OP 29 December, 2023 - 01:56 AM
- TCP Flood
- What It Does: Overwhelms a target server with TCP connection requests.
- Best Used Against: Servers with limited resources to handle numerous connection requests.
- Common Ports: Typically targets ports like 80 (HTTP) and 443 (HTTPS).
- What It Does: Overwhelms a target server with TCP connection requests.
- UDP Flood
- What It Does: Sends a large number of UDP packets to random ports on a remote host.
- Best Used Against: Systems that poorly handle UDP traffic.
- Common Ports: Can target any, but often 53 (DNS), 123 (NTP), and 161 (SNMP).
- What It Does: Sends a large number of UDP packets to random ports on a remote host.
- HTTP Flood
- What It Does: Simulates legitimate HTTP requests to overwhelm a web server.
- Best Used Against: Websites and web applications.
- Common Ports: Primarily port 80 (HTTP) and 443 (HTTPS).
- What It Does: Simulates legitimate HTTP requests to overwhelm a web server.
- HTTPS Flood
- What It Does: Similar to HTTP Flood but targets secure HTTPS connections.
- Best Used Against: Secure web services.
- Common Ports: Primarily port 443 (HTTPS).
- What It Does: Similar to HTTP Flood but targets secure HTTPS connections.
- OVH Attack
- What It Does: Specifically targets OVH hosting services with large-scale attacks.
- Best Used Against: Websites or services hosted on OVH servers.
- Common Ports: Depends on the specific service being targeted.
- What It Does: Specifically targets OVH hosting services with large-scale attacks.
- NFO Attack
- What It Does: Aims at disrupting services provided by NFOservers.
- Best Used Against: Servers hosted by NFO.
- Common Ports: Varies based on targeted service.
- What It Does: Aims at disrupting services provided by NFOservers.
- ICMP Flood (Ping Flood)
- What It Does: Overwhelms the target with ICMP Echo Request (ping) packets.
- Best Used Against: Networks with poor ICMP management.
- Common Ports: Not port-specific as it operates at the network layer.
- What It Does: Overwhelms the target with ICMP Echo Request (ping) packets.
- SYN Flood
- What It Does: Sends a flood of TCP/SYN packets, often with a spoofed sender address.
- Best Used Against: Servers that allocate resources for connections before completion.
- Common Ports: Typically 80 (HTTP) and 443 (HTTPS).
- What It Does: Sends a flood of TCP/SYN packets, often with a spoofed sender address.
- KillAll Attack
- What It Does: Aims to terminate processes on the target system (not a typical DDoS method).
- Best Used Against: Systems with known vulnerabilities to such attacks.
- Common Ports: Varies based on the application targeted.
- What It Does: Aims to terminate processes on the target system (not a typical DDoS method).
- Socket Flood
- What It Does: Opens a large number of sockets on the target without closing them.
- Best Used Against: Web servers or applications with limited socket handling.
- Common Ports: Often 80 (HTTP) and 443 (HTTPS).
- What It Does: Opens a large number of sockets on the target without closing them.
- STUN Attack
- What It Does: Misuses the STUN protocol to flood a target with traffic.
- Best Used Against: VoIP services or applications using STUN (Session Traversal Utilities for NAT).
- Common Ports: Usually 3478 (STUN).
- What It Does: Misuses the STUN protocol to flood a target with traffic.