Performing distributed denial of service attack using hoic lab

 Unlimited Attempts AllowedDetails

Virtual Labs: Perpetrators of DoS

Consider what you have learned so far about Denial of Service as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below.

Objective

Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its resources. In a DoS attack, attackers flood a victim’s system with illegitimate service requests or traffic to overload its resources and prevent it from performing intended tasks.

The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws. In this lab, you will:

  • Perform a DoS attack by sending a large number of SYN packets continuously
  • Perform an HTTP flooding attack
  • Perform a DDoS attack
  • Detect and analyze DoS attack traffic

Scenario

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means, motives, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.

One common method of attack involves saturating the target machine with external communications requests so that it cannot respond to legitimate traffic, or it responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. DoS attacks can essentially disable your computer or your network. DoS attacks can be lucrative for criminals; recent attacks have shown that DoS attacks are a way for cybercriminals to profit.

As an expert Ethical Hacker or Pen Tester, you should have sound knowledge of Denial of Service and Distributed Denial of Service attacks in order to detect and neutralize attack handlers and mitigate such attacks. The labs in this module will give you a hands-on experience in auditing a network against DoD and DDoS attacks.

Week 8 Lab Assignment 1: Auditing a Network against DoD and DDoS attacks.

Lab Task:

The objective of this lab is to help students learn how to perform a DDoS attack—in this case, HTTP Flooding.

Lab Description:

A distributed denial of service (DDoS) attack is a more sophisticated form of DoS attack in which, in some cases, it is difficult to trace the attackers. A DDoS attack is a large-scale, coordinated attack on the availability of services on a victim’s system or network, launched indirectly through many compromised computers on the Internet.

A DDoS attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the DoS significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. The flood of incoming messages essentially forces the target system to shut down, thereby denying service to legitimate users.

These attacks come from various machines that can be in the same location or various other locations. As large numbers of “zombies” participate in this attack, an enormous amount of traffic is directed onto the victim machine, resulting in temporary or permanent damage to its resources.

As an expert Ethical Hacker and Penetration Tester, you must be aware of all types of DoS attempts and prevent them from affecting information systems.

decorative image

Access the lab here: EC-Council | iLabsLinks to an external site.

Submit proof of this assignment completion by uploading and submitting a screenshot of the graded lab from EC-Council Labs. Refer to the Course Projects page for more information on project submissions. 

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more