Smurf attack
|
The smurf attack, named after its exploit program, is a denial-of-service attack which uses spoofed broadcast ping messages to flood a target system.
In such an attack, a perpetrator sends a large amount of ICMP echo (ping) traffic to IP broadcast addresses, all of it having a spoofed source address of the intended victim. If the routing device delivering traffic to those broadcast addresses performs the IP broadcast to layer 2 broadcast function, most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply each, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, potentially hundreds of machines might reply to each packet.
Several years ago, most IP networks could lend themselves thus to smurf attacks -- in the lingo, they were "smurfable". Today, thanks largely to the ease with which administrators can make a network immune to this abuse, very few networks remain smurfable. [1] (http://www.netscan.org)
To secure a network with a Cisco router from taking part in a smurf attack, it suffices to issue the router command no ip directed-broadcast .
External links
- Official CERT advisory on Smurf IP DoS Attacks (http://www.cert.org/advisories/CA-1998-01.html)
- The Latest In Denial Of Service Attacks: "Smurfing" Description and Information to Minimize Effects (http://www.pentics.net/denial-of-service/presentations/19971027_smurf_files/frame.htm)
- Smurf Definition (http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213013,00.html)
- Dos attack on Unix. General IP Stack Tuning Recommendations (http://www.unixcities.com/dos-attack/index.html)
- Smurf Attack, Fraggle Attack, Spoofing, SYN Attack definition (http://www.unixcities.com/dos-attack/index1.html)