How a DDOS attack works.
Dunicot’s Post
More Relevant Posts
-
How DDos attack works? a nice image simulate this attack with an easy way 😉 - Attacker infects multiple victims computers with some malware. When run it, the malware leaves a backdoor for remote control without the victims noticing any unusual activity. - Attacker uses a Command and Control (C2) server to remotely control the infected computers. Various methods, including shell commands, are used for executing connections to the target. - The botnet sends large amount of HTTP/S GET requests to the target server. - The server is unable to manage the incoming traffic requests. Server becomes overwhelmed and crashes, leading to a denial of service for legitimate users.
Computer Science Engineering student with specialization in Cyber Security at ACROPOLIS INSTITUTIONS | Actor | Filmmaker | Editor |
How a DDoS attack works.
To view or add a comment, sign in
-
Stamp 1G | Information Security Analyst | MSc. in Cyber Security | International Peer Mentor | NCI '23 | Certified Ethical Hacker (CEHv8) | Top 2% in TryHackMe
Just completed the second room of the SOC Level 1 Path on TryHackMe. Learned about the various parts of the Pyramid of Pain and how it helps SOC Analysts guide their efforts in threat intelligence and incident response. #tryhackme #soc #socanalyst
To view or add a comment, sign in
-
Technical Support Engineer || Cybersecurity Analyst || Brand Manager || Digital Marketing Consultant || Computer Engineer || Technical Writer
How DDoS basically work:
To view or add a comment, sign in
-
Cybersecurity Professional| CompTIA Security+| Cyber Security Engineer| SOC Analyst| Incident Response| Network Administrator| Entry Level Cyber Security role | Data Loss prevention| Securing the Network| Data Analyst
Example of DDoS attack
To view or add a comment, sign in
546 followers