2 cissp ® Official Study Guide Eighth Edition


Smurf and Fraggle Attacks



Download 19,3 Mb.
Pdf ko'rish
bet697/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   693   694   695   696   697   698   699   700   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

751
Smurf and Fraggle Attacks
Smurf and fraggle attacks are both DoS attacks. A 
smurf attack
is another type of flood 
attack, but it floods the victim with Internet Control Message Protocol (ICMP) echo pack-
ets instead of with TCP SYN packets. More specifically, it is a spoofed broadcast ping 
request using the IP address of the victim as the source IP address.
Ping uses ICMP to check connectivity with remote systems. Normally, ping sends an 
echo request to a single system, and the system responds with an echo reply. However, in 
a smurf attack the attacker sends the echo request out as a broadcast to all systems on the 
network and spoofs the source IP address. All these systems respond with echo replies to 
the spoofed IP address, flooding the victim with traffic.
Smurf attacks take advantage of an amplifying network (also called a smurf amplifier) 
by sending a directed broadcast through a router. All systems on the amplifying network 
then attack the victim. However, RFC 2644, released in 1999, changed the standard 
default for routers so that they do not forward directed broadcast traffic. When admin-
istrators correctly configure routers in compliance with RFC 2644, a network cannot be 
an amplifying network. This limits smurf attacks to a single network. Additionally, it 
is common to disable ICMP on firewalls, routers, and even many servers to prevent any 
type of attacks using ICMP. When standard security practices are used, smurf attacks are 
rarely a problem today.
Fraggle
attacks are similar to smurf attacks. However, instead of using ICMP, a fraggle 
attack uses UDP packets over UDP ports 7 and 19. The fraggle attack will broadcast a UDP 
packet using the spoofed IP address of the victim. All systems on the network will then 
send traffic to the victim, just as with a smurf attack.
Ping Flood

ping flood attack
floods a victim with ping requests. This can be very effective when 
launched by zombies within a botnet as a DDoS attack. If tens of thousands of systems 
simultaneously send ping requests to a system, the system can be overwhelmed trying to 
answer the ping requests. The victim will not have time to respond to legitimate requests.
A common way that systems handle this today is by blocking ICMP traffic. Active intru-
sion detection systems can detect a ping flood and modify the environment to block ICMP 
traffic during the attack.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   693   694   695   696   697   698   699   700   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish