Tear Drop, Land Attack, ICMP and UDP flooding

What is Tear Drop , Land Attack , ICMP or UDP flooding technic ? and How can I test with which tools or commands ?
siratorAsked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
ahoffmannConnect With a Mentor Commented:
Tear Drop - sending fragmented packets which force to use negative numbers in TCP/IP software
Land Attack - DoS where sorce IP is equal destinatin IP
ICMP or UDP flooding - sending huge amount of packets to victim (to much to explain details here)
How can I test? - use nmap http://www.nmap.org/
0
 
The--CaptainCommented:
>How can I test with which tools or commands ?

If you're looking for the actual attack tools, check google - I cannot (or at least, will not) provide links to them here.  

Or if you cannot wait, just run old versions of ssh, bind, ftp, sendmail, telnet, and portmap servers - the tools will install themselves automatically [chuckle]...

Cheers,
-Jon

P.S.  Thanks ahoffman for your sendmail suggestions - keep up the good work...

0
 
Tim HolmanCommented:
To be honest these attacks are all old hat now.  Most reputable firewalls stop these by default.
0
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

 
ahoffmannCommented:
examinations/homework papers are not as up-to-date as firewalls, probably ;-))
0
 
The--CaptainCommented:
>examinations/homework papers are not as up-to-date as firewalls, probably ;-))

The best summary of this thought I've heard to date is:

Holy homework questions, batman!

Cheers,
-Jon
0
 
ahoffmannCommented:
Jon, can't understand this phrase, just got it verbatim. Think I miss the joke ..
0
 
siratorAuthor Commented:
Thanks ahoffmann. Anyway for ICMP or UDP flooding , I heard that , it can be solved by O.S. itself. Really ? and Do you know , how ?
0
 
ahoffmannCommented:
I only know of Linux (probably BSD too) which can set some counters which are used to deteckt potential floodings.
Solaris also have some rough implementation of this.
0
 
Tim HolmanCommented:
Software can detect potential floodings yes, but in doing so can be DoSsed itself, so best run this sort of thing on firewall platforms that don't even let such traffic through to your internal network.
0
 
The--CaptainCommented:
cisco has rate limiters that will stop this stuff as well.

ahoffman, I guess you never saw the 60's batman TV show (or the Justice League cartoon in the 80's) - Robin (of Batman and Robin, the comic book characters) would always exclaim:

"Holy <favorite goofy thing>, batman!"

in a really silly manner - true camp.

Cheers,
-Jon
0
 
ahoffmannCommented:
Thanks Jon, think we continue this chat in another thread ;-)
0
 
The--CaptainCommented:
I thought that's what PAQ's were for hehe (just kidding).

Cheers,
-Jon
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.