UDP (User Datagram Protocol) is a simple connectionless transmission model formally defined in RFC 768.
Questions tagged [udp]
92 questions
1
vote
1 answer
Following strategy using DDoS mitigation service - UDP bandwith exhaustion attack from spoofed IPs
I need to defend against receiving a massive spam of UDP packets from random spoofed IP addresses. I would make it this way:
In my protocol, every UDP packet contains username and password.
Firewall(3rd party) would have updatable list of users(name…
John Lock
- 93
- 4
1
vote
0 answers
Linux service on UDP ports under MITM or fuzzing attack
I am rather new to this forum but I will try my best to explain my situation.
I run a game server for an outdated game called Project Reality. The community is rather small and the remaining servers fight over the playerbase every evening in order…
Aare Pajuste
- 11
- 2
1
vote
0 answers
UDP flood from my own IP
A few moments ago I was trying to open Youtube when the browser (Chrome) notified me that I have no internet connection. All of my cable connections were OK. I disconnected the cable from my computer and reconnected it and the website opened.…
Nakute Marato
- 59
- 1
- 2
- 4
1
vote
1 answer
How is UDP hijacking even possible?
My doubt is this: UDP has no sequence numbers, so what indeed is the concept behind UDP session hijacking?
Tilak Madichetti
- 252
- 1
- 6
- 16
1
vote
1 answer
What are common services that are being misused in UDP amplification DDoS attacks?
I have been learning about DDoS attacks and how to protect from it. I have a question regarding DDoS attacks. What are common services that are being misused in UDP amplification DDoS attacks?
Romzes
- 11
- 2
1
vote
2 answers
DDoS Mitigation - Whitelist or Blacklist Incoming SOURCE Ports?
For a network offering webservices, I have had recommendations to blacklist a couple of common incoming DESTINATION ports, such as UDP 53, to combat the increasing load from DDoS. I'm wondering if it makes sense to blacklist attackers SOURCE ports…
George
- 739
- 1
- 6
- 22
1
vote
2 answers
nmap localhost UDP scan fails, even though netcat is listening
I open two terminal windows on my linux box. On one, I have netcat listen to a UDP port and on other I nmap -sU that port. Netcat receives the connection and the data, but nmap reports the udp port closed. I also see an ICMP port unreachable in nmap…
zonked.zonda
- 11
- 2
0
votes
0 answers
Slow internet, IP Flood?
Lately, I've been getting slow internet. I checked wireshark and noticed I keep receiving in matter of seconds thousands of UDP packets that my computer does not respond to, and here's the twist: There are almost no repeating IP addresses. It's…
0
votes
0 answers
Is NMAP UDP scanning for IPV6 fully supported and mature?
When I read the docs on nmap.org about UDP support for IPV6 on nmap site I notice that "UDP is not supported". I know that the syntax is there, but when I run a scan against a target that is configured to send ICMP unreachables I cannot achieve good…
postoronnim
- 375
- 3
- 10
0
votes
1 answer
Can my ISP or government listen to my Skype calls?
Is the call encrypted with something like HTTPS to prevent a corrupt government (or ISP) from messing with the DNS routing, sniffing, snooping etc? Can my ISP or government listen to my Skype calls?
I'm calling a bank's 800 number from Skype using…
user274772
- 1
- 1
0
votes
0 answers
Is there a standard way to do point-to-point voice encryption at the PBX level?
I am pretty dissatisfied with the typical options for encryption found on standard IP phones like those from Cisco and Polycom.
Is there a standard way to do point-to-point voice encryption at the PBX level which I can set up independently? For…
Tyler Durden
- 1,116
- 1
- 9
- 18
0
votes
0 answers
Loopback source IP Spoofing
Assuming I have a service running with elevated privileges on a host, and another service is listening on a UDP port with access for everyone (0.0.0.0) is it possible to craft a spoofed UDP datagram from localhost so that appears it comes from a…
GrowingBrick
- 101
0
votes
1 answer
Why do DDoS attacks spoof DNS source IPs?
Recently, a lot of my friends have been talking about botnets. They said they've created their own. Obviously, I know this is all illegal so I try not to take part in any of it.
But I've been wondering how they work. I've read some articles…
Hackermon
- 3
- 2
0
votes
1 answer
Would adding `--data-string` to a UDP scan change the results?
I'm doing UDP scans on some internal servers and want to add a custom token (randomly generated string) to packets as much as possible in order to later filter out my scans from real non-testing traffic.
To attach my token to my nmap scans, I'm…
ChocolateOverflow
- 3,452
- 4
- 17
- 34
0
votes
3 answers
Is there any alternative to nmap for UDP?
I know UDP Scan is very slow and there are a lots of parameters for nmap like, --max-retries etc.
But i want to speedly udp port scan. I tried a lots of programs but not speedly. Any alternative nmap for speedly UDP scan technique or program/script?
mariam
- 11
- 2