3. A router is a networking device that forwards data
packets between computer networks. Routers perform
the traffic directing functions on the Internet.
A Wireless Adapter is a device which enable a system to
connect to wireless networks and can be able to capture
packets which are not intended to it.
The most familiar type of routers are home and small
office routers that simply forward IP packets between the
home computers and the Internet. An example of a router
would be the owner's cable or DSL router, which connects
to the Internet through an Internet service provider (ISP)
Router
4. DOS ATTACKS
Flooding
• Attacker sends an overwhelming number of messages at your
machine; great congestion
• The congestion may occur in the path before your machine
• Messages from legitimate users are crowded out
• Usually called a Denial of Service (DoS) attack, because that’s
the effect.
• Usually involves a large number of machines, hence
Distributed Denial of Service (DDoS) attack
5. Bombs victim With
HTTP requests
Legitimate
requests can’t
get through and
fails.
.
Router
(Access Point)
Attacker’s PC
(Hacker)
Client
(Victim)
Kali Linux: aireplay-ng
deauth -0 –a
5H:KO:9I:7J:89:J9
6. SYN
Client requests for connection
ACK + SYN
Server agrees for connection
request
ACK
Client finishes handshake
Client connecting to TCP
port
LISTEN
SYN_RCVD
CONNECTED
Four-way Handshake
A four-way handshake is a method used in a TCP/ IP
network to create a connection between a local
host/client and server. It is a four-step method that
requires both the client and server to exchange SYN and
ACK (acknowledgment) packets before actual data
communication begins.
7. ESTONIAN CYBER WAR APRIL 27, 2007 :-
• Weeks of cyber attacks followed, targeting government and banks,
ministries, newspapers and broadcasters Web sites of Estonia.
• Some attacks took the form of distributed denial of service (DDoS)
attacks (using ping floods to expensive rentals of botnets).
• 128 unique DDOS attacks (115 ICMP floods, 4 TCP SYN floods and
9 generic traffic floods).
• Used hundreds or thousands of "zombie" computers and pelted
Estonian Web sites with thousands of requests a second, boosting
traffic far beyond normal levels.
8. Ways to protect from DOS attacks
VPN – Virtual Private Network
TES- Temporary Encryption System
Mac Filtering – It make a copy of attackers MAC address
and stop any packets that are coming for that MAC
address (5H:KO:9I:7J:89:J9 ).
Physically away from Attacker’s PC