training
Denial of service attacks

Description
This is the fifth (out of five) session in the Networking and Cyber Security course. In this session we will explore, understand and practice Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. We will learn how to compromise the TCP/IP protocols to perform the most devastating attacks. We will learn how to defeat the most secured protocols and how to bypass authentications and encryptions. We will explore methods for detection and protection against DoS and DDoS attacks. We will use many examples and demos.

Objectives
After you complete this course you will be able to perform DoS and DDoS attacks. You will be able to develop your own tools for DoS attacks. You will be able to detect Dos and DDoS attacks in your networks and block them.

Duration
2 days

Outline

Denial of Service attacks
Overview
DoS and DDoS scenario and flow
Tools

DoS basics
LAN attacks (for example, ICMP Echo flooding)
Local to remote attacks (for example, TCP SYN flood attack)
Remote attacks (for example, DNS spoofing)
Programming, examples and demos

DoS advanced attacks
DoS of a network using a single packet
Interesting harmful packets
Bots and zombies
Programming, examples and demos


© Brainstorm Private Consulting. All Rights Reserved
Designed By : Template World