UDP
Concept:
UDP stands for user datagram protocol. UDP is an alternative communications protocol to Transmission Control Protocol used primarily for establishing low-latency and loss tolerating connections between applications on the Internet. Both UDP and TCP run on top of the Internet Protocol (IP).Both protocols send short packets of data, called datagrams.
UDP do protocol is very ,but it is not that much secure for data confidentiality,Moreover it has one way handshake because it sends the packet althogh packet will be recieved by reciever or not.
For example: walky talky, whenever we use walky talky then we speak and reciever knows the channel of communication but any third person can also hear the conversation by using that channel moreover sender have no any feed back whether data is reached or not.
UDP just sends the packets, which means that it has much lower bandwidth overhead and latency. But packets can be lost or received out of order as a result, owing to the different paths individual packets traverse between sender and receiver.
There are many udp ports in a computer system,a attacker can also attack by open udp ports by increasing the data flow or any other type of attack.
Demonstration:
There are some attacks can be done on udp ports,here i will give a demonstration
Steps:
1. Open UDP flooder software
2. Put ip of target pc on first box
3. Enter some alphabets on second box
4. Press enter
5. Attack will be started
6. Data traffic will be increased
Tools:
· Udp flooder
· DDOS attack
· Botnet
· UDP unicorn
Resources:
· https://www.youtube.com/watch?v=5bWPTTFYsD8 udp ddos based attack explanation
· https://www.youtube.com/watch?v=xCqHxz4ufvo botnet attack on linux
· https://www.youtube.com/watch?v=C2S4aDH61nE demo of udp flooder
· https://sourceforge.net/projects/udpflooder/files/UDP%20FLooder.exe/download?use_mirror=excellmedia&r=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fudpflooder%2F&use_mirror=excellmedia download udp flooder
No comments:
Post a Comment