Disclaimer: the following content is meant for information purpose only and disfavor any kind of Hacking.
In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.
There are mainly two types of Dos attack:
- single host DOS
- distributed DOS
there are different mechanisms used to serve the purpose, but the prominent ones are:
- Ping of death
- Buffer Overflow
- SYN attack
ping of death:
The ping command is usually used to test the availability of a network resource. It works by sending small data packets to the network resource. The ping of death takes advantage of this and sends data packets above the maximum limit (65,536 bytes) that TCP/IP allows.
If the person or network which you want to take down is of small scale then the following command can serve the purpose through smd,
*google can not be take down through this ping command, we are taking it as example to understand
Ping google.com -t
if the network is of large scale then the amount of memory bandwidth can be increased by some extent or use the infinity factor as well,
Ping google.com -l 150 -t