Question:
Can a DDOS attack be produced via using the PING command in a windows 7 pc?
anonymous
2014-02-04 20:05:06 UTC
HELLO, im wondering if the ping command can be used to launch a DDOS attack from a windows 7 running pc.

The ping command is stored in the system 32 directory within windows 7 and has the ability to find or detect if a remote pc is functioning or up in the network or not.


- What I want to know is, is there way to MODIFY or change the PACKETS the ping command uses to LAUNCH a DDOS attack? IT is illeagle and I don't want to damage anything.

Im thinking of securing my network because many firewalls just allow them in. I have tried soo many firewals but they never stop it.

- JUST TELL ME, where does the ping command MAKE or generate these internet packets from? and where abouts is this packet originated from?

is it a pre made text file of lots of text or code and it's saved as a .DLL or similar. Then the ping executable files takes that dll which contains packet generation information regarding the sending of packets and also determines the amount of packets to be generated?



PLEASE HELP I need to know this for inofmrtaion technology .
Three answers:
?
2016-10-17 04:39:52 UTC
Windows 7 Ping Command
?
2014-02-04 21:48:50 UTC
DDoS means "distributed". You can't do that with just one PC.

Some years back you could kill devices with the "ping of death" - an ICMP packet with more than the maximum legal 65536 data bytes - but not anymore since everyone fixed their TCP/IP stacks.



I presume ping creates packets on the fly given the options on the command line. You could find the source code for Linux ping easily enough at http://www.skbuff.net/iputils



Microsoft stopped allowing ICMP through Windows firewall for some stupid reason. It makes it harder for companies to police their own networks if devices don't respond to ICMP ECHO (ping) and doesn't really make anything more secure. Ping is pretty harmless - it's handled directly by the operating system network stack and doesn't involve any applications or disk access, so all you can do is block someones network if you had substantial resources and they had a low-bandwidth link. Much easier to do some resource-hungry request like a wildcard SQL query over the Web to a badly-written application.



Yes you can change the data bytes included in ping packets, but so what ? Someone suggested that someone could use ping to secretly export data through a firewall, but that only works if you don't think of it, like passing drug packets down the sewer. Blocking the sewer pipes is not the answer.



You can find the definition of ICMP packets at IETF.

If you don't follow the rules, the packet will probably be discarded. If you do follow the rules, it's harmless. The ping-of-death worked because the attacker didn't quite follow the rules, and the victim's operating system assumed that all network devices were innocent and trustworthy and didn't (at that time) check the incoming packets properly.
anonymous
2014-02-04 20:47:01 UTC
It is impossible. Because some hosting close the router tracing.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...