UDP Flood Denial of Service – DOS Penetration Testing using Kali Linux | Wireshark



UDP Flood Denial of Service – DOS Penetration Testing using Kali Linux | Wireshark

UDP Flood Denial of Service - DOS Penetration Testing using Kali Linux | Wireshark

A UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic.

A UDP flood works primarily by exploiting the steps that a server takes when it responds to a UDP packet sent to one of it’s ports. Under normal conditions, when a server receives a UDP packet at a particular port, it goes through two steps in response:

The server first checks to see if any programs are running which are presently listening for requests at the specified port.
If no programs are receiving packets at that port, the server responds with a ICMP (ping) packet to inform the sender that the destination was unreachable.

https://www.secuneus.com​​​​​​​/

Facebook : https://www.facebook.com/SecuneusTech/
Instagram : https://www.instagram.com/secuneustech/
LinkedIn : https://www.linkedin.com/company/secuneus-technologies/ .

Comments are closed.