1 00:00:00,390 --> 00:00:06,660 In the previous video, we have seen how we can perform DOS attack, but the attack is not able to take 2 00:00:06,660 --> 00:00:07,790 down a big target. 3 00:00:07,980 --> 00:00:14,020 So to take down a big target, we will use distributed denial of service attack or the DOS attack. 4 00:00:14,580 --> 00:00:23,210 Now, in order to perform DOS attack, we need a tool called Edge or ICI or high orbit ion cannon. 5 00:00:23,460 --> 00:00:23,740 Right. 6 00:00:24,030 --> 00:00:30,630 So open your browser and download it easy and open the first languages sourceforge dot net. 7 00:00:31,380 --> 00:00:37,780 Now if you see any other link, then this, then don't use that link because that would install additional 8 00:00:37,780 --> 00:00:39,310 surface, which is not a good thing. 9 00:00:40,050 --> 00:00:43,030 So open this link and download it from here. 10 00:00:43,620 --> 00:00:47,700 Now it is a risky software, so download it on your own risk. 11 00:00:47,850 --> 00:00:53,970 I suggest you to download this software in your virtual machine and not on your physical machine, because 12 00:00:53,970 --> 00:00:58,860 if something goes wrong, you have an option to delete the virtual machine and install a new one. 13 00:00:59,280 --> 00:00:59,660 Right. 14 00:01:00,210 --> 00:01:01,640 So you can download it from here. 15 00:01:01,890 --> 00:01:03,510 It says malware detected. 16 00:01:03,510 --> 00:01:04,980 Download it on risk. 17 00:01:05,240 --> 00:01:11,940 OK, so in my case, I am using three different virtual machines. 18 00:01:11,970 --> 00:01:17,640 OK, so the first one is Windows eight point one, which is an attacker machine. 19 00:01:17,640 --> 00:01:25,750 And we have Windows ten point one, which is another attacker machine and our target is callisthenics. 20 00:01:26,190 --> 00:01:28,760 OK, so this machine is a target. 21 00:01:28,950 --> 00:01:31,650 So let's take the IP off our target machine. 22 00:01:32,640 --> 00:01:35,160 It says Standard Order to dot 15. 23 00:01:36,300 --> 00:01:43,260 Now let's switch to the attacker machine and let's check the IP resistor in order to Gatford. 24 00:01:43,680 --> 00:01:47,710 So let's bring our target from here to DOT 15. 25 00:01:48,570 --> 00:01:51,680 OK, we are getting reply now. 26 00:01:51,690 --> 00:01:54,370 Let's check the connectivity from here as well. 27 00:01:54,570 --> 00:01:58,000 So ping then dot, dot, dot, dot, dot, dot, 15. 28 00:01:59,650 --> 00:02:02,900 OK, everything is working fine. 29 00:02:03,780 --> 00:02:12,000 Now you have to download SLAC software in all of your attacker machines, as I told you. 30 00:02:12,000 --> 00:02:14,310 And you are performing this attack in a demo environment. 31 00:02:14,370 --> 00:02:16,200 That's why I'm using to attack a machine. 32 00:02:16,890 --> 00:02:21,480 But in the real world, the hackers will use thousands of Autechre machines. 33 00:02:21,630 --> 00:02:22,010 Right. 34 00:02:22,560 --> 00:02:28,470 So you have to download that software in all of that, those machines, and you have to perform attack 35 00:02:28,470 --> 00:02:29,560 at the same time. 36 00:02:30,220 --> 00:02:36,210 OK, so I have already downloaded that software and it would be in my download folder. 37 00:02:36,510 --> 00:02:38,720 OK, so here is a download folder. 38 00:02:39,240 --> 00:02:40,290 Here is the software. 39 00:02:40,350 --> 00:02:46,800 OK, so first of all, you have to extract it or you can directly open it if you have a raw extractor. 40 00:02:48,210 --> 00:02:53,760 OK, it says evaluation copy and then run the application. 41 00:02:54,390 --> 00:03:00,930 OK, so let it open and let's switch to another attacker machine and let me open the software here as 42 00:03:00,930 --> 00:03:03,880 well in the downloads folder. 43 00:03:05,520 --> 00:03:06,180 Here it is. 44 00:03:09,140 --> 00:03:12,420 So let's throw in the towel here as well. 45 00:03:16,830 --> 00:03:17,220 Done. 46 00:03:18,430 --> 00:03:24,990 Now, this is the tool edge, or ICEE, which is used to perform the DOS attack. 47 00:03:25,500 --> 00:03:35,480 OK, now a good option is you can target multiple websites or computer system at once, right? 48 00:03:36,030 --> 00:03:38,300 So you can add your target from here. 49 00:03:40,080 --> 00:03:42,030 OK, enter the Yoran. 50 00:03:42,030 --> 00:03:46,650 If it is a website, enter the website name or you can enter the server IP address. 51 00:03:46,950 --> 00:03:52,900 So HTP Leisz and then IP of the target machine. 52 00:03:53,520 --> 00:03:56,360 OK, now the other option is to power. 53 00:03:56,490 --> 00:03:59,140 So said the power to hide. 54 00:03:59,580 --> 00:04:02,190 OK, and then you'd ask for booster. 55 00:04:02,490 --> 00:04:07,590 OK, so select the second one which is generic boost and click on add. 56 00:04:08,010 --> 00:04:11,840 OK, now here are the number of threads you want to use. 57 00:04:12,090 --> 00:04:17,460 So let's increase it to let's say around 20. 58 00:04:17,620 --> 00:04:19,100 OK, that's sufficient for now. 59 00:04:19,800 --> 00:04:25,210 Let's switch back to the machine and let's do the same job here as well. 60 00:04:25,230 --> 00:04:36,120 So HDB then door to door to door 15 said the power to high again select the booster to generate click 61 00:04:36,120 --> 00:04:36,770 on add. 62 00:04:37,290 --> 00:04:40,470 OK, increase the trials to 20 again. 63 00:04:41,310 --> 00:04:41,700 Done. 64 00:04:42,480 --> 00:04:48,480 Now to start the attack, click on this button which is fire the laser. 65 00:04:48,670 --> 00:04:55,070 OK, so let's start the attack from both of the attacker machines. 66 00:04:55,410 --> 00:04:58,970 Now it says power is high and that is engaging. 67 00:04:59,220 --> 00:05:01,560 OK, and this would be the output. 68 00:05:01,740 --> 00:05:02,910 OK, total output. 69 00:05:04,710 --> 00:05:06,780 So the attack has now been started. 70 00:05:07,410 --> 00:05:16,570 OK, so let's switch to our target and let's observe the traffic by using Wireshark, OK? 71 00:05:16,590 --> 00:05:23,070 It's in Belal, in Kahless or simply Tibaijuka can hit enter and it will open the tool. 72 00:05:24,330 --> 00:05:28,320 So it is a traffic capturing tool in your network. 73 00:05:29,700 --> 00:05:30,990 So let it open. 74 00:05:34,750 --> 00:05:39,610 Click on OK, now here, select the interface. 75 00:05:39,700 --> 00:05:43,930 So for now, I'm using Internet zero and click on start. 76 00:05:44,210 --> 00:05:52,870 OK, so it has started capturing the incoming traffic or the overall traffic in your network. 77 00:05:52,930 --> 00:05:56,530 OK, so let me increase this so you can see clearly. 78 00:05:57,880 --> 00:06:02,390 See, these are the number of threads or the number of total traffic. 79 00:06:02,410 --> 00:06:05,050 OK, so see, it's increasing very fast. 80 00:06:05,940 --> 00:06:13,870 OK, it says 23000, 24000, OK, which is a lot of traffic right now. 81 00:06:13,870 --> 00:06:21,400 Michael, Virtual Machine is a powerful virtual machine as it has around four of them and around 50 82 00:06:21,400 --> 00:06:23,280 GB of hard disk space. 83 00:06:23,680 --> 00:06:31,850 So it is not an easy task to hang this machine OK, or to make this machine an accessible right. 84 00:06:32,200 --> 00:06:38,050 So it will take around half an hour or maybe one hour to see the effect. 85 00:06:39,640 --> 00:06:45,910 So my aim is to show you how you can perform DOS attack in your virtual environment. 86 00:06:45,970 --> 00:06:53,590 Now, if you want to perform this in the real environment, then simply add your target and enter the 87 00:06:53,950 --> 00:06:59,590 IP of this server you are targeting right now to stop the attack. 88 00:07:00,160 --> 00:07:04,690 Simply click this button, fired the laser again and it will stop the attack. 89 00:07:04,750 --> 00:07:12,940 OK, it says total output is one hundred and one M.B and let's stop the other one as well. 90 00:07:13,410 --> 00:07:20,920 OK, so I hope now you know how we can perform dos and those attacks on your target, but do this with 91 00:07:20,920 --> 00:07:22,540 all the required permissions.