Advertisement
SLaychickentheroozte

DDos Guide and how to protect yourself)

Oct 16th, 2016
190
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.77 KB | None | 0 0
  1. Info about Ddosing (This is for educational purpose only)
  2. DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
  3. ========================================================================================================================================
  4.  
  5. DoS/DDoS
  6. What is DDoS actually?
  7. Is it illegal? Will I get easily caught?
  8. How to DDoS?
  9. Spoofing
  10. How to prevent a DDoS Attack?
  11. DDoS Ampflication.
  12. Layer 4 and Layer 7
  13. Scripts.
  14. Websites that allows spoofing.
  15.  
  16.  
  17. DoS/DDoS
  18.  
  19. DoS (Denial of Service)
  20. DDoS (Distributed Denial Of Serivce)
  21.  
  22. They both have a large difference, DoS is sending from one location, and DDoS is sending from multiple locations.
  23.  
  24. What is DDos actually?
  25.  
  26. DDoS is basicly sending out packets, and preventing the usert from connecting to the destination.
  27. Basicly the user is trying to connect 1.1.1.1, And the attacker is sending packets to 1.1.1.1 to prevent the user from connecting.
  28.  
  29. When the host isnt being ddosed :
  30. User > Testing Connection > 1.1.1.1 > Succesfully connected.
  31.  
  32. When a DDoS attack is active :
  33. User > Testing Connection > Connection failed > Timeout on 1.1.1.1
  34.  
  35. Is it illegal? Will I get easily caught?
  36.  
  37. In some ways, DDoS is legal, but mostly DDoS is illegal, DDoS is also called Stress-testing, that means you are testing your server, to see If your server can handle a large amount of bandwith in.
  38. But DDoS is mostly illegal, and for illegal purposes used, like attacking homeconnections without permission.
  39.  
  40. Is it easy to get caught? No, depends on where you are sending the attack from, you can hide your location with a VPN (Virtual Private Network).
  41.  
  42. How to DDoS/DoS
  43.  
  44. A denial of service attack is basicly sending out packets from your location to a destination, to prevent a user connecting to the destination.
  45. You can DoS simply with using Control+R and type in CMD.exe, then type something like ping (host), this is basicly pinging the destination.
  46. Pinging wont do much, So you can buy a server and send packets from that, that will make you getting caught a lower chance, most hosts doesnt allow DDoS attacks, and will simply cancel your dedicated server/VPS.
  47. You need a host that allows spoofing, So your destination doesnt know wher e to send the abuse report to, this will prevent you from getting your server canceled Not all hosts allow spoofing
  48.  
  49. Spoofing
  50.  
  51. What is spoofing you ask? Spoofing is basicly hiding your host so the destination doesnt know, where the packets come from, Here is how spoofing looks like :
  52. Spoiler (Click to View)
  53.  
  54. How to prevent DDoS attacks?
  55.  
  56. Preventing DDoS attacks, isnt that simple you think it is, There are alot of different ways to stop DDoS attacks, You can ask for DDoS Protection by your host, or you can get migation, migation is basicly spreading all the packets to a set of servers so your main server doesnt get too much packets in, a reverse proxy can be used also.
  57.  
  58. How to block XMLRPC attacks?
  59. Simply block the Wordpress Useragent, and make them redirect to a blank page.
  60.  
  61. DDoS Ampflication
  62.  
  63. What is DDoS ampflication you ask? Well its basicly a ampflication of your DDoS attacks, there are alot of different methods to use for ampflication attacks, You double your DDoS attacks using a ampflication method.
  64.  
  65. Here is a list of different amp (ampflication) methods :
  66. (Click to View)
  67.  
  68. Layer 4 and Layer 7
  69.  
  70. What is the difference about Layer 4 and Layer7 you ask?
  71. Layer 4 is basicly sending out data/packets.
  72. Layer 7 is sending out fake users, to a webserver.
  73.  
  74. List of Layer 4 and Layer 7 methods.
  75. Layer 4 (Click to View)
  76.  
  77. Layer 7 (Click to View)
  78.  
  79. Scripts
  80.  
  81. Well, you need scripts also before DDoSing, so here is a thread where a large amount of scripts got posted :)
  82.  
  83. https://hackforums.net/showthread.php?tid=4230629
  84. Compile using chmod 777 (file)
  85.  
  86. Scanning and Filtering.
  87.  
  88. Scanning and filtering, is really important for your ampflication methods.
  89. Scanning is basicly searching around the world, for IPs that your ampflication method can use, to double the attack amount.
  90.  
  91. How do you filter you ask me?
  92. Here are some filter scripts, made by QuezzStresser.
  93. http://quez-stresser.com/joomlafilter.txt
  94. http://quez-stresser.com/mssqlfilter.txt
  95. http://quez-stresser.com/xmlrpcfilter.txt
  96. http://quez-stresser.com/chargenfilter.txt
  97.  
  98. Use them with installing PHP.
  99.  
  100. Filtering is testing the timeout on the IPs you scanned, the lower the timeout the higher your amp rate is.
  101.  
  102. Websites that allow spoofing.
  103.  
  104. http://www.ecatel.info
  105. https://www.slaskdatacenter.pl
  106. http://blazingfast.io | Layer 7 only.
  107. use OVH for scanning.
  108. ==========================================================================================================================================
  109. Ddosing site
  110.  
  111. distributed denial-of-service attack (DDOS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)
  112.  
  113. Basic Procedure/Logic employed in DDOS :
  114.  
  115. 1.) Open Command Prompt in windows by going to Start -> All Programs -> Accessories -> Command Prompt.
  116.  
  117. 2.) Type "ping site-ip -l 5120 -n 100000 -w 1".
  118.  
  119. Here "site-ip" is the IP Address of Target, You can also use site-name like "www.google.com" instead of site-ip."5120" is the size of packet sent to the target Which is 5 KB in example. "100000" is the no of requests sent to the Target. "- w 1" is the waiting time after each request which is 1 sec in example. You can change these parameters according to your need, but Don't omit these.
  120.  
  121. This Attack is also called "Ping of Death"
  122.  
  123. But In Actual a Single Computer using this Attack cannot Deface a Site for long time. Hackers Create and install botnets on different computers as trojans and use those Comprised Computers also to send these Dummy Packets to Target. When a Large no of Compromised Computer send simultaneous Requests to the target, the target site will be offline and Defaced.
  124. =========================================================================================================================================
  125. Types#
  126. UDP Flood
  127.  
  128. SYN Flood
  129.  
  130. Ping of Death
  131.  
  132. Reflected Attack
  133.  
  134. Peer-to-Peer Attacks
  135.  
  136. Nuke
  137.  
  138. Slowloris
  139.  
  140. Degradation of Service Attacks
  141.  
  142. Unintentional DDoS
  143.  
  144. Zero Day DDoS
  145.  
  146. Multi-Vector Attacks
  147. ==========================================================================================================================================
  148. How to protect yourself
  149.  
  150. Anti-Virus Programs:
  151. So after testing the anti-virus program AVG it turned out to be actually a decent anti virus [With the help of other programs that we will mention later]
  152. So yeah i guess you should also download it.
  153. It will function as A Normal Computer Anti-Virus:
  154. http://www.avg.com/ww-en/homepage
  155.  
  156. Next here we have our default Advanced Anti-Virus which will protect us from viruses upon with RATs since most crypters can't fight The well known nod32.
  157. The ESET Smart security will also protect from ddos attacks and bad websites upon with other cool extra features:
  158. https://www.eset.com/int/home/smart-security/
  159. ======================
  160. Advanced Firewalls:
  161. First we will start out with our basic new internet firewall that won't allow hackers to use port scanning programs on you such as NMAP,it also blocks the OS Detection hack that can be used by hacking tools... it's a really decent internet firewall and by the help of the anti-viruses,nothing will be able to stop it.
  162. Zone Alarm Firewall:
  163. http://www.zonealarm.com/software/free-firewall/
  164.  
  165. Second here we have our default Advanced Firewall which will protect you both Online and Offline,It will protect your internet and also might function as an anti virus since it doesn't allow processes that can be executed silent without your permission,now it gives you the permission to do whatever you want with the process.
  166. However,i am talking about Comodo firewall.
  167. If you got annoyed from the notifications asks for permission and stuff,use the Game Mode in the comodo firewall.
  168. Comodo Firewall:
  169. https://www.comodo.com/home/internet-sec...rewall.php
  170. ======================
  171. Browser Protection [TOR]:
  172. So basically if you feel unsafe on the internet use the browser TOR to be anonymous.
  173. TOR:
  174. https://www.torproject.org/
  175. If you want to maximize the protection use some Proxies.
  176. Also make sure to open a VPN before opening TOR [If you want to maximize the protection.]
  177. Also i am not really sure if you can run TOR with Proxies with a fucking VPN but i will try this method soon and i will let y'all know if it's possible or not.
  178. However,For now lets move on to the VPN.
  179. ======================
  180. VPN[Virtual Private Network]:
  181. Look guys,when it comes to VPN i am not that expert guy that can tell if a vpn keeps logs or not.
  182. So If you have a secure VPN that doesn't keep logs,make sure to run it and NOT USE THE ONE THAT I SUGGEST.
  183. But incase you don't,you can just use this one:
  184. https://www.securitykiss.com/
  185. I have been using this one for a pretty long time,and it works very well.
  186. There are thousands of hundreds of VPNs out there,so make sure you have the best one that you can find.
  187. Or if you are really curious or if you are a true black hat hacker,then you can give the VPNs your middle finger and use proxies instead.
  188. ======================
  189. VMware [Virtual Machine]
  190. If you want to run Without being infected with anything,run a windows virtual machine on VMware: http://www.vmware.com/
  191. Also,Sandboxie: http://www.sandboxie.com/
  192. Is a goot tool to use for both,ur main OS [Ur computer/laptop] and the VMware.
  193. ======================
  194. Quick shits before i end the tutorial:
  195. Note:If you tried to sell this tutorial as a Private Protection Method,i will find your computer and you will be a victim of Project Ni
  196. Now lets move on to the tips:
  197. 1-If you have a question write it down below,i might be able to help you.
  198. 2-If you are a hacker don't use windows,use kali linux.
  199. 3-Do not treat your CMD as a hacking terminal.
  200. 4-Don't be a skid.
  201. 5-Don't make anyone teach you hacking,teach yourself.
  202. 6-Feel free to install any program that will maximize your protection.
  203. 7-If you used this,don't be a stupid fucker and tell everyone about it.
  204. 8-If you have open ports,close them. [Unless you know what you are doing.]
  205. 9-Turn off windows firewall if you don't need it.
  206. 10-If you want to run a suspicious program,use sandboxie on VirtualMachine.
  207. ==========================================================================
  208. VPN are useful from an Ddos and ip masking but these may not always help.
  209. ====================================================================================
  210. 1) Download and install WampServer: http://www.wampserver.com/en/
  211.  
  212. 2) Configure it to operate on a port that is not 80 such as 9987
  213.  
  214. 3) Correctly port forward for your web server (you may not be able to see it if you go through your browser. Just use http://www.canyouseeme.org/ to check).
  215.  
  216. 4) Register @ http://ddos-protection.io and claim your free ddos protection
  217.  
  218. 5) Register a domain for your website, it can be a free one.
  219.  
  220. 6) Verify your website i.e: http://yourwebsite.com:9987/verify.txt
  221.  
  222. 7) Create a reverse proxy to your home IP on port 9987, or whichever port that you chose.
  223.  
  224. 8) Point your domain to the DDoS-Protection.io servers!
  225.  
  226. 9) Enjoy! Your website now has DDoS protection, and is operating under a standard port (port 80). http://yourwebsite.com will now work without the :9987 (port)
  227. =====================================================================================================================================
  228. anything else ask me.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement