You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello, I want to use your software for good purposes. For several months now, I have been attacked by VSE servers using the EVERYTHING method. They attack with a very large number of fake IP addresses. I am now actively looking for and testing protection. Using your software, it would be easier for me to conduct tests. Please help, how can I organize an attack from my server?
I do something like this. I scanned through zmap dns and I got a dns.txt file with a bunch of ips. Then I launch the attack with such a command, it goes and crashes the server, but in the attack dump there is only 1 ip from which the attack is coming
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Hello, I want to use your software for good purposes. For several months now, I have been attacked by VSE servers using the EVERYTHING method. They attack with a very large number of fake IP addresses. I am now actively looking for and testing protection. Using your software, it would be easier for me to conduct tests. Please help, how can I organize an attack from my server?
I do something like this. I scanned through zmap dns and I got a dns.txt file with a bunch of ips. Then I launch the attack with such a command, it goes and crashes the server, but in the attack dump there is only 1 ip from which the attack is coming
Beta Was this translation helpful? Give feedback.
All reactions