A blog about Tips and Tricking any thing that possible in social networking and websites or, software, internet, computer, hack, crack, serial...

Sunday, September 4, 2022

Download DDoS Tools - How to DDoS Like a Professional Hacker – #1 DDoS Tutorial

If you are looking for guides and tutorials to learn how to DDoS someone like a professional ethical hacker than this is the best DDoS guide of this decade.
This tutorial teaches you how to DDoS an IP Address, Network or PC.
What you need to understand is the information processor. When it is exposed to too much of information or traffic which it can’t handle so it blows up.

So, What is DDoS and How to do a DDoS Attack?

Now the question is what does DDoS stands for? It is the abbreviation of “distributed denial of service”, and it is little more complicated than simple DoS attack. Though both of these attacks serve one purpose that is bringing down a website by flooding its server with a lot of information or traffic.

In the Dos attack usually, one source or a computer is used to send information to the victim website. Whereas in DDoS attack multiple sources of information or computers are used. The number of attackers of computers may vary from 100s to 1000s depending on the strength of the target website.

How to DDoS Someones PC, IP Address or Network (Ethical Hacker Way) – For Beginners

There are many many ways of pulling of  DDoS attacks. The more the method is effective the more it will be difficult to execute. In order to launch more powerful attacks, hacker usually hires a dedicated botnet to teach the victim a lesson.

Let’s show you how to DDoS!

Botnets: The most effective method...

You must be wondering what a botnet is. A botnet is a group of internet-connected machines or computers which are installed with a malware. As every device is infected with malware so they obey their admin. The big botnet networks own millions of computers over the internet, which may physically be located anywhere in the world. Usually, owners of such infected computers don’t even know that they are a part of such big network.

Normally such botnets are used for different types of illegal purposes. For example phishing, collecting user data or even cryptocurrency. But at times such networks are also rented to other buyers who need to carry out a DDoS attack.

Top Free DDoS Attack Tools of 2020
Small groups of hackers usually don’t have access to such big botnet networks so they just rely on their own computers. Such small-scale hackers use a different type of tools to direct traffic to the target server. Well, we understand that one computer can send an only a limited amount of traffic to a given a server.

But things change dramatically if you crowdsource a few hundred computers. One of the biggest hacktivist group Anonymous has used a similar approach to launch a similar type of attacks. What they do is they ask their followers to download a particular software or malware and target a particular server. Meanwhile, they are connected with others through different messaging services.

Here is a couple of software which are used by hackers to launch DDoS attacks:


LOIC which is an actual short form of “Low Orbit Ion Cannon”

Tor’s Hammer

HULK google 

DDOSIM this one is another great simulator or DDoS

Please note: You will need to download LOIC DDoS attack tool in order to launch medium to high powerful denial of service pings.

How to DDoS an IP Address Using only CMD (Command Prompt)

This one is one of the most basic attacks, also known as “ping of death” in this type of attack hackers use cmd in windows to send an abundance of packets to any given IP address.

This type of attack normally works great for comparatively small targets considering the sources available. Hackers usually target:

Hacker a target one single pc by finding its IP address. In order to carry out the attack for single computer hacker must have to find its IP address so that he could target it with an abundance of packets.
Other easy targets for such attacks are the Wi-Fi routers. All you need to do is to flood the router with a lot of traffic which will stop it send internet packets to the connected devices. Another way hacker uses such attack is to target one single pc to disconnect from a wifi router.
Though ping of death is very basic in nature and it is effective against only small targets. But if hackers use multiple computers to attack a target they can get the desired results. They can even bring down small websites with limited bandwidth capacity.

Send unlimited requests using Google Spreadsheets

Using spreadsheets of Google, a hacker can bring down a small website. In this type of attack, the attackers use a script which continuously inquires the target website to send a particular file which is stored in its cache. This file can be an image or pdf. He will write the script in such a way that it will keep running in a loop.

Usually, DDoS attacks use a huge amount of information packets to send requests to the target website, but in this type of attack, the attacker instead keeps asking for information from the web server. In other words, the attacker won’t need the huge amount of computers or botnet to bring down the website or its service.

Teardrop attacks: 

Send data one by one Anyone who understands the basic working of the internet knows that information sent over the internet is usually sent in small pieces instead of one single piece. When some data is transmitted from one end to the other it is divided into multiple pieces and then it is assembled in one piece on the server end.

The server knows to end and to start packets of one big file through parameters called offset. It not only knows their starting and ending points, but it also knows there reassembly order.

Teardrop involves sending a huge amount of senseless and overlapping or non-functional parameters to the server. So the server tries to assemble the data received but it fails to do so, in order to reassemble the uploaded data quickly it uses a huge amount of server resources and eventually the website goes down.

How to Amplify a DDoS attack (The Professional Hacker Way)

Hackers at times use DNS reflection, in order to achieve a multiplier effect. This involves a number of steps to pull off:

The first thing the hacker needs to do is to forge the IP address of the target.
Once the hackers have taken the identity of the target he will send endless requests to the open DNS.
Now in response to the requests by the hacker the DNS resolver sends back data or information to the victim server whose identity has just been stolen. Remember the size of the information sent back to the target is bigger than the requests which are sent to DNS resolver.
So how much every bit of information is amplified? For every one byte of information which is sent by the hacker to DNS resolver becomes 40 bytes. Now assume if hackers use a botnet and the whole process will end up DNS sending 100gygabits of traffic the target website.

The different types of DDoS attacks:
The DDoS attack can be categorized into 2 main categories:

Application Layer.
Network Layer.

Network Layer Attacks: Everything you need to know

In this type of DDoS attack, the website’s infrastructure is targeted by sending a huge amount of info. Though you might have seen adverts claiming to offer unlimited or unmetered bandwidth. But don’t fall for such offers, theoretically, you can say that you won’t have to get worried about the traffic amount or bandwidth.

To understand it more comprehensively let’s take an example of a website which has monthly traffic about 15k page views per month and 100s of pages. This website would require 50  gigabytes to run. Remember this amount of traffic is expected to be dispersed over the entire 30 days. A website with such resources won’t be able to survive a DDoS attack as even a small scale DDoS attack can generate that much of traffic within an hour.

In such case, the hosting service will shut down your website until the traffic becomes normal. Well, you can say that this is pretty cheap on hosting provider’s side, but this is done to avoid any kind of spillover which might result in affecting other clients. Network layer attack can further be divided into many types some common one is given below:

SYN Attacks. Synchronize attack is requested which a computer transmits to the web server to sync the underlying two devices or machines.
DNS reflecting.
UDP amplification attacks.

Well, one weakness for this kind of attack is that because of its immense amount of traffic the victim can easily figure out the type of attack is happening on their web server.

Application Layer Attacks: Everything you need to know

This type of attacks is more complicated and precise in nature as they tend to target those tools and software which are used by that particular website. Remember such software is sometimes crucial for a website’s functionality. For example, in such attack, the hackers will target WordPress installation, scripts, and database communication.

Usually, such programs or scripts are not designed to handle such type attacks or traffic or requests. So in other words, even a small-scale DDoS attack can dismantle these scripts or software.

Usually, application layer DDoS attack involves a huge amount of HTTP requests. This exploit is executed using two simple HTTP requests that are Post and GET. These commands are commonly used in web pages to send and retrieve information. The POST request is quite complex uses a lot of resources as compared to GET request.

It is complex in the sense that the processes started by this command are usually resourced intensive on the server side. A huge amount of HTTP requests will further generate a big amount of internal server requests which results in a crash of the whole website.

How to protect yourself against a DDoS (DOS) Attack?

Wireshark: Actively Monitor your Networks
It is a great tool to diagnose if you are going through a denial of service attack or not. It offer you some great features, for example, you can see what ip addresses are connected to your server and what amount of packets they are sending.

But don’t forget if the attacker is using VPN then you won’t be able to see the real IP address. And if the attack is coming from a botnet then you will see a big amount of IPs connected with your server. You can google further about the usage of Wireshark.

If you are using windows, it comes with a built-in tool known as Netstat. It along with many other statistics shows you the details of devices connected to your server.

In order to use this tool, just type netstat –an in your windows command prompt and it will provide you with the complete details of your connections. It will show you the internal IP as well as external IPs.

Keep an eye on traffic, is it an attack or traffic spike?

Traffic spikes are quite common and on some occasions, they can be immense enough to bring down the websites. If a website is designed to handle a limited number of user at one time let’s say 50 users per occurrence. It is highly likely that website will crash if 500 user visits it at the same occurrence or time.

A major sign of the website is under attack is slowing down the performance of the server. Service unavailable errors and request start to take more time, for example, normal requests which are completed within milliseconds they start to take longer.

Let your Internet Service Provider know that you are under attack

Keep your ISP in the loop, usually ISPs and hosting providers have already a planned response for such attacks, but just contact them and keep them the in the loop. Be prepared for any of such situation in advance.

Always have an incident response plan or disaster recovery plan ready:

Every website owner should have a response plan just in case website comes under attack what steps should be taken. Every organization has their own plan, but below are few steps which should be covered:

Keep a whitelist of critical IP addresses. For example you internet service provider, traffic sources, your clients and business partners etc.
Set up an alarm for traffic spikes.
Keep monitoring connections and terminate the unnecessary ones.
Keep your server updated with an extra bit of bandwidth and server-side resources.

Watch for any virus or malware infections

In many cases, hackers use DDoS attack as a disguise to get access to the sensitive data. When the attack is on don’t panic. Make sure your server is not infected by any kind of malware and your data is save. Don’t forget to scan your server once you are back live.

Are you safe from DDoS Attacks?

To sum it up, always keep your hosting and web server up to date and always keep a plan to follow in case of DDoS attack. You should have mitigations in place and should have DDoS protection from your hosting company or provider. This will need you to have a much more powerful server and network connection to overcome the attack. I hope our how to DDoS Attack Someones PC, IP or Network guide was helpful.

Please be aware that this is not a joke and is serious, even if you try ddosing your friend or even someone on discord can get you in trouble, so please be careful how you use our tutorial. You are responsible for your own actions, only use these methods on servers, PCs and systems that you have permission to use and do so on. Let us know any of your DDoS Attack methods in the comments.

1 comment:

  1. CONTACT: onlineghosthacker247 @gmail. com
    -Find Out If Your Husband/Wife or Boyfriend/Girlfriend Is Cheating On You
    -Let them Help You Hack Any Website Or Database
    -Hack Into Any University Portal; To Change Your Grades Or Upgrade Any Personal Information/Examination Questions
    -Hack Email; Mobile Phones; Whatsapp; Text Messages; Call Logs; Facebook And Other Social Media Accounts
    -And All Related Services
    - let them help you in recovery any lost fund scam from you
    onlineghosthacker Will Get The Job Done For You
    onlineghosthacker247 @gmail. com