SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Attack Project Presentation:
Bloggingtheboys.com
By John Intindolo
ISSC461
Instructor Christopher Weppler
(“Largest ddos attack,” 2012)
ORGANIZATION-
SB Nation:BloggingThe Boys
(“Blogging the boys”, 2014)
Why bloggingtheboys.com?
 Being a lifelong and diehard Philadelphia Eagles fan I have an
obvious hatred for the Dallas Cowboys. It is because of this
hatred I am choosing to attack the blog fan site “Blogging the
Boys” with a Denial-of-Service attack that will crash the site, and
thus shut up these lousy Cowboys fans... at least for a short
while.
Plan ofAction to Perform the Attack
 Hide Your IP Address- to protect your online identity
 Ping the Web Address- to find out the IP address of
the website
 Scan the IP Address- to see what ports are open
 Perform the Attack- use the RDos program to launch
the attack and exploit the open port
(“A healthy body”, 2013)
Denial-of-Service Attack
(“How to hack,” 2013)
What is a DoS Attack?
 A Denial-of-service attack which is commonly referred to as a
DoS attack is the attempt to defeat the availability (the “A” of the
CIA Triad) of a network (Pleeger, 2012, p. 602). Generally
speaking its used to interrupt or suspend services of a host
connected to the Internet for a temporary amount of time. It is an
attack that is sent by a single person or system.
Distributed Denial-of-ServiceAttack:
What is a DDoS Attack?
(Nelson, 2011)
 A Distributed Denial-of-Service attack or DDoS is a Denial-of-
Service attack that takes place in two steps. The first step is for
the attacker to plant a Trojan horse on the target machine and
repeat the process on many different computers. These machines
which are known as zombies are then told by the attacker to
launch the attack, and cause the interruption of the network
availability (Pleeger, 2012, p. 637).
DoS & DDoS Attack
Difference
DoS Attack
• One computer and one
Internet connection is used
to flood the server with
packets.
DDoS Attack
• Uses many computers and a
multitude of Internet
connections to flood the
server.
• Often uses a Trojan to gain
access to many computers
that are then turned into
zombies to perform the
attack when called upon by
the attacker.
Download IPHiding Tool:
IP HiderPro
(“Ip hider pro”, 2013)
Download a Port ScanningTool:
Nnmap’s Zenmap GUI
(“Nmap”, 2013)
Download the HackingTool:
rDoS
(“Mpgh: Multiplayer game”, 2013)
UsingCMD:
PingBloggingtheboys.com
UsingZenmapGUI:
Scan theIP address for Open Ports
UsingrDos to Perform theAttack
(“How to hack,” 2013)
The Network Has BeenCrashed
(“5 things you”, 2010)
References
• 5 things you can do to make your website crash free. (2010). Retrieved from
http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/
• A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from
http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/
• Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com
• Cyber sucks. (2013). Retrieved from
http://cybersucks.blogspot.com/2012_02_01_archive.html
• How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access
point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi-
performing-denial-service-dos-attack-wireless-access-point-0147988/
• Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
Referencescont’d.
• Largest ddos attack on record slowed the internet?. (2012). Retrieved from
http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the-
internet-94/
• Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57-
general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html
• Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from
http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/
• Nmap. (2013). Retrieved from http://nmap.org/
• Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability /
Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson
Publication

Weitere ähnliche Inhalte

Andere mochten auch (9)

Las 7 maravillas del mundo.pps
Las 7 maravillas del mundo.ppsLas 7 maravillas del mundo.pps
Las 7 maravillas del mundo.pps
 
NEHF Happy, Healthy, at Home symposium 100117 Workshop 2 - West Hampshire e...
NEHF Happy, Healthy, at Home symposium 100117   Workshop 2 - West Hampshire e...NEHF Happy, Healthy, at Home symposium 100117   Workshop 2 - West Hampshire e...
NEHF Happy, Healthy, at Home symposium 100117 Workshop 2 - West Hampshire e...
 
Ib0011 international marketing
Ib0011 international marketingIb0011 international marketing
Ib0011 international marketing
 
AksumChar
AksumCharAksumChar
AksumChar
 
Vision
VisionVision
Vision
 
armaduras mecanica estatica
armaduras mecanica estatica armaduras mecanica estatica
armaduras mecanica estatica
 
Lr4 kramarenko%201
Lr4 kramarenko%201Lr4 kramarenko%201
Lr4 kramarenko%201
 
El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016
El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016
El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016
 
Work Term Report
Work Term ReportWork Term Report
Work Term Report
 

Ähnlich wie Attack_Project_Presentation_ISSC461_Intindolo

The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterCSCJournals
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)Fatima Qayyum
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptxOzkan E
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botGroup of company MUK
 
DNS Rebinding Attack
DNS Rebinding AttackDNS Rebinding Attack
DNS Rebinding AttackFelipe Japm
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
Implementation Of real testbed of DDOS
Implementation Of real testbed of DDOSImplementation Of real testbed of DDOS
Implementation Of real testbed of DDOSJatin Singh
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)btpsec
 
DNS Security Threats and Solutions
DNS Security Threats and SolutionsDNS Security Threats and Solutions
DNS Security Threats and SolutionsInnoTech
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real worldMichael Renner
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS AttacksSymantec
 

Ähnlich wie Attack_Project_Presentation_ISSC461_Intindolo (20)

The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration Tester
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptx
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Ddos
DdosDdos
Ddos
 
DNS Rebinding Attack
DNS Rebinding AttackDNS Rebinding Attack
DNS Rebinding Attack
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Implementation Of real testbed of DDOS
Implementation Of real testbed of DDOSImplementation Of real testbed of DDOS
Implementation Of real testbed of DDOS
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
DNS Security Threats and Solutions
DNS Security Threats and SolutionsDNS Security Threats and Solutions
DNS Security Threats and Solutions
 
Dos attack
Dos attackDos attack
Dos attack
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real world
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 

Mehr von John Intindolo

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloJohn Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloJohn Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloJohn Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloJohn Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloJohn Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloJohn Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloJohn Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloJohn Intindolo
 

Mehr von John Intindolo (17)

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_Intindolo
 

Attack_Project_Presentation_ISSC461_Intindolo

  • 1. Attack Project Presentation: Bloggingtheboys.com By John Intindolo ISSC461 Instructor Christopher Weppler (“Largest ddos attack,” 2012)
  • 2. ORGANIZATION- SB Nation:BloggingThe Boys (“Blogging the boys”, 2014) Why bloggingtheboys.com?  Being a lifelong and diehard Philadelphia Eagles fan I have an obvious hatred for the Dallas Cowboys. It is because of this hatred I am choosing to attack the blog fan site “Blogging the Boys” with a Denial-of-Service attack that will crash the site, and thus shut up these lousy Cowboys fans... at least for a short while.
  • 3. Plan ofAction to Perform the Attack  Hide Your IP Address- to protect your online identity  Ping the Web Address- to find out the IP address of the website  Scan the IP Address- to see what ports are open  Perform the Attack- use the RDos program to launch the attack and exploit the open port (“A healthy body”, 2013)
  • 4. Denial-of-Service Attack (“How to hack,” 2013) What is a DoS Attack?  A Denial-of-service attack which is commonly referred to as a DoS attack is the attempt to defeat the availability (the “A” of the CIA Triad) of a network (Pleeger, 2012, p. 602). Generally speaking its used to interrupt or suspend services of a host connected to the Internet for a temporary amount of time. It is an attack that is sent by a single person or system.
  • 5. Distributed Denial-of-ServiceAttack: What is a DDoS Attack? (Nelson, 2011)  A Distributed Denial-of-Service attack or DDoS is a Denial-of- Service attack that takes place in two steps. The first step is for the attacker to plant a Trojan horse on the target machine and repeat the process on many different computers. These machines which are known as zombies are then told by the attacker to launch the attack, and cause the interruption of the network availability (Pleeger, 2012, p. 637).
  • 6. DoS & DDoS Attack Difference DoS Attack • One computer and one Internet connection is used to flood the server with packets. DDoS Attack • Uses many computers and a multitude of Internet connections to flood the server. • Often uses a Trojan to gain access to many computers that are then turned into zombies to perform the attack when called upon by the attacker.
  • 7. Download IPHiding Tool: IP HiderPro (“Ip hider pro”, 2013)
  • 8. Download a Port ScanningTool: Nnmap’s Zenmap GUI (“Nmap”, 2013)
  • 9. Download the HackingTool: rDoS (“Mpgh: Multiplayer game”, 2013)
  • 12. UsingrDos to Perform theAttack (“How to hack,” 2013)
  • 13. The Network Has BeenCrashed (“5 things you”, 2010)
  • 14. References • 5 things you can do to make your website crash free. (2010). Retrieved from http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/ • A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/ • Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com • Cyber sucks. (2013). Retrieved from http://cybersucks.blogspot.com/2012_02_01_archive.html • How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi- performing-denial-service-dos-attack-wireless-access-point-0147988/ • Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
  • 15. Referencescont’d. • Largest ddos attack on record slowed the internet?. (2012). Retrieved from http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the- internet-94/ • Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57- general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html • Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/ • Nmap. (2013). Retrieved from http://nmap.org/ • Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson Publication

Hinweis der Redaktion

  1. I have decided to do my attack project presentation on an affiliate of SB Nation known as Blogging the Boys. It is a fan blog for the NFL Franchise the Dallas Cowboys.
  2. For the purpose of this attack a DoS will be used, but had the chosen target been a bigger website such as bank’s online website then a DDoS attack would be needed in order to interrupt the availability of the site.
  3. The first step is to download the IP hiding tool to protect your identity
  4. The next step is to download the port scanning tool Zenmap GUI from the Nmap website so that you can scan the IP address for open ports which creates a vulnerability to a DoS attack.
  5. The next step is to download the program rDoS so that you are able to carry out the attack and crash the website.
  6. Once you open the cmd type the following to get the IP address of the website: ping www.bloggingtheboys.com
  7. Using the IP address of www.bloggingtheboys.com discovered from pinging the website in cmd, it is now time to scan that IP address for open ports in Zenmap GUI. In the “target” window type in the IP address which is: 199.27.78.185 In the “Profile” drop down menu select “Intense scan, all TCP ports” to reveal all TCP ports that are open and click the “scan” button After the scan has finished you will see three ports that are open and leave a vulnerability to an attack The open ports are: 554, 80, and 443 Port 80 will be used for this attack
  8. Enter the IP address of the website which is 199.27.78.185 Press the “Enter” button Enter “80” where it asks for port number Press the “Enter” button The rDos program will now perform a DoS that will crash the website “Blogging The Boys”
  9. The website “Blogging The Boys” has now been successfully crashed