DDoS (Distributed Denial of Service) is performed using multiple computers to attack the target victim computer.
What is DDoS?
Distributed Denial of Service occurs by using multiple computers to attack a specific target. In our previous article, we have provided detailed information about the Denial of Service (DoS). The DoS attack uses a single computer, while more than one computer uses this type of attack.
Other computers used to attack the victim computer are unaware of the attack. In an attack initiated by a hacker, he uses computers on the Internet to make a more powerful blow to the target. These computers on the Internet are exposed to malicious software.
As a result, if you have an unsecured computer, you help unintentionally and unaware of the DDoS attack.
How to Do Attack?
The attacker can easily start the attack remotely. A malware-infected computer community is at your fingertips, and when ordered, attacks on the target are initiated.
It can integrate these computers into their own network with malicious software that is transmitted to computers connected to the Internet and with a code inserted into this software by a Hacker.
Performing a DoS attack is an easy process. You can find many free tools on the internet. With basic software knowledge, you can infect computers with malicious software and infect them with your network.
Therefore, a attack can be made by capturing multiple computers.
The computers that carry out the attack are also called Zombie computers. The group of zombie computers is called Botnet. With Botnet, attacking the target computer is very simple. You don’t necessarily have to be a software engineer. There are even sites that provide Botnet service on the Internet. An attack can also be accomplished by renting Botnet through these sites.
The DDoS is actually a typical DoS attack. The difference between DoS and DDoS is the use of multiple computers.
The operating logic differs according to the DoS attack type. This type of attack has a Botnet network created by zombie computers. There are thousands of zombie malicious computers in this Botnet network.
In addition, this type of attack operates in a hierarchical structure. Each computer connected to the Internet can be included in a Botnet network. The simplest way to achieve this is to create a Trojan virus and distribute it on the Internet.
Within a Botnet network, there are handlers and zombies. The attacker needs a handler to gain control over the zombie computers. The instructions given by the attacker are transmitted to the handlers and then transmitted to the zombie computers to execute the given command.
Computers that communicate between the attacker and Zombie computers are called Handler computers. There are Zombie computers under each Handler computer.
Types of Attack
1. Application-Layer DDoS Attack
Application layer attacks are a type of attack that exploits Windows, Apache, OpenBSD, or other software vulnerabilities.
2. Protocol DDoS Attack
Protocol-based attacks are a type of DoS. This type of attack is usually done with attacks such as Ping of Death and SYN Flood.
3. Volume-Based DDoS Attack
Level-based attacks include ICMP Floods, UDP Floods, and other types of Flood attacks.
Sample programs that you can easily find on the internet are as follows;
4. Hiren Patel
In this article, we have described the basics of Distributed Denial of Service. In addition, these attacks can not only be done programmatically but also through web sites. Thanks for following us!
The point that should not forget is that these attacks are CYBERCRIME. It is definitely not recommended to do any attacks!