How to Perform a DDoS Attack Using Torshammer

Man

Professional
Messages
3,087
Reaction score
627
Points
113
In this article, we will show you how to use torshammer to perform a DDoS attack on a target website.

Hello everyone, dear friends!
In this article, we will show you how to use torshammer to perform a DDoS attack on a target website.

To begin with, it would not be superfluous to remind you that uncoordinated DDoS attacks on websites are a criminal offense, prohibited by law all over the world . Therefore, following this guide, you do everything at your own risk.
Well, now we can begin!

Introduction​

DoS (Denial of Service), also called a denial of service attack, is the predecessor of DDoS .

A denial of service attack sends multiple legitimate requests in an attempt to overload the resources of a target server, causing the server to be unable to respond to requests.

DDoS (Distributed Denial of Service) attackers use multiple hosts to simultaneously attack a target server and use a decentralized denial of service approach.

This makes the target server unable to handle a large volume of requests even when using network security technologies.

Based on the general attack strategy, the following types of distributed denial of service can be distinguished:
  • Bandwidth exhaustion: Whether it is a server or a network device, its bandwidth has a set maximum. This is known as “bandwidth exhaustion.” Network congestion actually occurs when the set bandwidth is used up, making the device unable to send more network packets.
  • Resource exhaustion: A certain amount of operating system resources, both software and hardware, such as connection tables, processor, and RAM, are required for the normal operation of an Internet service. If the resource is exhausted, the system is unable to manage additional normal network connections.
  • Application resource exhaustion: In order for an application to function properly, it usually needs to communicate with other systems or resources. Legitimate requests will also be slowed down or stopped entirely if the application is busy processing bogus requests from DDoS attackers.

A little about the Torshammer tool​

Tor's Hammer is a Python-based post-dos testing tool.

Torhammer uses the Tor network to anonymize the attack and avoid detection.

Using the Tor network to anonymize attacks makes it an ideal tool to use when the target site has rules that ban IP addresses that send large amounts of traffic.

When using the Tor network for DDOS attacks, Torhammer assumes that you are simply using Tor on 127.0.0.1:9050.

The tool kills almost all unprotected Apache and IIS web servers with a single entity.

Installing the Torshammer tool​

Since Torhammer is python based, it is cross-platform.
  • To install it, we need to install Tor on our system for use with Torshammer:
Code:
sudo apt-get install tor

Now we can use Torhammer with Tor.
  • The next step is to download the tool from its official GitHub repository:
Code:
git clone https://github.com/dotfighter/torshammer.git
  • After the download is complete, go to the newly created folder:
Code:
cd torshammer

This folder contains three files that make up the Torhammer tool.
  • socks.py
  • terminal.py
  • torshammer.py

To launch a DDoS attack we will use the torshammer.py file.

Using the Torshammer tool to launch a DDoS attack, we can specify the details of the target and even choose whether to use Tor or not.

These flags include:
  • -t – – sets the target to <Hostname|IP>
  • -r – – sets the number of threads <Number of threads> Default 256
  • -p – – sets the port <Web server port> Default 80
  • -T – -tor Enables anonymization via tor on 127.0.0.1:9050
  • -h – -help Shows this help

Launching a DDoS attack on a target website on localhost​

We already have a running DVWA stand, which we will be carrying out a DDoS attack on within the framework of this article.
  • To completely disable the site, we will go to the Torshammer folder and run the following command:
Code:
python torshammer.py -t 127.0.0.1 -p 80 -r 50000
  • After a while, if you try to load the DVWA web page in your browser, it will get stuck loading!

If you want to use the Tor network, be sure to add a feature when performing an attack -Tthat provides security and also provides a new identity in case the target site is programmed to ban IP addresses that keep the connection open for a certain amount of time.

Conclusion​

As shown in the above tutorial, we can launch a DDoS attack on a target from our computer.

The target website was taken down just seconds after the Torshammer tool was launched.

In a DDoS attack, a hacker slows down the normal operation of a target website by sending many random packets to the web server.

That's all. Use this tool wisely!
 
Top