DDOS is a means of network attack. Hackers use a large number of hosts in their hands to send a large number of attack packets to a machine at the same time, which makes these packets flood the network, thus affecting the access of normal users to the host until the host is overloaded and crashes. At present, there is no radical solution to this attack, just like early detection and early control of cancer, which mainly prevents IP that sends too many requests (abnormally too many) from resisting DDOS attacks for a period of time.
How to write a Trojan horse program?
The simple process of writing and making Trojan horse programs is as follows:
1. Make a Trojan installation package apk; first;
2. Next, Trojan horse is implanted into an ordinary mobile news application, which is called "stallion" in the jargon of hacker industry;
3. Start the remote monitoring. After the Trojan horse is implanted with normal news or live broadcast applications, hackers can start the remote monitoring service of the Trojan horse;
4. Install Trojans;
5. Remote control: take photos. With Trojan Horse, you can remotely start the automatic photo taking function of the target mobile phone. It can be seen that the photos automatically taken by the mobile phone camera can be obtained without the user's knowledge.
Why are there no broilers among ddos attackers? How to get broilers?
Use vulnerabilities to scan domestic or foreign IP segments in batches, and then upload and run Trojan horses generated by your attackers, so there will be broilers. If you want to control a large number of broilers, you must install or hang your Trojan horse on a high-traffic website.