The following steps demonstrate the use of Metasploit to perform Dos attacks:
- Prior to using Metasploit auxiliary modules to perform DoS testing, we will need to identify what DoS modules are available. The relevant modules can be identified by browsing through the Metasploit directory tree:
- By browsing to the /modules/auxiliary/dos directory, we can see the various categories of DoS modules. In the example provided, we have browsed to the directory that contains Windows HTTP denial-of-service exploits:
- The vulnerability ...