Page 79 - StudyBook.pdf
P. 79

General Security Concepts: Attacks • Chapter 2  63

                 zombies. Masters receive orders that they then trickle through to the zombies for
                 which they are responsible.The master is only responsible for sending and receiving
                 short control messages, making lower bandwidth networks just as suitable as higher
                 bandwidth networks.

                 Figure 2.2 A Generic DDoS Attack Tree


                                                      Attacker     Attacker may install client
                            Attacker can initiate attack           software on multiple
                            by sending messages to                 machines. Client software is
                            compromised hosts with                 capable of waking daemons
                            DDoS client software                   installed on zombies and
                            installed on them.                     commanding them to
                                                                   commence targeted attacks.

                                      Master                          Master







                               Zombie        Zombie          Zombie          Zombie








                           Target host becomes the                  Hacker compromises multiple
                           victim of multiple attacks               hosts to act as zombies included
                           originating from multiple                in the coordinated attack.
                           sources/zombies.                         Zombies are responsible for
                                                    Server          contducting actual attack.



                    On the hosts not designated as zombies, the hacker installs the software (called
                 a daemon) used to send out attack streams.The daemon runs in the background on
                 the zombie, waiting for a message to activate the exploit software and launch an
                 attack targeted at the designated victim.A daemon may be able to launch multiple
                 types of attacks, such as User Datagram Protocol (UDP) or SYN floods. Combined
                 with the ability to use spoofing, the daemon can prove to be a very flexible and
                 powerful attack tool.









                                                                              www.syngress.com
   74   75   76   77   78   79   80   81   82   83   84