Which attack is also known as a spoofed attack, using intermediary machines to reflect DDoS traffic toward a target?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which attack is also known as a spoofed attack, using intermediary machines to reflect DDoS traffic toward a target?

Explanation:
Distributed Reflection Denial of Service attacks use spoofed traffic reflected off intermediary machines toward the target. The attacker forges the victim’s IP address and sends small requests to many reflectors (misconfigured services that will answer requests from anywhere). Those reflectors then reply to the spoofed address with much larger responses, creating a flood that overwhelms the target. The multiplication of traffic comes from multiple reflectors, which is why this method is called reflective and distributed. Unlike other flood types, this relies on amplification via intermediaries and IP spoofing, not simply flooding from the attacker’s own hosts.

Distributed Reflection Denial of Service attacks use spoofed traffic reflected off intermediary machines toward the target. The attacker forges the victim’s IP address and sends small requests to many reflectors (misconfigured services that will answer requests from anywhere). Those reflectors then reply to the spoofed address with much larger responses, creating a flood that overwhelms the target. The multiplication of traffic comes from multiple reflectors, which is why this method is called reflective and distributed. Unlike other flood types, this relies on amplification via intermediaries and IP spoofing, not simply flooding from the attacker’s own hosts.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy