7 hours 6 minutes
Hey, everyone, welcome back to the course. So in this video, we're just gonna go over a brief introduction to denial Service and DDOS attacks, and we'll also talk about some of the categories of those attacks.
So what is a denial of service attack? Well, if you remember the CIA triage from earlier in this course that we talked about that affects the availability. So denial of service attacks and DDOS attacks
affect the availability of the information. So this is basically just attack on a computer or network. So, for example, maybe a Web server or the actual network itself could also just be an attack on, like an application. And essentially, what's happening here is
the victim, or the target is being flooded with requests. So in a typical denial of service or DDOS attack the victims being flooded with so many requests that they just they can't access the system or the right people can't access the systems. I should
an example of this, like think about if you're in your drinking. Ah, bottle of water. Right. So let's say you're drinking from a gallon jug of water and you're swallowing your swallowing the water, etcetera and you're drinking the water. Now let's pretend that somebody throws another gallon of water in there, right, and someone else dumps another gallon.
All of a sudden, you're getting overwhelmed, right? You can't drink all of that water. There's just so much water.
So that's what we're talking about. Denial of service. We just There's just so much we can't actually function.
So it's a mentioned availability, right with the systems or the applications are actually unavailable for people that need to use them. So it's a DDOS attack. What's the difference? Right detail stands for distributed denial of service attack, and as the name implies, we're talking about using multiple devices to attack a single target. So, for example,
if you remember from years ago the mirror botnet that used I ot devices
and attacked certain systems,
that's what we're talking about here. So, for example, I create a botnet. I attack your Web server, and then what happens is your customers can't go to your e commerce site and buy from you anymore until you fix that issue.
So essentially here again, we're just flooding that victim with the service request to make sure that the right people are not able to access that particular system or that application.
We have several different categories of Dallas hers and details attacks. We've got volumetric attacks. And so basically, these consumed the bandwidth of the target network or service. We've got fragmentation attacks, and so this overwhelms the target system's ability to reassemble fragmented packets
we've got. We've got our TCP State exhaustion attack. So basically, this consumes the connection state tables that air president, network infrastructure components, eso things like your low balance. Here's your firewalls application servers. So this essentially eats up that bandwidth and causes the denial of service. And then we got our application layer attacks like I mentioned before, where
the attack is consuming the application resource is
or the services. And because of that, legitimate users were not able to access those.
So just a quick, quick question here for you. Denial of service attacks involve multiple compromised machines attacking a single victim. Is that gonna be true or false?
Right. So that was actually false, right? If you remember the details attack of the distributed denial of service is gonna be the one where it involves multiple compromised machines that are attacking that single victim.
So in this video, we just briefly talked about what denial of service attacks are as well as what distributed denial of service or DDOS. Attacks are, and we talked about some of the different categories of those attacks.
Ethical Hacking (CEH Preparation)
Master the core techniques and technologies of penetration testing and ethical hacking and assess the ...
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered