UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.1K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Backup Legal Mega
πŸ¦‘OFFICIAL MICROSOFT OFFICE PRO PLUS LINKs FROM MICROSOFT WILL REMOVED IN 24 NH IN 24 HOURs

> https://officecdn.microsoft.com/db/492350F6-3A01-4F97-B9C0-C7C6DDF67D60/media/en-US/ProPlus2019Retail.img X64

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 SITES FOR PAID SOFTWARES- CRACKED- AND SAFE - LIST 2 :
> nion torrents list

https://sharewareonsale.com/

https://topwaresale.com/product-category/software-giveaway/

https://www.techno360.in/category/free-stuff/

https://giveaway.download.hr/

πŸ¦‘FOR ANDROID LIST 2 > FOR MORE SEE CHATS @UndercodeTesting


https://apk4free.net/

https://www.apkmirror.com/

https://apkpure.com/

https://www.9apps.com/

https://www.revdl.com/

https://androidapksfree.com/

https://www.modapkdown.com/

http://apkreal.com/

http://allfreeapk.com/

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
DDOS FOR NOOBS- RECENTLY WE SEND DDOS TOOLS + INSTALL > ACTUALLY ALL POPULAR TOOLS ...

> NOW UNDERSTANDING HOW DDOS WORK !!
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is a DoS attack?

> DOS is an attack used to deny legitimate users access to a resource, such as accessing websites, networks, e-mail, etc., or make it extremely slow. DoS is D enial O F S initials ervice abbreviation. This type of attack is usually achieved by simultaneously clicking on a target resource with too many requests (such as a web server). This prevents the server from responding to all requests. This may cause the server to crash or slow down.

> Cutting off some businesses from the Internet may result in significant business or capital losses. The Internet and computer networks provide power for many companies. Organizations such as payment gateways and e-commerce websites rely entirely on the Internet for business.
πŸ¦‘ Dos type of attack

There are two types of Dos attacks namely;

1) DoS -This type of attack is performed by a single host

2) Distributed DoS -This type of attack is performed by many attacked computers, all targeting the same victim. It floods the network with data packets.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How DoS attacks work

> Let's take a look at how DoS attacks are performed and the technologies used. We will study five common types of attacks.
youtube.com/Undercode

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹:


1) The death

ping command is usually used to test the availability of network resources. It works by sending small data packets to network resources. Ping of death took advantage of this and sent packets exceeding the maximum limit allowed by TCP / IP (65,536 bytes). TCP / IP fragmentation divides the data packet into small chunks that are sent to the server. Since the data packets sent are larger than those that the server can handle, the server may freeze, restart, or crash.

2) Smurfs
such attacks use a large number of Internet Control Message Protocol (ICMP) ping traffic targets at Internet broadcast addresses. The reply IP address spoofed the IP address of the target victim. All replies are sent to the victim, not the IP used for ping. Since a single Internet broadcast address can support up to 255 hosts, a smurf attack will amplify a single ping 255 times. The effect of this is to reduce the speed of the network to such an extent that it is impossible to use it.

3) Buffer overflow The
buffer is a temporary storage location in RAM for saving data so that the CPU can manipulate it before writing it back to the disc. The buffer has a size limit. This type of attack loads more data into the buffer. This will cause the buffer to overflow and destroy the data it has. An example of buffer overflow is sending an email with a file name of 256 characters.

4) Teardrop
attacks of this type use larger packets. TCP / IP breaks them down into pieces assembled on the receiving host. Attackers manipulate data packets when they are sent so that they overlap each other. This may cause the target victim to crash when trying to reassemble the packet.

5) SYN attack
SYN is a short form of Synchronize. This type of attack uses a three-way handshake to establish communication using TCP. SYN attacks work by flooding victims with incomplete SYN messages. This causes the victim's computer to allocate memory resources that have never been used, and denies access to legitimate users.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
> Download GoldenEye: http://packetstormsecurity.com/files/120966/GoldenEye-HTTP-Denial-Of-Service-Tool.html


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Best DDos Tools 2019-2020
t.me/UndercodeTesting

πŸ¦‘1) LOIC (Low Orbit Ion Canon)

> LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.

>https://sourceforge.net/projects/loic/

2) XOIC

> XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways


>http://anonhacktivism.blogspot.com/2017/11/new-xoic-ddos-tool-download.html

3) HULK (HTTP Unbearable Load King)

> HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.

> http://packetstormsecurity.com/files/112856/HULK-Http-Unbearable-Load-King.html

4) DDOSIMβ€”Layer 7 DDOS Simulator
DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.

> This tool is written in C++ and runs on Linux systems.

>These are main features of DDOSIM

πŸ¦‘Features:
Simulates several zombies in attack
Random IP addresses
TCP-connection-based attacks
Application-layer DDOS attacks
HTTP DDoS with valid requests
HTTP DDoS with invalid requests (similar to a DC++ attack)
SMTP DDoS
TCP connection flood on random port
Download DDOSIM here: http://sourceforge.net/projects/ddosim/

> Read more about this tool here: http://stormsecurity.wordpress.com/2009/03/03/application-layer-ddos-simulator/

5) R-U-Dead-Yet:

> R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.

> Download RUDY: https://code.google.com/p/r-u-dead-yet/

6) Tor’s Hammer

> Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.

> Download TOR’s Hammer here: http://packetstormsecurity.com/files/98831/

7) PyLoris:

> PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.

> Download PyLoris: http://sourceforge.net/projects/pyloris/

8) OWASP DOS HTTP POST
It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.

> Download here: https://code.google.com/p/owasp-dos-http-post/

9) DAVOSET
>DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.

> Download DavoSET: http://packetstormsecurity.com/files/123084/DAVOSET-1.1.3.html

10) GoldenEye HTTP Denial Of Service Tool
GoldenEye is also a simple but effective DOS attacking tool.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Hacking activity: Battle of death

1) We assume that you are using Windows for this exercise. We also assume that you have at least two computers on the same network. On your unauthorized network, DOS attacks are illegal.

2) This is why you need to set up your own network for this exercise.

3) Open a command prompt on the target computer

Enter the command ipconfig. You will get a result similar to the one shown below
>
πŸ¦‘DoS protection:Tips To prevent attack

> organizations can use the following strategies to protect themselves from denial of service attacks.

1) Attacks such as SYN flooding exploited vulnerabilities in the operating system. Installing security patches can help reduce the possibility of such attacks.

2) Intrusion detection systems can also be used to identify or even stop illegal activities

3) The firewall can block all traffic from the attacker by identifying its IP, thereby preventing simple DoS attacks.

4) You can configure the router through the access control list to restrict access to the network and discard suspicious illegal traffic.

5) cloudflare

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘For this example, we use mobile broadband connection details. Write down the IP address. Note: In order to make this example more effective, you must use a LAN network. Switch to the computer to be used to attack and open a command prompt
us to use the unlimited data package 65500 ping victim computer
, enter the following command

1) ping 10.128.131.108 -t | 65500
here,
2) "Ping" sends the packet to the victim
3) "10.128.131.108" is the victim's IP address
4) "-T" indicates that the packet should be sent before the program stops
5) "-L" specifies the data payload to be sent to the victim
You will get a result similar to the one shown below
πŸ¦‘Flooding the target computer with packets does not have much impact on the victim. To make the attack more effective, you should use ping from multiple computers to attack the target computer.

1) The above attacks can be used to attack routers, web servers, etc.

2) If you want to view the impact of the attack on the target computer, you can open the task manager and view the network activity.

3) Right click on the taskbar

4) Select Start Task Manager

5) Click the Network tab

6) You will get results similar to the following
πŸ¦‘1) The purpose of denial of service attacks is to deny legitimate users access to resources such as networks and servers.

2) There are two types of attacks, denial of service and distributed denial of service.

3) You can use SYN Flooding, Ping of Death, Teardrop, Smurf or buffer overflow to perform a denial of service attack

4) Operating system, router configuration, firewall and intrusion detection system security patches can be used to prevent denial of service attacks.

written @Undercoder
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁