SHOW:
|
|
- or go back to the newest paste.
1 | ---------------------------------------------------- | |
2 | TORS HAMMER TUTORIAL | |
3 | ---------------------------------------------------- | |
4 | ||
5 | In this pdf tutorial I will be demonstrating as well as teaching you how to use Tor'shammer. | |
6 | Begin by downloading Tor, if you already don't have it, and Tor'shammer from http://packetstormsecurity.org/files/ | |
7 | 98831/Tors-Hammer-Slow-POST-Denial-Of-Service-Testing-Tool.html | |
8 | Although the download information claims to be linux only, it will also work for unix or Mac OS X. | |
9 | ||
10 | Once you have downloaded and saved the file to your desktop or any other directory, open it | |
11 | and it should automatically extract. Once it is extracted, you should see a folder called "torshammer". | |
12 | Inside that folder there will be three python files: "torshammer.py", "terminal.py", and "socks.py. | |
13 | ||
14 | Now depending on your OS, if you are on a Mac OS X, your right click it and run it with "Python Launcher 2.X" | |
15 | In this context, I will demonstrate how to use it on a linux/terminal environment. | |
16 | Now open terminal and we are going to go into the folder where the 3 files are kept. For me the location was in, | |
17 | /applications/torshammer/. Now I will type "cd /applications/torshammer/", now press enter. You should now be | |
18 | in the directory, to make sure type in the command in the same terminal window "ls", you should see the three files | |
19 | inside. | |
20 | Since we would like to open "torshammer.py" now type in, while still being in directory of the folder, | |
21 | "python torshammer.py". You should now see a terminal-based GUI interface. | |
22 | Tor'shammer interface has it's own basic help menu that tells you how to run the script according to your target. | |
23 | They already provide an example, but I will provide you another example simply for the context, | |
24 | "./torshammer.py -t 192.168.1.100 -r 100000 -T", the larger the thread count, the more efficient and effective the attack | |
25 | will be. -T adds the Tor function which provides security, as well, as providing a new identity in case the site is | |
26 | programmed to ban IP addresses which leave an open connection for "x" amount of time. Tor'shammer's method of | |
27 | combacking this is clever and effective, making it the powerful tool it is. However, Tor'shammer is only effective to | |
28 | apache servers which do not run nginx. | |
29 | Please enjoy this tutorial, this tutorial should not be posted on public domain or we will begin to see an increase in | |
30 | nginx servers, making this tool useless. |