Wednesday 11 January 2017

DDOS ATTACK


In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
         

Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

An important term which you come across while searching for ddos is 'BOTNET'


'BOTNET' simply is a group of computer's which are a maliciously affected by a virus send from the hacker , once infected these computer's can be operated remotely.
These computer's send requests all at once to the targeted server.

illustration of a DDos attack

Obviously a bandwidth limit will be reached and with too many requests the server will be forced to shutdown.

METHODS OF DDOSING A WEBSITE

 There are a tons of tools which are available for free over the Internet the best ones are listed below.

(You need to run all the tool's mentioned below at the same time to achieve better result's)

LOIC ( Low orbit ion cannon )
 
          (A low orbit ion cannon window)

First type in the address of the website you intend to destroy

For example type in http://www.google.com
Then select TCP
Port number 90
Threads 50
Time out 1000
Then hit 'CHARGE MY LASER'

you are done wait till some numbers appear in the requested column.

Download loic from this link::
https://sourceforge.net/projects/loic/files/latest/download

*You may get message about malware , just ignore it.

XOIC

XOIC is another ddos tool much similar to LOIC but it is more powerful than LOIC.
XOIC uses the same methods as LOIC.

                          (A XOIC window)

Once you get this window , type in the ip address 
To find the ip address follow the method

Type cmd in start window
Open cmd
Type 'ping' space 'url'
For example:: ping www.google.com


The underlined number is the ip address
In this case 216.58.196.68

Now go to XOIC WINDOW
Type in the ip address in the ip column
Select TCP
PORT 90
Click on MAKE DDOS

You're done and keep it running for a long period of time.

The download link for XOIC follows::
http://sourceforge.net/projects/xoic/

THE ANNONYMOUS DOSER

This is a free tool from the ANNONYMOUS and it is simple you need to just type in the ip address of the targeted server.

             (An annonymous doser window)

Keep the window running till some red codes begin to start , with message in it as 'requested time out' now the server is down.

                          We do not forget.
We do not forgive.                     We are legion.

                                 Expect us
                             _Annonym v _

Monday 9 January 2017

Introduction

                               Hello there!

                Myself I am _annonymous v _

In this introductory post I will give you the basic ideas of hacking.

"HACKING" basically is a back door entrance to highly complex system of programming algorithm.
It's just like picking a lock ,now what do you need to pick a lock ? Some tools right ,, then yes it is with the case of hacking you need some programming skills.


There are three types of hackers


* THE WHITE HAT
* THE GREY HAT
* THE BLACK HAT


"THE WHITE HAT"

 They are software expert's mainly hired in a company to prevent other hacker's to run malicious script's and steal information from the company.

They mainly employ penetration test

Penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects and patch installations, for example – ethical hacking may include other things. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering, without the knowledge and consent of the targets. Only the owners, CEOs and Board Members (stake holders) who asked for such a security review of this magnitude are aware.


 To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.

In most recent cases these hacks perpetuate for the long term con (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.

"THE GREY HAT"

 These hackers are independently working guy's mainly with an intense social responsibility and an sense of humanitarian concept's in mind , they are placed in between the white and black hat's.


A further difference among these types of hacker lies in their methods of discovering vulnerabilities. The grey hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers

"THE BLACK HAT"

 These guy's are the predators in the web they hack into companies, government and other private website's and steal social security numbers.


 Black-hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". - black hat hacker's break into secure networks to destroy, modify, or steal data or to make the network unusable for those who are authorized to use it which cost's loss in billions.


In my next post I would basically start with the methods of hacking one by one.


We will Never forget,we will never forgive , we are a legion,
                   
              

                             EXPECT US!
                          _ANNONYM V_