067 Counterattack

Under Aiwen's command, Charlene first controlled the botnet to launch a SYN flood attack on Etfi's server, sending a large number of semi-connection requests with forged addresses to the port where the network service is located, occupying the semi-connection queue of Etfi's server, and frantically consuming CPU and memory resources.

The server is overloaded, the connection is full, and the drone following behind it suddenly cannot access the server.

They use cameras to capture the speed and flight path of the Evan plane in real time, and this data is synchronized to the server in real time, and the server calculates the tracking strategy and attack plan, and then proceeds to the next step after receiving the instructions.

Relying on Etifi's powerful computing power and bandwidth resources, this should have been done in milliseconds.

But now Etfi is occupied by a large number of semi-connected requests, these drones and robots can't receive instructions for a while, and enter a state of command acceptance and waiting, not knowing what to do next, so they can only continue to fly stupidly according to the straight-line distance, and the sudden firing also stopped immediately.

Evan breathed a sigh of relief, and Charlene operated the flying machine to escape.

Three minutes later, the partially tracked drone changed its path of traveling in a straight line and began to catch up again.

"Etfi responded quickly, they adjusted the syncookie and synproxy protection measures, and shortened the SYN connection timeout time!" Evan shouted at Charlene, "Have you solved their defense algorithm?" ”

The attack just now was just Aven's stone-throwing to test Etfi's defense mechanism and efficiency.

“get!”

"Test how quickly they react to the defenses of mixed packets!"

This method is to mix SYN+ACK, SYN+RST and other packets into the flood attack, which can significantly increase the performance pressure of Etifi's defense measures, and will cause some protection equipment to be mishandled and locked, consuming server CPU memory and clogging bandwidth.

Use this to test the limits of Ettifi's defenses before developing a further attack strategy.

The drone behind was stupid again, and flew blindly along the path that the previous step had chased.

"Rub, Etifi is determined to want you, they rewrote the algorithm, directly interrupted the semi-connection, and even abandoned the requests of normal users." Ten minutes later, Charlene responded.

For cloud service providers, this method is extremely harmful to the user experience, and Etfi is simply killing one enemy and losing 5 billion yuan to arrest people this time.

"Semi-connected doesn't work, just put full connection!"

This attack is able to bypass the firewall and anti-syncookies and synproxy counterfeiting capabilities, because the firewall will default to this as a normal connection and let it go. Etfi terminates the half-connection, and then attacks with the full connection.

There is a limit to the number of TCP connections that a service can accept, and once a large number of TCP connections are available, even if they are normal, they will slow down until the CPU and memory resources are exhausted, and more services will be refused.

"Etfi is starting to limit the number of connections!"

"Use the slow connection tool, establish a connection with the server every few seconds, do not release it after success, send spam packets regularly, and extend the connection time!"

"Good! I wrote an algorithm that calculates the interval and release time sufficiently to get them to full capacity. I captured their processing efficiency and cadence and arranged for the botnet to attack in batches with different cadences. ”

Evan gave a thumbs up: "Great, learn so fast!" ”