What Is A DDoS Attack and How Can It Be Fended Off
What Is A DDoS Attack and How Can It Be Fended Off
Prepared by:
Engr. Virgilio A. Zacarias, Jr.
• With work from home being the norm in today’s era, people spend considerable
time on the internet, often without specific measures to ensure a secure session.
Apart from individuals, organizations worldwide that host data and conduct
business over the internet are always at the risk of a DDoS attack.
• In a DOS attack, the hacker seeks to make the resources of a particular server,
database, or router inaccessible to its users. This can be done by clogging the
available bandwidth of the target, be it via continuous web requests or indefinite
ping commands. Analogous to how blocking a shop’s door prevent potential
clients from entering it, DOS attacks were complete distress in the early days of
network security.
• The term DDoS is an acronym for ‘distributed denial of service’. Instead of a
single device attacking a single server, DDoS attacks have multiple systems
attacking a target, identifying the original hacker. With all the devices trying to
access the resources of a server, legitimate users are unable to access them, which
causes a server outage of sorts.
• Now that you have learned what is a DDoS attack, take a look at how a DDoS
attack works.
HOW DOES A DDOS
AT T A C K W O R K ?
• You have two virtual machine instances in this demo. One of them is Parrot
Security, which a hacker generally uses to launch certain attacks like DDoS on
specific targets. The second virtual machine is a standard Linux distribution that
acts as our target system. The majority, if not all, servers worldwide use Linux as
a backend, thanks to its stability and low resource consumption.
1 . Yo u h a v e t o s e t u p a w i r e s h a r k p r o g r a m o n o u r t a rg e t
system, which helps analyze the network traffic being sent
and received from the instance.
2. To attack the target, you need to get its IP address, which
a c t s a s a n i d e n t i f i e r f o r t h e s y s t e m . Yo u c a n f i n d t h e l o c a l I P
address by using the command “ifconfig”.
3. To launch the attack, we will need a program called hping3. It is
a c o m m a n d - l i n e t o o l t h a t a c t s a s a p a c k e t g e n e r a t o r a n d a n a l y z e r
f o r t h e T C P / I P p r o t o c o l . Yo u w i l l u s e t h e I P a d d r e s s d e t e c t e d i n t h e
p r e v i o u s i m a g e t o s t a r t t h e a t t a c k . T h e c o m m a n d t o b e g i v e n u s i n g
h p i n g 3 i s :
4 . O n c e t h i s c o m m a n d i s r u n , y o u c a n w a t c h t h e w i r e s h a r k w i n d o w
o n o u r t a r g e t s y s t e m a n d w a t c h a f l u r r y o f r e q u e s t s b e i n g s e n t
f r o m a s i n g l e I P a d d r e s s . A f t e r a f e w s e c o n d s , t h e s y s t e m b e c o m e s
c o m p l e t e l y u n r e s p o n s i v e d u e t o t h e l a c k o f p r o c e s s i n g p o w e r i n
h a n d l i n g s o m a n y r e q u e s t s s i m u l t a n e o u s l y.
• What you just launched was a DoS attack or a simple denial of service attack.
Attacks of such small magnitude are not able to break down the behemoth servers
for multinational corporations. When multiple systems start doing the same thing
to more extensive and robust systems, they eventually succumb to the attack
unless urgent measures are taken. Since more than a single system disrupts
communication, it’s termed DDoS, or distributed denial of service.