This movie explains how multiple attack sources can be collected and targeted to create a distributed denial of service, as well how botnets are used to achieve this.
- [Voiceover] This course explains and demonstrates…how a denial of service happens,…and to do this, we'll use a virtual environment…to make sure that our testing…is as much as possible in its own sandbox.…In addition, I've positioned a real Windows 10 host…outside the sandbox to enable testing across networks.…Let's take a look at the virtual environment.…Here we have the VirtualBox manager…and in it a list of hosts that we'll use for the testing.…If you're not familiar with this environment,…check out my Introduction to Kali Linux course…in which I provide full details…on installing and using VirtualBox.…
The first host listed in the test environment…is my Kali system.…This is where most of my testing tools reside.…Kali doesn't have a specific category for denial of service…in it applications menu,…but it has most of the tools already installed.…I'll be using the tools from the command line…in a terminal window, and where necessary,…I'll be downloading and installing them.…A list of the tools to be installed…
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.
- What is denial of service?
- SYN flooding
- Smurf and URL flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding SIP
- Detecting DoS with PeerShark
- Defeating DoS attacks