The Melbourne Film Festival website was hacked in February July. hackers used the ping command to death.
Ping-l 65500-T IP
-L defines the data packet size;
-T continuously ping a fixed IP address,
Popularity: Send ICMP datagram of a certain size continuously. The command stop method Ctrl + C. It may not work if you only have one computer, but if you have many computers (control one thousand bots to attack at the same time !) Then the other party can be completely paralyzed.
Defect: Most computers use routes to access the Internet. This method is safer than using a cat to access the Internet. The reason for security is that the IP address of the former is dynamic.
First, you must know the IP address of the other party. There are many methods to obtain IP addresses, such as using rainbow QQ and ipsniper, and a command [netstat-N]. You can skip this step. As for the usefulness of obtaining the IP address of the other party, you can think about it by yourself. It will not guide you to do bad things here.
This article is from the blog "old books often read New Ideas" and will not be reproduced!