Site hosted by Angelfire.com: Build your free website today!

LabFour

Ji Johnson

2.1

LabFour 2.2

     

1.  List different methods of starting a DoS or DDoS attacks.

Executed against network connectivity

Using your own resources against you

Consuming the network bandwidth

Consuming other resources such as process identifiers, process slots..

           

2.      History of DoS and DDoS attacks.

When the server and client exchange an acknowledgment before sending data, the attacking system sends SYN messages to the victim system.  The victim system doesn’t get the SYN-/ACK messages and the server.  While the server wait for the table is emptied out, the attacker continue to send IP-spoofed packets requesting new connections to the server.

 

3.  The effects of a DoS or DDoS attack.

DoS attacks can disable attacked computer or network. It can disrupt service, prevent from using service, or flood a network.

2.3

 

CPUHOG is a way to crash your system.  The CPUHOG changes the low priority process to high so the system is respond to that process (which is the back ground) and can’t respond to other real high priority process.   It brings the system down.

 

Windows system application and process priorities:  application is a program that you run in your system and every application has a process priority assigned. 

 

·  0-7 - Low user

·  7-15 - High user

·  15-23 - Real Time

·  23-31 - Administration only