Saturday, 10 October 2015

Airtel Introduced Timely Based Data Plan For Unlimited Downloading

Yeah! This is just what I’m talking about and have been anticipating this feature for a very long time. That is if its not deception from the pit of Airtel Network. I can tell you that there is nothing as good as a timely based unlimited data plan in an environment of good network reception. Despite the fact that I’m hating Airtel network, I think I’m going to give this a try just for downloading purposes. Airtel one of the giant Telecom company silently introduced a timely based unlimited data plan which is different from all their packages. This timely based plan works with time, as soon as your time expires, it seizes to connect. But while your time is on session, you can downloaded Dubai hotel inside your smartphone or PC. The plans are; 5min for N15 10min for N30 30min for N90 60min for N180 Note Airtel NG says this data subscription are not capped but are unlimited. 
   Will it Work on my Device?
It works on all devices without any strange configuration
How Can I Subscribe For This Package? 
 Dial *439# and follow the prompt to get you started. This plan is suitable for downloading and not for normal surfing of the internet. So if you have any heavy files to download in gigs, go ahead and kill Airtel server until your N180 expires. Hope You Love It?

Reasons Why Girls Are Being Used And Dumped

Few Reasons Why Girls Are Being Used And Dumped.

Girls always complain of being used and dumped, always complain of
heart breaks and so on without actually knowing that they usually
contribute to that. A guy can cheat on you but will never leave you for
another girl if you are actually what he wants, you have seen cases
where a guy will be cheating on his girl friend but he will stil let the
other girl he is messing up with know that he has a girl friend o! Its
true that no matter how good your girl friend is, some guys will stil
cheat on their girl friendsbut the main thing is…is he cheating
because he wants to get another girl and dump you or is he cheating
because its in guys’ nature to do so and after that, he stil minds his
girl friend, begs and cries if he is caught in the process? Below are
some of the reasons why girls are being cheated on and get dumped at
the end.

1. LOVING BECAUSE OF LOOKS:
Some girls are fond of loving and dying for the fine boys, the huge and
well built guys, tall and cute with red lips without knowing how good or
bad the guy is, without knowing if the guy even has 1% of likeness not
to talk of love for her. One funny thing about guys is that once you
come to them or throw yourself at them and open your legs, they wil
enter and enjoy themselves whether they have any feelings for you or
not. You the silly girl will keep throwing yourself at the fine boy and he
will keep having fun with you and be using you as his sex machine
while he has someone he loves; at the end he will dump you and go to
his girl friend while you start shading tears of heart break and being
dumped. Love and date someone who loves you too and values you no
matter the looks.

2. LOVE FOR MONEY:
Yes…once a girl sees a guy with money and good car and house, love
instantly and automatically starts and develops. You obviously forget
that guys are wise, you also forget that there is this girl that has been
with him when he wasnt rich and you believe he will leave the girl and
date you because you are beautiful, sexy, good in bed or pretend to be
good and pretend not to be after his money? Its true that some guys
forget about the girl and dump the girl who was with them when they
were poor once they make moneybut 90% of guys who later make
money stil dont forget. If you think its a lie, ask Dangote.

3. LOVE BECAUSE OF FAME:
Some girls can go any length to get a guy who is famous. Loving and
dying for a famous guy is like a poor person who always wants to
travel with a private jet..you will lie down on your bed and keep
imagining until you sleep off and continue the imaginations in your
dream. Sometimes, you will be lucky to get the famous guy by doing
all you can, playing all your tricks and stil believe he is yours forgeting
that so many desperate people like you are also doing same thing you
did or same trick you used. The famous guy will stil use you and dump
you at the end and go to his girl friend or you think he doesnt have a
girl who loves him for whom he is. If you think its a lie, ask Tuface
Idibia.

4. INSATIABLE:
I think I have exprienced this one in the past. Some girls will never get
satisfied no matter what you give them. Am not talking of being
satisfied in bed, I mean materially and financially. There are some girls
that have been used and dumped and will stil be used and dumped
tomorrow even if they meet a millionaire due to insatiable character
and too demanding. You will buy a balckberry for her, she will want
iphone6. You buyiphone 6for her, she will demand for a car, out of
love you buy the car for her, she will demand for a house for her
family when you havent married her yet o! Such a person will never get
satisfied and trust guys, when they find out you are such a person, they
will hurry to use you anddump you.

5. YOUR CHARACTER:
This is one of the major reasons why guys use and dump most girls.
Some girls are so good in painting themselves outside, looking good
outside and when you take them home, you will realise that she is like
a breathing wood and an empty entity. She cant cook well, she cant
keep her surroundings neat and clean,she is lazy, a dirty type, lousy
and what have you. You will be like…God, what kind of girl is this. Guys
and their cunny nature, he will stil use you and dump you and run to
his girl friend that knows how totake care of things. No guy will ever
dump a good girl for a bad girl unless you use charm and the charm
wil one day get expired.

Thursday, 8 October 2015

How To Run Two WhatsApp Accounts on A Device

WhatsApp is one of the most popular messenger app that also lets you share pictures, videos, music files and so on. By now, everyone of us have WhatsApp in our smartphones. I prefer WhatsApp among other messaging apps due to its simplicity and instant messaging service.

Although each and everything is quite handy in WhatsApp, but "Ain't  the most disturbing part that you came across?" For me it is:

If you run dual SIM in your Android smartphones, you might be willing to enjoy two separate WhatsApp account for your two different telephone numbers on your smartphone. Isn't it?

However, this is where WhatsApp puts limitations on its users. WhatsApp users can not use more than one WhatsApp account on their mobile devices.




However, you are probably wondering:
"How do we find an excellent solution for this problem that actually works?"

Today, 9JACZ introducing you two different Android apps -- OGWhatsApp and SwitchMe -- that allows users to run multiple WhatsApp accounts on a single smartphone.

METHOD 1: USING OGWhatsApp

OG_WHATSAPP
 is an Android app that allows you to use two separate WhatsApp accounts on your single Android device without any need to root your Android device.

While running your normal WhatsApp account on your smartphone, you can follow some simple steps (below) in order to run a different WhatsApp account on the OGWhatsApp.

Follow these simple steps to go:
Step 1: Take a complete backup of your WhatsApp data and restore it.
Step 2: Delete all the WhatsApp data by going to Settings>apps>WhatsApp>Clear Data.
Step 3: Rename the /sdcard/WhatsApp directory to /sdcard/OGWhatsApp. You can use any file manager for Android to do this task, or from Windows.
Step 4: Uninstall your original WhatsApp app from your Android device.
Step 5: Now install OGWhatsApp in your Android smartphone.
Step 6: Once installed, remember to verify your old number that was previously registered with the original WhatsApp to OGWhatsApp. That is it
Step 7: Now re-install the official WhatsApp for your other number from the play store.

This is amazing:
Enjoy two separate WhatsApp accounts for both telephone numbers on your single Android device without even rooting your Android device.


 METHOD 2: USE SWITCHME TO RUN MULTIPLE ACCOUNTS


These is another Android app that allows you to have two separate WhatsApp accounts on a single Android device, but this app requires your Android smartphone be rooted.


 Also Note::::

Switchme multiple account app allows you to log in and out of multiple user spaces however it needs root access to do this. However, users cannot access the other profile from their current profile because each account within the multiple profiles will have its settings, applications, and data.
Without wasting much of our time, here you go :

Step 1: Root your Android device.
Step 2: Make sure that you have WhatsApp app installed on your smartphone.
Step 3: Install SwitchMe Multiple accounts on your smartphone.
Step 4: Run SwitchMe Multiple accounts, it will ask for Superuser request that you need to grant.
Step 5: Now create a user profile with your name in SwitchMe app. This profile will be an administrator account containing all the current apps and settings, and will also reflect your WhatsApp profile that is already installed on your smartphone.
Step 6: Now create another profile using a different name by tapping on the Create Profile button in SwitchMe app, and then choose the Switch option by selecting this account.
Step 7: Now your smartphone will restart automatically and once it is ready to use, install official WhatsApp again from Google Play Store and register it for the different phone number. That is all
Congratulations!

Now you can easily use multiple WhatsApp accounts on your single Android smartphone. The Free version of SwitchMe Multiple accounts app allows you to use only two user account.

So, I have made available solutions for both users who want to use multiple WhatsApp accounts on their smartphone without rooting their Android device and with rooting their Android device respectively





Saturday, 3 October 2015

GLO FREE 100 MB FOR # 200 FOR 7 DAYS

I know that some of you might need this glo sub as its working and downloading perfectly no more talk friends,load or have upto N200 glo credit on your line and send YES to 7070
immediately you will get a reply welcome you with your 100mb last for 7days and you can roll it over in the 7th day...Drop ya comments for more.





Please Drop a comment to show appreciation to the Author , You can also drop your own views below

How to send Fake Email with any Email Domain #hotanon

hello everyone. Now I'm gonna show you How to send Fake Email with any Email Domain you want.





ok here we go



First, download the program here

after downloading the program, run it and the program looks like this
[Image: gambar_836.png]

now fill all text field on the application
note (Click to Hide)
Fake Email textbox = your fake email, example :admins@fbi.gov
Victim(s) textbox = your target, example :blahblah@gmail.com
Subject textbox = your email subject, click on the checkbox if you want a random subject
Messages textbox = your email body message, you can use html tag too.
Amount textbox = how man messages you want to send.
-use ur own email on Victim textbox for testing if you feel it necessary.



[Image: gambar_844.png]

after you fill up all textfields, then click Send Emailbutton and wait till you got message like this
[Image: gambar_839.png]

done. Your email was successfully sent to the target. your email will be entered in the Inbox folder (tested on GMail)
[Image: gambar_840.png]

[Image: gambar_841.png]

this is how it looks if you use random email and random subject option (Click to Hide)
[Image: gambar_842.png]



[Image: yiYEfJx.png]


I hope this tutorial could helped you and many people, this took me a while to make so feedback is greatly appreciated.

thanks for reading my tutorial, and have a nice day
Happy ####

[Image: yiYEfJx.png]

Wednesday, 30 September 2015

Facebook spices up profiles with looping video, temporary pictures, larger images and more




As part of a continued effort to avoid the same fate as MySpace, Facebook on Wednesday announced a handful of major changes that add a bit of spice to users’ profiles.

The first change you may notice is the ability to replace your static profile photo with a looping video, an obvious next step as we continue to shift towards a video-centric web.



Facebook is also adding temporary profile pictures that allow users to display them for a set amount of time before reverting back to their original one. Facebook product managers Aigerim Shorman and Tony Hsieh suggested using the feature to support your favorite sports team leading up to the big game, to celebrate a special milestone like a birthday or vacation or to show off a throwback Thursday photo.

And speaking of, profile pictures are now larger and centered.



As it has done multiple times before, Facebook is making changes to its profile controls. Specifically, they’re adding a new customizable space at the top of your profile and adding a new one-line “bio” field. You’ll also be able to add up to five feature photos to showcase at the top of your profile. The space is visible to anyone that visits your profile although you’ll have full control over what information is shown, we’re told.

Facebook said it has already started to roll the changes out to a small number of iPhone users in California and the UK. Assuming all goes well, the rollout will continue to expand in the near future.

Friday, 25 September 2015

Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information



A newly discovered critical flaw in the implementation of web cookies by major browsers could open secured (HTTPS) browsing to Man-in-the-middle attacks.

The US Computer Emergency Response Team (CERT) has revealed that all the main browser vendors have improperly implemented the RFC 6265 Standard, also referred to as "Browser Cookies," allowing…

…remote attackers to bypass secure HTTPS protocol and reveal confidential private session data.

Cookies are small pieces of data sent from web sites to web browsers, which contains various information used to identify users, or store any information related to that particular website.

HTTPS Cookie Injection Vulnerability

Whenever a website (you have visited) wants to set a cookie in your browser, it passes a header named “Set-Cookie” with the parameter name, its value and some options, including cookie expiration time and domain name (for which it is valid).

It is also important to note that HTTP based websites does not encrypt the headers in any way, and to solve this issue websites use HTTPS cookies with "secure flag", which indicates that the cookies must be sent (from browser to server) over a secure HTTPS connection.

However, the researchers found that some major web browsers accept cookies via HTTPS, without even verifying the source of the HTTPS cookies (cookie forcing), allowing attackers with man-in-the-middle position on a plain-text HTTP browsing session to inject cookies that will be used for secure HTTPS encrypted sessions.

For an unprotected browser, an attacker can set HTTPS cookie masquerading as another site (example.com) and override the real HTTPS cookie in such a way that even the user might not realise it's a fake while looking through their cookie list.

Now, this malicious HTTPS cookie is controlled by the attacker, thus being able to intercept and grab private session information.

The issue was first revealed at the 24th USENIX Security Symposium in Washington in August when researchers presented their paper that said that cookie injection attacks are possible with major websites and popular open source applications including…

…Google, Amazon, eBay, Apple, Bank of America, BitBucket, China Construction Bank, China UnionPay, JD.com, phpMyAdmin, and MediaWiki, among others.

Affected Browsers:

The Affected major web browsers includes previous versions of:

    Apple’s Safari
    Mozilla’s Firefox
    Google’s Chrome
    Microsoft’s Internet Explorer
    Microsoft’s Edge
    Opera

However, the good news is that the vendors have now fixed the issue. So, if you want to protect yourself from this kind of cookie injection MitM (Man-in-the-Middle) attack vectors, upgrade to the latest versions of these web browsers.

CERT also recommended webmasters to deploy HSTS (HTTP Strict Transport Security) on their top-level domain.

Tuesday, 22 September 2015

iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode


io9-hack-passcode
A hacker has found a new and quite simple method of bypassing the security of a locked iOS device (iPhone, iPad or iPod touch) running Apple's latest iOS 9 operating system that could allow you to access the device's photos and contacts in 30 seconds or less.


Yes, the passcode on any iOS device running iOS 9.0 is possible to bypass using the benevolent nature of Apple’s personal assistant Siri.


Here's the List of Steps to Bypass Passcode:


You need to follow these simple steps to bypass passcode on any iOS device running iOS 9.0:

Wake the iOS device and Enter an incorrect passcode four times.For the fifth time, Enter 3 or 5 digits(depending on how long your passcode is), and for the last one, press and hold the Home button to invoke Siri immediately followed by the 4th digit.After Siri appears, ask her for the time.Tap the Clock icon to open the Clock app, and add a new Clock, then write anything in the Choose a City field.Now double tap on the word you wrote to invoke the copy & paste menu, Select Alland then click on "Share".Tap the 'Message' icon in the Share Sheet, and again type something random, hit Return and double tap on the contact name on the top.Select "Create New Contact," and Tap on "Add Photo" and then on "Choose Photo".You'll now be able to see the entire photo library on the iOS device, which is still locked with a passcode. Now browse and view any photo from the Photo album individually.

Video Demonstration 


You can also watch a video demonstration (given below) that shows the whole hack in action.


It isn't a remote flaw you need to worry about, as this only works if someone has access to your iPhone or iOS device. However, such an easy way to bypass any locked iOS device could put users personal data at risk.


How to Prevent iOS 9 Hack


Until Apple fixes this issue, iOS users can protect themselves by disabling Siri on the lock screen fromSettings > Touch ID & Passcode. Once disabled, you’ll only be able to use Siri after you have unlocked your iOS device using the passcode or your fingerprint. 

France rejects Google's appeal against implementing 'right to be forgotten' globally

France’s data protection watchdog, the Commission Nationale de l’Informatique et des Libertés (CNIL), has rejected Google’s appeal against the global enforcement of the ‘right to be forgotten’ rule.

In May this year, the CNIL ordered Google to apply the right to be forgotten rule – which lets people ask search engines to not display certain unflattering links resulting from a search on their name – to its google.com global domain and not just European domains such as google.fr or google.co.uk.

Google filed an informal appeal against the order in July, claiming it would restrict the public’s right to information, was a form of censorship, and was attempting to extend French law outside the country’s borders. The president of the CNIL, Isabelle Falque-Pierrotin, rejected the appeal on Monday, saying that delistings must be applied across all extensions of the search engine and that not doing so would mean the RTBF ruling could be easily circumvented. The CNIL added that it just wanted non-European companies to respect European laws when offering their services in the continent - rejecting Google’s claims it was going beyond its jurisdiction.

"The President of the CNIL rejects Google's informal appeal against the formal notice requesting it to apply delisting on all of the search engine's domain names […] Contrary to what Google has stated, this decision does not show any willingness on the part of the CNIL to apply French law extraterritorially. It simply requests full observance of European legislation by non European players offering their services in Europe," it said in a statement.

Under French law, Google has no legal possibility of appealing the order at this stage. If the company refuses to remove the tens of thousands of delistings from its non-European domains for named searches, then the CNIL will likely look at imposing sanctions - including the possibility of a fine up to 5 percent of its worldwide revenue - against the internet giant.

A Google spokesman said: “We’ve worked hard to implement the ‘right to be forgotten’ ruling thoughtfully and comprehensively in Europe, and we’ll continue to do so. But as a matter of principle, we respectfully disagree with the idea that one national data protection authority can assert global authority to control the content that people can access around the world.”

Security firm is buying iOS 9 exploits for $1 million


Zerodium, a startup that bills themselves as the "premium zero-day vulnerability and exploit acquisition program", are currently running a massive bug bounty program that is offering $1 million to developers who discover critical, exploitable flaws in iOS 9.

The company is willing to pay a total of $3 million for three separate iOS 9 exploits; $1 million to each group of developers. However it's going to take a particularly serious exploit to claim the million dollar bounty, as Zerodium's requirements are lengthy and strict.

The exploit in question must use an unknown flaw and lead to a "remote, privileged, and persistent installation of an arbitrary app", essentially making it an untethered jailbreak of iOS 9. On top of this, the flaw must be exploitable silently, reliably and remotely without any user interaction, with attacks originating through either a web page, SMS or MMS.

The exploit must be delivered exclusively to Zerodium and must work on all iOS 9 devices newer than and including the iPhone 5 and 3rd-gen iPad. The program will run through to October 31st, although if three exploits are discovered before then, the program will end early.

Zerodium doesn't state what the zero-day exploits will be used for, although the company lists its clients as major corporations "in need of advanced zero-day protection" as well as governments "in need of specific and tailored cybersecurity capabilities".

It's most likely that these exploits will be packaged up for groups that require silent backdoor entry into iOS 9 devices, such as governments that want to tap into and spy on an iPhone user. These type exploits that remain unpatched and unknown to the public typically command high prices on the market, which is why Zerodium is offering such a large sum for iOS 9 exploits.

How to Upgrade /Edit Your School Grade Result #FUN



Hello everyone here,  I'm going to show y'all HOW TO UPGRADE/ENHANCE YOUR SCHOOL RESULT BY YOURSEF    

This tutorial will simply guild you on how to ehhance your  result successively in all exams written countries. All you need to do is to Watch and follow the simple steps above #Firebug #hmmmm
Note: Pls Check the article Title .

#MITM ATTACKS!!!!

What is a MITM Attack?

A Man in the Middle Attack (MITM) is a type of network attack in which an attacker assumes the role of the default gateway and captures all the traffic going to and fro. This is a very serious attack and also very easy to perform. MITM attack can be performed in a Local area network such as airport and  coffee shop wifi, college wifi, computer labs and other any kind of LAN. 


What the attack basically means is that a hacker (or anyone for that matter) with the right set of  tools, can intercept all your internet activities and see all your passwords and  all the websites you are browsing. 




How to perform a Man in the Middle attack?



There are many types of Man in the Middle attacks. There are also many ways to perform this attack. There are several tools such as Cain&Abel, Ettercap, Subterfuge, SSLStrip etc which can do a MITM attack.



In Windows, we use a technique called ARP spoofing to achieve MITM scenario. We use a free ready made tool called Cain&Abel for this. First, you need to be in the same network subnet as the victim (same campus, same room, or same wifi).



Download and Install Cain&Abel. Alsodownload and install Wireshark which is also free. We will be using wireshark to capture the packets and analyze them. 
After everything is installed, run Cain from the desktop or menu. 




  • 1. Start Sniffer by clicking button shown in red box. 2. Then go to Sniffer tab.

  • 3. Right click on screen and select “Scan Mac Addresses”. The screen will quickly  be populated with all users in your LAN.
  • 4. Select all the IP addresses and right click. and select "Resolve host name". Now, you can find the IP address of the person you want to attack by viewing the computer names.


  • Now, 
  •  4. click on “ARP” on bottom and then 
  •  5. click on “Plus” icon to add user in victim list. 



 A window called “New ARP Poison Routing ” will pop up.

  • You will see windows divided in two parts. Select the default gateway in left half and select the victim's IP in the right.  Here you see me selecting 10.97.26.1 as the default gateway for the network and the victim's IP address 10.97.26.156




  • Click on start ARP option shown in red box. You will see that CAIN starts poisoning the host. 




This completes our ARP poisoning  Now, all the traffic from the victim will pass through the attacker's PC. The victim may notice his internet speed slowing down. 



Now, we need to capture the traffic by using Wireshark. 



Fire up wireshark and
 1. Click on the adapter button shown below in red. 2. Click 'start' in the adapter where there are packets. 






If you let this run for a while, all the traffic going through the victim's PC will be captured by wireshark. You can then save the packet capture file and analyze it with appropriate filters. By analyzing the packets, you can find juicy information like username and passwords, web urls visited by the victim etc.
Please note that you have to be very careful while performing such an attack. If not done properly, it can even cause denial of service to the entire network. 

How to setup VPN in Windows 7


WHAT'S VPN?
Virtual Private Network or VPN is used mostly by corporate employees to connect to their office while travelling or  from their home or coffee shop. However, for students, there is an entirely different usage, and that is to bypass firewall restriction in schools and colleges. My friends keep on asking me how to bypass our college firewall as sites like youtube and facebook are blocked during working hours. There are many ways to bypass a firewall, depending on the blocking mechanisms used. VPNs are the best in my opinion.

So, how does VPN work?
Simply put, the wifi or internet you are currently using is not secure. Anyone can sniff data by aMITM attack. VPN creates an encrypted tunnel from your computer to a remote computer which will pass on your information the the websites you are viewing. Just remember that VPN ensures that your information is safe from prying eyes. Now, you might ask, what is that remote computer we are connecting to? It may be your office, or a free VPN server in this case.  The diagram shows VPN connection to a corporate server.

There are several kind of VPN protocols such as PPTP, L2TP, OpenVPN etc.  OpenVPN is the most secure and reliable type of VPN. However, we have to download the OpenVPN client, making it an extra step. In a corporate environment or in a situation where data confidentiality is of prime importance, you may use OpenVPN.  The most easy to setup is PPTP, which comes inbuilt in Microsoft Windows. That means no downloading is required. So, we will use this one. Please note that PPTP is not absolutely secure, but for normal browsing it should be fine.

1. Goto your free VPN providers website. My personal favourite is www.vpnbook.com
   Once there, scroll down, and you will see the IP address or domain or the VPN server, the username and password.

Since the VPN website itself may be blocked by the firewall, you may use GPRS or 3G on you mobile to first visit the site and obtain the VPN username and password. 
Note: These VPN providers periodically  change the passwords, so keep visiting the site to get updated passwords.

2. Goto Control Panel -> Internet Options -> Connections tab
  Click on Add VPN as shown.



A new window will pop up, asking for the Internet Address. This is the VPN site address which we saw earlier on vpnbook.com.  In this case, it is euro1.vpnbook.com. Leave the other fields as they are.


3. Click Next, and it will ask for username and password  Enter them as you saw on the website. Leave the domain blank.


Now, Click Connect and your VPN setup is done. Congratulations, you can now surf any website anonymously and without being logged or blocked.

This tutorial was for PPTP based VPN. PPTP can be blocked by your college or ISP, although it is unlikely. In that case, use OpenVPN. It is impossible to block OpenVPN as it can use any port.

Denial of Service (DOS) Attacks

What are Denial of Service (DOS) attacks?

Denial of Service attacks have become more widely known due to extensive media coverage. But what exactly is a denial of service attack? Simply put, a denial of service attack is a type of cyber attack wherein a website or service is brought down by a hacker or a group of hackers by flooding it with bogus traffic. The web server becomes overloaded with this bogus traffic and the service eventually crashes.

This means that if a hacker performs a denial of service attack against a website, say for example a bank website, then all the online transitions of that bank will be halted. Both companies and individuals are no long able to log into their netbanking accounts for the duration of the attack, leading to loss in revenue for the bank. The bank will also lose reputation and credibility for failing to protect their IT infrastructure.  Similarly, if Gmail was attacked, millions of users will not be able to access their email accounts. In a typical DoS attack, one hacker performs the attack using a DoS tool or script. This is easy to mitigate. The only thing one needs to do is block the IP address of the attacker. To overcome this, hackers use a technique called Distributed Denial of Service or DDoS.

What are Distributed Denial of Service(DDoS) Attacks?


DDoS attacks involve hundreds, if not thousands of "volunteers" who install the DoS tool in their systems and launch a coordinated attack on the target at a specified time. This was the case when Anonymous hacker group took down Paypal  and Mastercard websites some time back. In case there are no "volunteers" involved, hackers use a networks of zombies called botnets to perform the same attack. These zombies are basically normal home computers which have been hacked and infected with the DoS tool. The controller is able to issue remote commands to these "bots" so that they can start attacking a particular website without the owners even noticing. 
Hackers and hactivists perform denial of service attacks by using an array of readymade tools. one such tools is called the Low Orbit Ion Cannon(LOIC). It is a simple GUI tool and volunteers can use it to launch attacks once they receive the green light from the controllers, usually via IRC or social networks. There are many other DoS tools such as HOIC,Hulk Web server, RUDY (R-U-Dead-Yet), Silent  DDoSer etc.

This disruption in service is one of the biggest challenges for companies today. There is no fool proof method to protect against DDoS attacks.  There are many ongoing research on how to mitigate DDoS attacks. As of now, big companies rely on IDS and firewalls and the cooperation of the ISPs to mitigate such attacks.

Would you like to know how to perform a denial of service yourself? Read my other article on  #how to perform DoS attack here.