From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Surveying DoS/DDoS attack tools

Surveying DoS/DDoS attack tools

- There are many off-the-shelf applications available to initiate a denial of service. We're going to take a look at four of those. Metasploit, Slowloris, Exploit-DB, which is a list of several, and then Tor's Hammer. So, Exploit-DB and Metasploit. Many of the SYN flood type things or ICMP flood type applications are available within Metasploit. Exploit-DB is a list of exploits that you can search through. In this example screenshot here, if you go into the modules/auxiliary/dos and do a list, we can see the targets here, android, cisco, dns, http, et cetera, et cetera, et cetera. What are you trying to DOS? If we take a look at tcp, we got claymore, junos_tcp, and a synflood. So, you could run a SYN flood from here within Metasploit. Exploit-DB is a website. You go there, you change your type to denial of service, hit search, and then run through the large list of available denials of service that you can execute. You'll notice there is a platform listed on the right there, meaning…

Contents