Pages

Friday, 21 December 2012

4rcrip3x- FireFlood DDOS


SYN Flood – A high rate of TCP SYN is sent to the destination target network or host but never ACKs the SYN-ACK. This should tie up CPU and memory resources on the target and make services unavailable to take new requests.

Session Flood – The attack will complete a high rate of full TCP three-way handshakes but never send data. The destination will have established sessions not being utilized and will eventually run out of resources.

SYN-ACK Flood – This generates SYN-ACK packets toward the destination target at a very high rate. The SYN-ACK is usually sent to a client and often will exhaust server system CPU resources.

UDP Flood – The attack sends a high rate of UDP packets toward the destination network or server. This flood can consume both bandwidth and processing resources.

No comments:

Post a Comment