
Entry statistics
0 views
0 appreciations
Entry content
Entry content
Entry content
Entry content
Entry content

Entry content

Entry content

Entry content

Entry content

Entry content

Entry content

Entry content

Entry content

Entry description
In this video we will thoroughly explain the "UDP-Flood" DDOS attack.
First, we will review some UDP fundamentals followed by IP Spoofing principle and finally, we will perform a real-life simulation of the attack, while noticing how it effects a station CPU and ICMP replies from the attacked machine.
First, we will review some UDP fundamentals followed by IP Spoofing principle and finally, we will perform a real-life simulation of the attack, while noticing how it effects a station CPU and ICMP replies from the attacked machine.
Please
sign in
to respond