Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Reuploaded from - https://pastebin.com/raw/LPpvCRMg
- \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
- DDOS MASSIVE ATTACK
- An Approach to attain Massive Firing Power to Deface a site:
- ALERT:
- Do Not Leave your PC running for many hours without Guarantee 100% to follow the instructions.
- ByteDos is tested to be most Easy & Reliable program for ddos
- Video: https://www.youtube.com/watch?v=h82FVIZ3de4
- File Download: http://ow.ly/cq8Pa
- any program with direct link to TOR can be used for this method
- such as: pyloris or torshammer
- [Note: no need to open many windows with them, only increase number of threads.]
- Software installations:
- install Firefox www.mozilla.org/en-US/firefox/new/
- install Tor www.torproject.org/projects/vidalia.html.en
- install VPN program
- Preparation for massive Ddos:
- reset your PC
- Open Tor
- Open Firefox
- Check IP "every time" before working on Firefox browser
- Tor IP = 127.0.0.1 (are you using TOR or not)
- use IP Checking sites:
- http://ip-check.info/?lang=en
- http://proxy.anondat.com/ip_test
- http://www.dnsleaktest.com/
- Run VPN
- (you can run a proxy before this step to make VPN connection then disconnect the proxy).
- Confirm IP changes on another browser chrome or MS. <---- To know if VPN is working properly.
- Start Ddos Attack:
- run many Bytedos windows
- as much as your pc can handle (memory load) 50, 100 , 200 sessions.
- insure to select "Proxy" connection to link ByteDos to Tor network. <--- Careful work is necessary
- insure to enter ( right IP or site URL ) with right port
- site info: as per robtex.com or any services
- a = main site url = http attack = port 80
- ns = dns site/host link to internet = udp attack = port 53
- mx = mail server/exchange server = udp attack = port 25
- note: avoid attacking google & amazon & cloud hosting. Too much attack is needed for them.
- This working style is Effective & Safe & Reliable; thus
- You can keep the PC attacking for hours.
- IMPORTANT <<>> IMPORTANT <<>> IMPORTANT
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- 2 things to insure proper internet connection:
- most PC uses "energy saving" setting; disable the "energy saving"
- & disable screen server too.
- "energy saving" settings disconnect many microprocessors functions or many processes. That's for sure we don't desire to be automatic. We want everything done by our knowledge.
- another critical settings is "power management" of the network card.
- It has an option of "turn off the device to save power"
- unmark the option.
- & sure using wireless connection is not preferable during Ddos; It can be disconnected easily.
- WARNING NOTE:
- - Do Not Leave your PC running for many hours without Guarantee 100% to follow the instructions.
- - "Common sense" : when you want to open the target site use Firefox with TOR is on, avoid using other browsers for checking sites you want to attack or attacking!
- Bottomline Explanations
- All signals are encrypted twice:
- Tor container ===> is within the VPN container ===> is within the router container
- Running a proxy before running VPN is another security trick!
- TOR network changes IP address every 10 minutes automatically, giving an advantage of changing the attacking IP.
- You can click "use a new identity" on Vidalia (Tor window) to manually change attacking IP.
- Have Fun
- Sail Safe on the internet
- Target: #OpZionism #Opilluminati #OpRothschild
- & Change the WORLD we are living to a better place …
- Greetings:
- #GlobalRevolution teams of #Anonymous Collective
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement