DDoS Attack Explained | How to Perform DOS Attack | Ethical Hacking and Penetration Testing