
Cyber attacks are an offensive activity that targets computer data systems, infrastructures, computer networks or computer devices that connected with the network using various methods of theft, modification or destruction of data or information systems.
A denial of service attack floods system resources, so it cannot respond to any service requests by users or systems. This type of attack is also an intervention on system resources, it is ejected in a huge number of hosts to infected with malware controlled by the attacker.
Unlike attacks carried out to allow an attacker to gain or increase access, denial of service does not provide direct benefits to attackers. For some of them, compensation for refusing service is sufficient. But if the attacked target of the resource is a member of business conflict, then the benefit of a hacker to the attacker can be real enough. Another point of the DoS attack is going offline to ensure that another type of attack can be carried out. One common example is taking over sessions, which I will describe later.
TCP SYN flooding attack
An attacker’s device floods a small queue on the target system with connection requests but does not respond when the target system responds to those requests. This leads to the target system timing out while waiting for the attacker’s device to respond, which causes the computer to crash or become useless when the connect button appears.
Teardrop attack
This type of warming causes the length shift and fragmentation fields in sequential IP packets to overlay relative to the attacked host system; the victim system tries to repair packages during the process but it fails to rebuild.
This type of attack uses IP packets to ” conquer ” the target system using an IP size of up to 65,535 bytes. If IP packets of this site are not allowed, then the attacker would fragment the IP packet. When the gate system reassembles a packet, buffer overflow and other failures may occur.
Botnets Type attack
When there are countless systems infected with malware and hacker controlling the process of Botnet then carry out DDoS attacks. These zombie robots or systems are used to attack target systems, often overwhelming the processing capacity and bandwidth of the target system. These DDoS attacks are challenging to trace because the location of botnets are located in different geologically.
Spoofing IP addresses
An attacker could use IP spoofing to convince a method of communicating with a known, trusted entity and ensure that the attacker could use the computer. The destination host can accept the package and act on its basis.
- Phishing and spear-phishing attacks
A phishing attack is a habit of sending emails that appear to come from trusted sources to obtain personal information or to influence users to do something. This may include an email attachment that loads malware onto your computer. It can also be a link to an illegal website that may prompt you to download malware or provide personal information.
- Car robbery
File download warnings are a common way of distributing malware. Hackers look for insecure sites and place a malicious script in HTTP and even PHP code on one of these sites. This script can install malware directly on the visitor’s computer or direct the victim to a hacked site.
- Password attack
Because passwords are the most commonly used mechanism for authenticating users on a data platform, access to passwords is a standard and effective attack strategy. Access to a person’s password can be obtained by searching his desk, “smelling” a link to the network to obtain information passwords, using social technologies, accessing the password database, or guessing.
- SQL injection attack
SQL injection has become a common problem on database-based sites. This occurs when the villain implements a SQL query to the database via client input to the host. SQL commands are inserted into the data plane input (for example, instead of a password or login) to run Disk SQL commands. The effective use of SQL injection can read confidential information from a database, modify (add, update or delete) database data, implement management operations (such as shutdown) in the database, recover the contents of a given file, and in some cases issue commands to the operating system.
Prevent yourself from these type of attack by using the best antivirus protection from McAfee Internet security. You can download mcafee with product key.