Hello All Bangladeshis!
Source: Mr.S1CK
Greetings,
This is we. Now the time comes, Its the time to Pay Back my dear warriors! Get ready for the Attack. No one is bigger then you. You are the King of Your Kingdom. No instruction required. Just be known about hiding your Internet Protocol [IP]. Wear a mask by using a new IP. No body will find you. Use TOR, HSS whatever you would like to but be safe. Never forget that we are by born Warriors. Attack India as much as you can.
The things you have to do:
1. Who ever is using LOIC like me, please be sure that you have protected your self before you do something. So here I have come with a solution to hide your Internet Protocol (IP) Address please use this. How to use it you will find everything in this post. Share it and Download it, use it and Use LOIC to BANG Indian website's. Any One of them!
2. Download LOIC (Low Orbit Ion Cannon) [If you don't have it!]
We want to make a history. What we can do and what we can perform its depends on out capabilities. Keep your expectation high.
We will attack website through DDoS. Lets know what is it?
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.
One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.
When the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack.
Keep your Shield on. Attack on Indian Sites. Its an Operation. I am naming it Operation Cyber India #OpCyberIndia.
Hack them by Phishing, Key Logging, DDoS, Own their sites etc ways of Hacking.
Hack them by Phishing, Key Logging, DDoS, Own their sites etc ways of Hacking.
I am with you guys and always will be.
Thank you.
Its Mr. S1CK
aka.
We are Anonymous,
We are Legion,
We do not Forgive,
We do not Forget,
Expect us.
United by One,
Divided by Zero.
[Its not a Message by Anonymous! Its a Message by Mr. S1CK]