🛡️

Understanding DDoS Attacks and Prevention

Sep 4, 2024

DDoS Explained Lecture Notes

Introduction

  • Presenter: Arya
  • Topic: Distributed Denial of Service (DDoS) attacks
  • Agenda:
    • Definition and basic understanding of DDoS and DoS (Denial of Service) attacks
    • Explanation of how these attacks work
    • Types of DDoS attacks
    • Demonstration of performing a DoS attack

Understanding DoS and DDoS

  • DoS (Denial of Service):

    • Denial of any kind of service (e.g., phone confiscation as an analogy)
    • In computing, involves hijacking servers, overloading ports, denying wireless authentication, etc.
    • Can be executed from a single machine (easy to detect and mitigate)
  • DDoS (Distributed Denial of Service):

    • Attack executed from multiple devices over a wide area
    • Difficult to stop and identify the main source

How DDoS Attacks Work

  • Aim to make a service unavailable by lowering machine performance
  • Methods include:
    • Flooding servers with connection requests
    • Sending unfragmented packets
    • Use of botnets to amplify attacks

Types of DDoS Attacks

  1. Ping of Death:

    • Exploits TCP/IP protocol by sending oversized packets
    • Causes computers to crash or freeze
  2. Reflected Attacks:

    • Uses botnets to send requests from multiple computers
    • Overloads victim computers by spoofing source address
    • Also known as Smurf attacks
  3. Mail Bomb:

    • Targets email servers with oversized emails
    • Crashes servers due to increased load
  4. Teardrop Attack:

    • Exploits fragmentation offset in IP headers
    • Causes servers to fail in reassembling packets

Demonstration: Performing a DoS Attack

  • Tools Used:
    • Aircrack-NG suite (including Aircrack-NG, AirMon-NG, AirReplay-NG, Aerodump-NG)
    • MacChanger
  • Steps:
    • Open terminal and log in as root
    • Identify wireless network card using ifconfig
    • Install Aircrack-NG and MacChanger using apt-get install
    • Set network card in monitor mode:
      • ifconfig wl01 down
      • ifconfig wl01 mode monitor
      • ifconfig wl01 up
    • Kill interfering processes using airmon-ng check kill
    • Run a dump scan for available access points using aerodump-ng
    • Choose a target router for DoS
    • Use AirReplay to send deauthentication messages
    • Set up a script to automate deauthentication and MAC address change

Ethical Considerations

  • Performing such attacks may lead to prosecution
  • Ensure you have permission before conducting any network testing

Conclusion

  • Overview of DDoS, its workings, types, and a practical demonstration
  • Reminder to use this knowledge ethically and legally

End of Lecture


  • Note: If you have questions, comment on the video, and subscribe to the Edureka channel for more tutorials. Happy learning!