Ping FloodĪn evolved version of ICMP flood, this DDoS attack is also application specific. These ZERO Day DDoS vulnerabilities do not have patches or effective defensive mechanisms. This is a standard term (like John Doe) used to describe an attack that is exploiting new vulnerabilities. Websites and applications with security loopholes are also susceptible to hackers looking to steal information. The exhausted server is then unavailable to process legitimate requests due to exhausted resources. Databases can also be targeted with SQL injections designed to exploit these loopholes. WordPress (we now offer the best WordPress hosting on the web) and Joomla are two examples of applications that can be targeted to exhaust a server’s resources – RAM, CPU, etc. DDoS attacks can target a specific application or a badly coded website to exploit its weakness and take down the entire server as a result.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |