Friday, 3 March 2017

What is DDoS Attack? DoS and DDos Attacks of a website

Hackers are attacking Cheat Engine Forum with DDoS

Recently a big case happening in the gaming world. Cheat Engine Forum have been attack by DDoS.
Cheat Engine Forum is not working now. Maybe temporary, maybe that it......... gone.
Cheat Engine Forum is having legal issue with the game company name Bethesda  the maker for the series of : The Elder Scrolls  & Fallout, most well known games are Skyrim -The Elder Scrolls 5, Fallout 4.
Image result for ddos attack pictures
So, what is DDoS and how does it work or attack ?

First you must learn about the difference between DoS and DDos Attacks

(DoS) is short for  A Denial of Service.  DoS attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource.

(DDoS) is stand for Distributed Denial of Service. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

Image result for ddos attack pictures



How DDoS Attacks Work

In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.

Types of DDoS Attacks
There are many types of DDoS attacks. Common attacks include the following:

    Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.

    Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.

    Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.

Image result for ddos attack pictures

In the United States, the people that take part in DDoS attacks run the risk of being charged with legal offenses at the federal level, both criminally and civilly. The Computer Fraud and Abuse Act (CFAA) is the applicable law.
Infecting and harvesting a botnet is illegal in the US. Moreover, controlling the botnet to target victims with Distributed Denial of Services attacks is illegal, too. Be sure to report the attack to your service provider (if they aren't already aware) and to your local authorities.

So why there are  still many of these attack?


Need More Detail ?   contact me !!
my e-mail is :
Any amount donation is welcome , even 10 cents is good for me.

I sell a lot of stuff, program. knowledge, etc..  at a small cost.
I will guide you step by step, personally.
My Paypal Account is :

Don't know how to send money ?   Click here for detail about Paypal account.

Don't have money? OK! Here is another way to get the program.
how to get my program - Free of charge

No comments:

Post a Comment