DoS or DDoS ADSL Modem/Router [Published]

DfgDfg Admin
edited May 2011 in Tech & Games
This is pretty simple and you just need a command prompt and the handy ping tool. This is the standard procedure to just DoS some website. But when it comes to routers and modems they can easily be overpowered by a single user. Now, obviously you don't want to DoS yourself that would be idiotic but it's handy method to ruin someone else Internet experience.

If you're using ADSL and you get a WAN IP address like abc.dfg.lol.mnf [123.147.125.144 etc ] then you can just change the mnf numbers and target the users on the ISP.

Basically we're going to DoS some modems and routers which are using the same ISP. Since it's hard to DoS a system it's fairly easy to DoS a simple modem. My ISP sucks when it comes to planning and the Internet I get is shitty. During this guide I got disconnected 10 times and I got bored so I DoS'ed my modem just for the fuck of it.

To test this:

type ping routerip -t -l 65500

ping 192.168.3.1 -t -l 65500 <-- that

You will get a TTL response < 38ms or more.

If you just ping the router/modem you will get <1ms if you're directly connected.

Just open as many command prompts as you like or can and just start entering that simple line and hit enter. Pretty soon you will see the TTL response increase from 38ms to 160+ and 180ms. My router crashed when it reached 190ms and I only opened like 25 windows.

So, in short if you want to fuck someone randomly.
A) login to your router.
B) Get the IP of default gateway and your IP.
C) Move the numbers up and down or use a scanner to check for port 80. Once you find some good targets then check those routers by opening the Admin page. If it's modem/router then.
D) Use the ping and have fun.

Granted this may or may not work on many systems but it overpower small modems and routers easily. The user will lose Internet connection and if the router recovers it will still get stalled in the end.

That scenario can easily be turned in DDoS. You can target modems and routers of offices by flooding them with bytes.


Anyway, I am off to sleep. Can somone test this on some different systems.

Comments

  • DfgDfg Admin
    edited December 2010
    Well, my system is quite decent but I bet if you try doing that in an underpowered PC you will get a bit held back. The point is this works under different conditions. I am using a China made router by ZTE it's not every highend and it can easily be overpowered. In short this will not work on powerful routers but if you DDoS it using muiltiple computers than it could work.
  • edited September 2014
    Since <a href="http://www.forskolinfreenow.com/forskolin-coleus">forskolinfreenow.com forskolin coleus</a> do you any good. <a href="http://www.forskolinfreenow.com/forskolin-flower">top forskolin flower</a> Soda is packed <a href="http://www.forskolinfreenow.com/coleus-forskohlii-bodybuilding">best coleus forskohlii bodybuilding</a> foods are getting of this component increase the heartbeat. <a href="http://www.forskolinfreenow.com/forskolin-fat-loss-reviews">forskolin fat loss reviews from forskolinfreenow.com</a> Take what <a href="http://www.forskolinfreenow.com/forskolin-fat">forskolinfreenow.com forskolin fat</a> for their yo <a href="http://www.forskolinfreenow.com/solaray-forskolin">best solaray forskolin</a> way that the entire body will not <a href="http://www.forskolinfreenow.com/forskolin-and-7-keto">forskolin and 7 keto forskolinfreenow.com</a> 24 hours of purchase. <a href="http://www.forskolinfreenow.com/forskolin-tea">forskolinfreenow.com forskolin tea</a> as the perfect for surgery it's just worth giving it a try <a href="http://www.forskolinfreenow.com/primaforce-forskolin">top primaforce forskolin</a> assisted those who were overweight and who have been on a greater body fat die .
  • DfgDfg Admin
    edited April 2011
    Taken from: Network (in)Security
    CMS Status:
  • OutbackOutback Acolyte
    edited April 2011
    Something like LOIC should be better at this than just a ping.

    http://en.wikipedia.org/wiki/LOIC
  • edited April 2011
    Outback wrote: »
    Something like LOIC should be better at this than just a ping.

    http://en.wikipedia.org/wiki/LOIC

    Isn't LOIC monitored or something now, after that LOIC shit went down on Wikileaks behalf?
  • -SpectraL-SpectraL Will Faggert
    edited May 2011
    Doing it the way Dfg said will hardly make a dent in the target. I think he explained it that way just so the novice will understand the basic premise of the attack, in that if you tie up the resources on the victim('s) hardware/software, you effectively bog their machine down so that it can no longer operate normally (if at all).

    Here's how a very easy way to create an effective denial of service situation using the distributed denial of service method:

    1. Download a high speed port scanner (these are much more powerful than a standard port scanner). There are many free multithread-capable port scanners on the web ie: http://www.radmin.com/products/previousversions/portscanner.php The faster your machine is the faster you can scan. If it can scan 2000 ports/second, then it's half-decent.

    2. Scan address ranges in high speed service providers such as in Rogers, Time Warner, Roadrunner, looking for port 27374 and 1243. These ports are either honey pots for SubSeven or real backdoor ports for SubSeven.

    3. Compile an orderly list of individual IP addresses which appear to have these ports open. There may be as many as a few hundred, depending on how many IP ranges were scanned.

    4. Next, using the author master password [14438136782715101980] for Subseven on port 27374 and master password [pizda] for Subseven on port 1243, try each one individually using Telnet to see if it's just a honey pot or the real backdoor. The honey pots will respond through Telnet with a bogus welcome message, whereas the real one will not give the standard welcome message > "welcome to Sub7... standing by..." if the login attempt is coming in through Telnet or by any means other than the geuine Subseven client. Make a second list to keep the IP addresses of the real Subseven backdoors.

    5. Now, after downloading the SubSeven 2.1.1 Gold client (it should still work on XP, even if the site says it won't) from any one of numerous download sites ie: http://www.hackpr.net/~sub7/downloads.shtml, use the client to log into each IP on the list using the respective master password for the respective port, just testing to see which ones allow unobstructed root access (95% will, or you wouldn't have seen their IPs in the port scan lists). Create a third list which has just the IPs of the machines which are wide open and willing. This list could literally have over a hundred IP addresses on it easy. Each of these machines are fully compromised, and will allow full and complete root access to their systems, just as if they were being operated by the actual owner. They will all be high speed boxes as well.

    6. Now comes the fun part. Logging into each mule one at a time using the client, go into "Connection" > "IP Scanner", then start scanning more broadband IP ranges through each mule (Sub7's built-in port scanner is also high speed), copy/pasta the IP results from each mule into a text document periodically, always searching for ports 27374 and 1243. You can have a hundred mules all scanning IP ranges at once, and this can generate thousands of possible backdoor IP addresses out there. Verify each hit manually for verification, just as before, using Telnet.

    7. Once several hundred highspeed backdoors are located and verified as genuine, the network resources of each mule can then be directed in concert at the exposed/open port of a single target. The best way to accomplish this is by:

    a/ use the Subseven client to log into each mule one at a time
    b/ in the client go into "Advanced"> "App Redirect" (Lets you run an MS-DOS command on the remote machine and pipes the output back to you)
    c/ using ftp.exe through the mule machine's MS-Dos, download a MS-Dos-based high speed packet flooder to the mule machine, and direct it by command-line at the prime target machine's IP address (the mule will not see either the packet flooder or its output, as Sub7 automatically makes things invisible for you server-side). Repeat for all mule machines, and have them all direct floods at the open port of the same IP address.

    Using this method, any machine, no matter how powerful it is, will be brought to its knees in short order.

    screenshots of the Subseven client:
    scan.gif
    mainclientpasswords1.gif
    mainclientpasswords.gif
    180884_134213199978517_115589605174210_231177_4306385_n.jpg
    sub28.gif

    Keep in mind, too, Subseven is only one of several dozen backdoors which are still out there by the millions, so this technique can work just as well on any one of them using the author master password. The point of this attack is to get as many machines under control as possible and direct them all at a single IP target's open port, so it doesn't matter how they get gotten. Every backdoor out there has its own default assigned port to scan for.

    Enjoy...
  • DfgDfg Admin
    edited May 2011
    ^Thanks Spectral for contributing. When we're dealing with a router with Firewall enabled or just even NAT enabled you won't see ports unless they're forwared. Hence, the only easy way is to just take router down and open ports.
  • edited May 2011
    Fuck Spectral, that's the stuff I'm talking about! Awesome post :D
  • -SpectraL-SpectraL Will Faggert
    edited May 2011
    There's still a billion people out there with just a modem, and there's still a billion people out there with backdoors wide open on their harddrives; it's just a matter of patience and the skill in knowing where to find them. Often, if one machine is infected, there's a very good chance there are other machines closeby which are also infected. I've noticed this in scanning IP ranges. All of a sudden you'll hit a huge patch of backdoors sitting right there ready to go. It's just a matter of getting lucky. NetBus, Sub7, Back Orifice, Beast, NetDevil.. etc... all these backdoors are still sitting out there by the millions, it's just a matter of locating them. Once you've located them, it's simply a matter of hacking the server, taking control of it, and using it for various purposes.
Sign In or Register to comment.