DDoS Attack | DDoS Attack Explained | What Is A DDoS Attack? | Cyber Attacks Explained | Simplilearn

Simplilearn
1 Sept 202119:22

Summary

TLDRThis video from Simply Learn explores the concept of Distributed Denial of Service (DDoS) attacks, detailing their mechanics and the damage they can inflict on both individual users and large corporations. It covers the types of DDoS attacks, including volume-based, protocol level, and application layer attacks, and discusses the motives behind such cyber assaults. The video also offers practical advice on prevention and mitigation strategies, such as using load balancers, firewalls, and CDNs. A demonstration using VMware and Parrot Security OS illustrates the impact of a DDoS attack on a server system, highlighting the importance of robust cybersecurity measures.

Takeaways

  • 🏡 Work from home has increased internet usage, making individuals and organizations more vulnerable to cyber threats like DDoS attacks.
  • 🚀 DDoS attacks have escalated, with three of the six strongest attacks occurring in 2021, highlighting the growing severity of these incidents.
  • đŸ€– Cybercriminals are leveraging botnets and compromised devices to amplify DDoS attacks, making them more disruptive.
  • 🔒 Multinational corporations, including GitHub, have faced significant DDoS attacks, emphasizing the broad impact on businesses.
  • 🔄 DDoS attacks involve a two-phase process: creating a botnet and then launching an attack on a target, overwhelming it with traffic.
  • 📊 There are three main types of DDoS attacks: volume-based, protocol-level, and application-level, each with different methods and goals.
  • 💡 Hackers may launch DDoS attacks for various reasons, including gaining a competitive advantage, extortion, or making political statements.
  • đŸ›Ąïž Companies can protect against DDoS attacks by using load balancers, firewalls, and early detection systems to manage and mitigate traffic.
  • ☁ Cloud providers offer enhanced cybersecurity measures, including DDoS protection, and can provide network redundancy to maintain service continuity.
  • 🌐 Increasing bandwidth and using a Content Delivery Network (CDN) can helpćˆ†æ•Łæ”é‡, reducing the impact of DDoS attacks by avoiding a single point of failure.

Q & A

  • What is a DDoS attack?

    -A DDoS attack is a type of cyber attack where multiple systems flood a target with a overwhelming amount of traffic or requests, rendering it inaccessible to legitimate users by consuming all its bandwidth and system resources.

  • How do hackers create a botnet for DDoS attacks?

    -Hackers create a botnet by infecting multiple devices with malware, ransomware, or through social engineering. These compromised devices, known as bots or zombies, can then be remotely triggered to send traffic to a target server.

  • What are the three broad categories of DDoS attacks mentioned in the script?

    -The three broad categories of DDoS attacks are volume-based attacks, protocol-level attacks, and application-level attacks. Volume-based attacks overwhelm resources with traffic, protocol-level attacks consume essential server resources, and application-level attacks target application and operating system vulnerabilities.

  • What is the purpose of using a SYN flood in a DDoS attack?

    -A SYN flood is used in DDoS attacks to exhaust the resources of the target server. It does this by initiating a connection with a SYN request but never completing the handshake, causing the server to hold open connections and resources, eventually leading to denial of service.

  • Why would a hacker launch a DDoS attack to hold a company at ransom?

    -A hacker might launch a DDoS attack to hold a company at ransom to force the company to pay a designated amount of money to the hackers. The attack disrupts the company's services, which can be detrimental to their reputation and market value, prompting them to pay to restore service.

  • What is the role of load balancers in mitigating DDoS attacks?

    -Load balancers play a crucial role in mitigating DDoS attacks by distributing incoming traffic across multiple servers. This helps to prevent any single server from becoming overwhelmed and ensures that legitimate traffic can still be processed during an attack.

  • How can a CDN help in protecting against DDoS attacks?

    -A Content Delivery Network (CDN) can help protect against DDoS attacks by distributing content across multiple servers in different locations. This not only reduces the load on any single server but also ensures that there is no single point of failure, making it harder for an attack to take down the entire service.

  • What is the significance of the GitHub DDoS attack mentioned in the script?

    -The GitHub DDoS attack mentioned in the script is significant because it was one of the strongest DDoS attacks at the time, lasting about 20 minutes and causing the platform to reconsider its security practices. It highlights the impact that DDoS attacks can have on even large, well-established platforms.

  • What is the difference between a DDoS attack and a DoS attack?

    -The main difference between a DDoS attack and a DoS attack is the source of the malicious traffic. A DoS attack comes from a single system, while a DDoS attack originates from multiple systems, often part of a botnet, making it more difficult to defend against due to the distributed nature of the attack.

  • What are some preventive measures that can be taken to protect against DDoS attacks?

    -Some preventive measures against DDoS attacks include employing load balancers and firewalls, using cloud providers with high levels of cybersecurity, increasing available bandwidth, and utilizing CDNs. Early detection and response, including filtering traffic and blocking offending IPs, are also crucial.

Outlines

00:00

🌐 The Prevalence of DDoS Attacks in the Digital Age

This paragraph introduces the ubiquity of DDoS attacks in today's internet-reliant world. It discusses how individuals and organizations are at risk due to the increase in botnet farms and compromised devices. The paragraph highlights the severity of DDoS attacks, mentioning that three of the six strongest attacks occurred in 2021, with the most extreme happening in 2020. It also touches on the evolving tactics of cybercriminals, who are exploiting new services and protocols to amplify their attacks. The paragraph provides a real-world example with GitHub's 2018 DDoS attack, suspected to be state-sponsored, emphasizing the need for robust security practices. The paragraph concludes with an introduction to the video's agenda, which includes explaining what DDoS attacks are, their mechanisms, categories, and preventive measures, as well as a demonstration of their impact using VMware and Parrot Security OS.

05:01

đŸ›Ąïž Understanding the Anatomy and Categories of DDoS Attacks

The second paragraph delves into the different types of DDoS attacks, categorizing them into volume-based, protocol level, and application level attacks. Volume-based attacks aim to overwhelm resources with massive traffic, measured in bits per second. Protocol level attacks consume essential server resources like load balancers and firewalls, measured in packets per second. Application level attacks target application and OS vulnerabilities, measured in requests per second. The paragraph also explores the motives behind DDoS attacks, such as gaining a competitive advantage, extortion, and political activism. It suggests protective measures like employing load balancers, firewalls, and early detection systems to mitigate DDoS threats. The importance of analyzing attack patterns to strengthen security is also emphasized.

10:03

🔒 Strategies for Mitigating DDoS Attacks

Paragraph three focuses on strategies to protect against DDoS attacks. It suggests using cloud providers for enhanced cybersecurity, as they offer features like firewalls, threat monitoring, and network redundancy. The paragraph also mentions the advantage of cloud's greater bandwidth in withstanding DDoS attacks. Increasing a server's bandwidth to handle traffic spikes is discussed as a potential, albeit costly, solution. The use of Content Delivery Networks (CDNs) to distribute content and reduce the risk of single points of failure is highlighted, with examples of popular CDNs provided. The paragraph concludes with a setup for a demonstration of a DDoS attack's effects on a system using VMware and Parrot Security OS.

15:06

đŸ’» Demonstrating the Impact of DDoS Attacks

The final paragraph provides a practical demonstration of a DDoS attack using VMware and Parrot Security OS. It outlines the process of finding a target's IP address and using hping3 to simulate an attack. The paragraph describes the use of Wireshark to analyze network traffic and observe the attack's effects in real-time. The demonstration shows how a server can become unresponsive due to an overwhelming number of requests, illustrating the potential for DDoS attacks to render services completely inoperable. The paragraph concludes with a reminder that the demonstration is for educational purposes only and emphasizes the importance of conducting such tests only on authorized networks.

Mindmap

Keywords

💡DDoS Attack

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. In the context of the video, DDoS attacks are depicted as a significant threat to both individuals and organizations, with the potential to take down entire websites or services. The script mentions that these attacks are becoming more extreme, with hackers leveraging botnet farms and compromised devices to launch more powerful attacks.

💡Botnet

A botnet is a network of private computers infected with malware and controlled as a group without the owners' knowledge. In the video script, botnets are described as a key component in DDoS attacks, where a hacker can trigger these networks of infected devices to send requests from a remote source, overwhelming the target and hiding the identity of the original perpetrator.

💡Amplification

Amplification, in the context of DDoS attacks, refers to the technique where attackers exploit vulnerabilities in protocols or services to increase the volume of traffic they can generate. The script indicates that cyber criminals are actively seeking new services and protocols for amplifying DDoS attacks, making them more potent and harder to defend against.

💡GitHub

GitHub is a web-based hosting service for version control and source code management using Git. It's mentioned in the script as an example of a high-profile target of a DDoS attack in 2018, which lasted for about 20 minutes and was widely suspected to be conducted by Chinese authorities. This incident underscores the vulnerability of even large, well-known platforms to such attacks.

💡Malicious Data

Malicious data refers to any data intentionally crafted to cause harm or exploit vulnerabilities in a system. In the video, it's explained that DDoS attacks often involve sending a web server so many requests to serve a page that it crashes under the demand, or a database being hit with a high volume of queries, which are examples of malicious data being used to overwhelm systems.

💡Volume-Based Attacks

Volume-based attacks are a type of DDoS attack that uses massive amounts of bogus traffic to overwhelm a resource, such as a website or a server. The script describes these attacks as focusing on clogging all available bandwidth for the server, thereby cutting off the supply to legitimate users. Examples include ICMP, UDP, and spoofed packet flood attacks.

💡Protocol Level Attacks

Protocol level attacks are a category of DDoS attacks aimed at consuming essential resources of the target server, such as load balancers and firewalls. The script explains that these attacks, which include SYN floods and Smurf DDoS, are measured in packets per second and are designed to exhaust the protective systems against DDoS, rendering them ineffective.

💡Application Level Attacks

Application level attacks are sophisticated DDoS attacks that target the application and operating system level vulnerabilities. As described in the script, these attacks flood applications with maliciously crafted requests, measured in requests per second, with the goal of preventing specific applications from delivering necessary information to users and overwhelming the network bandwidth to the point of a system crash.

💡Load Balancers

Load balancers are devices or software that distribute network or application traffic across multiple servers. In the video script, load balancers are mentioned as a preventive measure against DDoS attacks, as they can reroute traffic from one server to another, reducing the risk of a single point of failure and adding resiliency to the server data.

💡Content Delivery Network (CDN)

A Content Delivery Network (CDN) is a system of distributed servers that deliver web content to users based on their geographic location and the server's proximity to the user. The script explains that CDNs can help mitigate DDoS attacks by distributing content across multiple locations, thus avoiding a single point of failure and providing a measure of protection against traffic spikes.

Highlights

Work from home has increased internet usage, leading to a rise in DDoS attacks.

Hackers have easy access to botnet farms and compromised devices, escalating DDoS attacks.

Three of the six strongest DDoS attacks were launched in 2021, with the most extreme occurring in 2020.

Cyber criminals are seeking new services and protocols to amplify DDoS attacks.

Multinational corporations, including GitHub, have faced significant DDoS attacks.

DDoS attacks aim to make a service impossible to deliver by overwhelming it with requests.

Botnets, networks of compromised devices, are often used to launch DDoS attacks.

DDoS attacks work in two phases: creating a botnet and then attacking a target.

There are three broad categories of DDoS attacks: volume-based, protocol level, and application level.

Hackers may launch DDoS attacks for competitive advantage, ransom, or political reasons.

Load balancers and firewalls can help protect against DDoS attacks by managing traffic.

Early detection of DDoS attacks is crucial for data recovery and system recovery.

Cloud providers offer high levels of cybersecurity, including protection against DDoS attacks.

Extra bandwidth can provide protection against DDoS attacks by handling unexpected traffic spikes.

Content Delivery Networks (CDNs) can mitigate DDoS attacks by distributing content and avoiding single points of failure.

A demonstration using VMware and Parrot Security OS shows the effects of DDoS attacks on a system.

The demo illustrates how a DDoS attack can render a server unresponsive and drop legitimate requests.

The video concludes with a reminder that DDoS attack demonstrations are for educational purposes only.

Transcripts

play00:08

with work from home being the norm in

play00:10

today's era people spend considerable

play00:12

amount of time on the internet often

play00:14

without specific measures to ensure a

play00:17

secure session

play00:18

apart from individuals organizations

play00:20

worldwide that host data and conduct

play00:22

business over the internet are always at

play00:25

the risk of a ddos attack

play00:27

these ddos attacks are getting more

play00:29

extreme with hackers getting easy access

play00:31

to botnet farms and compromised devices

play00:34

as can be seen in the graph three of the

play00:37

six strongest ddos attacks were launched

play00:39

in 2021 with the most extreme attack

play00:42

occurring just last year in 2020

play00:44

lately cyber criminals have been

play00:46

actively seeking out new services and

play00:48

protocols for amplifying these ddos

play00:51

attacks

play00:52

active involvement with hacked machines

play00:54

and botnets allow further penetration

play00:56

into the consumer space allowing much

play00:58

more elaborate attack campaigns

play01:01

apart from general users multinational

play01:03

corporations have also had their fair

play01:05

share of problems

play01:07

github a platform for software

play01:09

developers was the target of a ddos

play01:11

attack in 2018.

play01:13

widely suspected to be conducted by

play01:15

chinese authorities this attack went on

play01:17

for about 20 minutes after which the

play01:19

systems were brought into a stable

play01:21

condition

play01:22

it was the strongest ddos attack to date

play01:24

at the time and made a lot of companies

play01:26

reconsider the security practices to

play01:28

compare such attacks

play01:30

even after years of experimentation ddos

play01:33

attacks are still at large and can

play01:35

affect anyone in the consumer and

play01:37

corporate space

play01:38

hey everyone this is bev from simply

play01:41

learn and welcome to this video on what

play01:43

is a ddos attack

play01:45

let's take a look at the topics we will

play01:46

be covering today

play01:48

we start by learning what is a ddos

play01:50

attack and how it works on a face by

play01:52

phase level

play01:54

we learn about the distinct categories

play01:56

in ddos attacks and the potential aim of

play01:59

hackers when they launch a ddos attack

play02:01

campaign

play02:02

we also look at some preventive measures

play02:04

that can be taken to protect oneself

play02:06

from these ddos attacks

play02:08

finally we have a demonstration of how

play02:11

such attacks can hamper the working of a

play02:13

server system using vmware and parrot

play02:16

security operating system

play02:18

but before moving forward make sure you

play02:20

are subscribed to the simply learn

play02:21

youtube channel don't forget to hit the

play02:24

bell icon to receive updates about more

play02:26

informative videos from our channel so

play02:28

let's learn more about what is a ddos

play02:30

attack

play02:32

a distributed denial of service attack

play02:34

or ddos is when an attacker or attackers

play02:37

attempt to make it impossible for a

play02:39

service to be delivered

play02:41

this can be achieved by thwarting access

play02:43

to virtually anything servers devices

play02:46

services networks applications and even

play02:50

specific transactions within

play02:51

applications

play02:53

in a dos attack it's one system that is

play02:55

sending the malicious data or requests a

play02:58

ddos attack comes from multiple systems

play03:01

generally these attacks work by drowning

play03:03

a system with requests for data

play03:05

this could be sending a web server so

play03:07

many requests to serve a page that it

play03:09

crashes under the demand or it could be

play03:11

a database being hit with a higher

play03:13

volume of queries

play03:14

the result is available internet

play03:16

bandwidth cpu and ram capacity become

play03:19

overwhelmed

play03:21

the impact could range from a minor

play03:23

annoyance from disrupted services to

play03:25

experiencing entire websites

play03:27

applications or even entire businesses

play03:30

taking offline

play03:31

more often than not these attacks are

play03:33

launched using machines in a botnet

play03:36

a botnet is a network of devices that

play03:38

can be triggered to send requests from a

play03:40

remote source often known as the command

play03:42

and control center

play03:44

the bots in the network attack a

play03:46

particular target thereby hiding the

play03:48

original perpetrator of the ddos

play03:50

campaign

play03:52

but how do these devices come under the

play03:53

botnet and what are the requests being

play03:55

made to the web servers

play03:57

let's learn more about these and how dos

play03:59

attack work

play04:02

a ddos attack is a two-phase process

play04:05

in the first phase a hacker creates a

play04:07

botnet of devices

play04:09

simply put a vast network of computers

play04:11

are hacked via malware ransomware or

play04:14

just simple social engineering

play04:16

these devices become a part of the

play04:18

botnet which can be triggered anytime to

play04:21

start bombarding a system or a server on

play04:23

the instruction of the hacker that

play04:25

created the botnet

play04:27

the devices in this networks are called

play04:29

bots or zombies

play04:31

in the second phase a particular target

play04:33

is selected for the attack

play04:35

when the hacker finds the right time to

play04:37

attack all the zombies in the botnet

play04:39

network send these requests to the

play04:41

target thereby taking up all the servers

play04:43

available bandwidth

play04:45

these can be simple ping requests or

play04:47

complex attacks like syn flooding and

play04:50

udp flooding

play04:51

the aim is to overwhelm them with more

play04:53

traffic than the server or the network

play04:55

can accommodate the goal is to render

play04:58

the website or service inoperable

play05:00

there is a lot of wiggle room when it

play05:02

comes to the type of ddos attack a

play05:04

hacker can go with

play05:06

depending on the target's vulnerability

play05:08

we can choose one of the three broad

play05:10

categories of ddos attacks

play05:12

volume based attacks use massive amounts

play05:15

of bogus traffic to overwhelm a resource

play05:18

it can be a website or a server

play05:20

they include icmp udap and spoofed

play05:23

packet flood attacks

play05:25

the size of volume based attack is

play05:27

measured in bits per second

play05:29

these attacks focus on clogging all the

play05:31

available bandwidth for the server

play05:33

thereby cutting the supply shot

play05:36

several requests are sent to the server

play05:38

all of which warrant a reply thereby not

play05:40

allowing the target to cater to the

play05:42

general legitimate users

play05:45

next we have the protocol level attacks

play05:47

these attacks are meant to consume

play05:49

essential resources of the target server

play05:52

they exhaust the load balancers and

play05:54

firewalls which are meant to protect the

play05:56

system against the ddos attacks

play05:59

these protocol attacks include syn

play06:01

floods and smurf ddos among others and

play06:04

the size is measured in packets per

play06:05

second

play06:07

for example in ssl handshake server

play06:10

replies to the hello message sent by the

play06:12

hacker which will be the client in this

play06:14

case but since the ip is proved and

play06:16

leads nowhere the server gets stuck in

play06:18

an endless loop of sending the

play06:20

acknowledgement without any end in sight

play06:24

finally we have the application level

play06:26

attacks

play06:27

application layer attacks are conducted

play06:29

by flooding applications with

play06:30

maliciously crafted requests

play06:33

the size of application layer attacks is

play06:35

measured in request per second

play06:37

these are relatively sophisticated

play06:39

attacks that target the application and

play06:41

operating system level vulnerabilities

play06:44

they prevent the specific applications

play06:46

from delivering necessary information to

play06:48

users and hawk the network bandwidth up

play06:50

to the point of a system crash

play06:53

examples of such an attack are http

play06:55

flooding and bgp hijacking

play06:58

a single device can request data from a

play07:00

server using http post or get without

play07:03

any issues

play07:04

however when the requisite botnet is

play07:07

instructed to bombard the server with

play07:09

thousands of requests the database

play07:11

bandwidth gets jammed and it eventually

play07:13

becomes unresponsive and unusable

play07:16

but what about the reasons for such an

play07:18

attack there are multiple lines of

play07:20

thought as to why a hacker decides to

play07:22

launch a ddos attack on unsuspecting

play07:24

targets

play07:25

let's take a look at a few of them

play07:28

the first option is to gain a

play07:29

competitive advantage

play07:31

many ddos attacks are conducted by

play07:33

hacking communities against rival groups

play07:36

some organizations hire such communities

play07:39

to stagger their rivals resources at a

play07:41

network level to gain an advantage in

play07:43

the playing field

play07:44

since being a victim of a ddos attack

play07:46

indicates a lack of security the

play07:48

reputation of such a company takes a

play07:50

significant hit allowing the rivals to

play07:52

cover up some ground

play07:55

secondly some hackers launch these ddos

play07:57

attacks to hold multinational

play07:59

corporations at ransom

play08:01

the resources are jammed and the only

play08:03

way to clear the way is if the target

play08:05

company agrees to pay a designated

play08:07

amount of money to the hackers

play08:09

even a few minutes of inactivity is

play08:11

detrimental to a company's reputation in

play08:14

the global market and it can cause a

play08:16

spiral effect both in terms of market

play08:18

value and product security index

play08:21

most of the time a compromise is reached

play08:23

and the resources are freed after a

play08:25

while

play08:26

tdos attacks have also found use in the

play08:28

political segment

play08:30

certain activists tend to use ddos

play08:32

attacks to voice their opinion

play08:34

spreading the word online is much faster

play08:36

than any local rally or forum

play08:39

primarily political these attacks also

play08:42

focus on online communities ethical

play08:44

dilemmas or even protests against

play08:46

corporations

play08:47

let's take a look at a few ways that

play08:49

companies and individuals can protect

play08:52

themselves against edos attacks

play08:55

the company can employ load balancers

play08:57

and firewalls to help protect the data

play08:59

from such attacks

play09:01

load balancers reroute the traffic from

play09:03

one server to another in a ddos attack

play09:06

this reduces the single point of failure

play09:08

and adds resiliency to the server data

play09:11

a firewall blocks unwanted traffic into

play09:13

a system and manages the number of

play09:15

requests made at a definite rate it

play09:17

checks for multiple attacks from a

play09:19

single ip and occasional slowdowns to

play09:21

detect a ddos attack in action

play09:25

early detection of a ddos attack goes a

play09:27

long way in recovering the data lost in

play09:29

such an event

play09:31

once you've detected the attack you will

play09:33

have to find a way to respond for

play09:35

example you will have to work on

play09:37

dropping the malicious jdos traffic

play09:39

before it reaches your server so that it

play09:41

doesn't throttle and exhaust your

play09:43

bandwidth

play09:44

here's where you will filter the traffic

play09:46

so that only legitimate traffic reaches

play09:48

the server by intelligent routing you

play09:51

can break the remaining traffic into

play09:53

manageable chunks that can be handled by

play09:55

your cluster resources

play09:57

the most important stage in ddos

play09:59

mitigation is where you will look for

play10:00

patterns of redos attacks and use those

play10:03

to analyze and strengthen your

play10:05

mitigation techniques for example

play10:07

blocking an ip that's repeatedly found

play10:09

to be offending is a first step

play10:13

cloud providers like amazon web services

play10:15

and microsoft azure who offer high

play10:17

levels of cyber security including

play10:19

firewalls and threat monitoring software

play10:21

can help protect your assets and network

play10:23

from ddos criminals

play10:25

the cloud also has greater bandwidth

play10:27

than most private networks so it is

play10:29

likely to fail if under the pressure of

play10:31

increased tdos attacks

play10:34

additionally reputable cloud providers

play10:36

offer network redundancy duplicating

play10:38

copies of your data systems and

play10:40

equipment so that if your service

play10:42

becomes corrupted or unavailable due to

play10:44

a ddos attack you can switch to a secure

play10:47

access on backed up versions without

play10:49

missing a beat

play10:51

one can also increase the amount of

play10:53

bandwidth available to a host server

play10:55

being targeted

play10:56

since ddos attacks fundamentally operate

play10:59

on the principle of overwhelming systems

play11:01

with heavy traffic

play11:02

simply provisioning extra bandwidth to

play11:05

handle unexpected traffic spikes can

play11:07

provide a measure of protection

play11:09

this solution can prove expensive as a

play11:12

lot of that bandwidth is going to go

play11:13

unused most of the time

play11:16

a content delivery network or a cdn

play11:19

distributes your content and boosts

play11:21

performance by minimizing the distance

play11:23

between your resources and end users it

play11:26

stores the cached version of your

play11:27

content in multiple locations and this

play11:30

eventually mitigates ddos attacks by

play11:32

avoiding a single point of failure when

play11:34

the attacker is trying to focus on a

play11:36

single target

play11:37

popular cdns include akamai cdn

play11:40

cloudflare aws cloudfront etc

play11:45

let's start with our demo regarding the

play11:46

effects of ddos attacks on a system

play11:49

for a demo we have a single device that

play11:51

will attack a target making it a dos

play11:54

attack of sorts

play11:55

once a botnet is ready multiple devices

play11:58

can do the same and eventually emulate a

play12:00

ddos attack

play12:02

to do so we will use the virtualization

play12:04

software called vmware with an instance

play12:06

of parrot security operating system

play12:08

running for a target machine we will be

play12:11

running another vmware instance of a

play12:13

standard linux distribution known as

play12:15

linux light

play12:17

in a target device we can use wireshark

play12:20

to determine when the attack begins and

play12:22

see the effects of the attack

play12:23

accordingly

play12:26

this is linux like which is a target

play12:28

machine and this is parrot security

play12:31

which is used by the hacker when trying

play12:33

to launch a ddos attack this is just one

play12:35

of the distros that can be used

play12:39

to launch the attack we must first find

play12:41

the ip address of our target

play12:44

so to find the ip address we open the

play12:46

terminal

play12:54

we use the command ifconfig

play12:59

and here we can find the ip address

play13:01

now remember we're launching this attack

play13:03

in vmware now the both the instances of

play13:07

parrot security and linux light are

play13:09

being run on my local network so the

play13:11

address that you can see here is

play13:13

192.168.72.129

play13:16

which is a private address

play13:18

this ip cannot be accessed from outside

play13:21

the network basically anyone who is not

play13:23

connected to my wifi

play13:25

when launching attacks with public

play13:27

servers or public addresses

play13:29

it will have a public ip address that

play13:31

does not belong to the 192168 subnet

play13:36

once we have the ip address

play13:39

we can use a tool called

play13:41

hping3

play13:45

hping3 is an open source packet

play13:47

generator and analyzer for the tcp ip

play13:50

protocol

play13:53

to check what are the effects of an

play13:54

attack we will be using wireshark

play13:57

wireshark is a network traffic analyzer

play14:00

we can see whatever traffic that is

play14:02

passing through the linux light distro

play14:04

is being displayed over here with the ip

play14:08

address the source ip and the

play14:09

destination ip as to where the request

play14:12

is being transferred to

play14:14

once we have the dos attack launched you

play14:16

can see the results coming over here

play14:18

from the source ip which will be parrot

play14:20

security now to launch the hping3

play14:23

command we need to give sudo access to

play14:26

the console which is the root access

play14:34

now we have the root access for the

play14:36

console

play14:37

the hping3 command will have a few

play14:39

arguments to go with it which are as you

play14:42

can see on the screen

play14:45

minus s

play14:46

and a flood

play14:49

a hyphen v

play14:52

hyphen p80 and

play14:54

the ip address of the target which is

play14:57

168 72.129

play15:05

in this command we have a few arguments

play15:08

such as the minus s which specifies syn

play15:11

packets

play15:12

like in an ssl handshake we have the syn

play15:16

request that the client sends to the

play15:18

server to initiate a connection

play15:20

the hyphen flood aims to ignore the

play15:23

replies that the server will send back

play15:25

to the client in response to the syn

play15:28

packets here the parent security os is

play15:30

the client and linux slide being the

play15:33

server

play15:35

minus v stands for verbosity as in where

play15:38

we will see some output when the

play15:39

requests are being sent

play15:41

the hyphen p80 stands for port 80 which

play15:45

we can replace the port number if we

play15:47

want to attack a different port

play15:49

and finally we have the ip address of

play15:51

our target

play15:53

as of right now if we check wireshark it

play15:56

is relatively clear and there is no

play15:58

indication of a ddos attack incoming

play16:01

now once we launch the attack over here

play16:06

we can see the requests coming in from

play16:08

this ip which is 192 168 72.128

play16:14

till now even the network is responsive

play16:17

and so is linux lite

play16:22

the requests keep on coming and we can

play16:24

see the http

play16:27

flooding has started in flood mode

play16:32

after a few seconds of this attack

play16:34

continuing the server will start

play16:37

shutting down

play16:38

now remember linux light is a distro

play16:40

that can focus on one that serves as a

play16:43

back end

play16:44

now remember linux light is a distro and

play16:47

such linux distros are served as backend

play16:50

to many servers across the world for

play16:52

example a few seconds have passed from

play16:54

the attack

play16:56

now the system has become completely

play16:58

irresponsive

play16:59

this has happened due to the huge number

play17:01

of requests that came from pirate

play17:03

security

play17:05

you can see whatever i press nothing is

play17:07

responded even the wireshark has stopped

play17:09

capturing new request because the cpu

play17:11

usage right now is completely 100

play17:14

and at this point of time anyone who is

play17:16

trying to request some information from

play17:19

this linux distro or where this linux

play17:22

distro is being used as a backend for a

play17:24

server or a database cannot access

play17:27

anything else the system has completely

play17:29

stopped responding and any request any

play17:31

legitimate request from legitimate users

play17:34

will be dropped

play17:36

once you stop the attack over here it

play17:39

takes a bit of time to settle down

play17:41

now remember it's still out of control

play17:43

but eventually the traffic dies down and

play17:45

the system regains its strength

play17:48

it is relatively easy to gauge right now

play17:50

the effect of a dos attack now remember

play17:53

this linux light is just a vm instance

play17:56

actual website servers and

play17:58

web databases they have much more

play18:01

bandwidth and are very secure and it's

play18:04

tough to break into

play18:05

that is why we cannot use a single

play18:07

machine to break into them

play18:09

that is where a ddos attack comes into

play18:11

play what we did right now is a dos

play18:14

attack as in a single system is being

play18:16

used to penetrate a

play18:18

target server using a single request now

play18:22

when a ddos attack multiple systems such

play18:25

as multiple parallel security instances

play18:27

or multiple zombies or bots in a botnet

play18:29

network can attack a target server to

play18:32

completely shut down the machine and

play18:34

drop any legitimate request thereby

play18:36

rendering the service and the target

play18:38

completely unusable and

play18:40

inoperable

play18:42

as a final note we would like to remind

play18:44

that this is for educational purposes

play18:46

only and we do not endorse any attacks

play18:49

on any one domains only test this on

play18:52

servers and networks that you have

play18:54

permission to test on

play18:57

hope you learned something interesting

play18:58

today if you have any questions

play19:00

regarding the lesson feel free to ask us

play19:02

in the comments section and we will get

play19:04

back to you as soon as possible

play19:06

thank you for watching

play19:11

hi there if you like this video

play19:13

subscribe to the simply learn youtube

play19:14

channel and click here to watch similar

play19:17

videos turn it up and get certified

play19:19

click here

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityDDoS AttacksBotnetsHackingInternet SafetyNetwork DefenseCyber ThreatsOnline SecurityData ProtectionHacker Tactics
Besoin d'un résumé en anglais ?