본문 바로가기

Hacking/Web Hacking

ping flood ddos attack





Ping Flood
The most basic of attacks is the ping flood attack. It relies on the ICMP echo command, more popularly known as ping . In legitimate situations the ping command is used by network administrators to test connectivity between two computers. In the ping flood attack, it is used to flood large amounts of data packets to the victim’s computer in an attempt to overload it. You can see an example of the ping flood attack below.


There is also type of DDoS attack -denial-of-service attack
and no one can stop this from happen because hackers always sharpening their skill to test a security of specific website,blogs etc.



'Hacking > Web Hacking' 카테고리의 다른 글

XSS 예제 페이지 소스코드  (0) 2013.03.28
바이러스 침투 별 포트 번호  (0) 2012.05.26