First page Back Continue Last page Graphics
Flood Amplification
Vulnerabilities:
- Protocols provide unauthenticated functionality
- Some protocols use a connectionless transport (UDP)
Attack:
- Spoof the source address of your packet as originating from your victim
- Spread the love around
- Invoke functionality that responds with more data than the request
Effect:
- “Smurf”-like amplification flood