?
Solved

What Is Dos Attack

Posted on 2013-06-07
4
Medium Priority
?
562 Views
Last Modified: 2013-06-20
What Is Dos attack,

Is Dos attack can be made on webservers only or DOS attack can be made on voip(asterisk) server, mail servers etc.
0
Comment
Question by:pawanopensource
4 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 500 total points
ID: 39230064
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users...

https://en.wikipedia.org/wiki/Denial-of-service_attack >

Almost all servers can be subjects to DOS attacks.
0
 
LVL 16

Assisted Solution

by:uescomp
uescomp earned 500 total points
ID: 39230174
Was popular way back to bring down machines using the ping command and loading packs to slow down servers to the point they are unusable, also known as the ping of death.

For instance using this command

ping -l 1024

This will ping with 1024 bytes

This article: http://en.wikipedia.org/wiki/Ping_of_death
0
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 500 total points
ID: 39231562
DOS attacks can be made against any network attached device including the networking devices themselves. Some devices and firewalls have built in protections to help by dropping all similar packets received from the same source if they are above a certain threshold of time indicating that they are most likely an attack.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 39232340
As Rick_O_Shay stated, DOS attacks can be made against any networked device, that also includes your desktop, your network enabled cell phone, printers, anything.

If I cause your desktop to crash, then I have denied you a service.
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
There's never been a better time to become a computer scientist. Employment growth in the field is expected to reach 22% overall by 2020, and if you want to get in on the action, it’s a good idea to think about at least minoring in computer science …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question