<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: WhiteHat💫</title>
    <description>The latest articles on DEV Community by WhiteHat💫 (@jeremih).</description>
    <link>https://dev.to/jeremih</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F763384%2F7afe9104-ff5f-4f54-af9c-437b3c549a85.jpg</url>
      <title>DEV Community: WhiteHat💫</title>
      <link>https://dev.to/jeremih</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jeremih"/>
    <language>en</language>
    <item>
      <title>What is DDoS Attack?</title>
      <dc:creator>WhiteHat💫</dc:creator>
      <pubDate>Fri, 10 Dec 2021 10:25:02 +0000</pubDate>
      <link>https://dev.to/jeremih/what-is-ddos-attack-jli</link>
      <guid>https://dev.to/jeremih/what-is-ddos-attack-jli</guid>
      <description>&lt;p&gt;&lt;strong&gt;DDoS&lt;/strong&gt;&lt;br&gt;
A distributed denial of service (DDoS) attack is a brute-force attempt to slow down or completely crash a server. The goal of a DDoS attack is to cut off users from a server or network resource by overwhelming it with requests for service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Common types of DDoS attacks&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Volume based attack: This includes UDP, ICMP and many other spoof-packet floods that attempt to consume bandwidth.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Protocol attacks: This kind of attack go after server resources directly and include the &lt;a href="https://www.cloudflare.com/learning/ddos/smurf-ddos-attack/"&gt;SmurfDDos&lt;/a&gt;, Ping of Death and SYN floods. If large enough packets-per-second rate is achieved, the server will crash.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Application layer attack: They target apps by making what appear to be legitimate requests (GET/POST) but at a very high volume. If there are lots of requests in a very short period of time, the victim's server shuts down. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;DoS vs DDoS&lt;/strong&gt;&lt;br&gt;
While a simple denial of service (DoS) involves one attack computer and a victim, distributed denials of service (DDoS) rely on armies i.e. thousands of infected "bot" computers which carries out tasks simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Impact of DDoS Attacks&lt;/strong&gt;&lt;br&gt;
Depending  on the severity of an attack, resources could be offline for couples of hours, days or even weeks. Money, time , clients, reputation can be destroyed. During an attack, employees are not able to access network resource, and in the case of web servers running eCommerce sites, no consumers will be able to login, purchase products or receive assistance. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What are the protective measures against DDoS attacks&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Limit the number of login attempts any user can make before being locked out of an account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tolerate a web-server configuration against DDoS attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure an ISP firewall to allow only the traffic complimenting to the services on the company side.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tweak your firewall to fight SYN flood attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Migrate public resources to another IP address.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Upgrade your Hardware.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Other Resources&lt;br&gt;
&lt;a href="https://www.gov.scot/binaries/content/documents/govscot/publications/advice-and-guidance/2019/10/cyber-resilience-incident-management/documents/cyber-incident-response-denial-of-service-playbook/cyber-incident-response-denial-of-service-playbook/govscot%3Adocument/Cyber%2BCapability%2BToolkit%2B-%2BCyber%2BIncident%2BResponse%2B-%2BDenial%2Bof%2BService%2BPlaybook%2Bv2.3.pdf"&gt;&lt;u&gt;NCC Cyber Incident Response DDoS&lt;/u&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.cbronline.com/wp-content/uploads/dlm_uploads/2018/04/Playbook-DDoS-Response-Playbook-new-V2.pdf"&gt;&lt;u&gt;Imperva DDoS Response Playbook&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>cybersecurity</category>
      <category>security</category>
      <category>news</category>
    </item>
    <item>
      <title>Simple Python Program To Find IP Address</title>
      <dc:creator>WhiteHat💫</dc:creator>
      <pubDate>Mon, 29 Nov 2021 09:08:34 +0000</pubDate>
      <link>https://dev.to/jeremih/simple-python-program-to-find-ip-address-5p7</link>
      <guid>https://dev.to/jeremih/simple-python-program-to-find-ip-address-5p7</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is an Ip Address?&lt;/strong&gt;&lt;br&gt;
An Internet Protocol address (Ip Address) is an identifier assigned to each computer and other device e.g., router, mobile, etc connected to a TCP/IP network that is used to locate and identify the node in communication with other nodes on the network. IP addresses are usually written and displayed in human readable format such as 192.168.55.10 in IPv4(32-bit IP address). Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (232) unique addresses. Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2128) unique addresses. In this article we will focus on how to get the Ip address of your computer in python. First of, you will have to import the python socket library and proceed to use this "IP=socket.gethostbyname(hostname)"  then you  print the value of the ip into the print() function in you code, the output of your IP address would be displayed as shown in the program below:&lt;/p&gt;

&lt;p&gt;"""Python program to find Ip Address"""&lt;br&gt;
 &lt;strong&gt;import&lt;/strong&gt; socket&lt;br&gt;&lt;br&gt;
 hostname = socket.gethostname()&lt;br&gt;&lt;br&gt;
 IPAddr = socket.gethostbyname(hostname)&lt;br&gt;&lt;br&gt;
 &lt;em&gt;print&lt;/em&gt;("Your Computer Name is:" + hostname)&lt;br&gt;&lt;br&gt;
 &lt;em&gt;print&lt;/em&gt;("Your Computer IP Address is:" + IPAddr)&lt;/p&gt;

&lt;p&gt;OUTPUT:&lt;br&gt;
&lt;em&gt;Your Computer Name is: mycomputer&lt;br&gt;
Your Computer IP Address is:192.168.40.109&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
With python, there are lots of programs you can write and explore, this is just one of many of them. Get hands on with this simple script and see your results. And that's it! If you have any suggestions or questions for improvements please let me know in the replies below 😁&lt;/p&gt;

</description>
      <category>python</category>
      <category>security</category>
      <category>programming</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
