DDoS for Research Only

DDoS for Research Only


“In order to protect one must understand how to exploit” – me just now

  • ping [ip address] -t -l 65500 
  • Low Orbit Ion Cannon http://sourceforge.net/projects/loic/
    • Once, you download the software, extract the software to Windows desktop.
    • Targeting the website: Double click the software icon to open it. LOIC is a portable software and requires no installation.
    • Now, put the website address that you target in the ‘target URL’ field.
    • It is optional to put the IP of the targeted website in the IP field. You can get the website IP by using ping command from your Windows.
    • Press the ‘lock on’ button which is next to the text field.
    • Under ‘Attack’, don’t change timeout, HTTP subsite, speed bar.
    • Under ‘TCP/UDP Message’, enter whatever you want to right.
    • Under the ‘Port’ field, change the value of the port of the targeted website. In most of the cases the value ’80’ should work.
    • Under ‘Method’, from the drop-down list, select UDP option.
    • Uncheck the ‘Wait for reply’ check box.
    • Change the thread value to 20 if you have a good computer. Otherwise, keep the value to 10.
    • Press the “IIMA CHARGIN MAH LAZER” button
  • High Orbit Ion Cannon
  • Google Spreedsheets
    • <pre>=image("http://example.com/sample.pdf?r=0")
  • ByteDos
  • Slowrois
  • More here  – https://security.radware.com/ddos-knowledge-center/ddospedia/ddos-attack/
  • https://en.wikipedia.org/wiki/Denial-of-service_attack


Disclaimer: Most countries have very stick Telecommunications and Computer Abuse laws. Just running these commands against anyone could put you in jail for 99 years. These tools are easily detected.

Cyber Security

Cyber Security


ImmutableID and Multi-Tenant Active Directory and Azure Active Directory

Multi-tenant Azure AD federation without the use of synchronization tools


Consideration for multi-forest synchronisation with a resource Exchange forest


Type A, B and C Enterprises

Type A, B and C Enterprises

A Gartner framework that classifies enterprises or their subdivisions according to a technology adoption profile. Classification is based not only on an enterprise’s current technology adoption strategy, but also on whether the strategy is supported by senior management and is adequately funded.

  • Type A enterprises are typically technically aggressive and well-funded, and use IT to gain a competitive advantage.
  • Type B enterprises, which are in the majority, are mainstream IT users with adequate funding that use IT for productivity.
  •  Type C enterprises are technologically conservative and risk-averse, and seek to control IT costs.

Recognizing an enterprise’s type offers company strategists a meaningful way to compare an enterprise’s use of technology against that of competitors, and to make decisions about when, how and where to adopt new technologies.

ICT Architecture Titles by Deliverables

ICT Architecture Titles by Deliverables


As a Solutions Architect, I always like to think outcome or deliverables based. So here is a short description of ICT Architecture Titles by Deliverables. There seems to be a lot of confusion around these titles so hope this helps.

These titles vary depending where the nominated titles is allocated inside ICT Supply Chain. (Customer, MSP, Vendor, Solutions Integrator or Distributor) more on this here:- http://www.insidespin.com/channeltopics.php#resellers .

(Loosely based on TOGAF and Zachman)

ICT Architecture Titles and Deliverables

  1. Presales / Sales Engineers (Vendors and SI side only)
    • Competitive Selling
    • Proof of Concepts/Pilots/Health Checks
    • Product Selection / Commercial and Licensing Models
    • Bill of Materials
    • Account Planing
    • Customer Training
  2. Enterprise Architects (Usually only customer side) Quasi CIO level
    • Business Case
    • Strategy/Financial Justifications (ROI, TCO, Net Present Value, RPO/RTOs)
    • Project Managment
    • RFP / RFI Scoping
    • Risk and Governances
    • Technology Roadmaps
    • Reference Architectures
    • Vendor Selection
    • Architecture Practices
    • Sourcing Agreements
    • Service Level Agreements
  3. Solutions Architects/Domain Architects (Infrastructure/Application/Security)(Customer, Vendor or SI)
    • Infrastructure Requirements
    • Responding to RFI/RFPs
    • Statement of Work
    • High Level Design
    • Bill of Materials
    • Services Estimates
  4. Subject Matter Experts (Delivery Focused)
    • Low-Level Design
    • As-Built Documentations
    • Operating Manuals

This is Rule of Thumb only.


Offline Convert VMware VMs to Hyper-V


Offline Convert VMware VMs to Hyper-V


  1. Firstly, use VMware vCenter to Export VM to OVF Template VM. (OVA is just a compressed archive) OR you can directly copy the .VMDK files while the VMs is Powered Down. IMPORTANT: You need both VMDK files the 1K and the large file
  2. Download and install Microsoft Virtual Machine Convert – https://www.microsoft.com/en-au/download/details.aspx?id=42497
  3. Open Powershell and use the following commands:
    • Import-Module &quot;C:\Program Files\Microsoft Virtual Machine Converter\MvmcCmdlet.psd1&quot;
    • convertTo-MvmcVirtualHardDisk -SourceLiteralPath &quot;D:\Debian8\Debian8-disk1.vmdk&quot; -DestinationLiteralPath &quot;D:\Debian8.vhdx&quot; -VhdType DynamicHardDisk -VhdFormat Vhdx
  4. IMPORTANT: The source file must be the 1K file. Otherwise you will get “No suitable drive was found at path.” Error.

Apple MAC OSX – Burn Bootable .ISO Images

Apple MAC OSX – Burn Bootable .ISO Images

  1. Open Disk Utility
  2. Drag & drop the .iso onto the left panel (under where you see your HD listed), or in some other manner get it into the left panel (may vary with the version of OSX you are using)
  3. Highlight the .iso
  4. Choose “Convert” at the top
  5. IMPORTANT: Choose “DVD/CD master” for the image format
  6. For encryption choose “none”
  7. Click “Save”, and make sure the file type is “.cdr” (you can keep the .iso if you want as well)
  8. After some time, you will have another image; burn that image
  9. Insert a writable CD or DVD, and choose the slowest possible burn time (for safety)
  10. Choose to verify the disk you are burning as well, then click “Burn”
  11. Depending on what OS built the .iso, the result may not be readable by your Mac, but  the PC or hypervisor where you will install it will be able to read and boot it
  12. hdiutil isoName.iso