How to do DDoS attack

DDoS Attack

DDoS stands for Distributed Denial Of Services. The DDoS attack is an attempt by a person or a group of people to make a victim site or node to deny service to its intended users. When an attack is performed from multiple sources to one victim destination it’s called a DDoS. This attack is more powerful than DoS attack.  In ethical hacking, a DDoS attack is often called stress testing. For know more about this attack, click here.

The DDoS attack was used by the anonymous group to target the victim server or network. The tool used by Anonymous group was LOIC ( Low Orbit Ion Cannon). In this article, I am gonna show you how you can perform a DDoS attack or stress testing by LOIC tool.

Shadowave Easily Hack Facebook Account Password

How to install Kali Linux in VMware

Disclaimer: A Dos or DDoS attack is illegal, this article is only for educational purpose and I am gonna attack my own website in this article. Team hackchefs recommend you do not perform it without the permission of website owner, it will lead you into trouble. And team Hackchefs is not responsible for any loss.

How to do DDoS attack

  1. First of all, Download the LOIC tool ( Skip the 5 sec ad and download LOIC) and Install.
  2. Open the LOIC and enter the target URL in the format of http://example.com then press on LOCK ON button. Here are target URL is https://hackchefs.com.

    DDoS attack Steps
  3. Now, you will see an IP in the SELECTED TARGET field.DDoS attack perform
  4. Write the IP (i.e 166.62.28.108) into IP field and press on LOCK ON button.do DDoS attack
  5. Now we are almost done, select the method of attack. In this case, I will select UDP method. You can also increase or decrease the speed of transferring the packet by moving the pointer.select method
  6. Now, press the IMMA CHARGIN MAH LAZER button to start the attack.
    You can also check the number of packet transfer during the attack.
  7. You can stop this attack by pressing the STOP FLOODING button.stop DDoS attack

 

By following these steps you can easily attack any victim. For preventing yourself from this attack, click here.

Share this

Leave a Comment

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.