CharGEN flood
A type of transport level amplification DDoS attack, similar to NTP amplification. The attack exploits vulnerabilities of the very old CharGEN character generator protocol, sending small packets with a spoofed victim IP address to devices supporting the protocol (such as printers, copying machines, etc.). The devices’ responses are sent as UDP packets to Port 19 of the victim server, causing it to waste too much resources trying to handle them.
Other terms in this category
UDP FloodTeardrop AttackVoIP floodMS SQL reflection DDoS attackCharGEN floodSNMP reflection attackSIP malformed attackSYN Flood, or SYN AttackMITM (man-in-the-middle) attackIP Null AttackDNS AmplificationNTP floodMemcached DDoS attackRecursive HTTP GET floodHTTP floodSlowloris or session attacksRST/FIN FloodSYN/ACK FloodIP Fragmentation AttackWhat Is a Ping Flood?What is an ICMP Flood Attack?
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy