How Bots attack using DDOS

Chad Underwood
5 min readSep 21, 2022

A DDOS (Distributed Denial of Service) attack uses multiple connections to stop access to a website or internet service.

These attacks use many computers to complete the attack. These computers can be PC, Macs, servers, video game consoles, and even smart home devices. The hackers need a device with a security hole like a zero day to install their malware.

With so many devices and people not keeping their devices up to date it’s not difficult for hackers to find what they need.

This is why it is so important to keep your device’s operating system and apps updated.

Photo by Mahdi Bafande on Unsplash

Now, imagine there’s a person who’s mad at a company.

The company conducts all of their business through the phone system.

This person wants revenge. The best way to keep the company from doing business is tying up their phone lines. This attacker calls the company all day long. But as soon as the company’s worker answers, the attacker hangs up.

Because the company must answer the phone and the person immediately hangs up. No one else is able to get their call through. This would destroy a business for as long as the person can keep the calls going.

This is the way a DDOS attack works but with internet websites and applications.

The set up

Hackers are looking for vulnerabilities.

These vulnerabilities are security holes that haven’t been patched by the software manufacturer. They malware to take control of the systems. This malware may not ever show any signs until it is used.

But the hacker still has control of the infected system.

Now the hacker has control the infected computers they just need to find their target.

Once the hacker had the target they start attack, employing each of their controlled computers to perform a DOS (Denial of Service) attack. This DOS attack sends as much data to the target as possible. Also, they use as many of their controlled computers to do the same. All of the infected computers work together.

The computers working together makes the attack distributed.

--

--

Chad Underwood

American writer sharing experiences in life, writing, technology, and content creation.