3. Create a denial of service
Hackers don't always want to gain privileges when they attack a company. Sometimes, they simply want to cause harm by disrupting a resource such as a network or system. To achieve this goal, he uses techniques that are often much simpler to implement than those we've already seen.
3.1 Resource saturation
The simplest methods include saturating network resources (usually bandwidth) or system resources (number of sessions, bandwidth, etc.). To achieve this, there are a number of different techniques, each of which affects a specific element of the resource.
-
Flooding saturates the network
The flooding principle is very simple. It's based on the fact that the hacker can generate more bandwidth...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Create a denial of service
Bibliography
Requests For Comments
Standard
- Information Technology – Telecommunications and information exchange between systems – Local and metropolitan networks – Common specifications – Part 3: Media access control bridges - ISO/IEC 15802-3 - 1998
Website
The Unofficial 802.11 Security Web Page http://www.drizzle.com/~aboba/IEEE
Tools
Taranis http://www.bitland.net/taranis
WEPCrack http://wepcrack.sourceforge.net
Macof http://security.royans.net/info/rawip/code/macof.shtml
...Organizations
Lawrence Berkeley National Laboratory's Network Research Group http://www-nrg.ee.lbl.gov
Computer Emergency Response Team – Industrie Services et Tertiaire (CERT-IST) http://www.cert-ist.com
Internet Assigned Numbers Authority (IANA)...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference