How to ddos!

DDoS: distributed denial-of-service
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude
of compromised systems attack a single target, thereby causing denial of service for users
of the targeted system. The flood of incoming messages to the target system essentially
forces it to shut down, thereby denying service to the system to legitimate users.

You can launch a DDoS attack by installing .vddos viruses at your slaves, and then launch
a DDoS attack at the slaves page. You will need at least 5 DDoS slaves to launch the
attack.
Required software: a .rddos program


What does the DDoS do?
The DDoS can damage the target's cpu, connection and harddisk size.
A DDoS with a power of 1.0/10+ slaves will damage the target's cpu.
A DDoS with a power of 4.0/10+ will also damage the target's connection.
A DDoS with a power of 5.0/10+ will also damage the target's harddisk and can wipe out files.

Watch out !
After an DDoS is launched the logfiles of all the DDoS slaves contain your IP.
And the target PC will contain logs about the DDoS slaves.
EXAMPLES:
24-10-2006 16:22 [!! a DDoS attack from 150.999.999.226, hardware was damaged !!] (victim's logs)
Slave's logs:
01-01-2007 04:35 [ur ip here] launched a DDoS attack via [localhost] to [victim's ip here]

Q & A

Q: How many slaves does it take to get x/10?

A: I've had 3.7/10 with as many as 20 and someone else has had 31 and only got about 2.0/10. If your using 3rd whois and higher 13 gets about 5.3/10. It takes 17-18 3.5+ fwl npc ddos slaves to get 10/10.

Q: Do FWLS stop DDoS?

A: No, not anymore. They do lessen the blow by a VERY SMALL amount. Like 4.0 fwl is minus -.7.

Q: Is thier any way to manipulate the % damages?

A: No, I've experimented and no conclusive evidence suggests such.

Q: What happens if you ddos an npc?

A: Its shut down a while, %s have no effect on NPCs, only the number of slaves. The time is some what random as well.

Q: How long is the wait per ddos?

A: 30 seconds per slave.

Q: DDoS is good for rep?

A: Not really, only 12.5 rep points per slave used to ddos.

Q: Can I assign DDoS slaves while prepping?

A: Nope, that was killed in early November.

Q: Can I que multiple DDoSes?

A: NO, not anymore.

Q: Should I clear logs?

A: Only on your victim, espically if they can reset, you believe they are online or they can/will hit back. Other wise no. Either IP reset or expect to get hit.

Q: How do I keep ddosing when I've got deleted?

A: You need a 0.8+ gb XHD to DDoS effecivly for any long time period (more than an hour). Keep your rddos, wwl, crc, and vddos in que from your XHD. It does not slow things down.

Q: How do I collect while DDoSing?

A: You shouldn't, but if you want to you can. I recommend stopping ddosing for 1-2 hours. Then at low usage times (6 PM or 6 am GMT) get a high lvl fwl. Format/AV and Pass reset. This will cuase people who have slaved you to think you IP reset. Hopefully no one is in you. collect as normal. I did this during both DDoS weeks and never had 0 euro robbed.

Q: Is 0.3 vddos better than 0.6?

A: I really don't know. I have used both and seen simler resualts. I now use 0.3 mainly and still do just as good. The Former DdoS master b4 me, Art-K-tech, also used 0.3.

Q: What effects DDoS power?

A: Slave's CPU. I am not sure about the amount of .vddoses installed. If that effect it, the effect is minor.

Q: What's the min stas from a ddos?

A: 500 Mhz CPU, 5 mbit connection and 5 gb Hdd. Most people call that "5-5-5 or 5/5/5". Used to it was 133 Mhz, 1 mbit and 1 gb HDD but that was changed in mid november or so. You know a 5 gb connection because it says 142 kb/s upload speed and 569 kb/s down speed. Harddisk is obvious. By the time HDD and Connection are 5'd the CPU is as well in like 90% of the cases.

Q: What determines what soft goes?

A: Random.

Q: Can I DDoS M2H?

A: Yes but what normall does 10/10 will give him -321.0/10. So you will need approx. 600 slaves to do 1.0/10 to him good luck.

Q: I was ddosed but it dosn't show any damge, did I escape it somehow?

A: Nope^^. This is always so funny when people say " HAHA UR DDOS DID NOTHING". Log out and log back in. Sorry to burst your bubble! Lol.

Q: I still have questions, how do I get an awnser?

A: Post your question here or IM me. I will get back ASAP.

~SilverFox


Related topics

General DDoSing Manual (updated) by xbillasurferx:
http://www.slavehack.com/includes2/includes/forum.php?&action=viewtopic&topic=51653&cat=6

A manual about the DDoS investigation NPC by BornLiveDie:
http://www.slavehack.com/includes2/includes/forum.php?&action=viewtopic&topic=60667&cat=6

The original DDoS manual by M2H:
http://www.slavehack.com/includes2/includes/forum.php?&action=viewtopic&topic=23&cat=6

A manual about protecting your self from DDoSes by xbillasurferx:
http://www.slavehack.com/includes2/includes/forum.php?&action=viewtopic&topic=52052&cat=6

6 comments:

  1. In my opinion, great content is above all. So focusing on creating good quality content is the solution.

    melbourne web hosting

    ReplyDelete
    Replies
    1. ◾PROTOCOL SHIELDERS◾HELLO, 
      I am COREY RODRIGUEZ by name,the only CEO of protocol-cyber-shield-hackers.  In this message, we will explain how you can almost avoid SCAMMERS and stay safe,  plus how our organization  works.
       Read it carefully!! Its reading will not take more than 10mins. 
      We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!! 
      ⚠️WARNING:
      MOST HACKERS YOU SEE HERE ARE FAKESAND SIMULTANEOUSLY INCONGRUOUS !!. It tears US up as we have received bitter emails of Jobs attempts proposals from most clients with hacking issues but never get it done and lost a lot in the process, EXAMPLES OF LOSSES ARE: ➡️BINARY FUNDS,➡️INVESTMENTS,➡️LARGE SCALE FUNDS,➡️PROPERTIES,➡️STONES(JEWELRIES) etc....
      all scammed by uncertified and fake hackers(impersonation) like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT). 

      SCAMMERS DONT PITTY YOU AND BY THE TIME YOU KNOW IT,YOU'VE GONE TOO DEEP BEING RIPPED OFF THROUGH DIVERSE TRICKY MEANS,PLEASE BE WISE ENOUGH TO PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.HOW WOULD YOU KNOW?? 
      You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:
      1, you see uncertified email accounts carrying numberings like"iamhacklord1232@(gmail,yahoo or hotmailDOTcom"  pls flee from them, BIG SCAMMERS.They take your money and never do your job!! 
      2, you see posts like "do you need to spy on spouse?" All fake!just a way to lure you toward getting ripped OFF!. 
      3, posting fake testimonies and comments to trick you into feeling save and  secured. Pls endeavour to ignore!! 
      ➡️NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART...(impersonating with our post pretending to work for us)WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO ALL MANNERS OF CYBER HACKING ISSUES.
                             ◾VERY IMPORTANT ◾
      For years now, We've helped  organizations  secure data base,  so many sites USE US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF  HANDLING CYBER MISHAPS. 
      "iPhone/ANDROID HACKS"
        "CLEAR CRIMINAL RECORDS"    "FUNDS RECOVERIES" AND LOT MORE BEEN DONE IN SHORT TIMING!
      these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain. 
                              ◾OUR  "AIMS" HERE ◾
      Are:1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.
      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the  availability of time given for Job contracts given to us.!! 
      Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment. write us on:
      ◾ProtocolhacksATgmaildotcom
      ◾CybershieldnotchATgmaildotcom
      ◾binaryoptionretrievalATgmaildotcom

      COREY ROD, 
      SIGNED...
      Thank you

      Delete
    2. Need The To Hire A Hacker❓ Then contact PYTHONAX✅

      The really amazing deal about contacting PYTHONAX is that the Hack done by us can’t get traced to you, as every Hacking job we do is strongly protected by our Firewall. It’s like saying if anyone tries to trace the Hack, it will lead them to us and we block whatever actions they are doing.

      We have been Invisible to Authorities for almost a decade now and if you google PYTHONAX, not really about us comes out, you can only see comments made by us or about us.

      Another Amazing thing to you benefit from Hiring our Hackers is that you get a Legit and the best Hacking service, As we provide you with Professional Hackers who have their Hacking Areas of specialization.
      We perform every Hack there is, using special Hacking tools we get from the dark web.

      Some list of Hacking Services we provide are-:
      ▪️Phone Hacking & Cloning ✅
      ▪️Computer Hacking ✅
      ▪️Emails & Social Media Account Hacking✅
      ▪️Recovering Deleted Files✅
      ▪️Tracking & Finding People ✅
      ▪️Hunting Down Scammers✅
      ▪️Hack detecting ✅
      ▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅

      OTHER SPECIAL HACKING SERVICES

      ▪️Binary Option Recovery ✅
      ▪️Scam Money Recovery✅
      ▪️Bitcoin Multiplication✅
      ▪️Change Of Grades In Universities/Colleges ✅
      ▪️Phone Calls Monitoring✅
      ▪️keyLogging Installation✅
      ▪️Remote Access Trojan (RAT) installation ✅
      ▪️Cyber Security Upgrade✅
      ▪️And lots more...........

      Whatever Hacking service you require, just give us an Email using the Emails Address provided below.
      pythonaxhacks@gmail.com
      pythonaxservices@gmail.com

      PYTHONAX.
      2020 © All Right Reserved.

      Delete

  2. Do you need expert help in gaining access/passwords to Facebook, gmail, Instagram, bbm, yahoo-mail, snap-chat, twitter, Hotmail, badoo, zoosk, various blogs, icloud, apple accounts etc. Password retrieval, breaching of bank accounts: (for local and international banks, block transfers, make transfers), clear debts, pay for bills at give a way rates also provide cheap Holiday booking, breach of web host servers, firewall breaches, application cracks, change of school grades, professional hacking into institutional servers, clearing of criminal records, mobile airtime recharge, keylogging, smartphone,tablet portable device hacks, pc hacks on any OS and ip tracking and general tracking operations..........contact :cyberfiles.hacker@gmail.com by email

    ReplyDelete
  3. Do you need the services of a trusted and reliable hacker ? Contact us today at  cryptocyberhacker@gmail.com Our services include the following: School grades hack Clearing of criminal records IPhone Hacking Tricks YouTube Hacking Tricks Email Hack Paypal, MasterCard hack Google Hacks Facebook Hacking Tricks Hacking Software Hacking Tricks IP Address Software Hacking Hack Facebook Password Online Already hacked online shopping pins for sale at give away price Windows Hacking Tricks Control devices remotely hack Android Hacking Tricks Keylogger Gmail Hacking Tricks Twitter Hacking, etc...

    ReplyDelete

  4. Hello everyone,
    Have you ever needed an expert when it comes to hacking?
    Have you ever wanted to hack someone’s email account?
    Recover lost accounts,school grade,boost credit score?
    Do you need to find a person’s sensitive information?
    Do you want to invade a person’s PayPal, Skrill, Amazon, Facebook or any other site account?
    Upgrade of University Grades,Password and email Retrieval,
    phone Lines monitoring, Skype Accounts, Hack Social Network, Trace calls on real time
    conversations,
    Remove Criminal Records,
    Credit Fixing, cyber-crime investigation,
    Hack Bank Accounts, Identification of Cheating
    Partner or employee,Then contact chauphampham42@gmail.com
    Text Or Call :- (601) 357-3187 best hacker

    ReplyDelete