Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Denial-of-service attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Permanent denial-of-service attacks=== Permanent denial-of-service (PDoS), also known loosely as phlashing,<ref>{{cite news|title=Phlashing attack thrashes embedded systems|first=John|last=Leyden|date=2008-05-21|access-date=2009-03-07|work=The Register|url=https://www.theregister.co.uk/2008/05/21/phlashing/}}</ref> is an attack that damages a system so badly that it requires replacement or reinstallation of hardware.<ref name="TechWeb">{{cite web|url=http://www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1|title=Permanent Denial-of-Service Attack Sabotages Hardware|publisher=Dark Reading |date=May 19, 2008 |first=Kelly |last=Jackson Higgins |archive-url=https://web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 |archive-date=December 8, 2008}}</ref> Unlike the distributed denial-of-service attack, a PDoS attack exploits security flaws which allow remote administration on the management interfaces of the victim's hardware, such as [[Router (computing)|routers]], printers, or other [[networking hardware]]. The attacker uses these [[Vulnerability (computer security)|vulnerabilities]] to replace a device's [[firmware]] with a modified, corrupt, or defective firmware imageโa process which when done legitimately is known as ''flashing.'' The intent is to [[Brick (electronics)|brick]] the device, rendering it unusable for its original purpose until it can be repaired or replaced. The PDoS is a pure hardware-targeted attack that can be much faster and requires fewer resources than using a botnet in a DDoS attack. Because of these features, and the potential and high probability of security exploits on network-enabled embedded devices, this technique has come to the attention of numerous hacking communities. [[BrickerBot]], a piece of malware that targeted IoT devices, used PDoS attacks to disable its targets.<ref>{{cite web|title="BrickerBot" Results In PDoS Attack|url=https://security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-service/|website=Radware|access-date=January 22, 2019|date=May 4, 2017}}</ref> PhlashDance is a tool created by Rich Smith (an employee of [[Hewlett-Packard]]'s Systems Security Lab) used to detect and demonstrate PDoS vulnerabilities at the 2008 EUSecWest Applied Security Conference in London, UK.<ref name="EUSecWest">{{cite web|url=http://eusecwest.com/speakers.html#PhlashDance|archive-url=https://web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance|archive-date=2009-02-01|title=EUSecWest Applied Security Conference: London, U.K.|publisher=EUSecWest|year=2008}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)