Join Malcolm Shore for an in-depth discussion in this video What you should know, part of Ethical Hacking: Denial of Service.
- [Voiceover] This is a practical course. It introduces a number of tools which I use to test systems. During this course, I'll be using a virtualized computing environment called VirtualBox, and I'll be using the Kali Linux testing framework. If you're not familiar with virtualization or you haven't used Kali before, you should watch my Introduction to Kali Linux course, which will show you how to install and use VirtualBox and Kali. In addition, I'll be assuming some basic computer and networking concepts, familiarity with Windows, and a knowledge of basic Linux commands.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.
- What is denial of service?
- SYN flooding
- Smurf and URL flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding SIP
- Detecting DoS with PeerShark
- Defeating DoS attacks