How to do it...

To perform DoS attacks using the exploit database, follow the given steps:

  1. Prior to using the exploit database to perform DoS testing, we will need to identify which DoS exploits are available. The total exploit database can be found online at http://www.exploit-db.com. Alternatively, a copy is locally stored in the Kali Linux filesystem. There is a files.csv file within the exploitdb directory that contains a catalog of all the contents. This file can be used to grep for keywords to help locate usable exploits:
  1. In the example provided, the grep function was used to search the files.csv file for any exploit database contents ...

Get Kali Linux Network Scanning Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.