Exploit

Post category:#Attacks

A piece of software code or module used for attacking vulnerable nodes in order to gain command and control over them, carry out a destructive action, or cause a denial of service.

Read moreExploit

Attack Amplification

Post category:#Attacks

A way to implement a DoS attack providing a manifold increase in impact on a victim server: a small number of bots initiate sending a huge amount of forged packets or requests, which severely slow down or paralyze the attacked server that tries to process them.

Read moreAttack Amplification

Smurf Attack

Post category:#Attacks

A Smurf attack is a type of DDoS attack that exploits the ICMP protocol and causes a stream of packets to the victim. At startup, large packages are created when using a method called "spoofing". The intended result is to slow down the target system to such an extent that it becomes inoperable and vulnerable.

Read moreSmurf Attack

VoIP Flood

Post category:#Attacks

A DoS attack, a variant of UDP flood implemented by sending large amounts of forged VoIP packets from a wide range of IP addresses to a VoIP server, usually used by a call center. As a result, the server wastes too much of its resources trying to handle the bogus requests. Due to some aspects of UDP protocol, a VoIP flood attack can be very hard to detect.

Read moreVoIP Flood