{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.com\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/","title":"What is an SSDP DDoS Attack? - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6lswoMCmg2\"><a href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/\">What is an SSDP DDoS Attack?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/embed\/#?secret=6lswoMCmg2\" width=\"600\" height=\"338\" title=\"&#8220;What is an SSDP DDoS Attack?&#8221; &#8212; MozDomains Blog\" data-secret=\"6lswoMCmg2\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.com\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","thumbnail_width":1920,"thumbnail_height":1080,"description":"A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u2019s infrastructure and taking their web resource offline. How does an SSDP Attack Work? The\u00a0SSDP protocol\u00a0is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message\u2026"}