5. DoS (Denial of Service) contd.,
● Data will not be transmitted to the users
from the server
● Service will be denied due to the attack
● Attack creates clogging of data packets by
creating heavy ip traffic
6. Tools Required
● A Linux Machine
● Mono, an open source implementation of
.NET Framework
● Mono-gmcs, a C# compiler
● Loic.sh, a shell script which creates a flood
of packets
13. (Contd…)
● Now, we are going to perform the attack on
the most renouned social networking site
i.e., Facebook.
● For this, we have to specify the URL in the
input column allocated for it.
● And then we set the mode to UDP because
it helps us to flood packets without the
requirement of an acknowledgement.
14.
15.
16.
17.
18.
19.
20.
21. Process Explained
● The packets were appended with random
characters and are streamed into the
subnet of the server.
● As a result, a very heavy ip traffic is created
in the subnet and blocks all the packets that
are being sent by the server.
● If the server uses TCP broadcast, the hop
packets create more traffic and help the
attacker.
22. Pros & Cons
● Although, the attack can't target a specific
victim, it damages the server and its
reputation to a greater level.
● The attacker can't be traced back because,
the attacker will not receive any packet
from the server and also he uses a forged
ip address while streaming the packets.
● Heavy loss incurrence when performed on
transaction processes.