[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
一、中断攻击了解
网络攻击是指任何非授权而进入或试图进入他人计算机网络的行为,是入侵者实现入侵目的所采取的技术手段和方法
根据实施方法差异,分为主动攻击和被动攻击,
主动攻击是指攻击者为了实现攻击目的,主动对需要访问的信息进行非授权的访问行为,被动攻击是利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行的攻击
本次实验是主动攻击中的中断攻击,中断攻击是主要通过破坏计算机硬件、网络、和文件管理系统来实现,系统可用性的攻击,使得用户不能正常的使用计算机资源
本次实验主要通过UDP Flood,不断发送UDP包,对网络造成堵塞
二、实验说明:攻击机:windows 7+UDP Flood 靶机:windows server 2003+天网防火墙
实验过程
*
攻击机使用UDP Flood向靶机服务器发送UDP数据包。
(1)UDP Flood参数设置:
靶机IP地址:192.168.1.103
端口号:445 (445端口是一种TCP端口,提供局域网中文件或打印机共享服务)
最大响应时间:600
网络连接方式(发包速度):最大。
(2)登录天网防火墙,设置UDP数据包监视,查看数据包通过的日志记录。
可以看出,被攻击机,不断的接收攻击机发的UDP包
3、防范措施:设置防火墙规则禁止UDP数据包通过
(1)新建IP规则:
设置IP规则名称:deny UDP
数据包方向:接收
对方IP地址:任何地址
数据包协议类型:UDP
满足条件时的处理方式:记录和警告
(2)移动规则至UDP协议规则的最上面,保存设置。
4、查看防火墙日志中拦截的UDP数据包。
查询日志,防火墙已经成功拦截UDP包