CharGEN flood
A type of transport level amplification DDoS attack, similar to NTP amplification. The attack exploits vulnerabilities of the very old CharGEN character generator protocol, sending small packets with a spoofed victim IP address to devices supporting the protocol (such as printers, copying machines, etc.). The devices’ responses are sent as UDP packets to Port 19 of the victim server, causing it to waste too much resources trying to handle them.
Other terms in this category
UDP floodTeardrop AttackICMP floodPing floodIP fragmentation attackSYN/ACK floodRST/FIN floodSlowloris or session attacksHTTP floodRecursive HTTP GET floodVoIP floodNTP floodDNS AmplificationIP Null AttackUDP floodMITM (man-in-the-middle) attackSYN flood, or SYN attackSIP malformed attackSNMP reflection attackMS SQL reflection DDoS attackMemcached DDoS attack
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy