Preconfiguration File

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Ethical Hacking (2019): Denial of Service

with Malcolm Shore

Preconfiguration File
This file contains details of the software and virtual machine configuration changes required to support the
Ethical Hacking: Denial of Service course. Each requirement is noted in the relevant course module, but you
may wish to preload the software to avoid having to wait when working through each video.

Video Title Item Details

02_02, Smurf flooding with hping Hyenae In Windows 7 , navigate to https://


and Hyenae sourceforge.net/projects/hyenae/
and press the Download button to
download the .exe file.

02_03, UDP flooding with LOIC LOIC In Windows 7, navigate to https://


sourceforge.net/projects/loic/
and press the Download button
to download the .zip file. Extract
the executable.

02_05, Using NTP to amplify ntpdos.py In Kali, wget, https://github.com/


attacks vpnguy-zz/ntpdos/blob/master/
ntpdos.py.

04_01, Flooding HTTP with GoldenEye In Kali,


GoldenEye cd /usr/share
git clone https://www.github.
com/jseidl/GoldenEye.git

04_02, Testing web apps using Switchblade In Windows 7, navigate to https://


OWASP Switchblade www.owasp.org/index.php/
OWASP_HTTP_Post_Tool and
click on the Windows Installer to
download the HttpDosTool4.0.zip
file. Extract the
Switchblade folder.

05_01, Flooding a SIP server MYVOIPAPP In Windows 10, navigate to


https://www.myvoipapp.com/
download/index.html and
download the MYVOIPAPP
executable for 20 clients. Run the
executable to install.

Ethical Hacking (2019): Denial of Service with Malcolm Shore 1 of 1

You might also like