Home page logo

pen-test logo Penetration Testing mailing list archives

RE: DDOS Products
From: "R. DuFresne" <dufresne () sysinfo com>
Date: Tue, 14 Nov 2006 16:50:08 +0000 (UTC)

Hash: SHA1

On Sun, 12 Nov 2006, ankur jindal wrote:

Can you please explain what do you mean by a 'good DDoS' tool? What does it exactly do ? I am just trying to learn what should a good tool be able to do in a scenario such as DDoS. I hope its not just rate limiting of traffic.

In a small DDOS attempt there are things and appliances that can help to mitigate the issues of alot of packets passing the internet connection<s>. But in a majot DDOS that fills your pipes there's really nothing one can do themselves, not without the help of a larger piped upstream provider assiting.

For pentesting, it is our understanding that DDOS is not in most cases considered a useful concept or stratedgy.

As for what those appliacnes might do in small DDOs packet attacks, your best source of info is from the vendors sites, provided you can read between the fluff....


Ron DuFresne
- -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        admin & senior security consultant:  sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A  E838 B2DF AFCC 94B0 6629

...We waste time looking for the perfect lover
instead of creating the perfect love.

                -Tom Robbins <Still Life With Woodpecker>
Version: GnuPG v1.4.5 (GNU/Linux)


This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]