why this video is so underrated ?! thank you so much for your clear and very straightforward explanation
@cyberguide_in4 жыл бұрын
What an explanation!!! Just amazing as always!
@hnasr4 жыл бұрын
Thanks Bablu!! Appreciate it
@PouriyaJamshidi4 жыл бұрын
Hussein you are gonna take our jobs :D One thing to add here, 99% of enterprises are already protected by a security layer (read firewall) so those packets will never make it to the backend server. But here's the catch, DNS amplification can heavily impact the bandwidth of target, hence it is very effective. Many of the DNS providers have implemented method to not answer these queries anymore but there are thousands of resolvers out there that one can take advantage of.
@hnasr4 жыл бұрын
Interesting ! do you know how DNS providers know how IP has been spoofed? without implementing DoH/DoT that is ..
@PouriyaJamshidi4 жыл бұрын
@@hnasr The answer is usually they won't know. To mitigate it, they implement some sort of intelligence in their applications. One example would be, the big resolvers do not reply to "ANY" query anymore (it is way more complicated than this in reality)
@corbenreed6724 Жыл бұрын
Brings joy to my heart to see informative information presented with enthusiasm and fluency.
@SacredFireGaming5 ай бұрын
Thank you for explaining this. My network just got used as a reflection point. Trying to figure out what i can do to keep this from happening again. Probably just gonna turn off the local dns on my router. No need for it really.
@Cyber.Panda.5 ай бұрын
You got yourself a subscriber!! Solid work 🔥🔥
@samueladewale29874 жыл бұрын
You are doing a great job. I learn alot from you channel. May your knowledge continually increase.
@hnasr4 жыл бұрын
samuel adewale thank you Samuel! Appreciate it I am learning a lot every day by making these videos 🙏
@RoDrop9 ай бұрын
Awesome presentation!
@monaembaby77832 жыл бұрын
your explanation way is awesome❤❤ thank you
@carlosmccrary90362 жыл бұрын
Great explanation. Very much appreciated!
@computerGeekOffical3 жыл бұрын
thanks hussein your explain very helpful
@lisatorelli-sauer7922 жыл бұрын
Thanks for the explanation (and silly voices that made me laugh). 😊
@abubakarali54382 жыл бұрын
Thanks brother, that was straight to the point.
@TheCaveAdventurers3 жыл бұрын
Incredible explanation sir, thank you very much!
@gsn95033 жыл бұрын
thanku so much bro, now its crystal clear
@LucianPantea4 жыл бұрын
Excellent video. (as usual) (y)
@hnasr4 жыл бұрын
Thank you 🙏 excellent game btw !
@LucianPantea4 жыл бұрын
@@hnasr hehe - love DeusEX as well - one of my all times favorite!
@idontknow4722 жыл бұрын
Thank you for the video.
@romantsyupryk30094 жыл бұрын
Thanks so much for this video tutorial.
@AZ-bu7ss2 жыл бұрын
Thanks
@t.z.56643 жыл бұрын
very funny presentation :-) nice
@galfrasian2 жыл бұрын
Is DNS Amplification and DNS Reflection are the same thing?
@harsh.sodiwala3 жыл бұрын
1:13 triggers my google nest LOL :-p
@ndeyeastoundiaye98843 жыл бұрын
👍👍
@patelmalavdev4 жыл бұрын
Next attack Slowloris 😶😶
@hnasr4 жыл бұрын
nice idea! this attack is one reason NginX introduced headers_timeout