Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Overview
Syllabus
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Profiling Killnet
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
Taught by
Malcolm Shore