2. ORGANIZATION-
SB Nation:BloggingThe Boys
(“Blogging the boys”, 2014)
Why bloggingtheboys.com?
Being a lifelong and diehard Philadelphia Eagles fan I have an
obvious hatred for the Dallas Cowboys. It is because of this
hatred I am choosing to attack the blog fan site “Blogging the
Boys” with a Denial-of-Service attack that will crash the site, and
thus shut up these lousy Cowboys fans... at least for a short
while.
3. Plan ofAction to Perform the Attack
Hide Your IP Address- to protect your online identity
Ping the Web Address- to find out the IP address of
the website
Scan the IP Address- to see what ports are open
Perform the Attack- use the RDos program to launch
the attack and exploit the open port
(“A healthy body”, 2013)
4. Denial-of-Service Attack
(“How to hack,” 2013)
What is a DoS Attack?
A Denial-of-service attack which is commonly referred to as a
DoS attack is the attempt to defeat the availability (the “A” of the
CIA Triad) of a network (Pleeger, 2012, p. 602). Generally
speaking its used to interrupt or suspend services of a host
connected to the Internet for a temporary amount of time. It is an
attack that is sent by a single person or system.
5. Distributed Denial-of-ServiceAttack:
What is a DDoS Attack?
(Nelson, 2011)
A Distributed Denial-of-Service attack or DDoS is a Denial-of-
Service attack that takes place in two steps. The first step is for
the attacker to plant a Trojan horse on the target machine and
repeat the process on many different computers. These machines
which are known as zombies are then told by the attacker to
launch the attack, and cause the interruption of the network
availability (Pleeger, 2012, p. 637).
6. DoS & DDoS Attack
Difference
DoS Attack
• One computer and one
Internet connection is used
to flood the server with
packets.
DDoS Attack
• Uses many computers and a
multitude of Internet
connections to flood the
server.
• Often uses a Trojan to gain
access to many computers
that are then turned into
zombies to perform the
attack when called upon by
the attacker.
14. References
• 5 things you can do to make your website crash free. (2010). Retrieved from
http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/
• A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from
http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/
• Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com
• Cyber sucks. (2013). Retrieved from
http://cybersucks.blogspot.com/2012_02_01_archive.html
• How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access
point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi-
performing-denial-service-dos-attack-wireless-access-point-0147988/
• Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
15. Referencescont’d.
• Largest ddos attack on record slowed the internet?. (2012). Retrieved from
http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the-
internet-94/
• Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57-
general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html
• Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from
http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/
• Nmap. (2013). Retrieved from http://nmap.org/
• Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability /
Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson
Publication
Hinweis der Redaktion
I have decided to do my attack project presentation on an affiliate of SB Nation known as Blogging the Boys. It is a fan blog for the NFL Franchise the Dallas Cowboys.
For the purpose of this attack a DoS will be used, but had the chosen target been a bigger website such as bank’s online website then a DDoS attack would be needed in order to interrupt the availability of the site.
The first step is to download the IP hiding tool to protect your identity
The next step is to download the port scanning tool Zenmap GUI from the Nmap website so that you can scan the IP address for open ports which creates a vulnerability to a DoS attack.
The next step is to download the program rDoS so that you are able to carry out the attack and crash the website.
Once you open the cmd type the following to get the IP address of the website:
ping www.bloggingtheboys.com
Using the IP address of www.bloggingtheboys.com discovered from pinging the website in cmd, it is now time to scan that IP address for open ports in Zenmap GUI.
In the “target” window type in the IP address which is: 199.27.78.185
In the “Profile” drop down menu select “Intense scan, all TCP ports” to reveal all TCP ports that are open and click the “scan” button
After the scan has finished you will see three ports that are open and leave a vulnerability to an attack
The open ports are: 554, 80, and 443
Port 80 will be used for this attack
Enter the IP address of the website which is 199.27.78.185
Press the “Enter” button
Enter “80” where it asks for port number
Press the “Enter” button
The rDos program will now perform a DoS that will crash the website “Blogging The Boys”
The website “Blogging The Boys” has now been successfully crashed