Three killers of server attacks

The mainstream Hong Kong server attacks have a variety of methods, but only DDoS attacks, CC attacks and ARP spoofing are the three attack methods, which can not only paralyze the Hong Kong server, but also have no solution and cannot be defended.

DDoS attack

The full name of a DDoS attack is called Distributed Denial of Service. Attackers often combine multiple computer platforms to attack the same target or multiple targets, and the consequences of the attack vary in severity. It has been nearly 30 years since DDoS attacks appeared, but there is still no effective countermeasures. It is an attack method that people are crazy and are not afraid of seeing the light.

DDoS attacks often use a large number of legitimate requests to occupy server network resources, thereby achieving the purpose of paralyzing the network. When facing a DDoS attack, it is difficult for a server to reasonably determine and distinguish between requests. Therefore, it is often at a loss when it is attacked and can only wait for the attacker to stop the attack.

CC attack

CC attacks are not inferior to DDoS attacks. Essentially, both of them belong to the same type of attack, and both use a proxy server to generate legitimate requests to the victim host. But the difference is that DDoS attacks usually target platforms and websites sending a large number of data packets to paralyze the target, while CC attacks are more inclined to attack pages.

However, the impact of CC attacks is not less than that of DDoS attacks. CC attacks against IP and traffic are very concealed. This attack method is common to many forum users and is currently a very mainstream server attack method.

ARP spoofing

ARP spoofing is essentially different from DDoS attacks and CC attacks. In layman's terms, ARP spoofing is a protocol that converts IP addresses into physical addresses. There are generally two ways to appear, one is to deceive the router ARP table; the other is to deceive the gateway of the intranet PC.

Both types of deception will cause very serious consequences. Deception of the router may result in the interception of the relevant gateway data. Hackers create the wrong internal Mac address of the router, so that the real information cannot be stored in the router. The gateway deception to the PC is to trick the PC into sending data to the fake gateway by forging the gateway.

Guess you like

Origin blog.csdn.net/meiya9999/article/details/108592981