DDoS Attack Methods
The methods below can be used against datacenters, home connections, firewalls, game servers, protected servers, for example, OVH, Voxility, and many more.
UDP-MIX v2:
The unique and powerful method which mix ALL CyberVM UDP attack methods per one attack. (Mix only udp attack methods that available to your membership plan).
The unique and powerful method which mix ALL CyberVM UDP attack methods per one attack. (Mix only udp attack methods that available to your membership plan).
UDP-DN [POWERFUL]:
Unique attack method that flooding the target with a lot of UDP-DN packets. This method generate high raw power in terms of Gbps.
UDP-RD:
Unique attack method that flooding the target with a lot of UDP-RD packets. This method can bypass some protected hosts and firewalls. This method generate medium raw power in terms of Gbps.
UDP-TL [POWERFUL] :
Unique attack method that flooding the target with a lot of UDP-TL packets. This method can bypass some protected hosts and firewalls. This method is the strongest and generate the highest raw power in terms of Gbps.
UDP-DV :
Unique attack method that flooding the target with a lot of UDP-DV packets. This method can bypass some protected hosts and firewalls. This method generate low raw power in terms of Gbps.
UDP-QU :
Unique attack method that flooding the target with a lot of UDP-QU packets. This method can bypass some protected hosts and firewalls. This method generate low raw power in terms of Gbps.
UDP-PL:
Unique attack method that flooding the target with a lot of UDP-PL packets. This method can bypass some protected hosts and firewalls. This method generate low raw power in terms of Gbps.
UDP-AR :
Unique attack method that flooding the target with a lot of UDP-AR packets. This method can bypass some protected hosts and firewalls. This method generate low raw power in terms of Gbps.
UDP-IPsec v2 :
IPSec UDP Flood v2 that sending IPSec protocol packets, can be used to bypass protected servers/hosting.
Random Protocol v2:
Random IP Protocol flood that sending random IP protocol with random data in each packet, can be used to bypass protected servers/hosting.
FiveM [GameServers] :
FiveM flood that sending specific payloads - can be used against FiveM servers.
Valve [GameServers]:
VSE flood that sending specific payloads - can be used against Valve Source Engine servers (cs, csgo, etc..)
TeamSpeak3 Servers :
TS3 flood that sending specific payloads - can be used against TeamSpeak3 Servers
UDP SPOOF v2:
Spoofed UDP flood that sending random data within the UDP packet - can be used to bypass some firewalls or cause a high CPU load for some servers
OVH UDP :
Spoofed UDP flood for OVH servers that sending random data within the UDP packet. *This method require HIGH power which means you need to use few concurrents.
TCP AMP [POWERFUL] :
TCP Amplification flood that sending SYN-ACK within the TCP packet using TCP Reflectors - can be used to bypass some firewalls or cause a high CPU load for some servers
TCP FAST OPEN :
Spoofed TCP-TFO flood that sending syn&syn-ack packets with TCP FAST OPEN option within the packet.
TCP SYN v2 :
Spoofed TCP-SYN flood that sending syn packets with tcp-options within the packet. Open TCP Port is recommended to use.
The methods below can be used against websites, web apps, load balancers, Bypass Cloudflare, Incapsula, and many more CDN services.
HTTP-RAW v2:
HTTP-RAW: Flood with RAW HTTP Requests using high performance proxies, sending as much as possible requests per seconds - You can use it to take down websites.
HTTP-BROWSER [FULL BYPASS] :
HTTP-BROWSER: Flood with HTTP Requests using high performance proxies with browser-bypass-mode enabled which bypass most of the sophisticated layer-7 firewalls (CDN, Javascript Challanges, Captchas and many more). You can use it to take down websites. * It takes about 30-60 seconds to start the attack.
(This post was last modified: 04-11-2021, 05:29 PM by Alioxa.)