What we’ll attempt to do in this article is similar to testing a nuclear bomb (okay, not really). But still, there’s no way to tell exactly what will happen, other than to blast the damn thing because more often than not that’s just the way it is with DDOSing.
Cyber Security28 posts
Most of us use Amazon, Facebook, and Gmail almost on an everyday basis but what if you get to know that even those platforms are not safe and secure in terms of personal data like password and other information it is a great threat for all of us.
While DDoS has historically been just an annoyance, there is usually a financial impact, such as lost sales or a spike in bandwidth costs.<<<
Now that we’ve got a good understanding on the what DDoS is, let’s take a look at how it’s practically done. Although I won’t get into the technical details, here is an example of a fairly popular DOS tool - HULK
A distributed denial of service (DDoS) attack is one in which a large number of compromised systems connect to a single target (like a website), thereby causing denial of service for genuine users of the targeted system
Cheat Engine is an open source tool designed primarily to help you to tweak stuff in a running game. This allows us to make the game harder or easier or get free coins etc. It’s mainly about hacking games, but we’ll see there’s quite a bit more to it
Steganography is the art of hiding messages in such a way that no one, apart from the sender and receiver, suspects the existence of the hidden data. In this tutorial, you’ll learn a neat trick using which you can hide
Every security system has a flaw and what we’re going to discuss here is just that. Most people, with their eyes on the clock and not a second to spare just tick “Remember Me” on various websites without a second thought
A zip bomb, also known as a decompression bomb (or the ‘Zip of Death’ for the overly dramatic ones), is a malicious archive file designed to crash or render useless the program trying to access it. It could also be employed to disable anti-virus software in order to create an opening for other typical viruses.
By now you should have a pretty good grip on working with batch files. The time has come for you to fly out of the nest. Presented below are a few ideas for things that you can make your viruses do.
So now we’ve got a bunch of batch file viruses under our belt. Now it’s time to further solidify your understanding of batch scripting, so that you can start making your own useful batch files (malicious or not).
The commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient microsoft OS). These DOS(Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI).
Now that we’ve learned how to overloaded the computer’s memory, in this tutorial we’re going to wipe it all off. This is a short and easy one. This is different than the other batch file viruses we’ve seen yet. This can do real damage. Make sure you only run this inside a VM.
This virus combines the best of the fork bomb and the application flooder. It creates a new batch file in the same directory and then copies itself onto this new file. It then starts this new virus and then both of them create another copy of themselves which are then run and the process repeats over and over
Application Flooder is one of the most simplest and oldest viruses out there and unlike the fork bomb we just saw, the “Application flooder” although technically harmless, is a really annoying virus.
The fork bomb is the equivalent of a DDoS attack on your own system. It aims to deprive the system of memory (RAM), leaving nothing for other applications or the operating system’s vital operations required to keep the systems running, hence crashing it
In the following few tutorials, we’ll be learning about batch file viruses. We’ll look at various techniques to bring down a computer using small and simple scripts. Even if you have no background in programming, you’ll find it very easy to follow along.
Due to the (ahem) sensitive nature of our field of work, I recommend you use a virtual machine and not your personal native OS for doing anything you’re not familiar with. Virtual machines are perfect for practicing hacking
The following article assumes that you are a complete beginner and will likely help you every step of the way in becoming a hacker. This article is for anyone who wishes to communicate their troubles efficiently and getting their questions answered without uncalled-for rudeness
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term “hacking” historically referred to constructive, clever technical work that was not necessarily related to computer systems.
So we know what hacking is, now let’s talk about hackers. There are a lot of things that distinguish different kinds of hackers. Most importantly, skill and motivations. That is, what are you trying to accomplish and how far are you willing to go?
A person who is able to discover a weakness in a system and manages to exploit it is called a hacker and this process is known as Hacking.
Hacking is an art, and it takes years of practice to master it. Having no idea about hacking is okay and when I say beginner, I mean someone who has no experience with programming and with hacking methodologies.
What beginners want is magic. A tool which is easy to use, works on Windows, can be download by searching on Google and clicking on the first link we see, and will do all the hacking itself on the push of a button. Sadly, no such tool exists
Offensive Security, maintainers of the popular Kali Linux open source project, released Kali Linux 2019.4, the latest iteration of the Kali Linux penetration testing platform. The new release includes several new features.
Now that we’ve learned the language of security professionals, it’s time to familiarize ourselves with the tools of trade. We’re going to take a look at some of the popular tools used by security professionals.
We just saw the most common abbreviations used by hackers. Now let us demystify some of the jargon and terminologies that you’ll find in the field of digital security.
Below are some frequently used abbreviations and acronyms that all hackers should know about. The abbreviations we’re about to take a look at are used by programmers