Continued from page 1
A SYN attack simply buries its target by swamping it with TCP SYN packets. Each SYN packet demands a SYN-ACK response and causes
server to wait for
proper ACK in reply. Of course,
attacker never gives
ACK, or, more commonly, it uses a bad IP address so there's no chance of an ACK returning. This quickly hogties a server as it tries to send out SYN-ACKs while waiting for ACKs.
When
SYN-ACK queues fill up,
server can no longer take any incoming SYNs, and that's
end of that server until
attack is cleared up. The Land attack makes SYN one-step nastier by using SYN packets with spoofed IP addresses from your own network.
There are many ways to reduce your chances of getting SYNed, including setting your firewall to block all incoming packets from bad external IP addresses like 10.0.0.0 to 10.255.255.255, 127.0.0.0 to 127.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255, as well as all internal addresses. But, as SCO discovered, if you throw enough SYN packets at a site, any site can still be SYNed off
net.
Brute Force Attacks
Common brute force attacks include
Smurf attack and
User Datagram Protocol (UDP) flood. When you're Smurfed, Internet Control Message Protocol (ICMP) echo request packets, a particular type of ping packet, overwhelm your router. Making matters worse, each packet's destination IP address is spoofed to be your local broadcast address. You're probably already getting
picture. Once your router also gets into
act of broadcasting ICMP packets, it won't be long before your internal network is frozen.
A UDP flood works by someone spoofing a call from one of your system's UDP chargen programs. This test program generates semi-random characters for received packets with another of your network's UDP echo service. Once these characters start being reflected, your bandwidth quickly vaporizes.
Fortunately, for these two anyway, you can usually block them. With Smurfing, just setting your router to ignore broadcast addressing and setting your firewall to ignore ICMP requests should be all you need.
To dam up UDP floods, just block all non-service UDP services requests for your network. Programs that need UDP will still work. Unless, of course,
sheer volume of
attack mauls your Internet connection.
That's where
DDoS attack programs such as Tribe Force Network (TFN), Trin00, Trinity, and Stacheldraht come in. These programs are used to set DDoS attack agents in unprotected systems. Once enough of them have been set up in naÃ?Æ?Ã?¯ve users' PCs,
DDoS controller sets them off by remote control, burying target sites from hundreds or even thousands of machines.
Unfortunately, as more and more users add broadband connections without
least idea of how to handle Internet security, these kinds of attacks will only become more common.
Deflecting DDoS Attacks
So what can you do about DDoS threats? For starters, all
usual security basics can help. You know
drill: make sure you have a firewall set up that aggressively keeps everything out except legal traffic, keep your anti-viral software up to date so your computers do not become a home for DDoS agents like TFN, and keep your network software up to date with current security patches. This won't stop all DDoS attacks, but it will stop some of them like Smurfing.
You may not think you need these services, since in a worse case scenario you're still going to get knocked off
net. But not every attack will be a massive one with thousands of attackers. For most attacks, these services can definitely help.
And, let's face it, today we have PC's
net 24-7. With DDoS attacks on
rise, you'd be wise to at least familiarize yourself with DDoS prevention services. After all, it's not only your network in danger, it's your business.

An elite team of regular "Joes's" fighting back & making huge cash online one day at a time. dDawg as a team has been able to create a profit on the internet. http://www.str8junk.com