Ethical Hacking: Denial of Service

Ethical Hacking: Denial of Service

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 33m | 245 MB

Ethical hacking involves testing to see if an organization’s network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Ethical Hacker exam. In this course, learn about the history of the major DoS attacks and the types of techniques hackers use to cripple wired and wireless networks, applications, and services on the infrastructure. Instructor Malcolm Shore covers the basic methods hackers use to flood networks and damage services, the rising threat of ransomware like Cryptolocker, mitigation techniques for detecting and defeating DoS attacks, and more.

Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.

Topics include:

  • What is denial of service?
  • TCP SYN, Smurf, and UDP flooding
  • Deauthenticating a wireless host
  • Flooding HTTP
  • Using BlackEnergy
  • Flooding a SIP server
  • Detecting P2P attacks with PeerShark
  • Defeating DoS attacks
Table of Contents

1 How to test for denial-of-service weaknesses
2 What you should know
3 Disclaimer
4 Understanding denial of service
5 Exploring the test environment
6 TCP SYN flooding using hping3
7 Smurf flooding with hping and Hyenae
8 UDP flooding with LOIC
9 ARP poisoning with ettercap
10 Using NTP to amplify attacks
11 NEW Amplification using memcached
12 NEW When is a DDoS not a DDoS
13 Deauthenticating a wireless host
14 Flooding HTTP using GoldenEye
15 Testing Web Apps using OWASP Switchblade
16 Understanding BlackEnergy
17 Killing an FTP application
18 Flooding a SIP server
19 Explaining ransomware
20 Understanding Cryptolocker
21 Understanding Petya
22 Defeating denial-of-service attacks
23 Commercial anti-DOS services
24 Detecting P2P attacks with PeerShark
25 Summary