@EggGump
2019-03-06T18:14:36.000000Z
字数 965
阅读 484
security
本文先讲解了DDoS攻击,再讲解基于reflector的DDoS攻击,最后基于各种网络协议的字段进行挨个分析,讲解哪些字段容易受到attacker的利用从而进行攻击。
DDoS攻击结构:
各协议可能被攻击的字段分析
ip :Type of Service
TCP:If the reflector’s stack has guessable TCP sequence numbers
ICMP: reflectors generating ICMP messages can likely be filtered out.
UDP:port number can be filtered.
DNS:递归查询,欺骗查询
http: would be a significant threat were it not for the likely quick traceback due to the non-spoofed connection from the slave to the proxy. Definitely a significant threat if servers running on stacks with predictable sequence numbers are widely deployed.
Other TCP application: would be a significant threat were it not for the likely quick traceback due to the non-spoofed connection from the slave to the proxy. Definitely a significant threat if servers running on stacks with predictable sequence numbers are widely deployed.
原文值得细看,不错的文章,就是语法太难了。