Amplification attacks are characterized by an attacker sending out a modest amount of attack traffic, but using a third-party server to amplify that attack traffic. In this video, learn how amplification attacks work and look at an amplification attack us
- [Narrator] A reflection attack takes place … when we send a packet to a server, … and have it reply, not to us, but to the target. … We can achieve this easily … by spoofing the source address in the packet. … An amplification attack takes place … when we send a packet to a server … and get a significantly larger packet … sent back to the target in reply. … Both reflection and amplification attacks … typically involve sending packets to many thousands … of servers in a distributed denial-of-service attack. … Let's have a look at the basics of an NTP attack. … I'll start by looking at the Ubuntu server, … which I have on the virtual network running the NTP service. … I can check what services are running in Ubuntu … by entering the command service --status-all more. … We can see the NTP server is shown with a plus. … It's running. … Okay, Let's see how it's configured. … This shows me that the service is running and it's connected … to four authoritative time servers. … Okay, we have a service here. …
Author
Updated
1/8/2021Released
3/25/2019- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks
Skill Level Intermediate
Duration
Views
Related Courses
-
Penetration Testing: Advanced Kali Linux
with Malcolm Shore2h 22m Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate -
Ethical Hacking: Hacking IoT Devices
with Luciano Ferrari35m 22s Intermediate
-
Introduction
-
Disclaimer1m 12s
-
1. What Is a Denial of Service?
-
2. Infrastructure Denial of Service
-
UDP flooding with LOIC3m 16s
-
ARP poisoning with Ettercap5m 13s
-
Using NTP to amplify attacks5m 55s
-
3. Wireless Denial of Service
-
4. Application Denial of Service
-
Understanding BlackEnergy6m 12s
-
Killing the FTP service1m 42s
-
RangeAmp attacks on the CDN1m 10s
-
5. SIP Service Attacks
-
Flooding a SIP server6m 9s
-
-
6. Ransomware
-
Explaining ransomware3m 42s
-
Understanding Cryptolocker2m 44s
-
Understanding Petya2m 28s
-
-
7. Mitigation Techniques
-
Commercial anti-DOS services1m 49s
-
Considering IoT denial2m 53s
-
Conclusion
-
Summary1m 2s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Using NTP to amplify attacks