From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Using Hyena to run a reflection attack

Using Hyena to run a reflection attack

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Using Hyena to run a reflection attack

- [Instructor] A reflection attack takes place when an attacker sends packets to an intermediate system, and that system responds not back to the attacker but to the target. This is usually achieved by spoofing the source IP address to be that of the target. When the intermediate system receives the packet, it looks to all intents and purposes as if it was a legitimate request from the target. Reflection attacks were of technical interest but become particularly significant when combined with amplification. This enables an adversary to leverage infrastructures already deployed on the internet, to deliver a crippling flood of data onto the target without crippling his or her own network. Before we get into looking at reflection attacks, it's useful to do a quick review of how packets move around local and wide area networks. Four addresses are used for this. The source and destination MAC address, which is shown as six bits…

Contents