Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
DDOS hacking: method, types and tools
[Image: become-elite-hacker-part-3-easy-ddos.1280x600.jpg]

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.
What Is a Denial of Service Attack?

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.

In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack only floods a service.

DDOS or Distributed Denial of Service Attack

This is the complicated but powerful version of DOS attack in which many attacking systems are involved. In DDOS attacks, many computers start performing DOS attacks on the same target server. As the DOS attack is distributed over large group of computers, it is known as a distributed denial of service attack.

To perform a DDOS attack, attackers use a zombie network, which is a group of infected computers on which the attacker has silently installed the DOS attacking tool. Whenever he wants to perform DDOS, he can use all the computers of ZOMBIE network to perform the attack.

In simple words, when a server system is being flooded from fake requests coming from multiple sources (potentially hundreds of thousands), it is known as a DDOS attack. In this case, blocking a single or few IP address does not work. The more members in the zombie network, more powerful the attack it. For creating the zombie network, hackers generally use a Trojan.

There are basically three types of DDOS attacks:

  1. Application-layer DDOS attack

  2. Protocol DOS attack

  3. Volume-based DDOS attack
Application layer DDOS attack:Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server.

Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more.

Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets.

There are many tools available for free that can be used to flood a server and perform an attack. A few tools also support a zombie network to perform DDOS attacks. For this post, we have compiled a few freely available DOS attacking tools.

Free DOS Attacking Tools

1. LOIC (Low Orbit Ion Canon)

LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.

It can be used simply by a single user to perform a DOS attack on small servers. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.

[Image: 102913_1221_DOSAttacksa1.png]

Image 1: Low Orbit Ion Canon

You can see the snapshot of the tool above. Enter the URL or IP address and then select the attack parameters. If you are not sure, you can leave the defaults. When you are done with everything, click on the big button saying “IMMA CHARGIN MAH LAZER” and it will start attacking on the target server. In a few seconds, you will see that the website has stopped responding to your requests.

This tool also has a HIVEMIND mode. It lets attacker control remote LOIC systems to perform a DDOS attack. This feature is used to control all other computers in your zombie network. This tool can be used for both DOS attacks and DDOS attacks against any website or server.

The most important thing you should know is that LOIC does nothing to hide your IP address. If you are planning to use LOIC to perform a DOS attack, think again. Using a proxy will not help you because it will hit the proxy server not the target server. So using this tool against a server can create a trouble for you.

Download LOIC here:



XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways. Like LOIC, it comes with an easy-to-use GUI, so a beginner can easily use this tool to perform attacks on other websites or servers.

[Image: 102913_1221_DOSAttacksa2.jpg]

Image 2: XOIC

In general, the tool comes with three attacking modes. The first one, known as test mode, is very basic. The second is normal DOS attack mode. The last one is a DOS attack mode that comes with a TCP/HTTP/UDP/ICMP Message.

It is an effective tool and can be used against small websites. Never try it against your own website. You may end up crashing your own website’s server.

3. HULK (HTTP Unbearable Load King)

HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.

It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server’s resource pool.

The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.

4. DDOSIM—Layer 7 DDOS Simulator

DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.

This tool is written in C++ and runs on Linux systems.

These are main features of DDOSIM
  • Simulates several zombies in attack

  • Random IP addresses

  • TCP-connection-based attacks

  • Application-layer DDOS attacks

  • HTTP DDoS with valid requests

  • HTTP DDoS with invalid requests (similar to a DC++ attack)


  • TCP connection flood on random port

Read more about this tool here:

5. R-U-Dead-Yet

R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.

6. Tor’s Hammer

Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.

Download TOR’s Hammer here:

7. PyLoris

PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.


It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.


DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.

10. GoldenEye HTTP Denial Of Service Tool

GoldenEye is also a simple but effective DOS attacking tool. It was developed in Python for testing DOS attacks, but people also use it as hacking tool.

Detection and Prevention of Denial of Service Attack

A DOS attack is very dangerous for an organization, so it is important to know and have a setup for preventing one. Defenses against DOS attacks involve detecting and then blocking fake traffic. A more complex attack is hard to block. But there are a few methods that we can use to block normal DOS attack. The easiest way is to use a firewall with allow and deny rules. In simple cases, attacks come from a small number of IP addresses, so you can detect those IP addresses and then add a block rule in the firewall.

But this method will fail in some cases. We know that a firewall comes at a very deep level inside the network hierarchy, so a large amount of traffic may affect the router before reaching the firewall.

Blackholing and sinkholing are newer approaches. Blackholing detects the fake attacking traffic and sends it to a black hole. Sinkholing routes all traffic to a valid IP address where traffic is analyzed. Here, it rejects back packets.

Clean pipes is another recent method of handling DOS attacks. In this method, all traffic is passed through a cleaning center, where, various methods are performed to filter back traffic. Tata Communications, Verisign, and AT&T are the main providers of this kind of protection.

As an Internet user, you should also take care of your system. Hackers can use your system as a part of their zombie network. So, always try to protect your system. Always keep your system up to date with the latest patches. Install a good antivirus solution. Always take care while installing software. Never download software from un-trusted or unknown sources. Many websites serve malicious software to install Trojans in the systems of innocent users.
Contact me for any help or forum credit... Thanks
Once you have all of your materials, you are ready to put together your own Wigs For Women
hair. Before installing the lace wig, you will need to condition and wash your own hair. And also hardwearing . hair healthier and scalp from Wigs
itching, an excellent wash and deeply conditioner are suggested. Ensure that the head of hair is completely free of moisture and hydrated. A trim is also encouraged if you have damaged hair or split ends. One of the main top reasons to Human Hair Wigs
use a lace wig is advertise healthier hair when having overall flexibility.

Soon after washing the hair and doing any of the proposed your hair treatment options, you may have 2 choices. Some women choose to put on a epidermis Wigs For Women
toned wig limit under the lace wig for additional security and some basically clean their hair back and then utilize. If you decide to put on the wig limit ensure that it suits the skin sculpt. It is possible to braid hair below the cover or simply place it.

A wonderful idea to make a far more realistic seeking head is to use Ace bandage. Ace bandage is an extremely Wigs
affordable fitness bandage for muscle accidents that can be bought at your local pharmacy. It clings to by itself so no fasten or tape is used to the your hair or scalp. The feel from the bandage offers a bumpy visual appeal which copies the head appearance underneath the lace front side wig. It really Wigs For Women
needs to be packaged round the go both on top of an ordinary wig limit or directly to your hair. Make sure you cleanse your hair line with rubbing alcoholic drinks and allow it to dried up completely.

After you have all of your supplies, you are prepared to get ready your own Lace Front Wigs
locks. Before installing the lace wig, you will need to wash and condition your own hair. To maintain your head of hair wholesome and head from Wigs
itching, a good wash and strong conditioner are recommended. Ensure the your hair is entirely dry and moist. If you have damaged hair or split ends, a trim is also encouraged. One of several major top reasons to Wigs For Cancer Patients
dress in a lace wig is advertise healthy hair whilst experiencing adaptability.

Following cleansing the hair and carrying out the advised hair treatments, you have 2 choices. Some ladies opt to wear a pores and skin Wigs For Women
toned wig limit under the lace wig for added protection while others simply remember to brush their hair then and back utilize. If you wish to dress in the wig limit ensure that it fits the skin sculpt. You may braid the hair below the cap or maybe place it.

A great idea to produce a far more sensible seeking scalp is to apply Ace bandage. Ace bandage is a very Wigs For Women
economical sporting bandage for muscle tissue personal injuries which can be purchased on your community drugstore. It clings to by itself so no adhesive or tape is used to the hair or scalp. The texture of your bandage offers a bumpy visual appeal which mimics the scalp visual appeal beneath the lace front wig. It really Wigs For Cancer Patients
needs to be covered around the head either in addition to a normal wig limit or instantly to your hair. Ensure that you purify your hair line with rubbing liquor and permit it to dried out fully.

Possibly Related Threads...
Thread Author Replies Views Last Post
  Another Ethical Hacking Tools... horlarwealth 1 156 08-25-2017, 07:12 PM
Last Post: DavidWab
Photo Hacking Tools! Super Scan 4 Port Scanner Latest Version LordZeus 0 180 07-14-2017, 09:38 PM
Last Post: LordZeus

Forum Jump:

Users browsing this thread:
1 Guest(s)

DDOS hacking: method, types and tools00