Chapter 6

Overwhelm and Disrupt (DoS/DDoS)

IN THIS CHAPTER

Bullet Disrupting normal operations

Bullet Sending a flood attack to a host

Bullet Digging into the details of DoS and DDoS

Bullet Exploring specific DoS attacks

The series of attacks I cover in this chapter revolves around overwhelming targets. In previous chapters, you learn how to use specific tools to knock on the front door (or try the back door) and see if you could gain access. In this chapter, I show you how to kick in the front door.

In these scenarios, the attacker is focused on literally overwhelming the target to cause it to either crash, not accept real connections for service, clog up the pipes, incapacitate the system by using up all its resources, and just plain disrupt everything to cause a denial of service. I talk specifically about Denial of Service (DoS) attacks, which are unfortunately common.

I also show you how attackers (and pen testers) handle the disruption of resources through attacks such as a DoS, DDoS (distributed form of a DoS), buffer overflow attacks, and more. I discuss what tools you use to identify both whether ...

Get Penetration Testing For Dummies now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.