How To Perform A DoS Attack On A Website?
---------------------- www.darkhtu.net ---------------------------
Hello,its me Mr. Invictus!!!Previously I've posted a video on Gmail Hacking and now Dos Attack....Hope you'll enjoy!!! :P
In this tutorial, I’m going to teach you how to perform a distributed denial of service (DoS) attack on a website. To perform the attack, we’re going to use an application called LOIC, which is the same application that the hacktavist group Anonymous uses. Don’t worry, I’ll walk you through the LOIC download and installation process. This tutorial is for BackTrack 5 and Kali Linux users.
Note: As stated in the video, it is illegal to perform a denial of service (DoS) or distributed denial of service (DDoS) attack on any website or any other platform that you do not own. The information presented in this tutorial is for educational purposes only.
#Invictus
How To: Crack a Gmail Account Password In BackTrack 5 ?
In this tutorial, I will teach you how to crack a Gmail user’s password with a brute force attack. To perform the attack, we will be using a script called Hydra, which comes preinstalled on your BackTrack 5 distribution bundle. The attack is simple; all we need is an email address for our victim and a wordlist or dictionary file. For those of you who don’t know how to create a wordlist,.
#Invictus
Hacking From Android Phones, Made Easy With (Anti) Android Network Tool Kit
Have an android phone, looking for easy ways to hack like pentesters? Well you are in luck, Anti or Android networking Tool Kit is Just what the world needs, another killer mobile app for android devices, Anti allows you to control other devices such as Desktop PC, other Android Phones and even iOS devices with just a few pushes.
Anti - Android Network Tool Kit
Android Network Toolkit (ANTI) is an amazing android application. You could bring all the hacking tools on PC to your Android smartphone. Using this app is as simple as pushing a few buttons, and then you can penetrate your target.
How Anti Works?
Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly, Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how you can exploit/fix each one of them.
Features
Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.
Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.
D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.
Replace images - This will replace all images transferred to/
Post-meterpreter module to recover deleted files from NTFS.
--
Enjoy the hacking!
Beef - Browser Exploitation Framework
Beef is a popular framework used to exploit browsers. It is used for security testing purpose and is legal if used for educational purpose.
This tool is developed for experienced penetration testers. They can use attack vectors of the tool to target browser. Tester can also control which browser should be tested and which module should be used in the target system.
It comes with simple user interface and runs on most of the operating systems.
Download Beef here:
http://beefproject.com/
--
Enjoy a short intro to Beef
Kali Linux - Overview
Great introduction to Kali presented in a 5min video prepared by Mr Justin Hutchens.
--
Enjoy! :P
Exploiting Windows 8 with Metasploit
Some our next video on Hacking.....
Exploiting Windows 8 with Metasploit - must see ;)
Who can recommend some good video for BT/Kali Linux beginners?
Hack Multiple Systems with MSFCLI and Bash Scripting
Watch our Page First Video Guys:
Enjoy!