Samstag, 4. April 2015

Jays Booter 6.0 DoS

Jays Booter 6.0


Powerful IP grabber and Denial of Service Attack tool. Can boot people off Xbox LIVE, PSN, and other networks.

Download Jay's Booter Link1

PenTBox

PenTBox

PenTBox is a security suite that can be used in penetration testing engagements to perform a variety of activities.Specifically these activities include from cracking hashes,DNS enumeration and stress testing to HTTP directory brute force.

Download
Link1

Great Tutorial on PenTbox available here.

Anonymous DoSer




A DoS tool created by one of the anonymous hackers. The tool itself does not seem to have a specific origin, though it is claimed to be linked to Anonymous.


ByteDoS

The Good-Bye tools is a HTTP flooding tools that have no DDoS or botnet capability.

Good Bye v5.2

 DOWNLOAD

 


DDOSim (DDoS)




ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server).

Download


How to use DDoSIM:

Usage: ./ddosim
-d IP                   Target IP address
-p PORT            Target port
[-k NET]             Source IP from class C network (ex. 10.4.4.0)
[-i IFNAME]      Output interface name
[-c COUNT]       Number of connections to establish
[-w DELAY]       Delay (in milliseconds) between SYN packets
[-r TYPE]             Request to send after TCP 3-way handshake. TYPE can be HTTP_VALID or HTTP_INVALID or SMTP_EHLO
[-t NRTHREADS]   Number of threads to use when sending packets (default 1)
[-n]                       Do not spoof source address (use local address)
[-v]                       Verbose mode (slower)
[-h]                       Print this help message
Examples:
1. Establish 10 TCP connections from random IP addresses to www server and send invalid HTTP requests (similar to a DC++ based attack):
./ddosim   -d 192.168.1.2   -p 80   -c 10   -r HTTP_INVALID  -i eth0
2. Establish infinite connections from source network 10.4.4.0 to SMTP server and send EHLO requests:
./ddosim   -d 192.168.1.2   -p 25   -k 10.4.4.0   -c 0   -r SMTP_EHLO  -i eth0
3. Establish infinite connections at higher speed to www server and make HTTP valid requests:
./ddosim   -d 192.168.1.2   -p 80   -c 0   -w 0   -t 10   -r HTTP_VALID  -i eth0
4. Establish infinite TCP connections (without sending a Layer 7 request)  from local address to a POP3 server:
./ddosim   -d 192.168.1.2   -p 110   -c 0  -i eth0

HOIC and LOIC

                               Denial of Service Attack Tools


Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application. LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP udp or UDP packets with the intention of disrupting the service of a particular host. 


“High Orbit Ion Cannon” or HOIC for short is a network stress testing tool related to LOIC; the use of both for launching DDoS attacks. Unlike its “low-orbiting” cousin, HOIC is able to cause DoS through the use of HTTP floods. Additionally, HOIC has a built-in scripting system that accepts .hoic files called “boosters”, allowing a user to implement some anti-DDoS randomization counter measures as well as increase the magnitude of his or her attack.
While HOIC (similarly to LOIC) still has no significant obfuscation or anonymization techniques to protect the user, the use of .hoic “booster” scripts allows the user to specify a list of rotating target URLs, referrers, user agents, and headers in order to more effectively cause a DoS condition by attacking multiple pages on the same site, as well as make it seem like attacks are coming from a number of different users.
 
 
 
LINKS:
 
Loic : http://cur.lv/kp5j5 
Hioc : http://cur.lv/kp5k4