Disclaimer: the following content is meant for information purpose only and disfavor any kind of Hacking.
In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.
There are mainly two types of Dos attack:
- single host DOS
- distributed DOS
there are different mechanisms used to serve the purpose, but the prominent ones are:
- Ping of death
- Buffer Overflow
- SYN attack
ping of death:
The ping command is usually used to test the availability of a network resource. It works by sending small data packets to the network resource. The ping of death takes advantage of this and sends data packets above the maximum limit (65,536 bytes) that TCP/IP allows.
If the person or network which you want to take down is of small scale then the following command can serve the purpose through smd,
*google can not be take down through this ping command, we are taking it as example to understand
Ping google.com -t
if the network is of large scale then the amount of memory bandwidth can be increased by some extent or use the infinity factor as well,
Ping google.com -l 150 -t
2 thoughts on “Dos attack”
This is the perfect webpage for everyone who wishes to understand this topic. You realize so much its almost hard to argue with you (not that I personally would want toÖHaHa). You definitely put a brand new spin on a subject that has been written about for a long time. Great stuff, just great!
Right here is the perfect webpage for everyone who would like to understand this topic. You understand a whole lot its almost tough to argue with you (not that I really will need toÖHaHa). You certainly put a fresh spin on a subject that has been discussed for a long time. Wonderful stuff, just excellent!