From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

How attackers redline your CPU

How attackers redline your CPU

From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Start my 1-month free trial

How attackers redline your CPU

- [Instructor] Quick, what's three times five? What's three to the fifth power? And what's 343,243,432 to the 8924th? Some problems are easy, other problems are harder. The fork bomb is a way to denial of service a computer on which you can run code. It was more fun when computers were expensive and less shared and you could stop an entire departmental computer from running. If you think about it for a second, nope, there's already so many copies of that script already started that they can't start any more. Usually it'll hit a limit like the number of processes or the open file handles that connect to the script. The attacker can also chew up memory by allocating a bunch as the script starts. Attackers usually won't do anything to slow down the ramp up of their attacks. You don't need to be local to cause a denial of service. Sometimes you don't even need to try. In July of 2016 a regular expression, written by Stack…

Contents