1 00:00:00,750 --> 00:00:07,320 In the previous video, we have seen what is dos and don'ts attack is all about. 2 00:00:08,100 --> 00:00:14,750 Now, in this lesson I will show you the practical of dos attack, which is denial of service attack. 3 00:00:14,760 --> 00:00:15,150 Right. 4 00:00:16,110 --> 00:00:25,350 So I'm going to perform HTP flooding attack in which attacker machine will continuously send SIM packets 5 00:00:25,770 --> 00:00:26,610 to the target. 6 00:00:27,690 --> 00:00:31,050 So here is the Kali machine, which is the attacker machine. 7 00:00:31,380 --> 00:00:37,210 And I have one more virtual machine running, which is Windows 10, and this one is our target. 8 00:00:37,620 --> 00:00:40,560 So let's check the IP of the target machine. 9 00:00:42,710 --> 00:00:50,050 OK, now let's switch back to a tiger machine and let's take the type of attack on the machine then 10 00:00:50,990 --> 00:00:57,080 now to perform this kind of attack, I'm going to use a utility called Etching Tree. 11 00:00:57,410 --> 00:01:01,220 So Edge Big Tree is a big tool in Cali. 12 00:01:01,970 --> 00:01:09,800 So it's been three hyphen capital s and then the IP of the target machine, which is standard order 13 00:01:09,810 --> 00:01:17,600 to Dodwell and then hyphen E and then the IP of the attacker machine, which is standard or door to 14 00:01:17,600 --> 00:01:18,740 door to speed. 15 00:01:19,670 --> 00:01:27,980 And then I be I have a B stands for Destination Port and the destination port would be 22 and then hyphen 16 00:01:27,980 --> 00:01:29,110 hyphen flow. 17 00:01:30,050 --> 00:01:30,370 Right. 18 00:01:31,010 --> 00:01:36,930 So this is going to perform the extra DP flooding attack on Windows 10. 19 00:01:37,640 --> 00:01:42,080 Now here you will able to see that HP is in flood mode. 20 00:01:42,350 --> 00:01:42,730 Right. 21 00:01:43,040 --> 00:01:45,040 And no replace will be shown. 22 00:01:46,310 --> 00:01:53,660 And the reason behind this is if you started receiving the replays and your target is more powerful 23 00:01:53,660 --> 00:01:58,880 than your machine, then there are chances that your own machine will crash. 24 00:01:59,690 --> 00:02:00,010 Right. 25 00:02:00,260 --> 00:02:05,240 So it is important that it would not show any replies to your machine. 26 00:02:05,720 --> 00:02:13,610 OK, so if you want to verify whether you are receiving the traffic on the ATM machine or not, then 27 00:02:13,610 --> 00:02:17,430 you can go ahead and use a tool called Wireshark. 28 00:02:18,230 --> 00:02:24,440 Now, in my role in one of my previous video, I have explained what a measure is and how you can use 29 00:02:24,440 --> 00:02:24,650 it. 30 00:02:25,130 --> 00:02:25,490 Right. 31 00:02:25,970 --> 00:02:33,260 So now I have to pause this video until and unless I'm able to see the effect of the attack and then 32 00:02:33,260 --> 00:02:34,430 I will resume the video. 33 00:02:37,880 --> 00:02:45,710 So now I'm trying to move my cursor, but I am unable to do that right and I am trying to open the command 34 00:02:45,710 --> 00:02:49,400 prompt using keyboard, but that that's not working right now. 35 00:02:49,590 --> 00:02:53,860 OK, so this is how you would able to see the effect. 36 00:02:54,180 --> 00:02:58,220 Right now, let's stop the attack by pressing control. 37 00:02:58,220 --> 00:03:05,320 See, and let me tell you two more important tools of performing DOS attack. 38 00:03:05,810 --> 00:03:14,520 So DOS, HDP and Sebu, that finger are two most important tools for performing DOS attack. 39 00:03:14,840 --> 00:03:22,750 So DOS SCDP, is it easy to use but powerful HDB flurried denial of service attack tool. 40 00:03:23,270 --> 00:03:29,980 Right, which works on Windows 10 seven eight eight point one extra. 41 00:03:30,680 --> 00:03:33,920 OK and the other two CPU that finger. 42 00:03:34,850 --> 00:03:37,190 So Version 2.0 has been released. 43 00:03:38,330 --> 00:03:44,570 It says this tool will create a batch file on your desktop, making possible multiple floats. 44 00:03:45,050 --> 00:03:49,840 It also floats the user a bit more dramatic, fezzes errors, etc.. 45 00:03:50,540 --> 00:03:57,940 Now, if you ask me personally that among these two pools, which one I prefer, so I will prefer Sebu. 46 00:03:57,980 --> 00:04:04,460 That finger using these tools is a very easy process as you use any other tool. 47 00:04:04,610 --> 00:04:11,360 Just install it on your PC and it will ask you to enter the IP address of your target machine or target 48 00:04:11,360 --> 00:04:13,400 website and click on attack. 49 00:04:13,970 --> 00:04:14,330 Right. 50 00:04:14,730 --> 00:04:17,840 That's how easy it is used to use these kind of tools. 51 00:04:18,650 --> 00:04:22,640 Now, let me tell you, you are using a free version of these tools. 52 00:04:22,640 --> 00:04:24,320 Are the drivers of these tools. 53 00:04:24,620 --> 00:04:27,650 Then it will provide you a limited access to its features. 54 00:04:27,890 --> 00:04:34,370 OK, but if you will go for the premium version or the big version of these tools, then it will grant 55 00:04:34,370 --> 00:04:38,990 you access to use all of the functions of these tools.