DoS (Denial of Service) Attack Types:

Major DoS attack types include OOB, Teardrop, Land, Bonk/Boink, Jolt, SSPING,
Pepsi, ICMP (Click), POD (Ping Of Death), and Smurf.

OOB (Out-Of-Band) nukes were one of the first types of DoS attack. They use
port 139 and are fixed in Win98 (only early versions of Win95 are
susceptible, as well as some versions of Windows NT). They simply connect to
the victim's port 139 and send any random data, which confuses the target.
They create a BSOD (Blue Screen Of Death), after which all TCP/IP services
cannot be used until the system is rebooted. 

Teardrop and Land are both actually Windows exploits. Teardrop and Land are
fixed in Win98 (only Win95 is susceptible). Teardrop and Land both will lock
up your computer. Teardrop uses IP (which is why it can be cured by VIPUP,
the Virtual IP Update), while Land uses TCP (which is why it can be cured by
VTCPUP, the Virtual TCP Update).

Boink (which is actually an updated version of Bonk), like Teardrop and Land,
is a Windows exploit. Teardrop, Bonk, and Boink all send fragments of packets
which cannot be re-assembled at the receiving end, causing the system to lock
up. Land uses a different tactic: It creates a spoofed packet which makes
your computer try to establish a TCP connection with itself. This redundant
connection causes the computer to lock up.

Jolt and SSPING are similar: They also send fragmented packets which make the
system lock up, but they have the added effect of making the packets huge,
thus bogging down the system further.

Pepsi is a UDP flooder. It uses random source address information to make it
look like many different machines are flooding the victim at once. This one
is particularly nasty.

ICMP nukes use ICMP, the Internet Control Message Protocol, to terminate
connections. The idea is that if you send an ICMP message to a server stating
that a particular computer connected to it has dropped the connection, the
server will drop the connection, and the target computer will be disconnected
even if it hadn't really dropped the connection. There is little to be done
about ICMP nukes, since ICMP is a fundamental part of the Internet and its
architecture makes this a fundamental vulnerability. (These kinds of nukes
are often called "Click" attacks.)

POD (Ping Of Death) attacks usually rely on sending a single huge ping
packet. The ping packet is actually made larger than the TCP/IP specification
allows such a packet to be (specifically, it allows for up to 65,536 bytes),
thus confusing the target (it creates a buffer overflow) and usually either
locking it up or stopping all its network services.

Smurf attacks are a newer form of DoS, and they are among the most effective.
(Sven Nielsen, founder of DALnet (the third-largest IRC network in the
world), called Smurf "probably the worst attack the Internet has seen to
date".) Again, they use ping packets. A Smurf attack sends ping packets to a
network's broadcast address. This causes a single ping packet to be sent out
to 255 other systems. Under normal circumstances, this would create 255 ping
responses, flooding the sender of the original ping packet. However, Smurf
spoofs the ping's source address, setting it to the victim's computer, so the
target system ends up receiving 255 ping responses from the other machines
which thought the victim was pinging them. And since this happens several
times over (the computer sending the Smurf attack does not only send one ping
to the broadcast address, but several repeatedly), well, you get the idea.

    Source: geocities.com/siliconvalley/2072

               ( geocities.com/siliconvalley)