On hacker forums, denial of service remains the most discussed topic. Hackers continue to develop tools to optimize this attack method. Why? Distributed denial of service (DDoS) attacks do not seek to breach data integrity or privacy; they can be conducted without the requirement of identifying vulnerabilities to exploit the application. This report catalogs the latest trends, techniques and technologies deployed by hackers and gives security professionals specific steps to mitigate the threat.