![Can 0 really be a factor? OFactor](http://www.geocities.com/mrburkemath/images/ofactor01.png)
Posted on 09/19/2008 1:28:47 PM PDT by kristinn
No, you commandeer zombie PCs under control of various worms/trojan horses and order them to ping a particular site to death.
Basically the server is bombarded with worthless data requests, crowding out legitimate site requests.
And its not that hard to do.
This isn’t necessarily software, this can also be hardware, or a combination of both.
However there’s almost alway a hardware aspect to a DoS or DDoS attack, as it has to do with the speed and capacity of the connection between what is called the system’s Network Interface (Ethernet, Fiber Optic, etc) and the outside world.
Secondarily, in a Web context, it has to do with how fast the webserver software on a system can serve up Web pages.
This can be a bottleneck because of CPU capacity/speed, memory, system tuning, or a number of other factors.
If it is bombarded, then the out to be able to see the IP addresses that are the source of it.
You have the right idea, but let me clarify further:
The use of the terms DoS and DDoS make an explicit connotation that it’s a deliberate attack on a system, as opposed to a website just getting too popular for its britches.
:-)
Cyberterrorists. Time to send the punks to fed prison (about the only chance they have of getting laid, anyhow).
BOR website came up just fine and dandy
There’s no point - can be thousands of addresses, all owned by people who have no clue whats going on because their systems are compromised. Their only hint is the PC is slower than usual.
I’m on the Ping of Death honor roll. (Ancient history)
This didn’t involve hacking- it involved investigation of a vulnerability where a malformed PING request could make a server crash.
This went across operating system lines.
There are several fairly effective countermeasures vs a standard DDoS attack (yes, I’ve worked on some, no, I’m not going to discuss them). And I mean beyond just IP blocking (which does work OK against VERY basic DDoS attacks, but can also block legit users, esp. if their computers have been zombied unbeknownst to them).
That said, a sophisticated DDoS attack can be a real pain in the @zz to handle. My bet is this will be the former, not the later.
Speaking of sneaky stuff like that, remember the early days of Windows 95 when you could crash anyone with a unique TCP packet? (winnuke)
I see nothing gets by you.
Yep.
For some reason, your post made me think of the prison scene in “My Cousin Vinny” where Vinny first meets his cousin’s friend in the jail cell.
I’ve worked in mission-critical computing for almost 20 years so I have some small familiarity with that of which you speak.
And I thank God daily that I don’t admin Windows systems.
:-)
Don’t remember that particular one, but I do remember having to go out and get Trumpet Winsock because Windows didn’t have a TCP/IP stack built in in those days...
Thank you both for your replies, it gives me a better idea of what’s happening.
I don’t think I’ve seen that film since not long after it was released. Pesci was great (as always).
pound-me-in-the-ass jail
LOL... I’m going to use that. I’m still laughing!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.