Главная
Study mode:
on
1
Introduction
2
Welcome
3
Questions
4
Agenda
5
What happened to DDoS
6
Whats going on right now
7
The amplifier list
8
The architecture
9
Honeypots
10
Moloch
11
Indexing
12
Results
13
Protocols
14
NTP
15
NCP
16
Request
17
DNS
18
Reply
19
Charging
20
SMP
21
HTTP
22
UDP Flood
23
Attack Testing
24
Hack Forums
25
Top Seller
26
Landing Page
27
Turnkey DDoS Service
28
Whos doing this
29
Database Leaks
30
Computer Crime Computer Fraud
31
United Kingdom
32
Twitter Post
33
What Do You Think
34
Take Questions
Description:
Explore the evolving landscape of DDoS attacks in this Black Hat conference talk. Delve into novel techniques used by law enforcement and private sector to measure, study, and attribute attacks from embedded device botnets and booter/stresser services. Learn about honeypot usage for gathering historical attack data and best practices for live DDoS attack testing. Examine representative PCAPs, dissect attack architectures, and understand various protocols involved. Gain insights into the underground marketplaces where these services are sold, the purchasing process, and the individuals behind these operations. Discover the legal implications and international efforts to combat DDoS attacks, concluding with a thought-provoking discussion on the future of cybersecurity in this domain.

Investigating DDOS - Architecture, Actors, and Attribution

Black Hat
Add to list
0:00 / 0:00