Main » 2011 September 17 » DDOS ATTACK - SIMPLE WEBSITE HACKING TECHNIQUE EXPLAINED
9:02 PM DDOS ATTACK - SIMPLE WEBSITE HACKING TECHNIQUE EXPLAINED | |
First of all We all should know What are the Different Methods Of attacking Websites... There are Generally Three Methods of Attacking an Website... 1. Ddos Attack 2. Shell Scripts Attack Note: SQL and other techniques comes in the Hacking Websites Part Not in attacking Part. Attacking is simply for fun or intentionally causing damage to the Website.. 1. DDOS Attack What is a Distributed Denial of Service (DDoS) attack? Have you ever tried to make a telephone call but couldn't because all the telephone circuits were busy? This may happen on a major holiday and often happens on Diwali, New year etc... The reason you couldn't get through is because the telephone system is designed to handle a limited number of calls at a time. So upto now you will Got an Idea What is Ddos(Distibuted Denial of Service) Attack. Basically Ddos attack is an attack which makes the Network So congested such that no further Requests are delivered. This is Done by making a number of connections to the Websites through Different Computer or Networks. Also can be done from One Computer by making Connections through Different Ports as there are 64k ports available in Windows OS... How Attacker Launch a Ddos Attack?? Later i will explain it With using simple Software: Server Attack Pro. Thsi is for Knowledge Only. First, Attackers build a network of computers that will be used to produce the volume of traffic needed to deny services to computer users. We'll call this an attack network. To build this attack network, Attackers look for computers that are poorly secured, such as those that have not been properly patched, or those with out-of-date or non-existent anti-virus software. When the Attackers find such computers, they install new programs on the computers that they can remotely control to carry out the attack. These days, however, the process of building an attack network has been automated through self-propagating programs. These programs automatically find vulnerable computers, attack them, and then install the necessary programs. The process begins again as those newly compromised computers look for still other vulnerable computers. Once an attack network is built, the intruder is ready to attack the chosen victim or victims. Some information security experts believe that many attack networks currently exist and are dormant, passively waiting for the command to launch an attack against a victim's computers. Others believe that once a victim has been identified, the attack network is built and the attack launched soon afterward. DdoS Attack Through Tools: Server Attack Pro THis tool is for Demonstration plz don't misuse... I am not Responsible for it Please Don't Misuse It.... HOW TO USE SERVER ATTACK SOFTWARE??? Steps: 1. Extract the Rar File to Obtain the Following Files.. 2. Launch The Program as Shown Below.. 3. Now Suppose You want to attack www.amulive.com (Educational Purpose Only). Type the website name In Server Address. And click on Start... 5. Now The Server Is Down and It Will Remain Down Till the Software Runs On your System... Please Don't Misuse It.... 6. Now You can Check Site cannot be Opened... Not Only my system but from any system... LIMITATIONS OF SOFTWARE: 1. Cant be Used against Big Servers like facebook, orkut, gmail, google etc... 2. Small Scale Sites and colleges sites and Bux Sites Easily Targeted... 3. For Some Site You may Need the Software to Run from 2 to 3 computers or more... PRECAUTIONS FOR WEBMASTERS! Don't Worry Friends (WebMaster's) My Next Post Will Be How To Prevent The Ddos Attacks... And Make your Site Never Suffer From These Attacks...So Keep Reading...
| |
|
Total comments: 0 | |