-
It's a hacker term. Also called a puppet machine. Hackers are most interested in hosts that are:
Hosts with good link status.
A host with good performance.
Hosts with poor security management.
This part actually uses another broad class of attack: the use of shape attacks. This is an attack method that stands alongside DDoS.
To put it simply, it is to capture and control the host that is being attacked. Obtain the highest administrative privileges, or at least get an account that has the authority to complete DDoS attacks. It is a necessary condition for a DDOS attacker to have a certain number of puppet machines ready, and below it is said how he attacked and captured them.
First of all, hackers generally do the job of scanning, randomly or purposefully using scanners to find those vulnerable machines on the Internet, such as program overflow vulnerabilities, CGI, Unicode, FTP, database vulnerabilities...(The list goes on) is the result of the scan that hackers want to see. Then there is an attempt to invade, and the specific means will not be said here, if you are interested, there are many articles about these contents on the Internet.
Anyway, the hackers have now captured a puppet machine! And then what did he do? In addition to the basic work of leaving a backdoor to wipe footprints mentioned above, he will upload the program used for DDoS attacks, usually using FTP.
On the attack machine, there will be a DDoS packet sending program, which is used by hackers to send malicious attack packets to the victim target.
-
It is a hacker-specific software with powerful features and high usability. It is not easy for the average person to find.
-
Differences: The main functions are different, the origins are different.
Difference 1: The main functions are different.
The main task of the fighter is to engage in air combat with enemy fighters and seize air superiority (air supremacy). The second is to intercept enemy bombers, attack planes and cruise missiles, and can also carry a certain number of ground attack missions to carry out ground attack missions.
Attack aircraft are mainly used to attack enemy tactics from low and ultra-low altitudes or targets in the depth of shallow and close campaigns, and directly support ground forces in operations. Abroad it is also called a close air support aircraft.
Difference 2: The origin is different.
Origin of the fighter: In 1915, Germany developed the Fokker aircraft equipped with a firing coordinator. The machine gun was fixed in the head of the fuselage and fired through the rotating surface of the propeller in the nose without the bullet hitting the rotating paddle.
In this way, the shooter in the back seat was eliminated, and both the flight and the shooting were done by the pilot.
Origin of the Strike Aircraft: The earliest attack aircraft was the Junkers Ji aircraft developed by the German Junkers Company, which made its first test flight on December 5, 1915. It was a biplane equipped with an aluminum alloy skin and protective armor, and it was also the first all-metal aircraft.
Machine guns were installed on board, carrying a small number of bombs, which could strafe and bomb ground targets at low altitudes, and later Juncker developed a more advanced CLI IV attack aircraft, which was changed from a double wing to a lower single wing, and its speed and maneuverability were also improved, and it was equipped with 2 or 3 machine guns.
-
Fighters: The main purpose: to fight against the enemy's air force, to ensure that the air supremacy on the battlefield is in their own hands, and to intercept the enemy's bombers and other air targets that strike at their own ground and sea military forces.
Secondary: It can be reloaded with aerial bombs and ground-to-ship attack missiles to attack ground or sea targets.
Fighter aircraft: Similar to fighter aircraft, fighter is the term of the United States and Europe and other countries, and China, Russia and other countries are called fighter aircraft.
Attack aircraft: Main purpose: to attack ground and sea targets. There is a certain ability to fight in the air.
Attack aircraft: Similar to attack aircraft, attack aircraft is the term of the United States and Europe and other countries, and China, Russia and other countries are called attack aircraft.
Bomber: Main purpose: to carry out strategic or tactical bombing missions, mainly used against strategic and tactical targets on the ground and sea surface. Basically no air combat capability.
Nowadays, many aircraft have the ability to carry out both air combat and attack on ground and sea targets, called fighter-bombers or fighter-attack aircraft.
Special case: "kamikaze" at the end of World War II. Basically all planes are available.
-
1. The combat objectives are different.
Attack aircraft are mainly aircraft whose main task is to combat ground (sea surface) targets.
A fighter is an aircraft whose main task is to dominate the air, and it is mainly used to strike at the opponent's aircraft.
2. The performance of the aircraft is different.
Fighters have good maneuverability, high thrust-to-weight ratio engines and good aerodynamic shape. Generally, there is no armor, that is, in a few particularly critical parts, there is only a little. Radar is primarily anti-air.
3. ** The transportation of the tomb is different.
Attack aircraft are generally equipped with bombs and ground attack rockets, missiles (can also bring air-to-air missiles), cannon loading, the overall bomb load is very large, but the range requirements are not high. The flight environment of attack aircraft is relatively complex, many are two-seaters, one pilot, one operator.
The main fighter is air-to-air missiles, and the cannon is not very reloaded. In order to pursue high maneuverability, as well as a simple flight environment, it is generally a single seat.
"A-4" is an American research institute
A single-seat light carrier-based attack aircraft of the Du type. >>>More
The complete thing is that it should be a UDP flooding attack. >>>More
CC attacks are a type of DDoS attacks, which are currently one of the main methods of application-layer attacks, and seem to be more technical than other DDoS attacks. CC attacks use the help of ** servers to generate legitimate requests to the target system, achieving cloaking and DDoS. >>>More
The methods between the two are different, one is the server, and cc is the simulated access**.
1.The balance of power, three extremely not recommended, 3700 is simply sky-high. The advantage game is almost the same, so the three are just out to play. >>>More