A denial-of-service attack (DoS attack) or distributed - TopicsExpress



          

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Do *not* forget to protect yourself first, and to do proper reconnaissance. r-u-dead-yet This tool runs with an interactive console menu, automatically detecting forms within given URL, and allowing the user to choose which forms and form fields are desirable to use for the POST attack. In addition, the tool offers unattended execution by providing the necessary parameters within a configuration file. In version 2.x RUDY supports SOCKS proxies and session persistence using cookies when available. A speedy suite of DoS (Denial of Service) hacking tools used for “attacking” servers. It also has a few “informative” tools that can help you get info on the person you want to attack, etc. Features Mass Connector – allows you to quickly connect and reconnect to a single address and port, usually overwhelming the server and stopping further connections. There is also an “amplify” option which allows you to have a separate amplifying server on another computer, and then tell it to mass connect also, thus increasing the power of the attack. Port Flooder – allows you to maintain a single connection to a server, sending data packets over a long period of time. There is also an “amplify” option which allows you to have a separate amplifying server on another computer, and then tell it to flood also, thus increasing the power of the attack. Multi Flooder – connects to multiple IP addresses and ports, allowing you to have the effects of the Port Flooder at many places simultaneously or at one place on many ports trying to shut down a server computer. UDP Flooder – same as the Port Flooder, except it uses UDP and is therefore capable of much higher speeds. (note on this at end of file) Port Scanner – allows you to scan a single host and a range of ports for open ports. Port Checker – allows you to check a single host and a single port to see if it’s open. Useful if you just scanned somebody and want to make sure the port is still open without scanning them all over again. IP Resolver – resolves IP addresses or hostnames. Press Enter with one of the fields selected to convert the IP/hostname. ZAAS – ZAAS (the ZapAttack Amplification Server) is what you put on a computer that you want to help the attack. There is a regular server which has a log window and runs visibly and also a hidden server which allows you to plant it on somebody’s computer and make them take part in the attack. ;-) And just in case you happen to lose the connection with the amplifier and you aren’t able to control the server anymore, ZAAS will automatically stop any attacks, making sure you have full control when you reconnect. A word of warning about the ports though: Even though they accept the Connect Every, Send Every, and Stay Connected options, they won’t apply them. So this means those values will just be discarded. Also, since Windows doesn’t support bundles, the RunOn file has to be separate from the app, but still in the same folder. ZAAS is a separate package available for download. A Security Suite that packs security and stability testing oriented tools for networks and systems. Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works. Technical features GNU/GPLv3 License. Free in freedom and in price. Multi-platform (Ruby: GNU/Linux, Windows, Mac OS, *BSD, iOS, Android, …). Compatible with Ruby and JRuby. Multithreading (native threads in Ruby >= 1.9 and JRuby). Doesn’t require additional libraries (non standard are included). Modular (easy to expand and customize). Tools (SVN Version) Cryptography tools Base64 Encoder & Decoder Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160) Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160) Secure Password Generator Network tools Net DoS Tester TCP port scanner Honeypot Fuzzer DNS and host gathering Web HTTP directory bruteforce HTTP common files bruteforce OWASP – the Open Web Application Security Project The OWASP Testing Guide v3 (Section 4.9) Denial of Service Testing outlines numerous areas of Denial of Service. In version 4.0 additional updates will be made. This QA tool was created to allow you to test your web applications to test availability concerns from HTTP GET and HTTP POST denial of service attacks – This tool is GPLv3 HOIC is pretty useless UNLESS it is used incombination with “BOOSTERS”, AKA “SCRIPTS”/BOOST PACKS / BOOM BOOM POWER. These boosters come in the form of .HOIC scripts. LOIC is an open source network attack application, written in C#. LOIC was initially developed by Praetox Technologies, but later it was released into the public domain. LOIC is an acronym for Low Orbit Ion Cannon, a fictional weapon in the Command & Conquer series of video games.
Posted on: Fri, 20 Sep 2013 13:05:00 +0000

Trending Topics



Recently Viewed Topics




© 2015