You’ve just arrived home after a long work day, so long in fact that night has already set in. You wander a bit through the darkness, turn on the lights, grab two slices of bread, and put them into that old, creaking toaster. It’s nothing fancy, just a quick and dirty snack until you undress, unwind and cook a proper dish.

The moment you push down on the button to toast the bread, you hear a loud pop, and all of the lights suddenly go out.

“Damn, the fuse blew up.”

Because the toaster was faulty, it flooded the electrical installation with excessive current it wasn’t designed to handle. This blew up the fuse, and shut down the installation.

A nearly identical process takes place in DDoS attacks. Replace “electrical current” with “information”, and “installation” with the term “information processor”, and you’ve already understood the basic principle.

What does DDoS stand for?

A DDoS attack is short for “Distributed Denial of Service”, and is the bigger brother of simpler denial-of-service attacks.

The point of these exercises is to take down a website or service, typically by flooding it with more information than the victim website can process.

DoS attacks typically send information from only one source (think PC’s, or other internet-connected devices), but a DDoS attack uses thousands, or hundreds of thousands, of sources to flood its target. This makes it a few orders of magnitude more powerful than its smaller sibling.

Measuring the strength of a DDoS

According to this study, 82% of attacks last less than 4 hours. In terms of bandwidth volume, 34% clock in at between 100 MB’s to 1 GB’s, and only 5.3% exceed the 10 GB/s mark.

A 1 GB/s denial-of-service attack is strong enough to take down most of the websites out there, since their data hosting simply doesn’t offer enough bandwidth to keep the site online.

One of the biggest ever recorded was the Mirai botnet attack in Autumn 2016, coming at over 1 terabytes per second. It overwhelmed the Dyn DNS provider, and then the effect cascaded, temporarily taking down major websites such as Reddit or Twitter.

Nowadays, even beginner hackers who can’t even code to save their life (called script kiddies) have access to big and powerful botnets-for-hire that can flood a target with 100 GB/s. This type threat isn’t going away, quite the contrary. Quite the contrary, it will only become powerful and widely accessible than before.

Why would anybody do this?

Compared to other kinds of cyber attacks, DDoS attacks are messy, overly destructive, and very difficult to pull off. Because of this, they don’t make much sense from a financial perspective.

So cybercriminals might use them as a blunt weapon against some of their competitors. For instance, they might want to bring down a site hosting a cybersecurity tool, or bring down a small online shop operating in the same niche.

In other cases, malicious hackers use them as a form of extortion, where the victim has to pay a fee in order for the denial of service to stop.

Also, a DDoS attack can act as a smokescreen, hiding the real endgame, such as infecting the target with malware or extracting sensitive data.

And in what constitutes a frequent scenario, the attacker might not even have a motive. Instead, he just does it for the “giggles”, seeking to test his abilities or just to cause mayhem.

Heimdal™ Threat Prevention Home makes sure that link is safe!
Your parents and friends will click any suspicious link, so make sure they're protected.
Heimdal™ Threat Prevention Home anti malware and ransomware protection
Heimdal™ Threat Prevention Home provides: Automatic and silent software updates Smart protection against malware Compatibility with any traditional antivirus.


Try it FREE

30-day Free Trial

How to DDoS someone, cybercriminal style

There’s more than one way of carrying out a denial-of-service attack. Some methods are easier to execute than others, but not as powerful. Other times, the attacker might want to go the extra mile, to really be sure the victim gets the message, so he can hire a dedicated botnet to carry out the attack..


A botnet is a collection of computers or other Internet-connected devices that have been infected with malware, and now respond to the orders and commands of a central computer, called the Command and Control center.

The big botnets have a web of millions of devices, and most of the owners have no clue their devices are compromised.

Usually, botnets are used for a wide variety of illegal activities, such as pushing out spam emails, phishing or cryptocurrency mining.

Some, however, are available to rent for the highest bidder, who can use them in whatever way seems fit. Oftentimes, this means a DDoS attack.

How botnets work

DDoS programs and tools

Small scale hackers who don’t have access to botnets, have to rely on their own computers. This means using specialized tools, that can direct Internet traffic to a certain target.

Of course, the amount of traffic an individual computer can send is small, but crowdsource a few hundreds or thousands of users, and things suddenly grow in scope.

This particular tactic has been successfully employed by Anonymous. In short, they send a call to their followers, asking them to download a particular tool, and be active on messaging boards, such as IRC, at a particular time. They then simultaneously attack the target website or service, bringing it down.

Here’s a sample list of tools that malicious hackers use to carry out denial of service attacks:

  • Low Orbit Ion Cannon, shortened to LOIC.
  • XOIC.
  • HULK (HTTP Unbearable Load King).
  • DDOSIM – Layer 7 DDoS Simulator
  • R-U-Dead-Yet.
  • Tor’s Hammer.


How to DDoS an IP using cmd

One of the most basic and rudimentary denial-of-service methods is called the “ping of death”, and uses the Command Prompt to flood an Internet Protocol address with data packets.

Because of its small scale and basic nature, ping of death attacks usually work best against smaller targets. For instance, the attacker can target:

a)    A single computer. However, in order for this to be successful, the malicious hacker must first find out the IP address of the device.

b)    A wireless router. Flooding the router with data packets will prevent it from sending out Internet traffic to all other devices connected to it. In effect, this cuts the Internet access of any device that used the router.

In order to launch a ping denial-of-service attack, the malicious hacker first needs to find out the IP of the victim’s computer or device. This is a relatively straightforward task, however.

A ping of death is small in scale, and fairly basic, so it’s mostly efficient against particular devices. However, if multiple computers come together, it’s possible for a handful of these to bring down a smallish website without the proper infrastructure to deal with this threat.

Using Google Spreadsheet to send countless requests

An attacker can use Google Spreadsheets to continuously ask the victim’s website to provide an image or PDF stored in the cache. Using a script, he will create a neverending loop, where the Google Spreadsheet constantly asks the website to fetch the image.

This huge amount of requests overwhelms the site and blocks it from sending outward traffic to visitors.

Unlike other denial-of-service tactics, this one doesn’t send large information packages to flood the website, but instead, it makes data requests, which are much, much smaller.

In other words, the attacker doesn’t need to rely on sizeable botnet or thousands of other users to achieve a similar effect.

Teardrop attacks

In most cases, the information transmitted between a client device and the server is too big to be sent in one piece. Because of this, the data is broken into smaller packets, and then reassembled again once it reaches the server.

The server knows the order of reassembly through a parameter called “offset”. Think of it as instructions to building a LEGO toy.

What a teardrop attack does, is to send data packets at the server that make no sense, and have overlapping or dysfunctional offset parameters. The server tries, and fails, to order the data according to the malicious offset parameters. This quickly consumes available resources until it grinds to a halt, taking down the website with it.

Amplifying a DDoS attack

To maximize every data byte, malicious hackers will sometimes amplify the flood by using a DNS reflection attack.

This is a multiple-step process:

  1. The attacker will assume the identity of the victim by forging its IP address.
  2. Using the forged identity, he will then send out countless DNS queries to an open DNS resolver.
  3. The DNS resolver processes each query, and then sends the information back to victim device who had its identity stolen. However, the information packets the DNS resolver sends out are much bigger than the queries it receives.

What happens during amplification is that every 1 byte of information becomes 30 or 40 bytes, sometimes even more. Amplify this further using a botnet with a few thousand computers, and you can end up sending 100 gygabytes of traffic towards a site.

The types of DDoS attacks

Denial-of-Service attacks fall in two broad categories, depending on their main attack vector:

  • Application Layer.
  • Network Layer.

Network Layer attacks

A network layer attack works by flooding the infrastructure used to host a website with vast amounts of data.

Many providers nowadays claim they offer “unmetered” bandwidth, meaning you should theoretically never have to worry about excessive amounts of traffic taking down your site. However, this “unmetered” bandwidth comes with strings attached.

To put things into perspective, a website with some 15,000 monthly pageviews and hundreds of pages requires around 50 gigabytes of monthly bandwidth to operate optimally. Keep in mind that this traffic is widely dispersed over the course of an entire month. A site like this has no chance to stay online if a DDoS attack rams it with 30 or 40 gigs of traffic in a one-hour period.

As a self-defense measure, the hosting provider itself will simply cut off hosting you while the traffic normalizes. Although this might seem cold, this prevents spill-over effects that might affect other clients of the hosting provider.

Network layer attacks themselves come in multiple shapes and sizes. Here are a few of the more frequent ones:

  • SYN Attacks. SYN is a shorthand for “synchronize”, and is a message that a client (such as a PC) sends to the server for the two to be in sync.
  • DNS reflecting.
  • UDP amplification attacks.

An upside to this kind of attack, if you can call it that, is that the huge amounts of traffic involved make it easier for victims to figure out what kind of denial of service they’re facing.

Application layer attack

Application layer attacks are much more surgical in nature compared to network ones. These work by targeting certain programs or software that a website uses in its day-to-day functioning.

For instance, an application layer attack will target a site’s WordPress installation, PHP scripts or database communication.

This type of software can’t handle anywhere near the load of wider network infrastructure, so even a comparatively small DDoS of a few megabytes per second can take it down.

The typical application layer DDoS is the HTTP flood. This works by abusing one of two commands, POST or GET. The GET command is a simple one that recovers static content, like the web page itself or an image on it.

The POST command is more resource-intensive, since it triggers complex background processes with a greater impact on server performance.

An HTTP flood will generate a huge amount of internal server requests that the application cannot handle, so it then flops and takes down the entire site with it.

How do you detect a DDoS attack?

Analyze the traffic, is it a usage spike or an attack?

Traffic spikes are a frequent occurrence, and can actually be big enough to take down poorly prepared websites. A site designed to cope with an average of 30-40 concurrent users will come under strain if a spike brings up the number to 600-700 users at the same time.

The first sign of a DDoS attack is a strong slowdown in server performance or an outright crash. 503 “Service Unavailable” errors should start around this time. Even if the server doesn’t crash and clings on to dear life, critical processes that used to take seconds to complete now take minutes.


Wireshark is a great tool to help you figure out if what you’re going through is a DDoS. Among its many features, it monitors what IP addresses connect to your PC or server, and also how many packets it sends.

Of course, if the attacker uses a VPN or a botnet, you’ll see a whole bunch of IPs, instead of a single one. Here’s a more in-depth rundown on how to use Wireshark to figure out if you’re on the wrong end of a denial-of-service.

Microsoft Windows also comes with a native tool called Netstat, which shows you what devices are connecting to your server, and other similar statistics.

To open the tool, write cmd in the Start menu search bar, and then type in netstat –an. This will take you to a screen showing your own internal IP in the left-hand column, while the right-hand column holds all of the external IPs connected to your device.

cmd nestat ddos

The screenshot above is for a normal connection. In it, you can see a few other IPs that communicate normally with the device.

Now, here’s how a DDoS attack would look like:


On the right hand side, you can see that a single external IP repeatedly tries to connect to your own device. While not always indicative of a DDoS, this is a sign that something fishy is going, and warrants further investigation.


DDoS attacks will only get more frequent as time passes and script kiddies get access to ever more sophisticated and cheap attack methods. Fortunately, denial-of-service attacks are short-lived affairs, and tend to have a short-term impact. Of course, this isn’t always the case, so it’s best to be prepared for the worst-case scenario.

The easy way to protect yourself against malware
Here's 1 month of Heimdal™ Threat Prevention Home, on the house!
Heimdal™ Threat Prevention Home
Use it to: Block malicious websites and servers from infecting your PC Auto-update your software and close security gaps Keep your financial and other confidential details safe


Download Free Trial


What Is a Smurf Attack, How Does It Work and How to Prevent It

DDoS Attack. How Distributed Denial of Service Works and How to Prevent It

What Is a Botnet & How to Prevent Your PC From Being Enslaved

How Every Cyber Attack Works – A Full List

How to back up your computer – the best advice in one place


Hey,dear website admins.This information is wrong.You can’t do any hack with cmd.Maybe a mini DoS attack.It’s not DDoS.

ha loll just ddos somone


This is informative, thanks for sharing this.

DDoS, DoS, Extortion etc.. is all part of cyber secuirty…

As with any new technology, it helps to read the manual. Williams says CSPs will need to research the security capabilities of 5G equipment and decide how to make the most of them. “There are a lot of security protections available, but they’re not always automatically enabled,” she says. “It’s often a case of turning the right options on, rather than presuming the system is secure by default.” Williams advises CSPs to take an outside-in approach when designing network defenses. “Don’t just consider hackers as a single entity, because they’re not” she says. “Look at the threat modeling side of things. Ask yourself why a hacker might target your organization, and what they have in terms of capability. Then, what’s the best way to prevent those attacks from taking place?”

I appreciate, cause I found exactly what I was looking for. You have ended my 4 day long hunt! God Bless you man. Have a great day. Bye


Interesting article. It was rather unexpected to read such an opinion. Well, seriously, who else would look at the DDoS attack problem from that perspective? It would also be interesting to know how you can track such an attack. Thanks.

Thanks alot. It’s so complete and comprehensive.

There are some fascinating closing dates in this article however I don抰 know if I see all of them heart to heart. There may be some validity however I will take maintain opinion until I look into it further. Good article , thanks and we want more! Added to FeedBurner as well

stock trading course on October 26, 2019 at 2:03 am

There is noticeably a bundle to realize about this. I think you made various nice points in features also.

What are the sites that we can perform dos attach only for education purpose.leagally

IP stressing, just look for stressers in search engine or downloads

woaw, ro guy, noice

Hi, constantly i used to check web site posts here in the early hours in the break of day, for the reason that i
love to gain knowledge of more and more.

Wait if this is a cybersecurity website, why does it teach you how to DDoS? 😮

So that we know what we’re up against and can defend ourselves against one.

That and penetration testers can utilise it as well.

Just like how the YouTuber NetworkChuck taught me how to phish.

Leave a Reply

Your email address will not be published. Required fields are marked *