This movie describes the basics of communications and processing resource management, as well as how resources can be overloaded. It will explain the various motivations for DOS attacks, and describe the Xmas tree attack as one of the first examples of real world denial of service.
- [Voiceover] Denial of service attacks…have been a threat on the internet…starting as far back as when Robert Morris…released his internet worm in 1988.…The internet was in its infancy,…and the result was a little more than an inconvenience.…In the age of cyberspace and ubiquitous connectivity,…online business depends upon accessible services,…but denial of service becomes a much more serious issue,…and once which can have devastating consequences.…The digital attack map provides a view of daily attacks…based on data collected by all the networks.…
Additional information is available…by hovering over the streams.…In an assessment carried out by Kaspersky Labs in 2015,…the cost of such an incident…is between $52,000 and $444,000, as a result of…the inability to carry out core business,…loss of contracts and opportunities,…credit rating impact, and insurance premium increases.…This is significant enough to justify external testing…to ensure the business is resilient.…
There are many different ways to achieve…a denial of service, and it would take a very long time…
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.
- What is denial of service?
- SYN flooding
- Smurf and URL flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding SIP
- Detecting DoS with PeerShark
- Defeating DoS attacks