How to Perform a Denial of Service Attack

Before I even get started on this Denial of Service attack tutorial..


By reading this you agree that you are responsible for your own actions. This software is designed specifically for penetration testing on your own servers. Not anyone else’s. This is for educational and professional purposes only. By reading the below contents, and using this software you now claim responsibility for all actions performed using it.

What is a Denial of Service attack?

Now that we have this out of the way. Firstly you will need to know how a Denial of Service attack works. DoS attacks work by flooding the IP address of your server to stop other users, or real traffic from getting there. For example, if there are a bunch of people in a line trying to use a service or purchase a product at your local store it will take very long to get to the front of the line. Now add about 200 people to that line per second, and nobody will ever get to the front of the line. DoS attacks work in the same way. Except instead of people being in that line, it would be communication packets. If you DoS attack a website, nobody else will be able to load that website because there are 200 other people trying to load the same website per second. There are too many people (or packets) in the line for the server to process.

Are DDoSing and DoSing attacks the same thing?

Keep in mind that DDoS and DoS are two separate things. DDoS stands for Distributed Denial of Service attack. DoS stands for Denial of Service attack. The difference is that one is distributed, and the other is not. With a DoS attack, it would be one single user flooding an IP address with packets. With a DDoS attack, it would simply be the same thing but with multiple people doing it simultaneously. So with this tool, you are not performing a DDoS attack, but instead a DoS attack. If you would like to perform a DDoS attack, you will need multiple computers on multiple networks performing this attack at the same time. Otherwise you will overload your own network by sending too many packets out at once.

How can I perform a Denial of Service attack?

So now that you know the difference between a DDoS and a DoS attack, we can get started. First you will want to download the DoSer tool. Once you have the DoSing tool downloaded, you will want to launch it. It will look something like this.

Denial of Service - Enter IP Address
This is what it will look like when you launch it. You will enter your server IP address here.

Now that you have it open, you will need an IP address to test it on. Get the IP address of your server, and now you can use this as your target IP address in the DoSing tool, and hit the enter key. Once you’ve entered your IP address it will ask you for a port to attack on. You can usually use port 80 because it is always open by default. But if you need to check for sure if it is open using the Open Port Checker or CanYouSeeMe if you are hosting the server locally.

Denial of Service - Check for open ports
Use the Open Port Checker tool to find open ports on your network.


Denial of Service - Choose your port
Enter your open port in the DoSer tool to flood it.

Once you’ve found your port, enter it in the DoSer tool and hit the enter key and it will launch the attack. You can now see how many packets it has sent so far.

Denial of Service attack in progress
Denial of Service attack in progress.

Now you will want to analyze the traffic information on your server using your resource manager. You can observe your network usage skyrocketing as more users are using the tool simultaneously. Use this information and research DDoS protection to keep your servers up and running. When you are finished analyzing the information, press the X in the top right corner of the DoSer tool to stop the attack.

That’s about it. You can now say you know how to launch a Denial of Service attack.

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑