MS SQL reflection DDoS attack
An attack type that exploits vulnerabilities of the MC-SQLR protocol used for sending queries to Microsoft SQL Server. An overload of a victim’s link is achieved as a result of getting lists of all database instances stored on multiple public SQL servers (including those hosted by service and cloud providers), along with the information on how to connect to those instances. The data is provided in response to a stream of spoofed scripted requests containing the attacked node’s IP address, sent to those SQL servers.
Other terms in this category
UDP floodTeardrop AttackICMP floodPing floodIP fragmentation attackSYN/ACK floodRST/FIN floodSlowloris or session attacksHTTP floodRecursive HTTP GET floodVoIP floodNTP floodDNS AmplificationIP Null AttackUDP floodMITM (man-in-the-middle) attackSYN flood, or SYN attackSIP malformed attackSNMP reflection attackCharGEN floodMemcached DDoS attack
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy