How would you detect these reflectors on your network?

Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.

How would you detect these reflectors on your network?

Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.

How would you detect these reflectors on your network?

A.
Run floodnet tool to detect these reflectors

B.
Look for the banner text by running Zobbie Zappers tools

C.
Run Vulnerability scanner on your network to detect these reflectors

D.
Scan the network using Nmap for the services used by these reflectors

Explanation:
http://www.exterminate-it.com/malpedia/remove-floodnet



Leave a Reply 1

Your email address will not be published. Required fields are marked *