Solved

Tear Drop, Land Attack, ICMP and UDP flooding

Posted on 2002-06-26
12
2,453 Views
Last Modified: 2007-12-19
What is Tear Drop , Land Attack , ICMP or UDP flooding technic ? and How can I test with which tools or commands ?
0
Comment
Question by:sirator
  • 5
  • 4
  • 2
  • +1
12 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
Comment Utility
Tear Drop - sending fragmented packets which force to use negative numbers in TCP/IP software
Land Attack - DoS where sorce IP is equal destinatin IP
ICMP or UDP flooding - sending huge amount of packets to victim (to much to explain details here)
How can I test? - use nmap http://www.nmap.org/
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
>How can I test with which tools or commands ?

If you're looking for the actual attack tools, check google - I cannot (or at least, will not) provide links to them here.  

Or if you cannot wait, just run old versions of ssh, bind, ftp, sendmail, telnet, and portmap servers - the tools will install themselves automatically [chuckle]...

Cheers,
-Jon

P.S.  Thanks ahoffman for your sendmail suggestions - keep up the good work...

0
 
LVL 23

Expert Comment

by:Tim Holman
Comment Utility
To be honest these attacks are all old hat now.  Most reputable firewalls stop these by default.
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
examinations/homework papers are not as up-to-date as firewalls, probably ;-))
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
>examinations/homework papers are not as up-to-date as firewalls, probably ;-))

The best summary of this thought I've heard to date is:

Holy homework questions, batman!

Cheers,
-Jon
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
Jon, can't understand this phrase, just got it verbatim. Think I miss the joke ..
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 

Author Comment

by:sirator
Comment Utility
Thanks ahoffmann. Anyway for ICMP or UDP flooding , I heard that , it can be solved by O.S. itself. Really ? and Do you know , how ?
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
I only know of Linux (probably BSD too) which can set some counters which are used to deteckt potential floodings.
Solaris also have some rough implementation of this.
0
 
LVL 23

Expert Comment

by:Tim Holman
Comment Utility
Software can detect potential floodings yes, but in doing so can be DoSsed itself, so best run this sort of thing on firewall platforms that don't even let such traffic through to your internal network.
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
cisco has rate limiters that will stop this stuff as well.

ahoffman, I guess you never saw the 60's batman TV show (or the Justice League cartoon in the 80's) - Robin (of Batman and Robin, the comic book characters) would always exclaim:

"Holy <favorite goofy thing>, batman!"

in a really silly manner - true camp.

Cheers,
-Jon
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
Thanks Jon, think we continue this chat in another thread ;-)
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
I thought that's what PAQ's were for hehe (just kidding).

Cheers,
-Jon
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now