Friday, 30 August 2013
Advanced method to deface a website?
How to deface a website with cmd?
Today I will discuss an Advanced Attack to Deface a site. This Attack is used to stop functioning of a site so that no one can access it.
NOTE: Remember friends this is purely for educational purposes, pleasedon't use this for illegal activities... Don't use it to harm any Server or site.[just Joking :D] but you can get caught by police if you hack . Not My responsibility if you get caught...
DDoS Attack:
-Distributed denial-of-service attack (DDOS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)
Basic Procedure/Logic employed in DDOS :
NOTE: Remember friends this is purely for educational purposes, pleasedon't use this for illegal activities... Don't use it to harm any Server or site.[just Joking :D] but you can get caught by police if you hack . Not My responsibility if you get caught...
DDoS Attack:
-Distributed denial-of-service attack (DDOS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)
Basic Procedure/Logic employed in DDOS :
1.) Open Command Prompt in windows by going to Start -> All Programs -> Accessories -> Command Prompt.
2.) Type "ping site-ip -l 5120 -n 100000 -w 1".
Here "site-ip" is the IP Address of Target, You can also use site-name like "www.google.com" instead of site-ip."5120" is the size of packet sent to the target Which is 5 KB in example."100000" is the no of requests sent to the Target. "- w 1" is the waiting time after each request which is 1 sec in example. You can change these parameters according to your need, but don't omit these.
This Attack is also called "Ping of Death"
But In Actual a Single Computer using this Attack cannot Deface a Site for long time. Hackers Create and install botnets on different computers as trojans and use those Comprised Computers also to send these Dummy Packets to Target. When a Large no of Compromised Computer send simultaneous Requests to the target, the target site will be offline and defaced.
(READ THIS MUST:- "You can get caught by police if you hack . Not My responsibility if you get caught"..)
if you like this article don't forget to give me like(y) n Share
http://www.facebook.com/ghostproductions525
Plzz Gyes..,share our page to ur Friends &
Keep reading our articles & Happy Hacking.
Subscribe to:
Post Comments
(
Atom
)
No comments :
Post a Comment