Questions tagged [udp]

UDP (User Datagram Protocol) is a simple connectionless transmission model formally defined in RFC 768.

92 questions
1
vote
1 answer

Following strategy using DDoS mitigation service - UDP bandwith exhaustion attack from spoofed IPs

I need to defend against receiving a massive spam of UDP packets from random spoofed IP addresses. I would make it this way: In my protocol, every UDP packet contains username and password. Firewall(3rd party) would have updatable list of users(name…
John Lock
  • 93
  • 4
1
vote
0 answers

Linux service on UDP ports under MITM or fuzzing attack

I am rather new to this forum but I will try my best to explain my situation. I run a game server for an outdated game called Project Reality. The community is rather small and the remaining servers fight over the playerbase every evening in order…
1
vote
0 answers

UDP flood from my own IP

A few moments ago I was trying to open Youtube when the browser (Chrome) notified me that I have no internet connection. All of my cable connections were OK. I disconnected the cable from my computer and reconnected it and the website opened.…
Nakute Marato
  • 59
  • 1
  • 2
  • 4
1
vote
1 answer

How is UDP hijacking even possible?

My doubt is this: UDP has no sequence numbers, so what indeed is the concept behind UDP session hijacking?
Tilak Madichetti
  • 252
  • 1
  • 6
  • 16
1
vote
1 answer

What are common services that are being misused in UDP amplification DDoS attacks?

I have been learning about DDoS attacks and how to protect from it. I have a question regarding DDoS attacks. What are common services that are being misused in UDP amplification DDoS attacks?
Romzes
  • 11
  • 2
1
vote
2 answers

DDoS Mitigation - Whitelist or Blacklist Incoming SOURCE Ports?

For a network offering webservices, I have had recommendations to blacklist a couple of common incoming DESTINATION ports, such as UDP 53, to combat the increasing load from DDoS. I'm wondering if it makes sense to blacklist attackers SOURCE ports…
George
  • 739
  • 1
  • 6
  • 22
1
vote
2 answers

nmap localhost UDP scan fails, even though netcat is listening

I open two terminal windows on my linux box. On one, I have netcat listen to a UDP port and on other I nmap -sU that port. Netcat receives the connection and the data, but nmap reports the udp port closed. I also see an ICMP port unreachable in nmap…
0
votes
0 answers

Slow internet, IP Flood?

Lately, I've been getting slow internet. I checked wireshark and noticed I keep receiving in matter of seconds thousands of UDP packets that my computer does not respond to, and here's the twist: There are almost no repeating IP addresses. It's…
0
votes
0 answers

Is NMAP UDP scanning for IPV6 fully supported and mature?

When I read the docs on nmap.org about UDP support for IPV6 on nmap site I notice that "UDP is not supported". I know that the syntax is there, but when I run a scan against a target that is configured to send ICMP unreachables I cannot achieve good…
postoronnim
  • 375
  • 3
  • 10
0
votes
1 answer

Can my ISP or government listen to my Skype calls?

Is the call encrypted with something like HTTPS to prevent a corrupt government (or ISP) from messing with the DNS routing, sniffing, snooping etc? Can my ISP or government listen to my Skype calls? I'm calling a bank's 800 number from Skype using…
0
votes
0 answers

Is there a standard way to do point-to-point voice encryption at the PBX level?

I am pretty dissatisfied with the typical options for encryption found on standard IP phones like those from Cisco and Polycom. Is there a standard way to do point-to-point voice encryption at the PBX level which I can set up independently? For…
Tyler Durden
  • 1,116
  • 1
  • 9
  • 18
0
votes
0 answers

Loopback source IP Spoofing

Assuming I have a service running with elevated privileges on a host, and another service is listening on a UDP port with access for everyone (0.0.0.0) is it possible to craft a spoofed UDP datagram from localhost so that appears it comes from a…
0
votes
1 answer

Why do DDoS attacks spoof DNS source IPs?

Recently, a lot of my friends have been talking about botnets. They said they've created their own.‌‌ Obviously, I ​​know this is all illegal so I try not to take part in any of it. But I've been wondering how they work. I've read some articles…
Hackermon
  • 3
  • 2
0
votes
1 answer

Would adding `--data-string` to a UDP scan change the results?

I'm doing UDP scans on some internal servers and want to add a custom token (randomly generated string) to packets as much as possible in order to later filter out my scans from real non-testing traffic. To attach my token to my nmap scans, I'm…
ChocolateOverflow
  • 3,452
  • 4
  • 17
  • 34
0
votes
3 answers

Is there any alternative to nmap for UDP?

I know UDP Scan is very slow and there are a lots of parameters for nmap like, --max-retries etc. But i want to speedly udp port scan. I tried a lots of programs but not speedly. Any alternative nmap for speedly UDP scan technique or program/script?
mariam
  • 11
  • 2