- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks
Skill Level Intermediate
- [Malcolm Shore] In the digital world, cyber attack has unfortunately become an everyday occurrence. Cyber attacks generally take one of three forms. Malware infection, commonly carried out by cyber criminals to gain access via malware to bank account details, or to encrypt files in order to demand ransoms. Intrusion, often by state-sponsored actors wanting to find sensitive information, or industrial spies looking for intellectual property, and denial of service, which may be a state-sponsored attack against critical infrastructure, or maybe vandalism by hacktivists or amateur hackers. I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explore how denial of service attacks work, and I'll look at the tools used to test systems and networks for resilience to a denial of service attack. Once you finish this course, you'll have a great understanding of how to test for denial of service weaknesses. Now let's get started with Denial of Service.