Solved

Tear Drop, Land Attack, ICMP and UDP flooding

Posted on 2002-06-26
12
2,471 Views
Last Modified: 2007-12-19
What is Tear Drop , Land Attack , ICMP or UDP flooding technic ? and How can I test with which tools or commands ?
0
Comment
Question by:sirator
  • 5
  • 4
  • 2
  • +1
12 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 7110041
Tear Drop - sending fragmented packets which force to use negative numbers in TCP/IP software
Land Attack - DoS where sorce IP is equal destinatin IP
ICMP or UDP flooding - sending huge amount of packets to victim (to much to explain details here)
How can I test? - use nmap http://www.nmap.org/
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7119718
>How can I test with which tools or commands ?

If you're looking for the actual attack tools, check google - I cannot (or at least, will not) provide links to them here.  

Or if you cannot wait, just run old versions of ssh, bind, ftp, sendmail, telnet, and portmap servers - the tools will install themselves automatically [chuckle]...

Cheers,
-Jon

P.S.  Thanks ahoffman for your sendmail suggestions - keep up the good work...

0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 7125167
To be honest these attacks are all old hat now.  Most reputable firewalls stop these by default.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7125456
examinations/homework papers are not as up-to-date as firewalls, probably ;-))
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7126138
>examinations/homework papers are not as up-to-date as firewalls, probably ;-))

The best summary of this thought I've heard to date is:

Holy homework questions, batman!

Cheers,
-Jon
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7127129
Jon, can't understand this phrase, just got it verbatim. Think I miss the joke ..
0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 

Author Comment

by:sirator
ID: 7127202
Thanks ahoffmann. Anyway for ICMP or UDP flooding , I heard that , it can be solved by O.S. itself. Really ? and Do you know , how ?
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7127251
I only know of Linux (probably BSD too) which can set some counters which are used to deteckt potential floodings.
Solaris also have some rough implementation of this.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 7127299
Software can detect potential floodings yes, but in doing so can be DoSsed itself, so best run this sort of thing on firewall platforms that don't even let such traffic through to your internal network.
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7127703
cisco has rate limiters that will stop this stuff as well.

ahoffman, I guess you never saw the 60's batman TV show (or the Justice League cartoon in the 80's) - Robin (of Batman and Robin, the comic book characters) would always exclaim:

"Holy <favorite goofy thing>, batman!"

in a really silly manner - true camp.

Cheers,
-Jon
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7127724
Thanks Jon, think we continue this chat in another thread ;-)
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7127778
I thought that's what PAQ's were for hehe (just kidding).

Cheers,
-Jon
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now