First page Back Continue Last page Graphics
Amplification Attacks
Vulnerabilities:
- Protocols provide unauthenticated functionality
- Some protocols use a connectionless transport (UDP)
Attack:
- Spoof the source address of your packet as your victim
- Spread the love
- Invoke functionality that responds with more data than the request
Effect:
- Smurf-like amplification flood attack