A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.


A distributed denial-of-service (DDoS) attack is when multiple entities are operating together to attack one target. DDoS attackers often leverage the use of a botnet—a group of hijacked internet-connected devices to carry out large scale attacks. Attackers take advantage of security vulnerabilities to control numerous devices using command and control software

A DoS (denial of service) attack is an attempt to make a computer resource unavailable for its intended users by a single attack entity

Volume-based/Volumetric Attacks: use connectionless protocols such as UDP to congest site bandwidth.
Protocol Attacks: seek to overwhelm specific devices, including web servers, firewalls and load balancers. These connection-based attacks typically work by exhausting the number of concurrent sessions that a device can handle.
Application/Layer 7 Attacks: target specific applications or servers by establishing a connection and exhausting resources.




DNS Amplification Attack

DNS Amplification attack is a type of distributed denial-of-service (DDoS) attack, where the attacker floods a website with so many fake DNS lookup requests that it eats up the network bandwidth until the site fails.

Read more
Blue Team Cheat Sheets by Chris Davis

DOWNLOAD PAPER     Blue Team Cheat Sheets by Chris Davis: DISCLAIMER: I only compiled this list of cheat sheets from other sources. As such, you will find reference to many different individuals or organizations that created these cheat sheets. I take no credit for any of their creations save for...

Read more


"The DDoS attack market is changing, and new DDoS services appear to have replaced ones shut down by law enforcement agencies. As organizations implement basic countermeasures, attackers target them with long-lasting attacks. It is difficult to say if the number of attacks will continue to grow, but their complexity is...

Read more



Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users.

Read more

Welcome Back!

Login to your account below

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist