{"id":2167,"date":"2021-11-13T15:27:10","date_gmt":"2021-11-13T15:27:10","guid":{"rendered":"https:\/\/news4hacker.com\/?p=283"},"modified":"2023-04-19T12:58:30","modified_gmt":"2023-04-19T12:58:30","slug":"how-to-do-a-denial-of-service-attack-2021-news4hacker","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-do-a-denial-of-service-attack-2021-news4hacker\/","title":{"rendered":"How to do a Denial-of-service attack | Recon Cyber Security"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em>Hello everyone do you know how to do a <strong>Denial-of-Service attack (Dos attack)<\/strong>. If you don&#8217;t know what a dos attack is so it is used to take down any website. In simple words, if you run this tool on a website it will slow down the website and in a few minutes the website will be crashed and then it will not open for a while. So let&#8217;s start!<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>TOOL DOWNLOADING<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2981 So 1st go on your <em>favorite<\/em> browser and search <strong>&#8220;Xerxes download&#8221;<\/strong> you can see a website link from Github just click on this and copy the code from here. You can directly go by clicking on this link\u2026 <\/p>\n\n\n\n<p>-&gt; (<a href=\"https:\/\/github.com\/XCHADXFAQ77X\/XERXES\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/XCHADXFAQ77X\/XERXES<\/a>)<\/p>\n\n\n\n<p>\u2981 Now open your terminal and clone this so type <strong>(git clone &lt;your code&gt;)<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/11\/Screenshot_20211123_193456-1024x579.png\" alt=\"\" class=\"wp-image-346\"\/><\/figure>\n\n\n\n<p><strong>Note: Before cloning choose your destination where you have to save this\u2026<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>PERFORMING ATTACK<\/strong><\/p>\n\n\n\n<p><strong>Step1.<\/strong> After cloning type <strong>cd XERXES\/<\/strong><\/p>\n\n\n\n<p><br><strong>Step2.<\/strong> Now type <strong>&#8221; ls &#8220;<\/strong> you can see your file does not have permission to start so for giving permission type &#8211; <\/p>\n\n\n\n<p><strong>( sudo gcc -o xerxes xerxes.c )<\/strong> <\/p>\n\n\n\n<p><em>&#8211; Maybe, now you are thinking that in the terminal we use chmod 777 commands for giving permission to any file then why we are using this code. So the tool which we are using is written in C language so we have to compile this before using it we hope you understand : )\u2026<\/em><\/p>\n\n\n\n<p><br><strong>Step3.<\/strong> After that type ( sudo .\/xerxes and your target website domain and port number of the service which use here )<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/11\/Screenshot_20211123_194458-1-1024x579.png\" alt=\"\" class=\"wp-image-348\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Hello everyone do you know how to do a Denial-of-Service attack (Dos attack). If you don&#8217;t know what&hellip;\n","protected":false},"author":1,"featured_media":10929,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10],"tags":[49,50,51,52,53,54],"class_list":{"0":"post-2167","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"tag-ddos-attack","9":"tag-denial-of-service","10":"tag-dos-attack","11":"tag-how-to-ddos","12":"tag-how-to-do-ddos-attack","13":"tag-how-to-do-denial-of-service-attack"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/2167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=2167"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/2167\/revisions"}],"predecessor-version":[{"id":10930,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/2167\/revisions\/10930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10929"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=2167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=2167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=2167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}