SYN Flood attack explained
DDoS (Distributed Denial-of-Service) attacks use different methods of attack. While basic of flooding an host with a high quantity of traffic remain the same, some DDoS techniques are more effective...
View ArticlePing Of Death attack explained
The type of denial-of-service (or “DoS”) known as the Ping of Death (or “POD”) is an attack in which the attacker deliberately sends oversized ping packets to the target computer. Ping packets are...
View ArticleSmurf Attack explained
A Smurf attack is a denial-of-service (or ‘DoS’) attack from the ’90s based around a ping packet driven offense. At the time, they were known as one of the worst methods of DoS attack the internet had...
View ArticleTeardrop attack explained (Legacy attack)
A Teardrop attack is an older type of denial-of-service (DoS) attack, which affects machines running the Windows 3.1, Windows 95, Windows 98 and Windows NT operating systems, as well as older Linux...
View ArticleICMP Flood attack explained
An ICMP flood attack is a method of denial-of-service (or ‘DoS’) attack otherwise known as a ‘ping flood’. An ICMP flood is one of the simplest ping-based DoS attacks, largely what it sounds like, in...
View ArticleICMP Nuke attack explained
ICMP nukes (‘Click’ attacks) are an old method of denial-of-service (or ‘DoS’) attacks that involve the use of corrupted ICMP – Internet Control Message Protocol – packets to shut down connections....
View ArticleDNS Amplification Attack Explained
The internet acronym DNS stands for domain name server. These are the servers which translated the “www” web addresses, which humans understand and remember, into the numeric IP addresses, which...
View ArticleHow DDoS SYN Flood Works
We have investigated the denial of service or synchronized (SYN) flood attacks that have been occurring lately. The attacker’s goal is to send enough incomplete SYN requests to overwhelm the victim’s...
View ArticleWhat is a DDoS Attack?
A distributed denial of service attack, or DDoS attack, is method that can be used to force a particular website offline for an extended length of time. Unlike conventional electronic attacks, there is...
View Article