Flood Attack?

Discussion in 'Ethical hacking' started by GreenGrass, Jul 5, 2008.

  1. GreenGrass

    GreenGrass New Member

    Joined:
    Jul 5, 2008
    Messages:
    123
    Likes Received:
    8
    Trophy Points:
    0
    Location:
    Norway
    Anyone know how to do a Flood attack?
     
  2. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    lol yea


    well there are certain types of flood attacks the mosic command basic ones are a DOS attack which means (Denial of Service Attack) or there is a


    A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless computer networking protocol.

    Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will:

    * Check for the application listening at that port;
    * See that no application listens at that port;
    * Reply with an ICMP Destination Unreachable packet.

    Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach him, and anonymizing the attacker's network location(s).

    This attack can be managed by deploying firewalls at key points in a network to filter out unwanted network traffic. The potential victim never receives and never responds to the malicious UDP packets because the firewall stops them.


    Download NET TOOLS and it comes with a UDP flood attack also

    one good DOS HTTP flood attack i like the most is called
    DOSHTTP download it


    below is 2 serial keys that are able to use forever


    DH10A-0064-5612-1234-37B5-9701

    DH10A-0064-6666-6666-1BF7-1419
     
  3. GreenGrass

    GreenGrass New Member

    Joined:
    Jul 5, 2008
    Messages:
    123
    Likes Received:
    8
    Trophy Points:
    0
    Location:
    Norway
    Ok thanks alot man.. :)
     
  4. GreenGrass

    GreenGrass New Member

    Joined:
    Jul 5, 2008
    Messages:
    123
    Likes Received:
    8
    Trophy Points:
    0
    Location:
    Norway
    Yeah this looks really cool.. thanks alot and the Key also works.. You know anywhere i can test this stuff? :)
     
  5. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    great to hear the key works umm well i usaly flood attack WOW private servers (world of warcraft)

    because of the servers are home based ( means the server is running on there computer) and when your running a server + web server for website ( account registration for private server ingame) + the ppl contected to your server using your bandwith.

    google wow private servers and the top site is the best click any of them then do a ping to see if there alive then if so you can use doshttp to flood the website because most chances its on a home based to make sure scan there ip with nmap then do a whois on the domain to make sure its not on a dedicated server. and just flood the website flooding the website attacks the webserver and can do vital damage to it.

    Hope this helps
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice