Attack Project Presentation:
Bloggingtheboys.com
By John Intindolo
ISSC461
Instructor Christopher Weppler
(“Largest ddos attack,” 2012)
ORGANIZATION-
SB Nation:BloggingThe Boys
(“Blogging the boys”, 2014)
Why bloggingtheboys.com?
 Being a lifelong and diehard Philadelphia Eagles fan I have an
obvious hatred for the Dallas Cowboys. It is because of this
hatred I am choosing to attack the blog fan site “Blogging the
Boys” with a Denial-of-Service attack that will crash the site, and
thus shut up these lousy Cowboys fans... at least for a short
while.
Plan ofAction to Perform the Attack
 Hide Your IP Address- to protect your online identity
 Ping the Web Address- to find out the IP address of
the website
 Scan the IP Address- to see what ports are open
 Perform the Attack- use the RDos program to launch
the attack and exploit the open port
(“A healthy body”, 2013)
Denial-of-Service Attack
(“How to hack,” 2013)
What is a DoS Attack?
 A Denial-of-service attack which is commonly referred to as a
DoS attack is the attempt to defeat the availability (the “A” of the
CIA Triad) of a network (Pleeger, 2012, p. 602). Generally
speaking its used to interrupt or suspend services of a host
connected to the Internet for a temporary amount of time. It is an
attack that is sent by a single person or system.
Distributed Denial-of-ServiceAttack:
What is a DDoS Attack?
(Nelson, 2011)
 A Distributed Denial-of-Service attack or DDoS is a Denial-of-
Service attack that takes place in two steps. The first step is for
the attacker to plant a Trojan horse on the target machine and
repeat the process on many different computers. These machines
which are known as zombies are then told by the attacker to
launch the attack, and cause the interruption of the network
availability (Pleeger, 2012, p. 637).
DoS & DDoS Attack
Difference
DoS Attack
• One computer and one
Internet connection is used
to flood the server with
packets.
DDoS Attack
• Uses many computers and a
multitude of Internet
connections to flood the
server.
• Often uses a Trojan to gain
access to many computers
that are then turned into
zombies to perform the
attack when called upon by
the attacker.
Download IPHiding Tool:
IP HiderPro
(“Ip hider pro”, 2013)
Download a Port ScanningTool:
Nnmap’s Zenmap GUI
(“Nmap”, 2013)
Download the HackingTool:
rDoS
(“Mpgh: Multiplayer game”, 2013)
UsingCMD:
PingBloggingtheboys.com
UsingZenmapGUI:
Scan theIP address for Open Ports
UsingrDos to Perform theAttack
(“How to hack,” 2013)
The Network Has BeenCrashed
(“5 things you”, 2010)
References
• 5 things you can do to make your website crash free. (2010). Retrieved from
http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/
• A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from
http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/
• Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com
• Cyber sucks. (2013). Retrieved from
http://cybersucks.blogspot.com/2012_02_01_archive.html
• How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access
point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi-
performing-denial-service-dos-attack-wireless-access-point-0147988/
• Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
Referencescont’d.
• Largest ddos attack on record slowed the internet?. (2012). Retrieved from
http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the-
internet-94/
• Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57-
general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html
• Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from
http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/
• Nmap. (2013). Retrieved from http://nmap.org/
• Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability /
Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson
Publication

More Related Content

PPTX
"Introduction to Bug Hunting", Yasser Ali
PPSX
Отчет о работе школьного лагеря
PDF
Setup a technology sourcing cooperation
DOCX
Om0016 quality management
PDF
Researchonmusicvideos lo1
DOC
Ge cooley resume 1 29-2016
PDF
Raipur Sahitya Mahotsav Case Study and Report
DOCX
Mu0017 talent management and employee retention
"Introduction to Bug Hunting", Yasser Ali
Отчет о работе школьного лагеря
Setup a technology sourcing cooperation
Om0016 quality management
Researchonmusicvideos lo1
Ge cooley resume 1 29-2016
Raipur Sahitya Mahotsav Case Study and Report
Mu0017 talent management and employee retention

Viewers also liked (9)

PPTX
Las 7 maravillas del mundo.pps
PPTX
NEHF Happy, Healthy, at Home symposium 100117 Workshop 2 - West Hampshire e...
DOCX
Ib0011 international marketing
PDF
Vision
DOCX
armaduras mecanica estatica
PPTX
Lr4 kramarenko%201
PPTX
El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016
PDF
Work Term Report
Las 7 maravillas del mundo.pps
NEHF Happy, Healthy, at Home symposium 100117 Workshop 2 - West Hampshire e...
Ib0011 international marketing
Vision
armaduras mecanica estatica
Lr4 kramarenko%201
El repositorio LINDAT de CLARIN en LINHD _ ReTeLe 2016
Work Term Report
Ad

Similar to Attack_Project_Presentation_ISSC461_Intindolo (20)

PDF
The Principles of Modern Attacks Analysis for Penetration Tester
PPT
Denial of services : limiting the threat
PPTX
Attacks on the cyber world
DOCX
DNS spoofing/poisoning Attack Report (Word Document)
PDF
Ddos and mitigation methods.pptx
PPTX
Assingement on dos ddos
PPTX
CheckPoint: Anatomy of an evolving bot
PDF
DNS Rebinding Attack
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PPT
Dos threats and countermeasures
PPT
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
PPTX
Implementation Of real testbed of DDOS
PPTX
Ddos and mitigation methods.pptx (1)
PPTX
DoS or DDoS attack
PPT
DNS Security Threats and Solutions
PPTX
Dos attack
PDF
DDoS mitigation in the real world
PPTX
Network And Application Layer Attacks
PDF
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
The Principles of Modern Attacks Analysis for Penetration Tester
Denial of services : limiting the threat
Attacks on the cyber world
DNS spoofing/poisoning Attack Report (Word Document)
Ddos and mitigation methods.pptx
Assingement on dos ddos
CheckPoint: Anatomy of an evolving bot
DNS Rebinding Attack
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Dos threats and countermeasures
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Implementation Of real testbed of DDOS
Ddos and mitigation methods.pptx (1)
DoS or DDoS attack
DNS Security Threats and Solutions
Dos attack
DDoS mitigation in the real world
Network And Application Layer Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
Ad

More from John Intindolo (17)

PPTX
Power_Point_Presentation_ISSC458_Intindolo
DOCX
ISSC368_Final_Project Proposal_Wk8_Intindolo
DOCX
ISSC456_Final_J_Intindolo
PPTX
ISSC456_Project_Presentation_Intindolo
DOCX
Research_Paper_Final_ISSC431_Intindolo
DOCX
ISSC362_Research_Paper_Intindolo
DOC
Research_Paper_ISSC461_Intindolo
DOCX
ISSC471_Final_Project_Paper_John_Intindolo
PPT
Project_Paper_Presentation_ISSC471_Intindolo
DOCX
ISSC481_Term_Paper_John_Intindolo
DOCX
Project_Paper_ISSC455_Intindolo
PPTX
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
DOCX
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
DOC
ISSC422_Project_Paper_John_Intindolo
DOCX
ISSC490_Project_John_Intindolo
DOC
ISSC361_Project_John_Intindolo
PPTX
Project_Presentation_ISSC361_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC456_Final_J_Intindolo
ISSC456_Project_Presentation_Intindolo
Research_Paper_Final_ISSC431_Intindolo
ISSC362_Research_Paper_Intindolo
Research_Paper_ISSC461_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
ISSC481_Term_Paper_John_Intindolo
Project_Paper_ISSC455_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
ISSC422_Project_Paper_John_Intindolo
ISSC490_Project_John_Intindolo
ISSC361_Project_John_Intindolo
Project_Presentation_ISSC361_Intindolo

Attack_Project_Presentation_ISSC461_Intindolo

  • 1. Attack Project Presentation: Bloggingtheboys.com By John Intindolo ISSC461 Instructor Christopher Weppler (“Largest ddos attack,” 2012)
  • 2. ORGANIZATION- SB Nation:BloggingThe Boys (“Blogging the boys”, 2014) Why bloggingtheboys.com?  Being a lifelong and diehard Philadelphia Eagles fan I have an obvious hatred for the Dallas Cowboys. It is because of this hatred I am choosing to attack the blog fan site “Blogging the Boys” with a Denial-of-Service attack that will crash the site, and thus shut up these lousy Cowboys fans... at least for a short while.
  • 3. Plan ofAction to Perform the Attack  Hide Your IP Address- to protect your online identity  Ping the Web Address- to find out the IP address of the website  Scan the IP Address- to see what ports are open  Perform the Attack- use the RDos program to launch the attack and exploit the open port (“A healthy body”, 2013)
  • 4. Denial-of-Service Attack (“How to hack,” 2013) What is a DoS Attack?  A Denial-of-service attack which is commonly referred to as a DoS attack is the attempt to defeat the availability (the “A” of the CIA Triad) of a network (Pleeger, 2012, p. 602). Generally speaking its used to interrupt or suspend services of a host connected to the Internet for a temporary amount of time. It is an attack that is sent by a single person or system.
  • 5. Distributed Denial-of-ServiceAttack: What is a DDoS Attack? (Nelson, 2011)  A Distributed Denial-of-Service attack or DDoS is a Denial-of- Service attack that takes place in two steps. The first step is for the attacker to plant a Trojan horse on the target machine and repeat the process on many different computers. These machines which are known as zombies are then told by the attacker to launch the attack, and cause the interruption of the network availability (Pleeger, 2012, p. 637).
  • 6. DoS & DDoS Attack Difference DoS Attack • One computer and one Internet connection is used to flood the server with packets. DDoS Attack • Uses many computers and a multitude of Internet connections to flood the server. • Often uses a Trojan to gain access to many computers that are then turned into zombies to perform the attack when called upon by the attacker.
  • 7. Download IPHiding Tool: IP HiderPro (“Ip hider pro”, 2013)
  • 8. Download a Port ScanningTool: Nnmap’s Zenmap GUI (“Nmap”, 2013)
  • 9. Download the HackingTool: rDoS (“Mpgh: Multiplayer game”, 2013)
  • 12. UsingrDos to Perform theAttack (“How to hack,” 2013)
  • 13. The Network Has BeenCrashed (“5 things you”, 2010)
  • 14. References • 5 things you can do to make your website crash free. (2010). Retrieved from http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/ • A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/ • Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com • Cyber sucks. (2013). Retrieved from http://cybersucks.blogspot.com/2012_02_01_archive.html • How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi- performing-denial-service-dos-attack-wireless-access-point-0147988/ • Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
  • 15. Referencescont’d. • Largest ddos attack on record slowed the internet?. (2012). Retrieved from http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the- internet-94/ • Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57- general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html • Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/ • Nmap. (2013). Retrieved from http://nmap.org/ • Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson Publication

Editor's Notes

  • #2: I have decided to do my attack project presentation on an affiliate of SB Nation known as Blogging the Boys. It is a fan blog for the NFL Franchise the Dallas Cowboys.
  • #7: For the purpose of this attack a DoS will be used, but had the chosen target been a bigger website such as bank’s online website then a DDoS attack would be needed in order to interrupt the availability of the site.
  • #8: The first step is to download the IP hiding tool to protect your identity
  • #9: The next step is to download the port scanning tool Zenmap GUI from the Nmap website so that you can scan the IP address for open ports which creates a vulnerability to a DoS attack.
  • #10: The next step is to download the program rDoS so that you are able to carry out the attack and crash the website.
  • #11: Once you open the cmd type the following to get the IP address of the website: ping www.bloggingtheboys.com
  • #12: Using the IP address of www.bloggingtheboys.com discovered from pinging the website in cmd, it is now time to scan that IP address for open ports in Zenmap GUI. In the “target” window type in the IP address which is: 199.27.78.185 In the “Profile” drop down menu select “Intense scan, all TCP ports” to reveal all TCP ports that are open and click the “scan” button After the scan has finished you will see three ports that are open and leave a vulnerability to an attack The open ports are: 554, 80, and 443 Port 80 will be used for this attack
  • #13: Enter the IP address of the website which is 199.27.78.185 Press the “Enter” button Enter “80” where it asks for port number Press the “Enter” button The rDos program will now perform a DoS that will crash the website “Blogging The Boys”
  • #14: The website “Blogging The Boys” has now been successfully crashed