Solved

What Is Dos Attack

Posted on 2013-06-07
4
544 Views
Last Modified: 2013-06-20
What Is Dos attack,

Is Dos attack can be made on webservers only or DOS attack can be made on voip(asterisk) server, mail servers etc.
0
Comment
Question by:pawanopensource
4 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 125 total points
ID: 39230064
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users...

< https://en.wikipedia.org/wiki/Denial-of-service_attack >

Almost all servers can be subjects to DOS attacks.
0
 
LVL 16

Assisted Solution

by:uescomp
uescomp earned 125 total points
ID: 39230174
Was popular way back to bring down machines using the ping command and loading packs to slow down servers to the point they are unusable, also known as the ping of death.

For instance using this command

ping -l 1024

This will ping with 1024 bytes

This article: http://en.wikipedia.org/wiki/Ping_of_death
0
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 125 total points
ID: 39231562
DOS attacks can be made against any network attached device including the networking devices themselves. Some devices and firewalls have built in protections to help by dropping all similar packets received from the same source if they are above a certain threshold of time indicating that they are most likely an attack.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 125 total points
ID: 39232340
As Rick_O_Shay stated, DOS attacks can be made against any networked device, that also includes your desktop, your network enabled cell phone, printers, anything.

If I cause your desktop to crash, then I have denied you a service.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now