Which of the following DDoS utilizes the flaws of system to perform an attack? code example

Example: ddos

A DDoS stands for "Distributed Denial of Service" attack which is basically
just sending so many requests to a server/website/network that it dies.

Or, in other words: it's the equivalent of 15 elementary kids bullying
one kid all screaming "AAAAAAAAAAAAA" until the bullied kid cries.

It's an illegal practice which can land you up to 10 years in prison
and/or you'd have to pay 500,000$ for damages (that's more than my mortgage).

It is extremely underestimated, as it can even destroy digital infrastructure
including databases, servers, computers, etc... Anything that can
get the DDoS requests.

There are multiple ways of doing a DDoS attack, the most popular one being
just sending as many pings to the victim as possible, called a "ping of death"
attack.

BAT code for example of a "ping of death" attack (works on windows only):

:loop

ping -t -l 50 google.com

goto loop

// 50 being the amount of bytes and google.com being the bucket for the IP address. -t to say we do it until
// the servers are down and -l to point out the size of the packets (in bytes).

Remember I am not responsible for any use of this knowledge, of this BAT code,
and any illegal and legal uses and I actively discourage you to DDoS anyone
without their consent (I doubt they'll give you it lol).

This is for educational purposes only.

Tags:

Misc Example