As you’ll already be aware, DDoSin or participating in any kind of cyber-attack in general is illegal, and usually for good reason.
Click "Continue" if you have a VPN, Proxy, the Tor browser or your own secure connection & wish to support Ukraine in taking down Russian propaganda and services aiding Putins invasion
This works by sending GET requests to each targeted website. It’s like opening each website in a random sequence on your PC and re-requesting the data over and over, although the data is not saved or cached, Due to the way it work, It should be fair to say that your Internet service Provider (ISP) won’t be any more bothered about this than they would you browsing the internet, but its always best to stay safe when it comes to security.
Todays message from the IT Army of Ukraine:
Story of our second hit on Obltelecom, after the first one on December 1, 23:
Provider: We're under a DDoS attack, but chill customers, give us two hours, we got this.
Customers: It's been five hours. Where's the internet?
Provider: Oops, we only managed to fend off 60 GB of traffic when they hit us with 120.
Customers: No internet for three days now...
Now Obltelecom surely got the experience, the experience not to promise a quick recovery from IT ARMY.
Big ups to all who joined in!
Channel |
Chat |
Website
Additional message for newly added targets:
To keep up with targets we're going to use the db1000n targets
direct from their GitHub repository.
These updates will be daily, so if the db1000n changes, it will
probably take a few hours longer for the change to make it here.