This DDOS document is the entire content of the presentation of the students of Manipal School in Dubai. Manipal School was established in Dubai in the year 2000 and has thrived until now!
Join the channel Telegram of the AnonyViet 👉 Link 👈 |
The University of Manipal is a very large private institution. Currently, the school is training more than 25,000 students from different countries across 23 subjects. Speaking of scale, the school’s construction area spans over 750,000 square meters (including floors). The campus premises of the school can accommodate more than 4,000 students.
In terms of facilities, it can be compared with Harvard University in the US. The school provides full facilities from library, gym, tennis court, play area, laboratory, and many more. In addition, the entire campus is covered by high-speed wifi. The system of lecturers and professors is selected from many countries around the world with the best quality.
Despite such a large scale, students’ learning is very comfortable and not too restrictive. The document that I share is ma document bafox on DDOS was rated as good by the professor in April 2017. Before you download, we should learn about the concept of DDOS first.
What is DDOS?
It is a form of cyber attack, also known as a denial of service attack. The victim is a fishc websitetranslateonline services, online stores… Websites that are attacked by DDOS will be paralyzed, stop working and users will not be able to access them. So how does a DDOS attack take place?
By sending extremely large data packets to the server of the victim’s website. The server will be overloaded due to data processing and can no longer respond to visitors. Thus, the website is basically considered to have been crashed because it is inaccessible.
Has there been a large-scale DDOS attack in the world?
More or less, you’ve probably heard about the world hacker organization Anonymous, right? They are an anonymous organization without a leader. It is a gathering place for hackers from many different countries around the world.
This group is famous for having carried out massive DDOS attacks on nefarious, religious websites. They even attacked government websites with the aim of protesting. The US government and he were also victims of this gang.
What is a botnet and why does it exist?
The downside of a DDOS attack is that you can’t do it alone. Self DDOS attack will greatly affect computer performance and internal network. So if you use a personal computer to perform a DDOS call, only self harm.
Because your machine must be running high performance for this attack. Your network connection also has to open up a terrible bandwidth to send large data packets. It is possible that your home network will go down because you can’t stand it. At that time, websites also have enough time to process data and recover. As a result, you only harm your own network equipment and computers.
Therefore, hackers have created Botnet to solve this problem. More specifically, Botnets are small viruses that hackers attach to installation files. The botnet will allow hackers to use your computer and network for their DDOS attack.
With about 5000 computers infected with Botnet that means hackers have 5000 computers to DDOS. Enough to create a large-scale DDOS attack. Talking about here is relatively complete concept of DDOS already. Now I will focus on the material that I am about to share with you.
What does the DDOS document of the University of Manipal – Dubai have?
This is the presentation report of Saket Acharya and Nitesh Pradhan was rated as good at this university in April 2017. So what will be included in this report? I will list them out for you to see.
- Explain basic and advanced DDOS attack concepts and knowledge.
- Explain attack methods.
- Draw diagrams to illustrate each method.
- Explanation of hacker terminology.
- Hybrid measures against DDOS and advanced firewall.
- Conclude and give you about possible future attack measures.
How to prevent DDOS Hybrid?
- Learn the basic commands to test with Linux.
- Show how to reduce the load and limit the server to receive data when attacked.
- How to block ips/network using iptables/apf with iptables command. This process will repeat in a loop until the number of victims (affected sites) is reduced to a minimum.
- How to set up a firewall in a smarter way.
- Refilter Gateway.
- Activate the necessary functions of the website and firewall.
There are other extensions in the document as well. Please read the documentation as it is not convenient for me to list them all. The document is uploaded in pdf format and I will leave the Google Drive link for you to download.
Download here
Good luck
Lmint.