A reflection attack is a special form of attack which can be used to hide the original attack source. In this video, learn about reflection attacks. Install and learn how to run the Hyenae tool to launch a denial of service via reflection.
- [Instructor] A reflection attack takes place … when an attacker sends packets to an intermediate system … and that system responds, … not back to the attacker, but to the target. … This is usually achieved by spoofing the source IP address … to be that of the target. … When the intermediate system receives the packet, … it looks to all intents and purposes … as if it was a legitimate request from the target. … Reflection attacks are of technical interest … but become a particularly significant threat … when combined with amplification. … This enables an adversary to leverage infrastructures … already deployed in the internet … to deliver a crippling flood of data onto a target … without crippling his or her own network. … Before we get into looking at reflection attacks, … it's useful to do a quick review … of how packets move around local and wide-area networks. … Four addresses are used for this, … the source and destination MAC address, … which are shown as six bytes separated by colons, …
- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks