What is DDoS?

Eronmay

Kıdemli Moderatör
18 Tem 2016
3,718
268
Kader
What is DDoS?

DDoS, which is called "Distrubuted Denial of Service", is the distributed denial of service / blocking system used by white hat hackers and black hat hackers, which is not dropped and explained by experts in many cyber security fields. To give the best example of DDoS attack; You went to a bakery, and you bought a pita from the oven.

report-malware-families-2020-ban2.png


Purpose of their Attack

Don't damage the systems.

For political reasons.

For commercial reasons.

Web sites not working.

E-mail systems not working.

Telephone systems not working.

Game Servers not working.

Computer systems do not work as disabled.

To make boredom / weather.


beyaz-sapkali-hacker-nedir.png



DDoS Attack Types

HTTP Flood

SYN Flood

LAN Flood

UDP Flood

ICMP Flood


HTTP Flood

It forces the servers we use to use the most resources by setting them on POST or HHTP GET requests and sending these configured packets to the destination.

SYN Flood

During the three-way handshake, the target SYN + ACK sends the message type SYN message. It waits for the message called ACK that agreed. Since the SYN sent by the attacker comes from a fake IP address, the target will not be able to receive the ACK message. In this way, a vicious circle is created and the target system crashes.

LAN Flood

It basically resembles a SYN Flood attack. In this type of attack, the attacker uses the target party's IP address. As a result, the target itself starts sending SYN packets. This repeats in a vicious circle and the target system crashes.

UDP Flood


This Protekol does not have a hand-squeeze, which we call 3-way. For this reason, a more rapid attack is taking place. The attacker sends random data / packets targeting udp protocols. The system crashes as the target receiving these packets becomes unresponsive.

ICMP Flood

ICMP Flood attack, called Internet Control Message Protocol, sends an ICMP Echo Request, or Echo request, from many different points. The target party sends an Echo reply to these requests. This becomes a vicious circle and the system crashes.


kDHSnH.png


Have a nice day
 

THT SON MESAJLAR

Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.