Hacking For Beginners – Manthan Desai

2010

27. How a ‘Denial of service’ attack works

On February 6th, 2000 Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day,hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in themorning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtuallychoked off.

How a "denial of service" attacks works

In a typical connection, the user sends a message asking the server it. The server returns theauthentication approval to the user. The user acknowledges this then is allowed onto the server.In a denial of service attack, the user sends several authentication server, filling it up. All requests havefalse return addresses, so the server can't find the user when it tries to send the authentication approval. The serverwaits, sometimes more than a minute, before closing the connection. When it does close the connection, the attackersends a new batch of forged requests, and the process begins again--tying up the service indefinitely.

Typical connection

www.hackingtech.co.tv

Page 151