What does ddos attack use to attack?
DDoS is the abbreviation of Distributed Denial of Service, which is distributed denial of service.
Use the TCP three-way handshake vulnerability to attack. (Recommended study: PHP video tutorial)
SYN attack is the most common DDos attack on the current network and the most classic denial of service attack. It uses the TCP protocol An implementation flaw is that by sending a large number of attack packets with forged source addresses to the port where the network service is located, the half-open connection queue in the target server may be filled, thereby preventing other legitimate users from accessing. This attack was discovered as early as 1996, but it still shows strong vitality. Many operating systems and even firewalls and routers cannot effectively defend against this attack, and because it can easily forge the source address, it is very difficult to trace. Its packet characteristics are usually that the source sends a large number of SYN packets and lacks the last step of the three-way handshake ACK reply.
The principle behind a DDoS attack is to put it bluntly, it is a group attack. Many machines are used to launch a DoS attack on the target machine. However, this is not a case where many hackers participate together. This kind of attack is only operated by one hacker. This hacker does not own many machines. He uses his machines to occupy many "broilers" on the network and controls these "broilers" to launch DDoS attacks. Otherwise, how can it be called distributed? Still in the example just now, your machine can send 10 attack data packets per second, and the attacked machine can receive 100 data packets per second, so your attack will definitely not work, and if you use 10 or more If more machines come to attack the target machine, the results can be imagined.
How does DDoS attack?
The most popular and most useful attack method is to use SYN-Flood to attack. SYN-Flood is also a SYN flood attack.
SYN-Flood will not complete the third step of the TCP three-way handshake, that is, it will not send connection confirmation information to the server. In this way, the server cannot complete the third handshake, but the server will not give up immediately. The server will keep retrying and wait for a certain period of time before giving up the unfinished connection. This period of time is called SYN timeout, which is about 30 seconds. -About 2 minutes. If a user has a problem when connecting and causes a thread of the server to wait for 1 minute, it is not a big deal, but if someone uses special software to simulate this situation in large quantities, the consequences can be imagined. If a server processes these large amounts of semi-connection information and consumes a large amount of system resources and network bandwidth, the server will no longer have room to handle normal requests from ordinary users (because the ratio of normal requests from customers is very small). In this way, the server cannot work. This attack is called: SYN-Flood attack.
For more PHP-related technical articles, please visit the PHP Graphic Tutorial column to learn!
The above is the detailed content of What does ddos attack use to attack?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



With the development of the Internet, network attack methods have become more and more diverse, including DDoS attacks. This attack method uses multiple attack sources to initiate a large number of requests to the target server at the same time, causing the server to be overwhelmed and unable to work properly. . Therefore, protecting the server is very important for some important websites. As a high-performance, cross-platform web server and reverse proxy server, Nginx can help us resist DDoS attacks. The following will summarize the security practices of Nginx to prevent D

1. Characteristics of application layer DDoS attacks. Application layer (seventh layer/http layer) DDoS attacks are usually initiated by Trojan horse programs, which can be designed to better exploit the vulnerabilities of the target system. For example, for a system that cannot handle a large number of concurrent requests, just by establishing a large number of connections and periodically sending out a small number of data packets to maintain the session, the system's resources can be exhausted, making it unable to accept new connection requests to achieve the purpose of DDoS. Other attacks include sending a large number of connection requests to send large data packets. Because the attack is initiated by a Trojan horse program, the attacker can quickly establish a large number of connections and issue a large number of requests in a short period of time. The following are some DDoS characteristics. We can use these characteristics to resist DDoS (including

Microsoft inadvertently set a new record last November when it mitigated a 3.47Tbps DDoS (distributed denial of service) attack. In a blog post, the Redmond giant shared Azure DDoS protection data for the third quarter of 2021. The company noted that the number of DDoS attacks increased in the second half of 2021. DDoS is a popular attack method that anyone can use due to the low price of attack services. In the second half of 2021, Microsoft mitigated an average of 1,955 attacks per day, an increase of 40% from the first half of the year. However, this pales in comparison to the 4,296 attacks mitigated on August 10, 2021. Overall,

The three attack methods of DDoS are: 1. SYN/ACKFlood attack; mainly by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or busy sending response packets to cause rejection. Serve. 2. TCP full connection attack; it is designed to bypass conventional firewall inspections. 3. Script attack; characterized by establishing a normal TCP connection with the server and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program. The biggest headache for websites is being attacked. Common server attack methods mainly include the following: port penetration, port penetration, password cracking, and DDOS attacks. Among them, DDOS is currently the most powerful and the most

Although bot attacks are more common than ever, there are some unsubstantiated myths surrounding them. By understanding these myths, you'll be better able to protect your website from potential damage and keep your customers happy. Here are seven of the most common robot myths and their truths. 1. Firewalls will stop sophisticated bot attacks 73% of enterprises believe legacy WAFs will protect them from bot attacks. A WAF is one of the first lines of defense for protecting web applications. It covers the most critical risks, including but not limited to the OWASP Top 10. WAF can be used to block malicious bots by creating WAF rules. Its basic mitigations include applying rate limiting to manage suspicious IPs

With the rapid development of AI artificial intelligence, short video, live broadcast industry and game industry, server hosting has become a necessary choice for many enterprises. However, as network attacks become increasingly rampant, DDOS attacks have become a problem that cannot be ignored in hosting services. Suzhou is an important IT city in China, and many enterprises and game customers choose to host servers here. In order to ensure the security of the server, it is crucial to develop an effective anti-DDOS attack plan. Suzhou server hosting to prevent DDOS attacks 1. Understand DDOS attacks First, we need to have an in-depth understanding of the principles of DDOS attacks. DDOS, a distributed denial of service attack, congests the server with a large number of legitimate or malicious requests, making it inaccessible to normal users. This type of attack comes in various forms, and the most common ones are

The three attack methods of DDoS are: 1. SYN/ACK Flood attack; mainly caused by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or busy sending response packets. Denial of service. 2. TCP full connection attack; it is designed to bypass conventional firewall inspections. 3. Script attack; characterized by establishing a normal TCP connection with the server and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program.

DDoS attack protection and network security configuration recommendations in PHP Huawei Cloud API interface docking With the rapid development of cloud computing, more and more enterprises choose to migrate their business to cloud platforms. As a leading cloud service provider, Huawei Cloud provides a wealth of cloud computing products and services. Security has always been an important issue during the docking process of PHP Huawei Cloud API interface. This article will focus on how to ensure system security by configuring Huawei Cloud's DDoS attack protection function and network security settings. And combined with code examples, we provide