YoVDO

Investigating DDOS - Architecture, Actors, and Attribution

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cybercrime Courses Network Protocols Courses Honeypots Courses

Course Description

Overview

Explore the evolving landscape of DDoS attacks in this Black Hat conference talk. Delve into novel techniques used by law enforcement and private sector to measure, study, and attribute attacks from embedded device botnets and booter/stresser services. Learn about honeypot usage for gathering historical attack data and best practices for live DDoS attack testing. Examine representative PCAPs, dissect attack architectures, and understand various protocols involved. Gain insights into the underground marketplaces where these services are sold, the purchasing process, and the individuals behind these operations. Discover the legal implications and international efforts to combat DDoS attacks, concluding with a thought-provoking discussion on the future of cybersecurity in this domain.

Syllabus

Introduction
Welcome
Questions
Agenda
What happened to DDoS
Whats going on right now
The amplifier list
The architecture
Honeypots
Moloch
Indexing
Results
Protocols
NTP
NCP
Request
DNS
Reply
Charging
SMP
HTTP
UDP Flood
Attack Testing
Hack Forums
Top Seller
Landing Page
Turnkey DDoS Service
Whos doing this
Database Leaks
Computer Crime Computer Fraud
United Kingdom
Twitter Post
What Do You Think
Take Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube