![]() Where a test requires us to request a number of parameters (such as specific sequences of URL or particular combinations of DNS RRs) from the target host, this can be scripted.Īs part of the custom coding development, we will undertake small evaluation tests so we can confirm to you our attack capability in Packets, Connections, or Queries per second, or in bandwidth, as appropriate. This can also be useful for controlled replay of real attacks, or load testing for new and existing services. We can also playback canned responses for certain tests – such as DNS AXFR or DNS ANY testing. ![]() The links for these therefore will not open the page to the public so please contact us for further information. We have chosen to limit the information we provide on some of these esoteric DDoS attacks to minimise tool development but we can discuss them under NDA. ![]() ![]() Our custom DDoS attack service is especially useful if you have non-HTTP/HTTPS resources or if you have concerns about the efficacy of your mitigation platform to unusual attacks. However we can add many more bespoke DDoS attack test patterns and methods through custom coding. Our DDoS Testing and Validation platform supports many types of test pattern.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |