DDoS Attack Concept Explained

June 4, 2017 | Views: 5425

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

DDoS attack:
Every website is stored on a hosting server, and every hosting server has the ability to know how many users can visit the website at the same time that stored on the server.

Suppose that www.nisareng.com is stored at Apache, and this server has the ability to serve 500 users a the same time. So, when 1000 users visit the site, it might shut down for some time or a long time.

A hacker can abuse this knowledge for his own purposes. He can attack by using botnets to send a lot of traffic to the victim web server (Website). Unfortunately, that is when the web servers get’s shut down.

Benefits:
Basically, hackers can not get benefits from this attack, but attacked companies must be at a loss. Suppose there are two companies; (1) Apple and (2) Samsumg are launching their new products at 12-12-18 ,12:00 P.M. Customers are waiting for 12:00 P.M.
Before 12:00 P.M., Apple.Inc will contract with hackers to DDoS attack at 12:00 P.M. against Samsung.
When it’s 12:00 P.M., Samsung’s customer will turn to Apple to get new products. So, by DDoS attack, Apple has achieved a high selling rate and Samsung has fallen at loss.

Lauching Dos Attack:
To perform this attack you need two things:

  1. The Python Engine (V2.X) to run and compile the hulk script .you can get from here:http://www.python.org/getit
    • Note: Download the 2nd version only for example the current on is 2.7.6. This script does not work with the 3.x version of python.
  2. Hulk.py script – this will run like a normal CMD.exe windows. It’s a small zip file, get it from here: http://www.packetstormsecurity.com/files/download/112856/hulk.zip .

When all is done, you should have Python installed, and the hulk.py file extracted. It would be easier if you installed python to a root directory.

Launch:
  1. Open run, type CMD to start cmd.exe windows.
  2. Change directory to where you installed PYTHON and pull hulk.py, type “CD” then the directory (Case Sensitive) (cd=chang directory) cd c:\python27
  3. Now start up the hulk.py script as follows –
    c:\hulk.pyhttp://www.nisareng.com/
    You should now see something like this “HULK ATTACK STARTED’’
    Give it a few seconds then it will show how many requests it has sent. If a few more seconds have passed and the attack was successful, you will see something like Respons Code 500.
    View full tutorial:


Legal Note: Please use this site (www.nisareng.com) to practice. Because I have owned this website and have full permission given by me for practice. Please do not practice at another website.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
8 Comments
  1. Keep up the good work…
    This is explained very well….

  2. This is very interesting, thank you for explaining the very fundamentals​ of the DDoS attack

  3. Thank you for useful post.
    Jazak Allah kher

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel