A Denial-of-Service (DoS) attack is designed to overwhelm your computing resources and render your services unavailable. DoS attacks take a variety of forms and target multiple layers of the Open Systems Interconnection (OSI) model. A Distributed Denial-of-Service (DDoS) attack uses multiple computers to carry out the attack. Hacktivists frequently use DDoS attacks against organizations, and cybercriminals use them as a cover for the criminal activities they are simultaneously perpetrating.
Denial of Service Assessment: Application
In recent years, online protest movements and hacktivism has focused on disrupting the online presence of targeted businesses. While much media attention has been paid to DoS attacks that use bandwidth saturation, the threat is more severe when DoS attacks exploit flaws and limitations in the actual web application or portal. Poor application design can result in more devastating DoS attacks that require considerably fewer attackers to execute.
IOActive’s DoS assessment will enumerate the weaknesses in your application’s architecture and service relationships that can be exploited. Our tests emulate the attack profiles generated by standard DDoS attack tools, DoS agents impersonating legitimate services and browsers, and DoS agents with Cookie and session management support.
Denial of Service Assessment: Infrastructure
IOActive’s experts can help your organization build an incident response plan for DoS attacks. Our DoS Preparedness Assessment is designed to help your organization understand its risk exposure, evaluate its ability to withstand attacks, and implement a tested response methodology. These proactive steps can help minimize the impact of DoS and DDoS attacks on your organization.