How would you detect these reflectors on your network?

Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.
How would you detect these reflectors on your network?

Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.
How would you detect these reflectors on your network?

A.
Run Vulnerability scanner on your network to detect these reflectors

B.
Run floodnet tool to detect these reflectors

C.
Look for the banner text by running Zobbie Zappers tools

D.
Scan the network using Nmap for the services used by these reflectors



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Guest

Guest

Correct answer should be A and C.

Guest

Guest

I mean A and D. C is not correct

seenagape

seenagape

I choose D

Ghost Man

Ghost Man

C is the Ans.