helpukr.xyz - Help Support Ukraine! |
If you are at a device with more control over like a Computer, you can use much more advance DDoS techniques, this allows you to have your computer generate complex payloads of data, abstract query’s and all kinds of other server abusing craziness.
In this section we’ll detail all kinds of useful software that can be used to attack our targets from. |
First and most important: |
|
|
|
![]() |
OpenVPN Proton VPN |
Click Here (or the VPN button at top of page) to See a bigger list of VPN's |
Types of DDoS Attack: |
|
|
|
![]() |
The OSI model is a perfect example to reveal the types of DDoS attacks. The OSI layer is divided into 7 types and according to it, the different types of attacks come under different levels of OSI layers. Where all DDoS attacks involve target base or traffic networks, hereby attacks are classified into 3 categories that are application-layer attacks, protocol attacks, volumetric attacks. According to the target vector, |
What are the types of DDoS attacks? |
||||
|
||||
1. Application layer attacks 2. Protocol attacks 3. Volumetric attacks |
Some common DDoS attacks are listed below: |
|||
1. UDP Flood 2. ICMP Flood 3. SYN Flood |
4. Ping of Death 5. NTP Amplification 6. HTTP Flood |
7. Slowloris |
Different types of DDoS attacks explained: |
|
|
|
![]() |
These are sometimes been known as layer 7 attacks to destruct the resources available in the target area. The DDoS attack is mainly in the area where webpages are created and transmitted through requests (HTTPS). An HTTP request can be too small on the client side but the response from the server is too large as it may hold multiple files and queries to build a webpage. Mostly this type of attack is difficult to protect as the traffic may be a concern to determine as malicious. |
|
|
![]() |
They mainly utilize layers 3 and 4 of the protocol stack to make the target not been accessed. These attacks consume the state capacity of web servers and firewalls etc. Here is an example of SYN Flood where requests are being unanswered and the process continues. For example, labor in a supply room gets a request from outside of the storeroom for a package. By hearing this, the labor goes and gets the package and waits for the final confirmation before he takes the package out of the storeroom. By the time the labor gets many more requests and without confirmation, the process goes unanswered and waits for the final step to closed. |
|
|
![]() |
This kind of DDoS attack will consume to use the bandwidth of target and internet networks. Some DDoS attacks are mentioned below:
First of all, the client is requesting for connection by sending an SYN message to the server-side. Once the server receives the connection request, it sends back an acknowledgment message to the client, to which the client responds with acceptance, and thereby the connection has been established. Here the striker sends continuous messages (SYN) to the server, mostly having a false IP address. The server receives being unknown lots of requests for connections. Either way the server attacked with malicious requests sends the acknowledgment, but it waits from the client-side for the same.
|
Top recomended simple DDoS tools |
|
|
|
Death by 1000 Needles![]() |
|
|
|
Disbalancer Liberator![]() |
|
|
|
helpukr.xyz http(s) flood![]() |
some the main benefits of this kind of flood is that you can use it on any device with a browser, no need to install any software, no need to root your mobile device to run it, and it's the safest way to flood a target if you for whatever reason refuse to use a VPN, Proxy or even Tor (which I've seen a few times).
If you want to use the ToR browser to preform your attacks then a http(s) browser flood is one of the best ways to go about it, though you can use a Linux distribution called "parrot OS" to run your entire network through ToR for the other tools.
|
|
The following infomation is sourced from Step 4 and above in the "How to get started" PDF file |
||||||
|
||||||
|
||||||
Get yourself a good attack (DDOS) program. On the sites themselves are examples on how to use them. https://github.com/yottaiq/CloudAttack Here are a few others (non Cloudfare):
Slowloris is basically an HTTP Denial of Service attack that affects threaded servers. It works like this:
This exhausts the servers thread pool and the server can't reply to other people. In order to run the attack, we need the logic of slowloris, however we won't write it by ourselves, instead, use the Python Slowloris implementation from an open source repository in Github. https://github.com/gkbrk/slowloris The script runs 150 sockets by default. After the installation just run: $ python3 slowloris.py [website url] -s [number of sockets]
Manyloris is a neat tool that allows to run Slowloris for multiple targets. It receives a list of targets and ports. You must have slowloris installed before you can run Manyloris. The targetlist is easy to make. Just create a simple text (.txt) file with the following format (add as many targets as you like): 123.423.1.1:80:443 For each target in the list, your system will start a slowloris attack. https://github.com/mjalt96/Manyloris
https://github.com/codesenberg/bombardier/releases/tag/v1.2.5 (example use : Example usage - ./bombardier-linux-amd64 --duration=240h --connections=1000 -- latencies https://lenta.ru) It maybe wise to run your query in a docker: https://github.com/nitupkcuf/runner [More information required]
Check our own program - Death by 1000 needles (DB1000N) https://github.com/Arriven/db1000n This is software for coordinated DDoS attacks on the occupier’s infrastructure. The main advantage of this method is that users only need to run the program on a PC to carry out attacks, and all coordination will be carried out and configured by administrators with the support of cyber security specialists. Instructions for use and all necessary links are on the main website: https://hackmd.io/pl_ucHTWQUmO9ubmzRT1tQ Please join everyone and download the program to your PC before the evening attacks, because then we will carry out the first attack with DB1000N. Stay tuned in the channel and look for upcoming updates.
This area of the origional documentation is outdated, so it has been replaced with details on our html flood tool.. If you want to view the origional content, open this PDF (also listed above). Every day we create a new .htm page that allows you to flood the daily targets with minimum effort. https://github.com/helpukr/helpukr.github.io
1. Open the github page and click on the current day's file with the extension .htm e.g. day94.htm 2. Select the code as you would normally select text in a document. Don’t use “Select All” because that will select the entire page and you only want the code. 3. Open a new notepad file and paste the copied code in the new file and save it somewhere locally on your computer. Make sure you change the extension of your new file is .html 4. Find your file in ‘Explorer’, select the file by clicking ONCE (left mouse button), hold down the SHIFT key and right-click on the selected file. Select “Copy as path”.
5. Open your TOR browser and paste (CTRL-V) the copied path in the address bar of your TOR
browser. You have to remove the double quotes (“”) on each end or it won’t open. Hit enter
when you’ve removed the quotes.
Click Continue to start the flood!
This next step is somewhat advanced and you will need a bit on Linux knowledge. If you’re really paranoid you can also run your network connection through several proxy (socks) services but this is not strictly necessary. Here’s a list of free proxy services (servers): https://spys.one/en/socks-proxy-list/
In Linux, you can achieve this added layer of security by using "proxychains". It's easy to install.
Open a terminal (commands for Kali so you may have to adjust slightly if you are using a different
distro/version)
Click Continue to start the flood! Please read the manual carefully. NMAP is a very powerful tool with many options to discover open ports. A good site to learn quickly is: For the WINDOWS users among us, there is a GUI for nmap, called zenmap: It does the same thing except it comes with a nice user-friendly GUI (Graphical User interface).
TIP 1: NMAP For anyone who has access to nmap already, nmap is pre-installed in Kali and ParrotOS. Check if you have this script by running this in the terminal "locate http-slowloris.nse" if you see this: /usr/share/nmap/scripts/http-slowloris.nse You can then use it on any desired IP. nmap -vv --script http-slowloris --max-parallelism 400 <target IP> TIP 2: DNS We also recommend changing your DNS to 9.9.9.9. This is an open DNS recursive service for free security and high privacy since your local DNS service may not always give you what you need in terms of reliability. https://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10 TIP 3: Randomized MAC addresses There's two controls for using random hardware addresses—one is for all Wi-Fi networks and the other is for the specific Wi-Fi network you choose. When you turn it on for all networks, random hardware addresses are used while your PC scans for networks and connects to any network. When it's turned on for a specific network you choose, random hardware addresses are used the next time you connect to that network. https://support.microsoft.com/en-us/windows/how-to-use-random-hardware-addresses-in-windows
Many people in Russia have no idea what’s going on. It’s a myth that every single Russian citizen
supports the war. In fact, most Russian don’t even know that Russia is the aggressor and that there
even IS a war in the first place. So, in order to make them aware, you could go onto a popular
website like tripadvisor or Trivago, find a Russian restaurant or hotel and give them a review. TIP 5: Find any Russian website you can and place a message. Our valued member Insschnimp made a great tutorial on spamming Russian websites: |
||||||
So please always remember this order : • Install OS |