Denial of Service - CompTIA Network+ N10-009 - 4.2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:49 PM on 3/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

5 Terms

1
New cards

Denial of Service

* Force a service to fail - Overload the service

* Take advantage of a design failure or vulnerability

- Keep your systems patched!

* Cause a system to be unavailable

- Competitive advantage

* Create a smokescreen for some other exploit

- Precursor to a DNS spoofing attack

* Doesn't have to be complicated - Turn off the power

2
New cards

A "friendly" DoS

• Unintentional DoSing - It's not always a ne'er-do-well

• Network DoS - Layer 2 loop without STP

• Bandwidth DoS

• Downloading multi-gigabyte Linux distributions

over a DSL line

• The water line breaks - Get a good shop vacuum

3
New cards

Distributed Denial of Service (DDpS)

Launch an army of computers to bring down a service

- Use all the bandwidth or resources - traffic spike

This is why the attackers have botnets

- Thousands or millions of computers at your command

- At its peak, Zeus botnet infected over 3.6 million PC's

- Coordinated attack

Asymmetric threat

- The attackers may have fewer resources than the victim

4
New cards

DDoS reflection and amplification

Turn your small attack into a big attack

- Often reflected off another device or service

An increasingly common network DDoS technique

- Turn Internet services against the victim

Uses protocols with little (if any) authentication or checks

- NTP, DNS, ICMP A common example of protocol abuse

<p>Turn your small attack into a big attack</p><p>- Often reflected off another device or service</p><p>An increasingly common network DDoS technique</p><p>- Turn Internet services against the victim</p><p>Uses protocols with little (if any) authentication or checks</p><p>- NTP, DNS, ICMP A common example of protocol abuse</p>
5
New cards

DNS Amplification DDoS

botnets receive commands to send requests to open DNS resolvers for large DNS keys or other large info.

they spoof the sender of the request as their target instead of themselves.

<p>botnets receive commands to send requests to open DNS resolvers for large DNS keys or other large info.</p><p>they spoof the sender of the request as their target instead of themselves.</p>

Explore top notes

note
Grade 9 Science Exam
Updated 414d ago
0.0(0)
note
Distal Biceps Tendon Tear
Updated 1127d ago
0.0(0)
note
ID Terms
Updated 221d ago
0.0(0)
note
Perception
Updated 825d ago
0.0(0)
note
Digestive System
Updated 1254d ago
0.0(0)
note
Grade 9 Science Exam
Updated 414d ago
0.0(0)
note
Distal Biceps Tendon Tear
Updated 1127d ago
0.0(0)
note
ID Terms
Updated 221d ago
0.0(0)
note
Perception
Updated 825d ago
0.0(0)
note
Digestive System
Updated 1254d ago
0.0(0)

Explore top flashcards

flashcards
Avancemos 2 - 2.2
66
Updated 978d ago
0.0(0)
flashcards
Lec 15 Cancer
22
Updated 706d ago
0.0(0)
flashcards
Module C
48
Updated 479d ago
0.0(0)
flashcards
Allemand
156
Updated 869d ago
0.0(0)
flashcards
Colonial Period
26
Updated 1189d ago
0.0(0)
flashcards
vocab unit 7 level f
20
Updated 1144d ago
0.0(0)
flashcards
Avancemos 2 - 2.2
66
Updated 978d ago
0.0(0)
flashcards
Lec 15 Cancer
22
Updated 706d ago
0.0(0)
flashcards
Module C
48
Updated 479d ago
0.0(0)
flashcards
Allemand
156
Updated 869d ago
0.0(0)
flashcards
Colonial Period
26
Updated 1189d ago
0.0(0)
flashcards
vocab unit 7 level f
20
Updated 1144d ago
0.0(0)