1 00:00:00,120 --> 00:00:05,790 Hey, Lou, everybody, welcome to my advanced ethical hacking, networking, penetration testing calls. 2 00:00:18,670 --> 00:00:26,230 In this video, we are going to talk about how you can protect yourself from a deep attack, all from 3 00:00:26,470 --> 00:00:29,420 dissolution, denial of service attack, which D. 4 00:00:29,520 --> 00:00:30,520 D or s. 5 00:00:31,030 --> 00:00:39,520 So there are lots of ways you can use to protect yourself or to mitigate that kind of attack. 6 00:00:39,850 --> 00:00:46,570 First thing first, if you have a Web site so you can try to install some security tools and if you 7 00:00:46,570 --> 00:00:49,010 are the owner of your wallet, too. 8 00:00:49,090 --> 00:00:52,570 So you can configure it as well in your back inside. 9 00:00:52,600 --> 00:00:56,250 So before distributed the DHC attack. 10 00:00:56,590 --> 00:01:06,370 But if you are a socialite, a user, call it a computer resource, you can just try to to secure yourself 11 00:01:06,820 --> 00:01:09,790 as a little as you can by changing your IP address. 12 00:01:09,880 --> 00:01:10,900 If you detect that. 13 00:01:11,000 --> 00:01:16,600 Aha, maybe I get impacted or I get affected by it D. 14 00:01:16,830 --> 00:01:17,410 S attack. 15 00:01:17,740 --> 00:01:19,810 How can you say that to yourself. 16 00:01:20,170 --> 00:01:26,260 So when a deal is that is made your computer is being busy. 17 00:01:26,590 --> 00:01:29,050 So your internet connection very slow. 18 00:01:29,110 --> 00:01:38,800 You've been without Internet because if the attacker uses a deal as that Taxin Faloon, that means it 19 00:01:38,950 --> 00:01:42,640 sends back again and again over and over to your computer. 20 00:01:42,950 --> 00:01:43,410 So. 21 00:01:44,640 --> 00:01:50,860 Or while you are on the Internet, let's say you are playing games all you are doing something so use 22 00:01:50,860 --> 00:01:58,270 and then boom is your internet connection is easy loading and your page on it was so easy loading without 23 00:01:58,540 --> 00:02:00,010 reaching the final goal. 24 00:02:00,040 --> 00:02:03,440 I mean without giving you a zone. 25 00:02:03,610 --> 00:02:06,910 So you intend it is so slow or even down. 26 00:02:07,300 --> 00:02:11,080 So what you can do first thing for as before and doing the particular part. 27 00:02:11,350 --> 00:02:15,700 Let's just summarize it in a few ways to show you. 28 00:02:16,570 --> 00:02:18,750 So look here. 29 00:02:19,160 --> 00:02:29,170 This page give gives us a very good and good explanation about what is the Durex attack and how it works, 30 00:02:29,320 --> 00:02:30,450 how to defend yourself. 31 00:02:30,460 --> 00:02:34,530 So as we said that it's a show distributed denial of service. 32 00:02:34,550 --> 00:02:39,880 The repropose of the U.S. attack is to simply overwhelm your Web server or your IP address. 33 00:02:40,040 --> 00:02:45,070 You so the server and ideas cripple it or take it down. 34 00:02:45,800 --> 00:02:48,640 And so that means it intimidates you. 35 00:02:48,790 --> 00:02:49,840 You annoys you. 36 00:02:49,840 --> 00:02:54,340 You're giving you some problems here or down below. 37 00:02:54,340 --> 00:03:00,160 You can find many tools you can use so that you can mitigate the attack. 38 00:03:00,880 --> 00:03:01,470 Okay. 39 00:03:01,570 --> 00:03:02,650 Hacking or brute force. 40 00:03:02,650 --> 00:03:10,940 Acton's IP blocking IP, Brookie, is that when you catch your enemy, you can then ban his IP address? 41 00:03:10,990 --> 00:03:12,840 I mean, the attacker IP address. 42 00:03:12,970 --> 00:03:19,180 But if the attacker is clever, of course, before making any attack, he will make a IP address, meaning 43 00:03:19,420 --> 00:03:21,340 being like your window, my pages. 44 00:03:21,430 --> 00:03:22,750 Then we can attack you. 45 00:03:22,960 --> 00:03:30,160 So or when you have some kind of knowledge of catching the attacker. 46 00:03:30,220 --> 00:03:32,030 So you will get him. 47 00:03:32,140 --> 00:03:32,620 Of course. 48 00:03:32,660 --> 00:03:34,510 But you will ban that window. 49 00:03:34,510 --> 00:03:40,630 My pledges is therefore so it can use an IP address again to make it to, you know. 50 00:03:40,740 --> 00:03:42,820 So again and again you have a job to do. 51 00:03:42,990 --> 00:03:43,960 He has a job to do. 52 00:03:44,530 --> 00:03:49,180 So yeah, you can use many tools like Keen's to life. 53 00:03:50,050 --> 00:03:50,440 OK. 54 00:03:50,590 --> 00:03:54,940 So let's jump into this. 55 00:03:56,350 --> 00:04:00,750 He'll take off Dee Dee Dee Dee as a tack. 56 00:04:00,910 --> 00:04:02,260 So we will just go it. 57 00:04:02,460 --> 00:04:03,570 As an engineer. 58 00:04:03,590 --> 00:04:05,000 Well not if not everybody. 59 00:04:05,010 --> 00:04:09,970 Very early days, but if you want we can wait it as you want because you have the address in front of 60 00:04:09,970 --> 00:04:10,090 you. 61 00:04:10,090 --> 00:04:11,860 So you'll have the scriptural everything. 62 00:04:12,130 --> 00:04:13,030 So we can reduce the debt. 63 00:04:13,530 --> 00:04:19,730 You have a very good understanding about it, about it that there are some well, some kind of attack 64 00:04:19,780 --> 00:04:28,900 like automatic attack application, laser attacks and deep of attack is to be political stands for simple 65 00:04:28,930 --> 00:04:34,520 mail transfer protocol and then protocol attacks and so on. 66 00:04:36,590 --> 00:04:43,850 As we have seen earlier, and if previous video of the attacks of the deal with attack, so it was so 67 00:04:44,000 --> 00:04:45,840 easy to attack your system. 68 00:04:46,190 --> 00:04:48,390 If if our word is there, they'll fall. 69 00:04:49,130 --> 00:04:55,880 What you should have in mind as an ethical hacker or as a as a security guy, you have to have in mind 70 00:04:55,920 --> 00:05:04,490 that if that's if the attack is so is so dangerous and then so easy to do like that. 71 00:05:05,030 --> 00:05:11,270 I have to find a way to secure myself because it's not at that moment when you get into the trap. 72 00:05:11,420 --> 00:05:12,860 We try to sort of yourself. 73 00:05:13,250 --> 00:05:20,450 You should have a plan first when the attack is made so that you can be polite to the attackers and 74 00:05:20,470 --> 00:05:22,250 that we can resist to that attack. 75 00:05:24,320 --> 00:05:32,030 As we have, since you have to have a plan and allocate wars, you should have a defined sprints before 76 00:05:32,030 --> 00:05:33,780 we spend that at that, too. 77 00:05:33,860 --> 00:05:40,820 Because when you got the attacker and it's not enough, so you feel Bunim potential Brooky that IP address. 78 00:05:41,060 --> 00:05:42,530 So this is what we mean. 79 00:05:42,770 --> 00:05:44,120 So you should have it. 80 00:05:44,120 --> 00:05:44,780 Which points. 81 00:05:45,350 --> 00:05:52,490 So to that attack, not only sort of your self, you saw the attack on yourself and then you let the 82 00:05:52,490 --> 00:05:53,390 attacker a life. 83 00:05:53,480 --> 00:05:53,930 No food. 84 00:05:53,960 --> 00:06:02,360 Luckily we let him alive when when he when he does something like that to you, when you get him, you 85 00:06:02,360 --> 00:06:02,930 catch him. 86 00:06:02,930 --> 00:06:04,130 You have to banish him. 87 00:06:04,460 --> 00:06:09,860 You know, you you destroy his IP address so that it can add into your system any more. 88 00:06:09,880 --> 00:06:13,170 So that's how we mean by killing the attacker. 89 00:06:13,220 --> 00:06:14,510 So you kill your enemy. 90 00:06:15,200 --> 00:06:17,940 You killed the IP address used by your enemies. 91 00:06:17,990 --> 00:06:19,540 So this is how we mean it. 92 00:06:19,910 --> 00:06:25,250 So, yeah, make sure no one knows the war and who to talk to. 93 00:06:25,430 --> 00:06:31,210 If they need to escalate the situation and provide a lethal internal and external contact can help. 94 00:06:31,760 --> 00:06:33,920 So they took what is in store prediction tools. 95 00:06:34,160 --> 00:06:37,610 So this is very well needed to keep everything up to it. 96 00:06:37,700 --> 00:06:37,940 Yeah. 97 00:06:38,480 --> 00:06:44,400 So let's say that we are in a company which is maybe 10 people. 98 00:06:44,480 --> 00:06:47,330 So we have to have a security manager. 99 00:06:47,780 --> 00:06:50,330 So you've said you you have this tool. 100 00:06:50,750 --> 00:06:56,900 So you install it and confront growing it into your system so that it can help you resist from the attacker 101 00:06:57,370 --> 00:06:58,580 and CloudFlare. 102 00:06:59,080 --> 00:07:01,490 It's it's a Carol. 103 00:07:02,150 --> 00:07:10,780 It's a kind of firewall so that you can mitigate the attack from from watching your inside. 104 00:07:11,240 --> 00:07:16,020 I mean, your two from giving your problem in improvable. 105 00:07:16,400 --> 00:07:20,460 So it may may need to as many to as soon as get into Dysport. 106 00:07:20,960 --> 00:07:22,220 So how to stop the attack. 107 00:07:22,550 --> 00:07:27,680 So many people say you can speed it by this or you can speed by this week, but it doesn't mean that 108 00:07:27,980 --> 00:07:28,700 they are warm. 109 00:07:28,940 --> 00:07:29,180 Yeah. 110 00:07:29,270 --> 00:07:35,110 But as much as you have a lot of information how to secure itself so you can use them. 111 00:07:35,450 --> 00:07:41,000 It would it would be very helpful, for example, me, even if I have five or on my computer. 112 00:07:41,330 --> 00:07:46,820 But sometimes if I said to myself, I did take something. 113 00:07:46,910 --> 00:07:49,310 So I quickly changed my IP address, you know? 114 00:07:49,370 --> 00:07:50,120 And then that's it. 115 00:07:50,460 --> 00:07:53,060 So but it's not only this way that they can do that. 116 00:07:53,330 --> 00:07:54,260 I can try. 117 00:07:54,350 --> 00:08:05,230 As the owner of my walk to I can set my water to to be to be oil resistant against the odds that I would 118 00:08:05,230 --> 00:08:06,150 shoot a how after. 119 00:08:07,130 --> 00:08:14,480 So there are a lot of ways so you can you can take to that you mitigate the attack from wishing you 120 00:08:16,280 --> 00:08:17,930 OK is so OK. 121 00:08:17,990 --> 00:08:20,280 The first thing first out was still dangerous obviously. 122 00:08:20,840 --> 00:08:23,120 So let's just briefly talk about it. 123 00:08:23,450 --> 00:08:28,460 You may be spending significantly of penetration testing and the latest technology for endpoint prediction 124 00:08:28,820 --> 00:08:30,380 all the way down. 125 00:08:30,410 --> 00:08:30,650 Yeah. 126 00:08:30,770 --> 00:08:31,670 So you just. 127 00:08:31,820 --> 00:08:32,410 We did, guys. 128 00:08:32,510 --> 00:08:33,320 I'm not going to read it. 129 00:08:33,380 --> 00:08:35,210 So you have this page in front of you. 130 00:08:35,870 --> 00:08:36,500 Check it out. 131 00:08:36,770 --> 00:08:37,500 Oh, Crystal Niro. 132 00:08:37,670 --> 00:08:41,390 So you said I can five step and then you in five steps and then you will get them. 133 00:08:41,720 --> 00:08:46,700 So the second step is to stop de narrow service that takes them to understand the impact. 134 00:08:46,830 --> 00:08:47,110 Yeah. 135 00:08:47,600 --> 00:08:50,340 Out can slow down your computer and you know. 136 00:08:50,920 --> 00:08:54,400 Oh but the communication that you're undertaking. 137 00:08:54,920 --> 00:08:55,340 OK. 138 00:08:55,460 --> 00:09:00,980 So how does the denial of service attacks this week really ties to clinicians and choose your squad 139 00:09:01,490 --> 00:09:03,790 and then test or a virus and adapt. 140 00:09:04,140 --> 00:09:04,290 Yeah. 141 00:09:04,670 --> 00:09:09,230 So this is how you can try to me to get the attack, guys. 142 00:09:09,350 --> 00:09:15,130 OK, so now let's minimize this like that. 143 00:09:15,170 --> 00:09:26,720 So what we can do, let's say we use this, we use these common and clear links that we launch and attack 144 00:09:27,020 --> 00:09:31,130 as we have seen in the previous video of the attack. 145 00:09:31,450 --> 00:09:34,430 So D command attacks. 146 00:09:34,550 --> 00:09:35,540 OK, system matching. 147 00:09:35,820 --> 00:09:40,430 This was much in all or MacBook for IP address. 148 00:09:40,760 --> 00:09:45,110 So what we can do as a simple user when we detect something like that. 149 00:09:45,530 --> 00:09:50,570 We can try to go to the practical part of that. 150 00:09:50,570 --> 00:09:58,340 I can show you how we can change or IP address so that we can face so that we can always list to the 151 00:09:58,340 --> 00:09:58,580 D. 152 00:09:58,730 --> 00:10:01,100 S attack from the attacker. 153 00:10:01,370 --> 00:10:08,570 But as we said earlier, that this kind of prevention can be used by the client user. 154 00:10:08,690 --> 00:10:14,210 I mean, if I'm using these computer so I can put this computer against that attack, but it would be 155 00:10:14,210 --> 00:10:19,190 better if I own your water so I can do the prevention exactly. 156 00:10:19,190 --> 00:10:21,040 On this seed when I'm in deceit. 157 00:10:21,180 --> 00:10:27,720 I mean, when the Gateway Water IP address and I click on the prevention from the dealers attack. 158 00:10:27,980 --> 00:10:30,540 So let's try to show you here. 159 00:10:30,680 --> 00:10:32,390 So we go here and there. 160 00:10:32,450 --> 00:10:35,930 We click on the Upwell icon and then we click here. 161 00:10:36,050 --> 00:10:38,750 System, which ruins the differences. 162 00:10:38,750 --> 00:10:42,970 And then we try something like a network way or it is, well, you heal. 163 00:10:44,530 --> 00:10:45,020 All right. 164 00:10:45,170 --> 00:10:48,630 So now we have Internet connection connected to Wi-Fi. 165 00:10:48,710 --> 00:10:51,270 And then the IP address is 27. 166 00:10:51,590 --> 00:10:56,660 So we want to click on ADD events so that we can make the modification. 167 00:10:57,110 --> 00:10:59,840 Before that, we have to have a user. 168 00:10:59,990 --> 00:11:01,670 I mean, and then we nexus. 169 00:11:01,940 --> 00:11:02,690 We click here. 170 00:11:03,530 --> 00:11:04,520 And then we pause. 171 00:11:04,700 --> 00:11:05,300 We click. 172 00:11:05,660 --> 00:11:06,890 We type or password. 173 00:11:08,430 --> 00:11:08,620 Yeah. 174 00:11:10,340 --> 00:11:11,660 So now we can click on it. 175 00:11:12,170 --> 00:11:13,100 So we just click. 176 00:11:13,130 --> 00:11:16,380 And then you go to disturb DCP. 177 00:11:16,520 --> 00:11:22,430 And then here you can see that we get an IP address from these WOUTER. 178 00:11:22,760 --> 00:11:24,010 But vrd. 179 00:11:24,260 --> 00:11:24,500 D. 180 00:11:24,650 --> 00:11:24,950 H. 181 00:11:25,040 --> 00:11:25,420 C. 182 00:11:25,540 --> 00:11:25,850 P. 183 00:11:25,940 --> 00:11:26,780 IP address. 184 00:11:27,120 --> 00:11:28,930 Therefore, what we can do. 185 00:11:28,930 --> 00:11:30,800 What we can try to click on this a war. 186 00:11:31,110 --> 00:11:35,510 And then we will use this using the HCB with my newer IP address. 187 00:11:35,900 --> 00:11:36,650 So we click here. 188 00:11:37,040 --> 00:11:44,090 And then they'll we're going to pass anything like let's say a one, two, two, one, one, two, three, 189 00:11:44,510 --> 00:11:48,140 one nine two one six eight one. 190 00:11:48,230 --> 00:11:53,710 And let's say at one one oh one one one one one two. 191 00:11:54,560 --> 00:11:58,640 So and then we can cook is that we'll play it for free. 192 00:11:58,940 --> 00:12:02,210 And it's still here, but we have to click on a play. 193 00:12:03,430 --> 00:12:03,970 Excellent. 194 00:12:04,360 --> 00:12:11,060 Now you see all oh, I if I get changed and then turn it off and then again turn it on. 195 00:12:11,500 --> 00:12:16,480 Now we can try to modify it if we want, we can just cross it again. 196 00:12:16,480 --> 00:12:17,440 So it's not a problem. 197 00:12:19,120 --> 00:12:20,350 OK, so it's not a problem. 198 00:12:20,770 --> 00:12:27,610 So we can try to verify it from the terminal type 199 00:12:30,640 --> 00:12:35,080 config and the new window and then the IP address should be modified. 200 00:12:35,110 --> 00:12:36,400 Let's go up where. 201 00:12:36,570 --> 00:12:37,300 Well, you. 202 00:12:38,100 --> 00:12:38,760 Excellent. 203 00:12:39,030 --> 00:12:39,730 Here it is. 204 00:12:40,030 --> 00:12:41,080 One, one, two. 205 00:12:41,530 --> 00:12:46,660 Now let's perform the attack, as we have seen earlier in the previous video. 206 00:12:46,960 --> 00:12:48,880 So let's we launch the attack. 207 00:12:48,940 --> 00:12:51,280 Guys, let's go. 208 00:12:51,340 --> 00:12:51,970 Oh, no. 209 00:12:52,240 --> 00:12:53,160 We still need it. 210 00:12:53,740 --> 00:12:54,390 It's a turn. 211 00:12:54,400 --> 00:12:56,410 So we don't need it so we can close it. 212 00:12:56,650 --> 00:12:57,940 Why you're here like that. 213 00:12:58,450 --> 00:12:59,050 And then this. 214 00:12:59,050 --> 00:13:04,120 We don't need it anymore, but we can just make it like that or do any stuff. 215 00:13:04,200 --> 00:13:05,070 We just press it. 216 00:13:05,500 --> 00:13:05,740 Okay. 217 00:13:05,830 --> 00:13:07,380 So we will launch this attack again. 218 00:13:07,390 --> 00:13:08,950 So we go to the attack machine. 219 00:13:09,280 --> 00:13:13,780 Assume that I am that machine and I am the victim so that you can understand because I use a V12 box 220 00:13:13,780 --> 00:13:16,390 machine, guys, so I press this. 221 00:13:16,420 --> 00:13:22,380 But before that, we have to go to system preference system before it ends. 222 00:13:22,450 --> 00:13:28,800 I mean, we have to go to to control activity when he talks. 223 00:13:28,800 --> 00:13:32,990 So it's here eight, nine or this here. 224 00:13:34,090 --> 00:13:37,130 So now we're going to launch and attack to see if we will watch or what. 225 00:13:37,240 --> 00:13:38,050 Of course not. 226 00:13:38,230 --> 00:13:43,850 We should not be able because all or address now is not in the whinge, you know. 227 00:13:44,260 --> 00:13:50,920 Oh, IP address is not this one IP address gets changed from two seven two one one two. 228 00:13:51,280 --> 00:13:51,530 OK. 229 00:13:51,640 --> 00:13:52,810 So let's just put it there. 230 00:13:53,850 --> 00:13:54,580 No easy. 231 00:13:56,490 --> 00:13:57,620 Is will see. 232 00:14:05,120 --> 00:14:14,690 Okay, so know do we we can try to defend ourselves from the deal is attacked is by going to a Wolter 233 00:14:15,000 --> 00:14:16,880 and country girl or whatever. 234 00:14:17,030 --> 00:14:17,780 Exactly. 235 00:14:18,110 --> 00:14:25,370 To be in such a way that it is setting up against the U.S. attack. 236 00:14:25,760 --> 00:14:31,500 So let me just show you just for you what I'm gonna give you some part of it, because I do. 237 00:14:33,150 --> 00:14:38,290 It's it would be not so end in a dive they put chose Hale. 238 00:14:39,210 --> 00:14:40,110 So. 239 00:14:44,480 --> 00:14:45,060 Massimo. 240 00:14:47,480 --> 00:14:51,200 So here, down below, so you have many options. 241 00:14:51,230 --> 00:14:56,150 You see have many, many, many options so that you can try. 242 00:14:57,410 --> 00:14:59,680 Yeah, so you have many oceans. 243 00:15:00,040 --> 00:15:06,310 So what we can do, we can we will find a way so that we can set it up against the U.S. attack, how 244 00:15:06,310 --> 00:15:07,860 to make it OK here. 245 00:15:08,230 --> 00:15:16,380 So if we can fight a war, so therefore we have a we have an option which say that enable the US protection. 246 00:15:16,720 --> 00:15:17,230 And then quickly. 247 00:15:17,360 --> 00:15:17,960 Yes. 248 00:15:18,310 --> 00:15:19,000 After clicking on. 249 00:15:19,000 --> 00:15:19,270 Yes. 250 00:15:19,300 --> 00:15:21,850 And then we click on apply. 251 00:15:22,120 --> 00:15:25,630 Therefore we will set a Wolter. 252 00:15:25,810 --> 00:15:26,440 Exactly. 253 00:15:27,340 --> 00:15:29,490 Against the US attack. 254 00:15:29,740 --> 00:15:30,250 All right. 255 00:15:31,630 --> 00:15:33,490 So I really hope that. 256 00:15:33,850 --> 00:15:34,360 I will hope. 257 00:15:34,400 --> 00:15:37,090 Guys, this video was informative for you all. 258 00:15:37,180 --> 00:15:41,590 And then we are looking forward to seeing you in the next video. 259 00:15:41,890 --> 00:15:42,430 Thank you.