DDOS or Distributed Denial of Service Attack is the most strong version of DOS attack. In this, many computers are used to target same server in a distributed manner.
Where DOS (Denial of Service Attack) is one of most dangerous cyber attacks. It is a an attempt to reduces, restricts or prevents or blocks accessibility of resources to legitimate users.
It is done by flooding the server’s request queue with fake requests and thereby overload its resources. DOS Attack can damage a website permanently as well. There are two ways of the DOS attack. Either crash a server or floods a service.
In this scenario, blocking a single or few IP address does not work, as it involves a ZOMBIE network to perform the DOS attack. There are many tools available on internet to flood a server and perform an attack. Here we are listing few among them
The articles on our website are only for Educational/Informational purposes. The author is not responsible for any illegal activity. We do not promote any malicious activities.
Also Read : LeakLooker : Find open databases with Shodan
Low Orbit Ion Cannon (LOIC)
It is an open source network stress testing and DOS attack software written with C#. This tool performs a DOS attack by sending UDP, TCP, or HTTP on the target with the intention of disrupting its services
It is mainly used for DOS attack on small servers. It is available on Linux, Windows, and Android as well.
Slowloris
This is the most effective tool for DDOS attack. It works by opening thousands of connections to the targeted web server and holding them open for a long time.
This is achieved by sending partial HTTP requests, and none of them will be completed ever. It requires minimal bandwidth to target web server and no after effects.
HOIC (High Orbit Ion Canon)
High Orbit Ion Canon or HOIC is developed to replace the Low Orbit Ion Cannon (LOIC) tool. It works by flooding target web servers with junk HTTP, GET and POST requests.
It can open up to 256 simultaneous attack sessions at once. This helps in bringing down the target system by sending a continuous junk requests so that legitimate requests cannot be processed.
The HOIC is a popular tool and is free to download. This is available for Windows, Mac, and Linux platforms as well.
R-U-Dead-Yet
R-U-Dead-Yet also known as RUDY is another DOS attack tool that work by a long form field submission via the HTTP POST method.
This tool detects the embedded web forms in the target website and then sends a legitimate HTTP POST request with a long content-length’ header field.
After that, it will send one byte-sized packet form information at a time.
Pyloris
Pyloris is a scriptable tool for a testing vulnerability in the server. It can be used to perform DOS attacks by using SOCKS proxies and SSL connections.
It can also target various protocols like HTTP, FTP, IMAP, SMTP, Telnet. It is also available on Windows, MAC, and LINUX.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…