top of page

DOS and DDOS Tests

DOS or DDOS tests aim to determine how long systems can survive as a result of a denial of service attack on the corporate network. With this test type, the reaction of the corporate systems and the response times of the services are measured in a denial of service attack that can be carried out, and measurements are made at many points from the configuration errors of the IT devices to the line width.

 

Denial of service attacks, which will be carried out in a controlled manner, are carried out both at the application layer (L7) and at the network layer (L4).

 

Penetration tests are one of the tests used to reduce the risks by seeing the current risks of many institutions. With penetration tests, security vulnerabilities are detected by applying infiltration attempts against the assets in the corporate network infrastructure.

 

However, in many cases, it has been seen that attackers who cannot successfully infiltrate can perform DOS or DDOS (Distributed Denial of Service Attack) attacks to damage the corporate network.

 

About Denial of Service DOS and DDOS Tests

DOS or DDOS attacks target the "accessibility" component of information security. At this point, information security suffers as access interruptions occur to the attacked systems and the accessibility component disappears.

 

DDOS attacks, which are carried out regardless of large or small targets, are attacks on system infrastructures and cyber attackers succeed to a large extent.

 

DOS and DDOS Tests Service

Ekon BiliÅŸim  In DDOS tests, we use our own spoof supported servers located in special datacenters around the world. These servers, which we have located on different continents and with different bandwidths, have the ability to generate traffic between 1Gbit and 100Gbit. In addition to similar methods such as TCP SYN, ACK, FIN and UDP, DNS Query Flood, there are also attack and traffic scenarios that we have prepared specifically for the application, especially GET/POST.

LEAK TEST

EXE LEAK TEST

DOS and DDOS TESTS

Vulnerability SCAN

IOT LEAK TEST

SOCIAL ENGINEERING
TESTS

MOBILE APPLICATION
TESTS

WEB APPLICATION
TESTS

SCOPE
FORM

WEB APPLICATION
TESTS

bottom of page