Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Recap
-
Denial of Service is a very commonly used attack methodology.
-
Distributed Denial of Service using a multiplicity of Zombie machines is an often seen attack methodology.
-
There are various tools available for attackers to perpetrate DOS attacks.
-
Protection against DOS is difficult due to the very nature of the attacks.
-
Different scanning tools are available to aid detection and plugging of vulnerabilities leading to DOS
-
If detected the countermeasures should be pressed immediately to limit damages.