Jump to content
culay

DoS and DDoS

Recommended Posts

Posted (edited)

Mega DoS & DDoS Collection [GOLD]

Difference between DoS & DDoS

Okay- Here is a little rant that is probably going to turn into some basic information...

I am getting sick and tired of people making this mistake- I suppose I could understand because the difference in names is so small; but the difference in meanings is huge as far as Data flooding goes, aDoS (Denial of Service) is NOT a DDoS (Distributed Denial of Service)...There IS a Difference, Let me Define both of them:

DoS: a DoS Attack is a Denial of Service attack- it involves using one computer / Internet connection to flood a server with packets (TCP / UDP) - The Objective of this attack is to 'overload' the servers bandwidth / other resources, This will cause a Denial of Service to anyone else that tries to use the server for whatever reason (HTTP [Website]).etc - hence the name Denial of Service Attack.

DDoS: Yes, There IS a difference- a DDoS Attack (or Distributed Denial of Service Attack) is pretty much the same as a DoS- but the difference in results is massive; as its name suggests the DDoS attack is executed using a distributed computing method often referred to as a 'botnet army', the creation process of which involves infecting computers with a form of malware that gives the botnet owner access to the computer somewhat- this cold be anything from simply using the computers connection to flood to total control of the computer - these attacks affect the victims computer -> server more than a regular DoS- because multiple connections are being used against ONE connection, Think of it like a fight, if there is a 1-on-1 fight; the chance of the good guy winning is far higher than if he was being beaten up by severalthousand tough-guys :)

For dummies:

Dos = One Computer

DDos = Many More

(DoS) Nukerz:

Rocket v1.0 = http://users.otenet.gr/~dstefan/cgi-bin/RocketV1_0.zip

Sends the +++ath0 to a modem and disconnects them from the web. The S2=225 string must be added to your modem for it to function properly!

Inferno Nuler = http://users.otenet.gr/~matisnfx/inf3rn0_nk.zip

Sends different attacks to the slave such as oversized IGMP packets and an OOB nuke to disconnect them from the net. It also floods the targeted IP with ICMP packets and kills the firewall!

Nemesy = http://users.otenet.gr/~dstefan/cgi-bin/n3m3sy.zip

Nemesy generates random packets. The source IP is poofed because of random progressive generation. :)

IGMP Nuke = http://users.otenet.gr/~dstefan/cgi-bin/lgmp.zip

An easy basic nuker, but a bit slow, overall it;s pretty good.

Panther Mode 2 = http://users.otenet.gr/~dstefan/cgi-bin/panther2.zip

A great fire-wall killer. Sends so much attacks that the firewall will force shut-down. (depends on the firewall)

(DoS) Flooders:

Janidos Send = http://rapidshare.com/files/107095756/ja...g.rar.html

DDoS 51.5 = http://rapidshare.com/files/37997459/DoS..._Final.rar

LOIC (Low Orbit Ion Cannon) = LOIC.zip

Probably the best DoS Tool there is

ServerAttack = Download ServerAttack+Dos+Attack+(Private).zip for free on uploading.com

Unknown = MEGAUPLOAD - The leading online storage and file delivery service

Clean, Works, Tested

(DoS) Collection:

http://rs84.rapidshare.com/files/40856215/DDOS.rar

Net tools = MEGAUPLOAD - The leading online storage and file delivery service

Pass: chemprojects.org (Do not add the http:// part to the password)

1) IP Address Scanner

2) IP Calculator

3) IP Converter

4) Port Listener

5) Port Scanner

6) Ping

7) NetStat (2 ways)

8) Trace Route (2 ways)

9) TCP/IP Configuration

10) Online - Offline Checker

11) Resolve Host & IP

12) Time Sync

13) Whois & MX Lookup

14) Connect0r

15) Connection Analysator and protector

16) Net Sender

17) E-mail seeker

18) Net Pager

19) Active and Passive port scanner

20) Spoofer

21) Hack Trapper

22) HTTP flooder (DoS)

23) Mass Website Visiter

24) Advanced Port Scanner

25) Trojan Hunter (Multi IP)

26) Port Connecter Tool

27) Advanced Spoofer

28) Advanced Anonymous E-mailer

29) Simple Anonymous E-mailer

30) Anonymous E-mailer with Attachment Support

31) Mass E-mailer

32) E-mail Bomber

33) E-mail Spoofer

34) Simple Port Scanner (fast)

35) Advanced Netstat Monitoring

36) X Pinger

37) Web Page Scanner

38) Fast Port Scanner

39) Deep Port Scanner

40) Fastest Host Scanner (UDP)

41) Get Header

42) Open Port Scanner

43) Multi Port Scanner

44) HTTP scanner (Open port 80 subnet scanner)

45) Multi Ping for Cisco Routers

46) TCP Packet Sniffer

47) UDP flooder

48) Resolve and Ping

49) Multi IP ping

50) File Dependency Sniffer

51) EXE-joiner (bind 2 files)

52) Encrypter

53) Advanced Encryption

54) File Difference Engine

55) File Comparasion

56) Mass File Renamer

57) Add Bytes to EXE

58) Variable Encryption

59) Simple File Encryption

60) ASCII to Binary (and Binary to ASCII)

61) Enigma

62) Password Unmasker

63) Credit Card Number Validate and Generate

64) Create Local HTTP Server

65) eXtreme UDP Flooder

66) Web Server Scanner

67) Force Reboot

68) Webpage Info Seeker

69) Bouncer

70) Advanced Packet Sniffer

71) IRC server creater

72) Connection Tester

73) Fake Mail Sender

74) Bandwidth Monitor

75) Remote Desktop Protocol Scanner

76) MX Query

77) Messenger Packet Sniffer

78) API Spy

79) DHCP Restart

80) File Merger

81) E-mail Extractor (crawler / harvester bot)

82) Open FTP Scanner

83) Advanced System Locker

84) Advanced System Information

85) CPU Monitor

86) Windows Startup Manager

87) Process Checker

88) IP String Collecter

89) Mass Auto-Emailer (Database mailer; Spammer)

90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)

91) Fishing Port Scanner (with named ports)

92) Mouse Record / Play Automation (Macro Tool)

93) Internet / LAN Messenger Chat (Server + Client)

94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control

95) Hash MD5 Checker

96) Port Connect - Listen tool

97) Internet MAC Address Scanner (Multiple IP)

98) Connection Manager / Monitor

99) Direct Peer Connecter (Send/Receive files + chat)

100) Force Application Termination (against Viruses and Spyware)

101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)

102) COM Detect and Test

103) Create Virtual Drives

104) URL Encoder

105) WEP/WPA Key Generator

106) Sniffer.NET

107) File Shredder

108) Local Access Enumerater

109) Steganographer (Art of hiding secret data in pictures)

110) Subnet Calculater

111) Domain to IP (DNS)

112) Get SNMP Variables

113) Internet Explorer Password Revealer

114) Advanced Multi Port Scanner

115) Port Identification List (+port scanner)

116) Get Quick Net Info

117) Get Remote MAC Address

118) Share Add

119) Net Wanderer

120) WhoIs Console

121) Cookies Analyser

122) Hide Secret Data In Files

123) Packet Generator

124) Secure File Splitting

125) My File Protection (Password Protect Files, File Injections)

126) Dynamic Switch Port Mapper

127) Internet Logger (Log URL)

128) Get Whois Servers

129) File Split&Merge

130) Hide Drive

131) Extract E-mails from Documents

132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)

133) Hook Spy

134) Software Uninstaller

135) Tweak & Clean XP

136) Steganographic Random Byte Encryption

137) NetTools Notepad (encrypt your sensitive data)

138) File Encrypter/Decrypter

139) Quick Proxy Server

140) Connection Redirector (HTTP, IRC, ... All protocols supported)

141) Local E-mail Extractor

142) Recursive E-mail Extractor

143) Outlook Express E-mail Extractor

144) Telnet Client

145) Fast Ip Catcher

146) Monitor Host IP

147) FreeMAC (MAC Address Editor)

148) QuickFTP Server (+user accounts support)

149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)

150) Network Protocol Analyzer

151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)

152) WebMirror (Website Ripper)

153) GeoLocate IP

154) Google PageRank Calculator

155) Google Link Crawler (Web Result Grabber)

156) Network Adapter Binder

157) Remote LAN PC Lister

158) Fast Sinusoidal Encryption

159) Software Scanner

160) Fast FTP Client

161) Network Traffic Analysis

162) Network Traffic Visualiser

163) Internet Protocol Scanner

164) Net Meter (Bandwidth Traffic Meter)

165) Net Configuration Switcher

166) Advanced System Hardware Info

167) Live System Information

168) Network Profiler

169) Network Browser

170) Quick Website Maker and Web Gallery Creator

171) Remote PC Shutdown

172) Serial Port Terminal

173) Standard Encryptor

174) Tray Minimizer

175) Extra Tools (nmap console & win32 version)

(DDoS) Host booters/Tools:

Black Energy DDOS bot = http://rapidshare.com/files/204652028/Bl...8.zip.html

BlackEnergy is an HTTP-based botnet used primarily for DDoS attacks. Unlike most

common bots, this bot does not communicate with the botnet master using IRC. Also, we

do not see any exploit activities from this bot, unlike a traditional IRC bot. This is a small

(under 50KB) binary for the Windows platform that uses a simple grammar to

communicate. Most of the botnets we have been tracking (over 30 at present) are located

in Malaysian and Russian IP address space and have targeted Russian sites with their

DDoS attacks.

SuperNova v5 {VIP} = http://rapidshare.com/files/185628977/BR...nova_5.rar

(DDoS) Collection:

Click images for download

XR Host Booter

xrnew.png

DDoSeR

ddoser2.png

DaRK DDoSeR

new%20gui.jpg

Darth DDoSer

*Uses any port

darth.png

MeTuS Delphi 2.8

*Uses any port

delphi.png

DDoSeR 3.0

30.png

Metus 2.0 GB Edition

*Uses port 3176

gbedit.png

BioZombie

*Uses port 3174

bio1.png

XR (Older)

*Uses on port 3070

xr1.png

Edited by culay
  • Upvote 1
Posted
E prost av meu(zone alarm security suite),si le vede ca trojan sau chiar is infectate :))?

Si mie la "Inferno Nuler" imi detecteaza ca si "cal troian" dar dea mi se rupe il folosesc demult.

In general orice crack la un joc imi detecteaza ca si virus,dar nu e.

In fine,descarca si foloseste software de mai sus doar cine vrea,eu nu oblig pe nimeni!

Posted

host booterele functioneaza pe principiul unei conexiuni TCP , client-server , la fel ca RATs , nu programul in sine e detectat, ci Stubul , adica ceea ce vei distribui tu, daia s-au inventat crypterele . Ma rog , nu zic ca nu sunt sanse sa fie backdoored :D.

Posted (edited)
Daca tot faci o treaba pune linkurile ca lumea ca unele nu merg.

Poi da,cele de rapidshare au fost sterse,find ca au fost detectate ca fiind virus.

Edited by culay

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...