Chapter 11Denial of Service

  1. image III. Security
    • E. Network security
    • P. Vulnerabilities

This chapter will give you a firm understanding of what constitutes a denial-of-service (DoS) attack, the tools and methods used to deploy it, and strategies used to defend against such attacks. DoS is one of the most interesting methodologies employed by the hacking community because of its dramatic impact on the targeted victim and the widely varied base of tools used to launch the attack. Additionally, the means of successfully launching a DoS attack are many, but the end result is essentially the same; as an attacker, ...

Get CEH: Certified Ethical Hacker Version 8 Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.