Summary


Recap

  • Denial of Service is a very commonly used attack methodology.

  • Distributed Denial of Service using a multiplicity of Zombie machines is an often seen attack methodology.

  • There are various tools available for attackers to perpetrate DOS attacks.

  • Protection against DOS is difficult due to the very nature of the attacks.

  • Different scanning tools are available to aid detection and plugging of vulnerabilities leading to DOS

  • If detected the countermeasures should be pressed immediately to limit damages.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net