1 00:00:00,540 --> 00:00:01,940 Dee Dee was attached to his. 2 00:00:03,410 --> 00:00:11,390 Now, the first one, which is like or the low orbit ion can, now there is an open source stress testing 3 00:00:11,390 --> 00:00:18,200 application and it allows for both PCB and you would be particular attacks to be carried out using a 4 00:00:18,200 --> 00:00:19,010 user friendly. 5 00:00:20,100 --> 00:00:22,220 Why Squiggy interface? 6 00:00:22,290 --> 00:00:24,120 Maybe I pronounce it wrong. 7 00:00:24,150 --> 00:00:24,900 Sorry about this. 8 00:00:25,990 --> 00:00:32,920 Due to the popularity of the original tool, derivatives have been created that allow attacks to be 9 00:00:32,920 --> 00:00:34,330 launched using our probes. 10 00:00:34,960 --> 00:00:39,680 So you can see that this is the tool, actually, so you can see that it has an interface. 11 00:00:39,710 --> 00:00:46,000 This is that you are able to look on and here is the I.B. and as you can see, charging my design as 12 00:00:46,000 --> 00:00:51,720 it is a cannon or cannon, as you can see here, to time out the active substance. 13 00:00:51,850 --> 00:00:55,870 Actually, it has a lot of options and a lot of functionality. 14 00:00:57,420 --> 00:01:05,430 Now, the second one, which is that the high iron fist attached to it was created to replace the light 15 00:01:05,460 --> 00:01:12,840 by expanding its capabilities and adding customizations using the HDTV protocol, the hawk is able to 16 00:01:12,840 --> 00:01:16,170 launch targeted attacks that are difficult to mitigate. 17 00:01:16,680 --> 00:01:23,790 The software is designed to have a minimum of 50 people working together in a coordinated effort. 18 00:01:24,090 --> 00:01:27,000 So you can see that here it is now. 19 00:01:27,000 --> 00:01:29,040 It is more updated, as you can see. 20 00:01:29,040 --> 00:01:31,490 But by the way, the fighter, the laser as well. 21 00:01:32,580 --> 00:01:36,720 And here you can put the target, the post out and a lot of options, as with. 22 00:01:39,380 --> 00:01:46,160 The slow loris, now Slow Loris is an application is designed to instigate low and slow attack on a 23 00:01:46,160 --> 00:01:47,060 targeted Java. 24 00:01:47,900 --> 00:01:53,520 It needs a relatively limited amount of resources in order to create a damaging effect. 25 00:01:54,260 --> 00:02:01,740 So, by the way, here is the tool, by the way, this can be using barrel by Thorn Java. 26 00:02:01,950 --> 00:02:05,110 Actually, it depends on the damage you have. 27 00:02:05,480 --> 00:02:08,690 But here is one of the example, using the burn language, by the way. 28 00:02:10,150 --> 00:02:15,880 Now we have the Rudie, are you dead yet, and we already talked about it mentioned in the show actually. 29 00:02:16,240 --> 00:02:24,280 So Rudy is another low and slow attack tool designed to allow the user to easily launch attacks using 30 00:02:24,280 --> 00:02:26,440 a simple point and click interface. 31 00:02:27,840 --> 00:02:33,600 And by opening multiband, I asked you to be Borst request and then keeping those connections open as 32 00:02:33,600 --> 00:02:34,540 long as possible. 33 00:02:34,620 --> 00:02:38,280 The attack aims to slowly overwhelm the targeted server. 34 00:02:38,580 --> 00:02:44,400 And you can see, by the way, again, that are you did yet or, you know, the tool you can't have 35 00:02:44,400 --> 00:02:46,850 it with with the multiple programming language. 36 00:02:46,860 --> 00:02:50,640 So here one of them, actually, which is a python, by the way. 37 00:02:51,950 --> 00:02:59,560 Now, how can I defend against the doors or the tools, so since that deal authority was you, attacks 38 00:02:59,570 --> 00:03:01,010 take a variety of forms. 39 00:03:01,190 --> 00:03:07,670 Mitigating them requires a variety of tactics, common tactics for stopping attacks, including like 40 00:03:07,670 --> 00:03:15,860 this very limiting, limiting the number of requests A will accept over a certain time window web application 41 00:03:15,860 --> 00:03:24,890 firewalls to that filter web traffic based on a series of rules and any network diffusion placing and 42 00:03:25,220 --> 00:03:31,640 distribute the cloud network between a server and incoming traffic, providing additional computing 43 00:03:31,640 --> 00:03:34,280 resources with which to respond to request.