1 00:00:01,200 --> 00:00:08,430 In this lesson, we will talk about those and those attacks, so don't stand for denial of service attack 2 00:00:08,430 --> 00:00:12,030 and those stands for distributed denial of service attack. 3 00:00:12,840 --> 00:00:21,930 Now, what is those attack dogs means creating a fake traffic, a huge amount of fake traffic on your 4 00:00:21,930 --> 00:00:27,740 target so that your target will unable to handle that much of traffic and will crash. 5 00:00:28,200 --> 00:00:30,650 So to make resources unavailable. 6 00:00:30,690 --> 00:00:34,200 Is the main aim of those attack right? 7 00:00:35,820 --> 00:00:44,310 Now, your target could be anything, a normal computer, a server or a Web site, so let's understand 8 00:00:44,310 --> 00:00:46,830 both doors and the doors one by one. 9 00:00:48,690 --> 00:00:53,730 So here is the scenario of DOS attack or denial of service attack. 10 00:00:54,600 --> 00:00:56,730 So this is the attacker machine. 11 00:00:56,790 --> 00:01:03,750 And in this type of attack and attacker can directly use his own machine to perform DOS attack on the 12 00:01:03,750 --> 00:01:04,290 target. 13 00:01:04,950 --> 00:01:14,880 But he will also hack a new computer and a non PC and will use that PC as an attacker machine to perform 14 00:01:14,880 --> 00:01:22,560 the DOS attack on the target so that whenever investigation is conducted, the security experts will 15 00:01:22,560 --> 00:01:28,450 assume that this is the attacker machine and this one is the real criminal. 16 00:01:28,950 --> 00:01:35,290 So to protect ourselves, the attackers would do these kind of attacks, right? 17 00:01:35,610 --> 00:01:41,270 They will hack on another machine and then use that machine to perform attack on the target. 18 00:01:41,910 --> 00:01:42,130 Right. 19 00:01:43,170 --> 00:01:51,270 But to protect ourselves from these kind of attacks, security experts will use more than one server. 20 00:01:51,660 --> 00:01:51,990 Right. 21 00:01:52,350 --> 00:01:54,900 Suppose your target is in Web site. 22 00:01:55,290 --> 00:02:03,570 So experts will look close to that website on more than one server so that whenever traffic increases, 23 00:02:03,870 --> 00:02:07,610 they will divide the traffic on all of their servers. 24 00:02:08,070 --> 00:02:08,310 Right. 25 00:02:08,790 --> 00:02:12,900 They are using load balancers to help protect from those attacks. 26 00:02:13,290 --> 00:02:19,080 Right now, those attack is used normally to take down small targets. 27 00:02:19,500 --> 00:02:28,110 OK, but if your target is big, like your target is Wikipedia, then those attacks will not work on 28 00:02:28,110 --> 00:02:28,850 that Web site. 29 00:02:29,020 --> 00:02:33,810 OK, so you have to go for distributed denial of service attack. 30 00:02:34,260 --> 00:02:34,680 Right. 31 00:02:35,070 --> 00:02:39,360 Which is dos in this did not attack. 32 00:02:40,020 --> 00:02:44,210 A group of hackers will come together to take down a big target. 33 00:02:44,460 --> 00:02:44,760 Right. 34 00:02:45,480 --> 00:02:53,340 So suppose this is hacker A, this is hacker B and this is hacker C, so a single hacker would hack 35 00:02:53,670 --> 00:02:55,020 some other machines. 36 00:02:55,290 --> 00:02:57,600 Right, like this. 37 00:02:59,830 --> 00:03:09,870 And then they all come together and will use all of these machines, OK, to take down a big target, 38 00:03:10,900 --> 00:03:11,220 right? 39 00:03:11,830 --> 00:03:20,620 So this is the minimum scenario because in real world, a single hacker would hack 10, 20 or even more 40 00:03:20,620 --> 00:03:21,340 machines. 41 00:03:22,070 --> 00:03:31,240 So a single hacker may use 20 machines, then a group of hackers, let's say 50 or 100, OK, then multiply 42 00:03:31,240 --> 00:03:38,800 them by 20 so that much of machines come together or used together to take down a big target. 43 00:03:39,610 --> 00:03:49,330 Now, recently, if you heard the news in September 2019, Wikipedia has faced DOS attack and is unavailable 44 00:03:49,330 --> 00:03:50,680 in some of the countries. 45 00:03:51,100 --> 00:03:51,440 Right. 46 00:03:52,120 --> 00:03:55,450 So did us attack once it started? 47 00:03:55,600 --> 00:03:57,360 Cannot be stopped easily. 48 00:03:57,580 --> 00:03:57,920 Right. 49 00:03:58,240 --> 00:04:03,790 You can't stop the attack by using your balancers or by blocking the IP address. 50 00:04:04,240 --> 00:04:08,580 OK, but you can use these kind of security in DOS attack, right? 51 00:04:09,310 --> 00:04:12,600 So they don't attack is a very harmful attack. 52 00:04:12,610 --> 00:04:18,790 And both those and those attacks are illegal in approximately all of the countries. 53 00:04:19,180 --> 00:04:26,530 So be aware before using these kind of attacks on real target until and unless you have the full permission 54 00:04:26,530 --> 00:04:27,140 to do so. 55 00:04:27,470 --> 00:04:27,760 Right.