SlideShare a Scribd company logo
1 of 36
Download to read offline
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Details
  DOS
  Types
  Simulation
  Internet Worm
  DDOS
  Discussion




                  http://google.com/search?q=y3dips
DOS
A denial-of-service attack is an attack on a computer system or
network that causes a loss of service to users




                                                 http://google.com/search?q=y3dips
Motives
  Money
  Revenge
  Prestige
  Gaining Access
  Politic



                   http://google.com/search?q=y3dips
DOS History
  Classical DOS
  Internet Worms
  Ddos




                   http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services
Denial Of services

More Related Content

Viewers also liked

Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet SecurityAmmar WK
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]Ammar WK
 
behind the book
behind the bookbehind the book
behind the bookAmmar WK
 
Attack the (Own) Network so You'll Survive
	 Attack the (Own) Network so You'll Survive	 Attack the (Own) Network so You'll Survive
Attack the (Own) Network so You'll SurviveAmmar WK
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with PasswordAmmar WK
 
phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanationAmmar WK
 
webhacking
webhackingwebhacking
webhackingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeAmmar WK
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]Ammar WK
 
password series
password seriespassword series
password seriesAmmar WK
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootAmmar WK
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Ammar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 

Viewers also liked (20)

Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]
 
behind the book
behind the bookbehind the book
behind the book
 
Attack the (Own) Network so You'll Survive
	 Attack the (Own) Network so You'll Survive	 Attack the (Own) Network so You'll Survive
Attack the (Own) Network so You'll Survive
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with Password
 
phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanation
 
webhacking
webhackingwebhacking
webhacking
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofing
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and Practice
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]
 
password series
password seriespassword series
password series
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be root
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 
wifi
wifiwifi
wifi
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 

More from Ammar WK (11)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 

Recently uploaded

What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024DOT TECH
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?DOT TECH
 
Human Capital: Education and Health in Economic Development
Human Capital:  Education and Health      in Economic DevelopmentHuman Capital:  Education and Health      in Economic Development
Human Capital: Education and Health in Economic Developmentyirgalemleaye
 
L1 2024 Prequisite QM persion milad1371.pdf
L1 2024 Prequisite QM persion milad1371.pdfL1 2024 Prequisite QM persion milad1371.pdf
L1 2024 Prequisite QM persion milad1371.pdfmiladsojoudi211
 
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书atedyxc
 
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书atedyxc
 
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdf
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdfTop 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdf
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdfcoingabbar
 
how do i convert pi coins to usdt easily.
how do i convert pi coins to usdt easily.how do i convert pi coins to usdt easily.
how do i convert pi coins to usdt easily.DOT TECH
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书atedyxc
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024FinTech Belgium
 
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书atedyxc
 
Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Commonwealth
 
Population Growth and Economic Development
Population Growth and  Economic DevelopmentPopulation Growth and  Economic Development
Population Growth and Economic Developmentyirgalemleaye
 
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书atedyxc
 
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书atedyxc
 
Maximize Your Business Potential with Falcon Invoice Discounting
Maximize Your Business Potential with Falcon Invoice DiscountingMaximize Your Business Potential with Falcon Invoice Discounting
Maximize Your Business Potential with Falcon Invoice DiscountingFalcon Invoice Discounting
 
PPT- Chapter 5- Cost Allocation presentation pdf
PPT- Chapter 5- Cost Allocation presentation pdfPPT- Chapter 5- Cost Allocation presentation pdf
PPT- Chapter 5- Cost Allocation presentation pdfKalkaye
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024ssuser7d2330
 
Indirect tax .pptx Supply under GST, Charges of GST
Indirect tax .pptx  Supply under GST, Charges of GSTIndirect tax .pptx  Supply under GST, Charges of GST
Indirect tax .pptx Supply under GST, Charges of GSTmeghnagandhi5574
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Champak Jhagmag
 

Recently uploaded (20)

What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?
 
Human Capital: Education and Health in Economic Development
Human Capital:  Education and Health      in Economic DevelopmentHuman Capital:  Education and Health      in Economic Development
Human Capital: Education and Health in Economic Development
 
L1 2024 Prequisite QM persion milad1371.pdf
L1 2024 Prequisite QM persion milad1371.pdfL1 2024 Prequisite QM persion milad1371.pdf
L1 2024 Prequisite QM persion milad1371.pdf
 
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
 
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
 
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdf
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdfTop 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdf
Top 5 Asset Baked Tokens (ABT) to Invest in the Year 2024.pdf
 
how do i convert pi coins to usdt easily.
how do i convert pi coins to usdt easily.how do i convert pi coins to usdt easily.
how do i convert pi coins to usdt easily.
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
 
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书
一比一原版(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单学位证书
 
Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]
 
Population Growth and Economic Development
Population Growth and  Economic DevelopmentPopulation Growth and  Economic Development
Population Growth and Economic Development
 
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书
一比一原版(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单学位证书
 
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书
一比一原版(SFU毕业证书)西蒙菲莎大学毕业证成绩单学位证书
 
Maximize Your Business Potential with Falcon Invoice Discounting
Maximize Your Business Potential with Falcon Invoice DiscountingMaximize Your Business Potential with Falcon Invoice Discounting
Maximize Your Business Potential with Falcon Invoice Discounting
 
PPT- Chapter 5- Cost Allocation presentation pdf
PPT- Chapter 5- Cost Allocation presentation pdfPPT- Chapter 5- Cost Allocation presentation pdf
PPT- Chapter 5- Cost Allocation presentation pdf
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024
 
Indirect tax .pptx Supply under GST, Charges of GST
Indirect tax .pptx  Supply under GST, Charges of GSTIndirect tax .pptx  Supply under GST, Charges of GST
Indirect tax .pptx Supply under GST, Charges of GST
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
 

Denial Of services

  • 1. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 2. Details DOS Types Simulation Internet Worm DDOS Discussion http://google.com/search?q=y3dips
  • 3. DOS A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users http://google.com/search?q=y3dips
  • 4. Motives Money Revenge Prestige Gaining Access Politic http://google.com/search?q=y3dips
  • 5. DOS History Classical DOS Internet Worms Ddos http://google.com/search?q=y3dips
  • 6. Ahmad Muammar W. K. http://google.com/search?q=y3dips