Page 1 of 1

Sending *heavy* packets

Posted: Sat Apr 05, 2025 5:45 am
by Mitu100@
One of the most dangerous attacks is ICMP flood, which guarantees 100% denial of service of the system. It consists in the fact that a broadcast is used, which is enhanced with the help of an additional. Participant - reinforcing network. For example, a hacker sends a request through an amplifying network containing 100 nodes, this request will be increased 100 times and redirected to the victim's address.

Lack of resources – This type of job function email database attack allows an attacker to seize additional resources, the very purpose of the attack is this. The attack is carried out taking into account the fact that there is already a certain amount of system resources. To carry out this type of attack, you just need to overload the victim's processor.
Processor overload can be performed in various ways, for example, server overflow with log files or sending *heavy* packets.
Server overflow with log files is most often performed if the administrator is inexperienced and has not set a limit when configuring the system. In this case, an attacker can take advantage of this and will send large packets that will quickly fill up the disk.
packets are sent to the server that, without saturating the bandwidth, spend all the processor time, which is why the server processor cannot process requests normally and users cannot access the resource.

Programming errors are an advanced level of Ddos attack, which consists in writing exploits that address errors in the code and lead to access to unused fragments of the program.

Disadvantages in the code - It consists in finding errors in the code and then in processing these situations by the system, and since the system does not know how to handle this kind of task, it may stop working.