Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Simulate a DDOS attack

Posted on 2013-01-30
5
Medium Priority
?
379 Views
Last Modified: 2013-02-17
Hi,
I'd like to simulate a DDOS attack for a college project (and to improve my own knowledge of the management/prevention of same) on a dummy home made network, can anyone suggest resources where I'd find details on how to do same please?
0
Comment
Question by:t38
  • 3
  • 2
5 Comments
 
LVL 41

Accepted Solution

by:
Kyle Abrahams earned 2000 total points
ID: 38837017
0
 

Author Comment

by:t38
ID: 38837297
Thanks for your prompt response, I'll review same and report back shortly
0
 

Author Comment

by:t38
ID: 38839204
ged325 - thanks again for those links, although they're helpful I was looking for more information rather than threads to forums so I'm going to leave the question open for a few days and see if I can obtain further detail.
0
 
LVL 41

Expert Comment

by:Kyle Abrahams
ID: 38841084
What information would you like?  Bees simulates the DDOS which achieves your goal no?
0
 

Author Closing Comment

by:t38
ID: 38898358
Thanks for your help!
0

Featured Post

Identify and Prevent Potential Cyber-threats

Become the white hat who helps safeguard our interconnected world. Transform your career future by earning your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question