Hacking For Beginners – Manthan Desai
2010
27. How a ‘Denial of service’ attack works
On February 6th, 2000 Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day,hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in themorning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtuallychoked off.
How a "denial of service" attacks works
In a typical connection, the user sends a message asking the server it. The server returns theauthentication approval to the user. The user acknowledges this then is allowed onto the server.In a denial of service attack, the user sends several authentication server, filling it up. All requests havefalse return addresses, so the server can't find the user when it tries to send the authentication approval. The serverwaits, sometimes more than a minute, before closing the connection. When it does close the connection, the attackersends a new batch of forged requests, and the process begins again--tying up the service indefinitely.
Typical connection
www.hackingtech.co.tv
Page 151