banner
andrewji8

Being towards death

Heed not to the tree-rustling and leaf-lashing rain, Why not stroll along, whistle and sing under its rein. Lighter and better suited than horses are straw sandals and a bamboo staff, Who's afraid? A palm-leaf plaited cape provides enough to misty weather in life sustain. A thorny spring breeze sobers up the spirit, I feel a slight chill, The setting sun over the mountain offers greetings still. Looking back over the bleak passage survived, The return in time Shall not be affected by windswept rain or shine.
telegram
twitter
github

The steps to carry out a DDoS attack are as follows.

  1. sudo -i to obtain root privileges

sudo -i

  1. Input

cd DDos-Attack

Enter the DDos directory

Some people may encounter problems entering here

First, we check if the text is capitalized correctly

If there are no mistakes, then the file is not configured properly

Just input

git clone https://github.com/Ha3MrX/DDos-Attack

to clone, which usually solves the problem

Of course, there are many different problems that can arise. When I was doing the practical operation, it prompted me that it couldn't clone

I found many solutions online, and the one that finally worked was to replace "https" with "git", which means

git clone git://github.com/Ha3MrX/DDos-Attack

This way, the configuration can be completed.

  1. Continue to input chmod +x ddos-attack.py to set permissions

chmod +x ddos-attack.py

After entering this command, there will be no prompt, so make sure you input it correctly

  1. Enter python ddos-attack.py to enter the attack interface

python ddos-attack.py

There may also be problems here, such as the prompt of not finding the python command (I forgot the exact prompt, but it means this)

This is because python is not properly set up, possibly because you have installed too many versions of python, confusing the terminal

At this time, use "which python" to check python

which python

It should display: /usr/bin/which: no python in (/usr/lib64/bin:/usr/lib64/sbin:/usr/lib/bin)

But don't worry, this doesn't mean there is no python. We directly search for the version by inputting "which python2"

which python2

It will display this text, and we observe that python2.7 is the recognizable version

/usr/bin/python2

$ ls -l /usr/bin/python2

-rwxr-xr-x. 1 root root /usr/bin/python2.7

So all we need to do is input

$ ln -s /usr/bin/python2.7 /usr/bin/python

to solve the problem!

At this point, the following interface will appear

Screenshot_3

This means that the entry was successful

Enter the target IP in the IP column to enter the attack

But if we want to obtain the opponent's IP within the local area network, we need to input

ifconfig

First, confirm your own IP, and then use "fping -g yourIPaddress/24" to view all IPs within the local area network

fping -g yourIPaddress/24

Then select your target for the attack.

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.