Current location - Quotes Website - Signature design - Hacker code daquan hacker code ddos
Hacker code daquan hacker code ddos
What does ddos mean?

DDOS is the abbreviation of (DistributedDenialofService), that is, Distributed Blocking Service. Hackers use DDOS attackers to control multiple machines to attack at the same time, so as to achieve the purpose of "preventing normal users from using services", thus forming DDOS attacks. With the continuous development of the Internet, the competition is becoming more and more fierce, and various DDOS attackers begin to appear.

What does ddos mean?

There are three main ways to attack ddos.

High traffic attack

Large-traffic attacks saturate the bandwidth and infrastructure of the network through massive traffic and completely consume them, thus achieving the purpose of network flooding. Once the traffic exceeds the capacity of the network or the connection ability between the network and other parts of the Internet, the network will be inaccessible. Examples of high-traffic attacks include ICMP, fragmentation and UDP flooding.

TCP state exhaustion attack

TCP state exhaustion attacks attempt to consume connection state tables that exist in many infrastructure components, such as load balancers, firewalls and application servers themselves. For example, a firewall must analyze each packet to determine whether the packet is a discrete connection, the existence of an existing connection, or the end of an existing connection. Similarly, the intrusion prevention system must track the state to realize signature-based packet detection and state protocol analysis. These devices and other stateful devices, including those responsible for equalizers, are often harmed by session flooding or connection attacks. For example, the Sockstress attack can fill the connection table by opening a socket, thus quickly flooding the state table of the firewall.

Application layer attack

Application layer attacks use more complex mechanisms to achieve hackers' goals. Application layer attacks do not flood the network with traffic or sessions, but slowly exhaust the application layer resources of specific applications/services. Application layer attack is very effective at low traffic rate, and the traffic involved in the attack may be legal from the protocol point of view. This makes application layer attacks more difficult to detect than other types of DDoS attacks. HTTP flooding, DNS dictionary, Slowloris, etc. Are examples of application layer attacks.

What is a d-dos attack?

The full name of DDoS is DistributedDenialofService, which translates into "Distributed Denial of Service" in Chinese, that is, a large number of legitimate distributed servers are used to send requests to the target, resulting in normal legal users being unable to obtain services.

For example, if a hacker takes control of thousands of computers and then makes them make requests to the Web server at the same time. Moreover, the response ability of the server is limited, and it will soon stop responding because of the exhaustion of resources.