(adsbygoogle = window.adsbygoogle || []).push({});
Hello guys, this is just a little tutorial on how to find a website's IP address and DoS them using only CMD. What is a Denial of Service Attack? Basically all this is does is floods of a network to prevent its operation
disruption of connections between two machines, preventing access to a particular service
Obstruction of access to a service to a particular person. This is how it works.You must login or register to view this content.
**For educational purposes only**
Okay first off we need to get the website's IP address, we can do this by going here ; You must login or register to view this content.
Once you've got the website's IP address you need to follow these simple steps below.
Tut:
1. Open CMD by going into run and typing CMD
2. Get the IP of the guy you wish to DoS, in this case we are using this : 59.12.182.71(random IP)
3. So you would type this in ur CM ping 46.17.100.40 -t -l 14000 (The higher the longer & The more damage done)
4. You have sucesfully DoS'd ur target! just alow it to finish (may take a while).
*Note*
This will not work if your host is weak. Also it takes multiple people to do this most of the time.
Here's a video tutorial to help you out abit more ;
I am not responsible for what you do with this after learning it. You do of you're own free will, please don't abuse this and certainly don't even try to use it here, that's why I posted it in premium because you guys are more trustworthy.
-Curt
Last edited by
Curt ; 04-11-2011 at 03:18 PM.
Reason: Wrong title..
The following 33 users say thank you to Curt for this useful post:
I have a better tool but it is some where in my computer and you type in their site URL and it sets it as that then you hit the button and "BOOM!" that thing will take down big sites
Congratulations, you've made a thread that's completely wrong. You must login or register to view this content.
Pod is just like that yes, but this is a form of DoS. There are two general forms of DoS attacks: those that crash services and those that flood services (what were doing here). Attacks can be directed at any network device (an IP address as explained), including attacks on routing devices and web, electronic mail, or Domain Name System servers.