In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
How to use CMD and tools for DDoS analysis, I believe that many inexperienced people do not know what to do. Therefore, this paper summarizes the causes and solutions of the problem. Through this article, I hope you can solve this problem.
When it comes to security, you pay attention to the security of the system. You cannot make your system secure simply by comparing it to the old measurements / resources that make it secure. Hacker enthusiasts are always looking for new ways to crack security and enter the system. To really understand what to do next, rather than following the old security tips, you need to really understand the process so that you can better identify and apply the changes you need.
If you are familiar with the term "website hacker", you may know the term DDOS. This is a common attack on the Internet today. We will show you how to do DDoS, but before you need to clearly understand what it means, understand the following:
What is DDoS?
DDoS stands for distributed denial of service, which has a great impact on the Internet and its users. It simply overwhelms the server or system by using various methods to shut down the system. When talking about a website, an attacker will build a large network or rover to send requests to your site server to the maximum extent possible so that legitimate users cannot access the site. DDoS attacks can cause a severe crash of the entire site. It can be blitzkrieg, DNS server magnification or other types. The power to shut down the system / server or keep it as busy as possible to prevent actual user access can be done in a number of ways. It all depends on the capacity of the server, and how many requests you need to send once to complete. Usually
To perform a DDoS attack, you need to perform the following simple steps. We will give you a brief introduction to how to DDoS the server. Let's take a look at the following step instructions:
As we have already said, this attack can be done in a variety of ways, and you can use other methods, but here, we use software and command prompts to run this process. It is easy to use software to carry out this attack because non-technical or knowledgeable people can even follow the instructions and can start using it at any time.
Step "start the software
To start executing DDoS's software, you need to install one of the best software that can actually run. Download this software from Sourceforge.net, which is called LOIC (low orbit Ion Cannon). After downloading a piece of software, you need to extract it to the Windows system and open it.
Step to locate a website
After opening LOIC on a Windows system, you need to navigate to the website where you want to do this. Here, you will see the Select Target Box area, with two other boxes that contain options for placing the URL and IP addresses of the Web site. If you have a Web site URL to locate, place it in the first box; if you have an IP, place it in the second box. After that, click the Lock button.
Step 3 configuration
Please be patient and do not move your finger to the big button, because you still need to configure and let the software know the configuration of the attack. Now, go to the third part, say "attack options", make "timeout" and "HTTP subsite" the same, but type any "random" message in the "TCP / UDP" message box.
If you want to attack the website, also make the port the same (80), and then select the UDP method. Uncheck to wait for a reply, and then set the number of threads to 10. In general, the number of threads should be 10, but if you have a good processor / configuration, you can increase it to 20, which will increase your attack power.
Step # 4 final step (attack)
Now it's time to press the trigger, and you'll see a big button that says IMMA CHARGIN MAH LAZER, so press it. After pressing, you will see the information and the progress of the attack. In the request column, under attack status, you will see the number of times the site's resources have been requested. Or, if you execute ddos on a Minecraft server, it will show the number of times the Minecraft server resources have been requested from it.
This is just an automatic DDoS attack and will be used with LOIC, where you will provide information. If you want to do this manually, you can use the command prompt to do this. Review the following steps to learn exactly how to do this.
How to use the command prompt for DDoS
You can use cmd with DDoS manually. It increases the simplicity and convenience of the task. Using the command prompt, you only need to enable the Internet connection.
Select a site: the first step is also to select a target, so please select a site.
Get IP: in order to DDoS the site, you need to get the IP address of the site. Open a command prompt and run this command
Ping www.example.com-t
Here, www.example.com is the name of the site.
It will display an IP address similar to xxx.xxx.xxx.xxx. Once you get the IP address, press Ctrl + c to stop the current command execution.
Execute DDoS: you need to type the following command on the DDoS website.
Ping [ip address]-t-l 65500
Instead of ip address, place the actual IP address of the website you just obtained from the above command.
This command sends 65500 bytes of data to an IP address or site. To make ddos attacks more powerful, you can use multiple systems and run commands.
Keep adjusting: you need to keep the command running for at least 2-3 hours. It will flood the server and the site will be temporarily shut down.
Note: attacks using commands apply only to servers with low configuration, such as shared servers. If you try to DDoS a Web site with VPS, dedicated, or highly configured servers, use only tools such as LOIC or other powerful tools. Will work for you.
After reading the above, have you mastered how to use CMD and tools for DDoS analysis? If you want to learn more skills or want to know more about it, you are welcome to follow the industry information channel, thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.