Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   489

DDOS attack methods tutorial / best practices

by PhantomLiar - 29 December, 2023 - 01:56 AM
This post is by a banned member (PhantomLiar) - Unhide
1.605
Posts
358
Threads
4 Years of service
#1

  1. TCP Flood
    • What It Does: Overwhelms a target server with TCP connection requests.
    • Best Used Against: Servers with limited resources to handle numerous connection requests.
    • Common Ports: Typically targets ports like 80 (HTTP) and 443 (HTTPS).
  2. UDP Flood
    • What It Does: Sends a large number of UDP packets to random ports on a remote host.
    • Best Used Against: Systems that poorly handle UDP traffic.
    • Common Ports: Can target any, but often 53 (DNS), 123 (NTP), and 161 (SNMP).
  3. HTTP Flood
    • What It Does: Simulates legitimate HTTP requests to overwhelm a web server.
    • Best Used Against: Websites and web applications.
    • Common Ports: Primarily port 80 (HTTP) and 443 (HTTPS).
  4. HTTPS Flood
    • What It Does: Similar to HTTP Flood but targets secure HTTPS connections.
    • Best Used Against: Secure web services.
    • Common Ports: Primarily port 443 (HTTPS).
  5. OVH Attack
    • What It Does: Specifically targets OVH hosting services with large-scale attacks.
    • Best Used Against: Websites or services hosted on OVH servers.
    • Common Ports: Depends on the specific service being targeted.
  6. NFO Attack
    • What It Does: Aims at disrupting services provided by NFOservers.
    • Best Used Against: Servers hosted by NFO.
    • Common Ports: Varies based on targeted service.
  7. ICMP Flood (Ping Flood)
    • What It Does: Overwhelms the target with ICMP Echo Request (ping) packets.
    • Best Used Against: Networks with poor ICMP management.
    • Common Ports: Not port-specific as it operates at the network layer.
  8. SYN Flood
    • What It Does: Sends a flood of TCP/SYN packets, often with a spoofed sender address.
    • Best Used Against: Servers that allocate resources for connections before completion.
    • Common Ports: Typically 80 (HTTP) and 443 (HTTPS).
  9. KillAll Attack
    • What It Does: Aims to terminate processes on the target system (not a typical DDoS method).
    • Best Used Against: Systems with known vulnerabilities to such attacks.
    • Common Ports: Varies based on the application targeted.
  10. Socket Flood
    • What It Does: Opens a large number of sockets on the target without closing them.
    • Best Used Against: Web servers or applications with limited socket handling.
    • Common Ports: Often 80 (HTTP) and 443 (HTTPS).
  11. STUN Attack
    • What It Does: Misuses the STUN protocol to flood a target with traffic.
    • Best Used Against: VoIP services or applications using STUN (Session Traversal Utilities for NAT).
    • Common Ports: Usually 3478 (STUN).
This post is by a banned member (tare12111) - Unhide
tare12111  
114
Posts
0
Threads
1 Year of service
#2
(29 December, 2023 - 01:56 AM)PhantomLiar Wrote: Show More
  1. TCP Flood
    • What It Does: Overwhelms a target server with TCP connection requests.
    • Best Used Against: Servers with limited resources to handle numerous connection requests.
    • Common Ports: Typically targets ports like 80 (HTTP) and 443 (HTTPS).
  2. UDP Flood
    • What It Does: Sends a large number of UDP packets to random ports on a remote host.
    • Best Used Against: Systems that poorly handle UDP traffic.
    • Common Ports: Can target any, but often 53 (DNS), 123 (NTP), and 161 (SNMP).
  3. HTTP Flood
    • What It Does: Simulates legitimate HTTP requests to overwhelm a web server.
    • Best Used Against: Websites and web applications.
    • Common Ports: Primarily port 80 (HTTP) and 443 (HTTPS).
  4. HTTPS Flood
    • What It Does: Similar to HTTP Flood but targets secure HTTPS connections.
    • Best Used Against: Secure web services.
    • Common Ports: Primarily port 443 (HTTPS).
  5. OVH Attack
    • What It Does: Specifically targets OVH hosting services with large-scale attacks.
    • Best Used Against: Websites or services hosted on OVH servers.
    • Common Ports: Depends on the specific service being targeted.
  6. NFO Attack
    • What It Does: Aims at disrupting services provided by NFOservers.
    • Best Used Against: Servers hosted by NFO.
    • Common Ports: Varies based on targeted service.
  7. ICMP Flood (Ping Flood)
    • What It Does: Overwhelms the target with ICMP Echo Request (ping) packets.
    • Best Used Against: Networks with poor ICMP management.
    • Common Ports: Not port-specific as it operates at the network layer.
  8. SYN Flood
    • What It Does: Sends a flood of TCP/SYN packets, often with a spoofed sender address.
    • Best Used Against: Servers that allocate resources for connections before completion.
    • Common Ports: Typically 80 (HTTP) and 443 (HTTPS).
  9. KillAll Attack
    • What It Does: Aims to terminate processes on the target system (not a typical DDoS method).
    • Best Used Against: Systems with known vulnerabilities to such attacks.
    • Common Ports: Varies based on the application targeted.
  10. Socket Flood
    • What It Does: Opens a large number of sockets on the target without closing them.
    • Best Used Against: Web servers or applications with limited socket handling.
    • Common Ports: Often 80 (HTTP) and 443 (HTTPS).
  11. STUN Attack
    • What It Does: Misuses the STUN protocol to flood a target with traffic.
    • Best Used Against: VoIP services or applications using STUN (Session Traversal Utilities for NAT).
    • Common Ports: Usually 3478 (STUN).

asdasdasdas
This post is by a banned member (PhantomLiar) - Unhide
1.605
Posts
358
Threads
4 Years of service
Bumped #3
This is a bump

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)