Get Mystery Box with random crypto!

BRōkéñ Hacker

Logo of telegram channel broken_hacker — BRōkéñ Hacker B
Logo of telegram channel broken_hacker — BRōkéñ Hacker
Channel address: @broken_hacker
Categories: Technologies
Language: English
Subscribers: 2.13K
Description from channel

Learn all your hacking here. Best hackers in the world we train professionals and beginners
Use our bot to contact administrator to learn new tricks and any hacking you want to know contact us through our bot @hackersworld2_bot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages 6

2021-12-30 20:19:16 Tomorrow Topic

How to Hack a Web Server

On @Broken_Hacker
122 views17:19
Open / Comment
2021-12-30 20:07:01 t.me/Broken_Hacker

Learn Best Hacking Here In this Channel you Learn video practice and Theory Tips And Tricks. Also Learn Carding.

If you Life your channel than please share in your groups and whatsapp group with your friends and family.

Contact here for any questions @hackersworld2_bot

Stay tuned and don't forget to share this channel
115 viewsedited  17:07
Open / Comment
2021-12-30 19:52:18 Summary

A denial of service attack’s intent is to deny legitimate users access to a resource such as a network, server etc.

There are two types of attacks, denial of service and distributed denial of service.

A denial of service attack can be carried out using SYN Flooding, Ping of Death, Teardrop, Smurf or buffer overflow

Security patches for operating systems, router configuration, firewalls and intrusion detection systems can be used to protect against denial of service attacks.

@Broken_Hacker
59 views16:52
Open / Comment
2021-12-30 19:52:18
@Broken_Hacker
55 views16:52
Open / Comment
2021-12-30 19:51:56 Enter the target IP address, in this example; we have used the target IP we used in the above example.
HERE,

0 as the number of packets means infinity. You can set it to the desired number if you do not want to send, infinity data packets

The size field specifies the data bytes to be sent and the delay specifies the time interval in milliseconds.

Click on send button
You should be able to see the following results

@Broken_Hacker
55 views16:51
Open / Comment
2021-12-30 19:51:56
@Broken_Hacker
50 views16:51
Open / Comment
2021-12-30 19:51:41 Hacking Activity: Launch a DOS attack

In this practical scenario, we are going to use Nemesy to generate data packets and flood the target computer, router or server.
As stated above, Nemesy will be detected as an illegal program by your anti-virus. You will have to disable the anti-virus for this exercise.

Download Nemesy from http://packetstormsecurity.com/files/25599/nemesy13.zip.html

Unzip it and run the program Nemesy.exe

You will get the following interface

@Broken_Hacker
50 views16:51
Open / Comment
2021-12-30 19:50:12 the attack is successful, you should be able to see increased network activities.
49 views16:50
Open / Comment