In this section, we are going to discuss one of the most deadly attacks, called the Denial-of-Service attack. The aim of this attack is to consume machine or network resources, making it unavailable for the intended users. Generally, attackers use this attack when every other attack fails. This attack can be done at the data link, network, or application layer. Usually, a web server is the target for hackers. In a DoS attack, the attacker sends a huge number of requests to the web server, aiming to consume network bandwidth and machine memory. In a Distributed Denial-of-Service (DDoS) attack, the attacker sends a huge number of requests from different IPs. In order to carry out DDoS, the attacker can use Trojans or IP spoofing. In this section, we will carry out various experiments to complete our reports.

Python Penetration Testing Essentials
By :

Python Penetration Testing Essentials
By:
Overview of this book
Table of Contents (14 chapters)
Python Penetration Testing Essentials
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Python with Penetration Testing and Networking
Scanning Pentesting
Sniffing and Penetration Testing
Wireless Pentesting
Foot Printing of a Web Server and a Web Application
Client-side and DDoS Attacks
Pentesting of SQLI and XSS
Index
Customer Reviews