Saturday, April 14, 2012

Denial of Service Attack (DOS) Attack On Websites

Hello readers, This is one of the most popular attack. When hacker or cracker not able to gain access on the target when he attacks the system for denial of services. 

What is DDos Attack?

A Denial-of-Service attack (DoS attack) or Distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DOS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

In a typical DDoS attack, a hacker (or, if you prefer, cracker) begins by exploiting a vulnerability in one computer system and making it the DDoS master. It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The inundation of packets to the target causes a denial of service.

How DoS Attacks are executed ? 

DoS Attacks are usually executed by flooding the target servers with unsolicited data packets in unprecedented manner. This may be done by misconfiguring network routers or by performing smurf attack on the victim servers. This results in ‘Capacity Overflow’, followed by Max Out of system resources, which makes the target service unavailable, either temporarily or permanently(In case of hardware targeted DoS attack) to the intended users.

DOS Attack Methods

Denial of Service (DOS) attacks are intended to shut down the servers for a period of time. To make site nonfunctional for a time the main part of attack is DOS attack. DOS attacks are usually doing by following methods:

1. Send unlimited amount of packets to the server.  
2. Executing Malwares   
3. Teardrop attack   
4. Application level flood
How to Perform Attack:  

 * Sending unlimited packets by ping command is also known as ICMP flood. This method can be done in the following way.

 Follow these steps:   

1: First of all you need to know the IP address of the website you want to crash. Use ping command in windows to get the ip address of the website

 open CMD and enter ping  And you will get target machine IP. 

2: Use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open  choose another website to attack.

3: Now  You have target machine IP Address. Type following command in CMD

      A simple DOS attack code would be:
      ping {Victim IP} -t -l 20000

On command prompt window you can type the following command. This command sends 20000 bytes of data to the IP, in a single packet. The -t is to ping the specified host until stopped and -l is to specify the buffer size.

 DOS attack with ping flood will work only if the following cafeterias are satisfied:

 1. Attacker should have higher bandwidth than the victim.
 2. Victim should respond to the ping requests

Dos /DDoS Attack with Tool:

There Are Many tools to perform DOS/DDOS attack. Please note that tools used for DoS attacks and DDoS are different. You don't need to know about programming to understand and run these tools. These tools may be OS specific or platform independent depending on what condition the programmers has built the code. We Discus these tools in nest post. But here i am giving Loic Dos Attack tool Download link. So Download this tool n Enjoy DOS Attack. Thank you.


Download Here

If you like this post then don’t forget  to share it and If you are getting any problem regarding to this feel free to comment :)

Connect With us on Facebook.
 Thank You For Visiting.....

Written by

Hello, My name is Ankit Bhandari You can visit and Learn Ethical Hacking from my blog. But all these hacking tricks only for educational purpose. Me and My Blog will not responsible for any wrong use of this. Enjoy it but never miss use it.


  1. you can aslo know more abt from below link ,there is tool also



© 2014 Invisible Hackers. All rights Reserved. Designed by InvisibleHackers