Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Tags
Syllabus
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/7dd7f175bf20.jpeg)
Ethical Hacking: Denial of Service
Affiliate notice
-
TypeOnline Course
-
Provider
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
Tags
Loading...
Saving...
Loading...