SlideShare a Scribd company logo
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service

More Related Content

PDF
Vulnerability Management
PDF
TH3 Professional Developper CEH social engineering
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PDF
Introduction IDS
PPT
Introduction To OWASP
PPTX
What is Ransomware
PPTX
Red Team vs. Blue Team
PPT
Application Threat Modeling
Vulnerability Management
TH3 Professional Developper CEH social engineering
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Introduction IDS
Introduction To OWASP
What is Ransomware
Red Team vs. Blue Team
Application Threat Modeling

What's hot (20)

PDF
Breach and attack simulation tools
PPT
Introduction Network security
PPTX
DDoS ATTACKS
PPT
DDoS Attack PPT by Nitin Bisht
PPT
ETHICAL HACKING
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPT
Intrusion Detection System
PDF
Threat Intelligence
PPT
DDoS Attacks
PDF
penetration testing
PPT
Port scanning
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Overview of the Cyber Kill Chain [TM]
PDF
Network Security - Defense Through Layered Information Security
PDF
Threat hunting 101 by Sandeep Singh
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PPTX
Cyber Security A Challenges For Mankind
PDF
Network Security Fundamentals
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPT
Introduction to Web Application Penetration Testing
Breach and attack simulation tools
Introduction Network security
DDoS ATTACKS
DDoS Attack PPT by Nitin Bisht
ETHICAL HACKING
Threat Intelligence 101 - Steve Lodin - Submitted
Intrusion Detection System
Threat Intelligence
DDoS Attacks
penetration testing
Port scanning
Cybersecurity 1. intro to cybersecurity
Overview of the Cyber Kill Chain [TM]
Network Security - Defense Through Layered Information Security
Threat hunting 101 by Sandeep Singh
Understanding Cyber Attack - Cyber Kill Chain.pdf
Cyber Security A Challenges For Mankind
Network Security Fundamentals
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Introduction to Web Application Penetration Testing
Ad

Viewers also liked (20)

PPTX
Denial of service attack
PDF
Denial of Service Attacks
PPTX
Denial of service attack
PPTX
Basics of Denial of Service Attacks
PDF
DDoS Attack Detection & Mitigation in SDN
PDF
Denial of Service Attacks
PDF
Denial Of Service Attack
PDF
Distributed Denial of Service (DDos) Testing Methodology
PPTX
Sqlinjection
PPT
Dc214 sn orgcrime (1)
PPTX
Attack detection and prevention in the cyber
PDF
Ddos attack definitivo
PDF
Cehv8 - Module 07: Viruses and Worms
PPTX
Sniffing
PPTX
Denial of service attack
PDF
Cehv8 - Module 10: Denial of Service
PPTX
Man in-the-middle attack(http)
PPT
Tele imersion
PPTX
Operation of Ping - (Computer Networking)
ODP
Man in the middle
Denial of service attack
Denial of Service Attacks
Denial of service attack
Basics of Denial of Service Attacks
DDoS Attack Detection & Mitigation in SDN
Denial of Service Attacks
Denial Of Service Attack
Distributed Denial of Service (DDos) Testing Methodology
Sqlinjection
Dc214 sn orgcrime (1)
Attack detection and prevention in the cyber
Ddos attack definitivo
Cehv8 - Module 07: Viruses and Worms
Sniffing
Denial of service attack
Cehv8 - Module 10: Denial of Service
Man in-the-middle attack(http)
Tele imersion
Operation of Ping - (Computer Networking)
Man in the middle
Ad

More from Avirot Mitamura (20)

PPTX
Rpa case study 2020 r1
PPTX
Ui path rpa_intro_v1
PDF
Cybersecurity and-cyberwar-singer-en-22186
PDF
Mental illness-at-work-race-en-20921
PDF
Digital certificate management v1 (Draft)
PPT
CEH - Module 11 : Session Hijacking
PPT
CEH - Module 6 : Trojans and Backdoors
PPT
CEH - Module 5 : System Hacking
PPT
CEH - Module4 : Enumeration
PDF
Kingdom of Thailand - visa
PDF
Preparation company limited registration
PDF
Elevate - Three Disciplines of Strategic Thinking
PDF
Lead with-humility-krames-en-22453
PDF
Rising to Power of Exceptional Executives
PDF
Imperial violet by poodle attacks on ss-lv3
PDF
Bash Code-Injection Briefing
PDF
Excise department project_fin
PDF
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
PPT
Executive presentation [4] - NHSO IT Master Plan B.C.2550
PPT
PKI101 polk
Rpa case study 2020 r1
Ui path rpa_intro_v1
Cybersecurity and-cyberwar-singer-en-22186
Mental illness-at-work-race-en-20921
Digital certificate management v1 (Draft)
CEH - Module 11 : Session Hijacking
CEH - Module 6 : Trojans and Backdoors
CEH - Module 5 : System Hacking
CEH - Module4 : Enumeration
Kingdom of Thailand - visa
Preparation company limited registration
Elevate - Three Disciplines of Strategic Thinking
Lead with-humility-krames-en-22453
Rising to Power of Exceptional Executives
Imperial violet by poodle attacks on ss-lv3
Bash Code-Injection Briefing
Excise department project_fin
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550
PKI101 polk

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx

Editor's Notes

  • #5: Denial of Service Attacks Distributed Denial of Service Attack (DDoS) Definition A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. Types of DoS Attacks The most common type of Denial of Service attack involves flooding the target resource with external communication requests. This overload prevents the resource from responding to legitimate traffic, or slows its response so significantly that it is rendered effectively unavailable. Resources targeted in a DoS attack can be a specific computer, a port or service on the targeted system, an entire network, a component of a given network any system component. DoS attacks may also target human-system communications (e.g. disabling an alarm or printer), or human-response systems (e.g. disabling an important technician's phone or laptop). DoS attacks can also target tangible system resources, such as computational resources (bandwidth, disk space, processor time); configuration information (routing information, etc.); state information (for example, unsolicited TCP session resetting). Moreover, a DoS attack can be designed to: execute malware that maxes out the processor, preventing usage; trigger errors in machine microcode or sequencing of instructions, forcing the computer into an unstable state; exploit operating system vulnerabilities to sap system resources; crash the operating system altogether. The overriding similarity in these examples is that, as a result of the successful Denial of Service attack, the system in question does not respond as before, and service is either denied or severly limited. Sources of Denial of Service Attacks "If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” Richard Clarke DoS attacks are low-cost, and difficult to counter without the right tools. This makes them highly-popular even for people with technical knowledge. In fact, DoS services are offered on some web sites starting at $50. These services have grown more and more sophisticated, and can effectively exploit application vulnerabilities and evade detection by firewalls. According to market research, DoS attacks largely originate from people with a grudge or complaint against a web site or company, competitors looking to increase market share by damaging commercial web availability, or criminal elements that systematically extort web site owners by holding his assets for ransom. Difference Between DoS and DDoS Attack It is important to differentiate between Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In a DoS attack, one computer and one internet connection is used to flood a server with packets, with the aim of overloading the targeted server’s bandwidth and resources. DDoS attack, uses many devices and multiple Internet connections, often distributed globally into what is referred to as a botnet. A DDoS attack is, therefore, much harder to deflect, simply because there is no single attacker to defend from, as the targeted resource will be flooded with requests from many hundreds and thousands of multiple sources.
  • #13: There are basically three types of DDOS attacks: Application-layer DDOS attack Protocol DOS attack Volume-based DDOS attack Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server. Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more. Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets.
  • #26: Botnets are moving toward a more P2P-like communication strategy, but there remain 'nets which rely on a single server. Bots have been spotted running on compromised Web servers, too, so that they can easily exploit browser vulnerabilities on their victims. Code running on a Web server can be considered a "server side" of botnets, and so can an actual bot server. In this article, we would like to explore what capabilities a bot server has, as well as talk about some Web exploitation kits. Command and Control Regardless of the fact that P2P technologies are starting to be used for communication between bots, it is still useful to understand how the less evolved bots function. The new P2P-enabled bots have the same functionality at their core, so the concept is the same. A bot herder who controls a bot server (or multiple servers) has at his disposal a number of interesting tools. We briefly talked about what botnets are used for in the introduction to this series, but now let's take a more detailed look at the actual commands a server can send to bot clients.