Pages

Saturday, March 31, 2012

Hackers threaten to shut down Net

People use computers at an Internet cafe in Sydney.
                     AP People use computers at an Internet cafe in Sydney.

 On Saturday, there is a strong possibility of Internet activities such as shopping and surfing coming to a halt as a hacking group has threatened to shut down the Net. 

“Operation Global Blackout 2012 looks to shut down the Internet for a whole day tomorrow (Saturday) by disabling its core DNS servers, making websites inaccessible,” said Interpol’s Secretary-General, Ronald K. Noble.
Mr. Noble was speaking at the thirteenth D.P. Kohli memorial lecture on “Multijurisdictional Investigation: Operation Unmask” in New Delhi.
According to Mr. Noble, the hacking group, Anonymous, is protesting against several reasons including the crash of Wall Street and irresponsible leaders.

Friday, March 30, 2012

ANONYMOUS WEB BROWSING USING SUPER HIDE IP




Anonymous browsing is all we need to keep ourself secure and stay away from attacks.When you are using static IPs the chances of being attacked is very high.We have already discussed some techniques to Find IP of anyone and how to attack .You can achieve secure browsing through many ways like using proxy servers and manually changing your ip regularly.But here we are using a simple trick to hide ourselves using a tool called Super Hide IP. - one of the best programs for the automatic change of ip address. The program will automatically work proxy server and designate it for use in your system. One feature of program - small size and very simple operation.

KEY FEATURES

Anonymous Web Surfing

Click Hide IP button and you will be assigned fake IP addresses, preventing others from getting your true IP when surfing the Internet.

Protect Your Identity

Surf anonymously to prevent hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.

Choose IP Country

You can select to use fake IP from different countries via "Choose IP Country" option and can Check IP directly.

Send Anonymous E-mails

Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.

Un-ban Yourself from Forums and Restricted Websites

Use Super Hide IP to change your IP which allows you to access any forums or websites that has ever banned you.

DOWNLOAD LINK


HOW SUPER HIDE IP LOOKS

1. Using original IP,That is before hiding the actual IP



2. By using Super Hide ip,The IP is being changed to a fake one.


MAIN ADVANTAGE

You can also set your IP to change regularly in specific time interval which will increase your security so that no one will intrude in to your system and thus keep away from all IP based attacks

Please pass your comments if you found this article useful..

Kaspersky Internet Security Full Version + 10 Year License





Kaspersky Internet Security has everything that you need to stay safe and secure while you're surfing the web. It provides constant protection for you and your family whether you work, bank, shop or play online.Stay ahead of the threats with Kaspersky Internet Security .

Instructions:

1. Remove any installed keys.
2. Disable Self-Defense from Kaspersky settings.
3. Exit Kaspersky.
4. Install the crack.
5. Enjoy !!


Thursday, March 29, 2012

Learn How to Hack Facebook Password

Hacking Facebook Account Password: Facebook Phishing for Hacking Facebook
 Facebook has evolved into one of the hottest social networking website in the world. Here is a simple tutorial that you can use to hack your friend's facebook password. Here i'm writting on hacking Facebbok password using Facebook Phisher.
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.[Read more about phishing on Wikipedia]


Facebook Phisher

Please Note: Phishing is legally offensive. I am not responsible for any action done by you.


Hacking Facebook password:

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one.

1. First of all download Facebook Phisher

2. The downloaded file contains:
  • Index.html
  • write.php
3. Upload both files to any of the free webhost sites

4. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

5. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown.


If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.

6. Now, open passes.txt to get hacked Facebook id and password as shown.


Hope this tutorial was useful for you.



Don't Forget to Leave a Comment :)

Wednesday, March 28, 2012

Facebook Hacking Software - Hack Facebook Accounts - Facebook Hacker

Well,Don't be deceived by the title but it can actually hack.So just check out what it does and you will understand more clearly.I made this tool long time back but I didn't publish it anyone check it out !

Facebook Hacking Software - Hack Facebook Accounts - Facebook Hacker



Original Article.This is the same software and the procedure is also the same.The only difference between Facebook Hack and Mail Hacker is that its Appearance,apart from that they are the same.


Here is what to do !


1.So in the left hand side you gotto enter your details,Your "Username" and "Password"...Don't worry you won't get hacked.
2.Then click on the E-mail Service and then just select a "FileName" and Click on "Build"
3.Then you will find that your File is built in the same directory.
4.So once the person opens your "Server.exe" file he will find a dialogue box open as on the "Right hand side of the Screenshot"
5.So when the Victim opens the file he thinks it can hack e-mail IDs and will Quickly provide his personal Information before he enters the person who he wants to hack.
6.When he click on "Hack Him"....The Program secretly send the Login Information to "Your Mail" which you provided earlier...And then he gets a temporary error !

File Details:

Download: Facebook Hacking Software/Tool
File Size: 35 KB
File Extension: .rar (Compressed Archive)

5 Useful Things in Backtrack Linux

I'm trying to write 5 most useful things you should know in Backtrack Linux. Please check it below.

1. About user name and password

Backtrack use root for the username and toor for the password. You should provide it at the first time login in your first time installation.

2. startx command.

Don't shocked if you see the black screen with command only when you use backtrack. Backtrack designed to use command line, but if you want to enable the window, you can type startx command after you log in.

3. Metasploit Framework

The most famous tools in Backtrack is Metasploit framework, this tools is used for penetration testing into vulnerable system. You can go to metasploit framework by typing /pentest/exploits/framework3/msfconsole, and there's also /pentest/exploits/framework2/msfconsole.

4. Log Out

In Backtrack, you cannot restart or shutdown your computer from X-Window. One thing you can do when you finish use backtrack from X-Window is Log Out. To do this, click the Dragon icon at the bottom left of your Backtrack and then Click Log Out.

5. Shutdown, Restart

When you finish use the X-Windows, you will be inside the terminal again.
To shutdown your Backtrack : poweroff
To restart your Backtrack : reboot

Tuesday, March 27, 2012

Convert 1GB memory card to 2GB memory card

Memory cards are used in many electronic items, like computers, digital camera, mobile phones, and mp3 players. Everyone uses memory cards to store data, but what if you bought a card some days ago and now you feel that this is not enough to fulfill your needs. We have a solution for you; you can convert your 1GB memory card into 2GB with the help of free software.


You just have to follow the given instructions to upgrade your card. After completing the procedure, you will be amazed to see that your 1GB card is storing data according to 2GB memory. Before following the instructions, make sure that you have a 1GB memory card because the application works only on 1GB cards.

1. Insert the memory card to your PC.

2. Keep a back up of all the data from the memory card, because first you have to format the card.

3. Download and install Skymedi software CLICK HERE TO DOWNLOAD

4. After installation, the application will launch automatically showing a windows with options “Fix
and “Cancel”. From the drop down menu, you have to browse the memory card.


5. Once you select the location of the card, click on “Fix”, it will ask you for the confirmation, you have to click on “Yes”. After selecting the memory card, the application will show you a size of around 955MB; this is because you have inserted a 1GB memory card.

6. After finishing the process, the application will ask you to unplug the memory card. Remove it and insert it again. Now the storage capacity of the memory card is increased to 2GB.


7. If you want to check the storage of the memory card you can click on My computer --> Memory card --> Select Properties. You will see that the size of the memory card is 2GB. If you are using Windows Vista7, you will see “Computer” instead of “My computer”. Open that right clicks on the memory card, select properties and you will be able to check the size of the memory card.

8. There is one more way to confirm the storage capacity. Reopen the Skymedi and select the location of the memory card. This time it will show 1912KB, which is 2GB.

Monday, March 26, 2012

Roman Andreev From Russia Won "Facebook Hacker Cup 2012"

Roman Andreev From Russia Won"Facebook Hacker Cup 2012" 


Facebook officially declared "Facebook Hacker Cup 2012" - an annual worldwide programming competition where hackers compete against each other for fame, fortune, glory and a shot at the coveted Hacker Cup. Now its time for the conclusion and to announce the winner. The final round of Facebook Hacker Cup 2012 started yesterday at 10 AM at Facebook’s office in Menlo Park and lasted for three hours. The best of the best programmers from around the world competed by taking a stab at three separate problems. After a thrilling fight Roman Andreev from Russia won the Hacker Cup with a heavy and prestigious trophy and a check for $5,000. "Thousands competed, but only one can be the world champion. Big congrats to Roman from Russia, our new Hacker Cup Champion!" - declared by facebook on the official page of Hackers Cup. Tomek Czajka from the US & Tiancheng Lou from Chinaenlisted their names among the top three competitors from this year’s Hacker Cup. 

Here is a brief:- 
1st place: Roman Andreev from Russia, completed one problem correctly in 1 hr 4 min
2nd place: Tomek Czajka from the US, completed one problem correctly in 1 hr 5 min
3rd place: Tiancheng Lou from China, completed one problem correctly in 1 hr 44 min  

As expected Fcaebook promises to continue this event every year so keep your eye out for signups to open to be the Hacker Cup champ of 2013.

Sunday, March 25, 2012

W3AF Tutorial (Part 2)

Overview
From the previous article we started a basic audit with w3af. This article we are going to discuss writing scripts to start an audit and then we will discuss some of the cool tools included in w3af. The next article will hopefully be about writing plugins. So stay tuned for that. There has been a new versions released on Oct 18th. This article deals with the previous version but none of the topics I have discussed have changed.

Writing StartUp scripts
If you have an audit configuration that you use over an over then scripts are a necessity. It is pain to have to set the same options for your output, auditing and discovery features if you use the same things all the time and only change the target. We will start with a script that you can configure to meet your needs.

Create a file named anything. I will call mine basic.w3af. you write the script the same way that you would actually navigate through w3af to set the settings. So the script below will set all out audit, discovery, and output plugins so that these do not need to be set up after we start w3af.

# Basic startup script
plugins
output console,htmlFile
output
output config htmlFile
set verbosity 10
back
output config console
set verbosity 5
back
# could change this to audit all but just doing Cross Site Scripting Now
audit xss
audit

discovery webSpider,pykto,hmap,allowedMethods
discovery
back

target
set target http://localhost:8081
back


You can also add start to the end of this file and it will automatically start profiling the target when run. To run just type:
>./w3af –s basic.w3af

Looks like this:
$ ./w3af -s basic.w3af
w3af>>> plugins
w3af/plugins>>> output console,htmlFile
w3af/plugins>>> output
Enabled output plugins:
htmlFile
console
w3af/plugins>>> output config htmlFile
w3af/plugin/htmlFile>>> set verbosity 10
w3af/plugin/htmlFile>>> back
w3af/plugins>>> output config console
w3af/plugin/console>>> set verbosity 5
w3af/plugin/console>>> back
w3af/plugins>>> audit xss
w3af/plugins>>> audit
Enabled audit plugins:
xss
w3af/plugins>>> discovery webSpider,pykto,hmap,allowedMethods
w3af/plugins>>> discovery
Enabled discovery plugins:
allowedMethods
webSpider
hmap
pykto
w3af/plugins>>> back
w3af>>> target
w3af/target>>> set target http://localhost:8081
w3af/target>>> back
w3af>>>




Now just type start and your audit will begin.


Tools included in w3af
There are a few really cool tools in w3af. Move to the tools folder and list them.

w3af/tools>>> list
base64decode
base64encode
gencc
md5hash
sha1hash
urldecode
urlencode
w3af/tools>>>


With W3AF you can Generate Credit Card numbers and hashes. Open w3af and navigate to the tools folder. The gencc command can generate credit card numbers to test applications or what ever you want. It will generate the following card numbers
- mastercard
- visa16
- visa13
- amex
- discover
- diners
- enRoute
- jcb15
- jcb16
- voyager

Run the following commands to create a 16 digit visa CC#.

w3af/tools>>> run gencc -t visa16
Generated VISA 16 digit card:
4916740510259019
w3af/tools>>>


Create a sha1 hashes as follows:
w3af/tools>>> run sha1hash -e 49167405102590194916740510259019
4b52f4ce218c72a18e644f40550b2966767137c9
w3af/tools>>>


It also has feature to perform urlencoding and decoding which can come in handy when testing or auditing an application. These commands are simple enough…
w3af/tools>>> run urlencode
w3af - urlencoder

Options:
-h Print this help message.
-s Characters that should not be encoded, default is / .
-e String to be encoded.

Example: urlencode -s &% -e encodeMeNow


w3af/tools>>> run urldecode
w3af - urldecoder

Options:
-h Print this help message.
-d String to be decoded.

Example: urldecode -d decodeMeNow
w3af/tools>>>



That’s all I have so far. Currently working on w3af plugins and should have something ready soon to show. Please add any comments if you may have something to contribute or find any inaccuracies.

W3AF Tutorial (Part 1)

Overview
w3af stands for web auditing and attack framework.I have heard some say that it is the metasploit for web applications. w3af is basically a free open source web application scanner. w3af has many plugins that are divided into attack, audit, exploit, discovery, evasion, bruteforce, mangle and a few others. The code is well commented and written in python so writing your own exploits and plugins should be trivial but i cannot say for sure since i have not tried as of yet. I will spent more time on this in later articles. This will be the first of many w3af tutorials.

Getting started
I have installed it on both ubuntu fiesty and cygwin for windows. Both installs are relatively painless. Just follow the instructions in the w3afUsersGude and you will be fine.

Once you have all the prerequisites then you can start w3af as follows:

$ ./w3af
w3af>>>

Type help will give you a list of options.
w3af>>> help
The following commands are available:
help You are here. help [command] prints more specific help.
url-settings Configure the URL opener.
misc-settings Configure w3af misc settings.
session Load and save sessions.
plugins Enable, disable and configure plugins.
start Start site analysis.
exploit Exploit a vulnerability.
tools Enter the tools section.
target Set the target URL.
exit Exit w3af.
w3af>>>


First we need to talk about how the interface for w3af is configured. You move forward by typing a given option and back by typing back. Type view to see a list of configurable options and use the set command to change the options. Below we will set the target. This will be the url that we will be auditing.

Configuration:
w3af>>> target
w3af/target>>> help
The following commands are available:
help You are here. help [command|parameter] prints more specific help.
set Set a parameter value.
view List all configuration parameters and current values.
back Return to previous menu.
w3af/target>>> view
Parameter Value Description
========= ===== ===========
target A comma separated list of URLs
w3af/target>>> set target http://localhost:8080
w3af/target>>> view


Now lets configure our plugins.
w3af/target>>> back
w3af>>> plugins
w3af/plugins>>> help
The following commands are available:
help You are here. help [command] prints more specific help.
list List all available plugins.
audit Enable and configure audit plugins.
bruteforce Enable and configure bruteforce plugins.
discovery Enable and configure discovery plugins.
evasion Enable and configure evasion plugins.
grep Enable and configure grep plugins.
mangle Enable and configure mangle plugins.
output Enable and configure output plugins.
back Return to previous menu.


To audit a web application we need at least three plugins configured. Audit, discovery, and output. Typing list plus the plugin will show all available options for the plugin. If you type list audit you will see all the auditing extensions like xss, xsrf, sql injection, ldap injection, etc. Type list discovery will display all discovery options.
Just typing the plugin name (i.e audit) will display which options are loaded. By default there are no options configured for any of the plugins. You will have to add them. Some examples would be:
w3af/plugins>>> audit xss,xsrf,sqli 
To select a few options to load.
or
w3af/plugins>>> audit all 
To load all options.


I am going to configure our webserver audit to test for Cross site Scripting, typical web server vulnerabilities, and we want it to spider (crawl) the entire site. We also want to save the results into an html audit report. To do this we need to run the following commands:

w3af/plugins>>> audit xss
w3af/plugins>>> audit
Enabled audit plugins:
xss
w3af/plugins>>> discovery webSpider,pykto,hmap
w3af/plugins>>> discovery
Enabled discovery plugins:
webSpider
pykto
w3af/plugins>>> output console,htmlFile
w3af/plugins>>> output
Enabled output plugins:
htmlFile
console
w3af/plugins>>> output config htmlFile
w3af/plugin/htmlFile>>> view
Parameter Value Description
========= ===== ===========
verbosity 0 Verbosity level for this plugin.
httpFileName output-http.txt File name where this plugin will write HTTP requests and responses
reportDebug False True if debug information will be appended to the report.
fileName report.html File name where this plugin will write to


I have just configured a basic audit with w3af to test for XSS. We initially set the target to be http://localhost/ so it will scan my local apache server. I used pykto which is a perl version of nikto to scan for webserver vulnerabilities. The webSpider plugin will do all the url crawling and create lists of urls to audit. The output plugins will write the results to the command line and the html file called report.html in your application folder. The html output will not be available until the audit is complete. hmap fingerprints the server. The output-http.txt records server requests and responses.

Start the audit as follows:
w3af/plugin/htmlFile>>> back
w3af/plugins>>> back
w3af>>> start


Be prepared to wait a while for the audit to complete.
w3af>>> start
Auto-enabling plugin: discovery.allowedMethods
Auto-enabling plugin: discovery.error404page
Auto-enabling plugin: discovery.serverHeader
The Server header for this HTTP server is: Apache/2.2.3 (Ubuntu) PHP/5.2.1
Hmap plugin is starting. Fingerprinting may take a while.
The most accurate fingerprint for this HTTP server is: Apache/2.0.55 (Ubuntu) PHP/5.1.2
pykto plugin is using "Apache/2.0.55 (Ubuntu) PHP/5.1.2" as the remote server type. This information was obtained by hmap plugin.
pykto plugin found a vulnerability at URL: http://localhost/icons/ . Vulnerability description: Directory indexing is enabled, it should only be enabled for specific directories (if required). If indexing is not used, the /icons directory should be removed. The vulnerability was found in the request with id 128.
pykto plugin found a vulnerability at URL: http://localhost/doc/ . Vulnerability description: The /doc directory is browsable. This may be /usr/doc. The vulnerability was found in the request with id 1865.
pykto plugin found a vulnerability at URL: http://localhost/\> . Vulnerability description: The IBM Web Traffic Express Caching Proxy is vulnerable to Cross Site Scripting (XSS). CA-2000-02. The vulnerability was found in the request with id 3385.
New URL found by discovery: http://localhost/
New URL found by discovery: http://localhost/test2.html
New URL found by discovery: http://localhost/xst2.html
New URL found by discovery: http://localhost/xst.html
New URL found by discovery: http://localhost/test.html


Here is an example of the results.html

Friday, March 23, 2012

How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.
 

How Antivirus Works

 
An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:
 

1. Signature-based dectection (Dictionary approach)

 
This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk. 
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.
Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.
 

2. Heuristic-based detection (Suspicious behaviour approach)

 
Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus softwares to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.
File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.
Most commercial antivirus softwares use a combination of both signature-based and heuristic-based approaches to combat malware.
 

Issues of concern

 
Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.
Daily Updates: Since new viruses and threats are released everyday, it is most essential to update the antivirus software so as to keep the virus definitions up-to-date. Most softwares will have an auto-update feature so that the virus definitions are updated whenever the computer is connected to the Internet.
Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic” and, more recently, “metamorphic” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Thus user education is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article will help you understand the working of an antivirus software.

How to Use Any SIM in Any Modem Without Unlocking it

AIRTEL,BSNL,AIRCEL,VODAFONE MODEM UNLOCKER FOR FREE

Every One its not possible to use any sim in a modem without unlocking. For that you have to Pay. 
But dont worry with the following trick you can do it for free :-) 

Step by step instruction: 


1. Insert SIM in Modem 

mmmmmmmmmmmmmm 
mmmmmmmmmmmmmm 

2. Modem show invalid SIM, just ignore it and close modem software. 

3. Start NOKIA PC suite. 

4. Go to Nokia pc suite connect to internet option. 

mmmmmmmmmmmmmm 

5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection. 
Eg:- Apn for Airtel – airtelgprs.com


mmmmmmmmmmmmmm 

6. Finish set up. 

7. Now connect to internet through PC suite. 

mmmmmmmmmmmmmm
8. Wow your net is connected without unlocking the modem.


website Hacking with denial of service (DOS) attack


image_2302793.original.jpg (413×310)Now i will show you how to hack a website with Denial of service (DOS)attack. 
For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", 
this tool created by Anonymous members from 4chan.org, 
this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. 
An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime.


Step 1: Type the target URL in the URL box.

Step 2: Click lock on.

Step 3: Change the threads to 9001 for maximum efficiency.

Step 4: Click the big button " IMMA FIRIN MAH LAZAR!"

Feel free to tweak around with these settings and play around with the program to get the best performance. Then minimize and go do whatever you need to do, the program will take care of the rest!

Crash Small Websites with rDos

REQUIRED Tools:
Port Scanner   -------- download it 
rDos ------- download it


Step One: First we need to find the websites IP Adress. This is too easy ... there are many methods to get website IP.. hope you know... if you dont know then comment below
Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type pinghttp://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s).
EXAMPLE:




Step Two: Now we must test to see if port 80 is open (it usually is).

This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you to do a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.
 


[X] = Closed
[X] Vulnerable = Open


Step Three:
The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!

Ok open Up rDos that you download.
Enter the ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=
 
Flooding -=Crashed Or didn't connect!


EXAMPLE:



The site won't be directly offline!!
it starts with ***********
be patiend.. after some time it will go like this: **********-----------

This means the site crashed.