Page 1206 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1206

Ping Flood

               A ping flood attack floods a victim with ping requests. This can be very
               effective when launched by zombies within a botnet as a DDoS attack.

               If tens of thousands of systems simultaneously send ping requests to a
               system, the system can be overwhelmed trying to answer the ping
               requests. The victim will not have time to respond to legitimate
               requests. A common way that systems handle this today is by blocking
               ICMP traffic. Active intrusion detection systems can detect a ping

               flood and modify the environment to block ICMP traffic during the
               attack.


               Ping of Death

               A ping-of-death attack employs an oversized ping packet. Ping
               packets are normally 32 or 64 bytes, though different operating
               systems can use other sizes. The ping-of-death attack changed the size
               of ping packets to over 64 KB, which was bigger than many systems
               could handle. When a system received a ping packet larger than 64

               KB, it resulted in a problem. In some cases the system crashed. In
               other cases, it resulted in a buffer overflow error. A ping-of-death
               attack is rarely successful today because patches and updates remove
               the vulnerability.




                             Although the ping of death isn’t a problem today, many

                  other types of attacks cause buffer overflow errors (discussed in
                  Chapter 21). When vendors discover bugs that can cause a buffer
                  overflow, they release patches to fix them. One of the best

                  protections against any buffer overflow attack is to keep a system
                  up-to-date with current patches. Additionally, production systems
                  should not include untested code or allow the use of system or
                  root-level privileges from applications.




               Teardrop

               In a teardrop attack, an attacker fragments traffic in such a way that a
               system is unable to put data packets back together. Large packets are
   1201   1202   1203   1204   1205   1206   1207   1208   1209   1210   1211