This is probably stupid... but, What would happen if you used an MS-DOS batch file to ping an IP address with the highest amount repeatedly? For example, it would be something like this:
start ping -t -l 65550 (ip address here)
start ping -t -l 65550 (ip address here)
start ping -t -l 65550 (ip address here)
start ping -t -l 65550 (ip address here)
start ping -t -l 65550 (ip address here)
start ping -t -l 65550 (ip address here)
Would this have any effect on the victim?
Ping ddos.
- Still_Learning
- Fame ! Where are the chicks?!
- Posts: 1040
- Joined: 11 Jun 2008, 16:00
- 15
- Location: Trigger City
Doesn't really work on most networks these days, but you can still happen across a few old routers/networks that you can execute a Smurf attack on:
Ping the broadcast address of the vulnerable network. Assuming that the router will forward on a ping sent to the broadcast address (and that the systems behind the router/firewall will respond to a ping sent to the broadcast address), you can multiply your bandwidth by quite a bit (creating the DDoS you first mentioned, rather than the DoS you described).
Example:
The vulnerable network has 100 systems online behind the firewall.
You send through a 76 kbps stream of ICMP echo requests to the broadcast address of the router, setting the source address of the echo request to the IP of the victim that you want to knock offline.
Each of the 100 systems behind the firewall receive the echo request and respond with an echo reply....to the specified source IP (your victim). This takes your 76 kbps stream and multiplies it by 2 orders of magnitude to (approx.) a 7.6 Mbps stream
You're still limited by the bandwidth of the vulnerable network, so it's not ideal.....but it's better than using your own
Very old-school attack.....I've only seen it actively (and successfully) employed once in the past 5 years or so.
Ping the broadcast address of the vulnerable network. Assuming that the router will forward on a ping sent to the broadcast address (and that the systems behind the router/firewall will respond to a ping sent to the broadcast address), you can multiply your bandwidth by quite a bit (creating the DDoS you first mentioned, rather than the DoS you described).
Example:
The vulnerable network has 100 systems online behind the firewall.
You send through a 76 kbps stream of ICMP echo requests to the broadcast address of the router, setting the source address of the echo request to the IP of the victim that you want to knock offline.
Each of the 100 systems behind the firewall receive the echo request and respond with an echo reply....to the specified source IP (your victim). This takes your 76 kbps stream and multiplies it by 2 orders of magnitude to (approx.) a 7.6 Mbps stream
You're still limited by the bandwidth of the vulnerable network, so it's not ideal.....but it's better than using your own
Very old-school attack.....I've only seen it actively (and successfully) employed once in the past 5 years or so.
C|EH, ECSA, C|EI
Halock Security Labs
http://www.halock.com
Halock Security Labs
http://www.halock.com