Topic Rating
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Undisclosed.to | Great Layer 4/7 power | Deucalion Botnet | Schedule attack
06-21-2018, 08:24 AM
Post: #1
Undisclosed.to | Great Layer 4/7 power | Deucalion Botnet | Schedule attack
[Image: 7FfDbEk.jpg]
> Who we are ? <

Undisclosed offers to companies and individuals to test their network security for educational purposes.

We have been working since 2016.


> Our features <

Custom source, custom methods and custom functions.


Great Layer 4 power | 15-30 Gbps per attack
Schedule attack function.
Layer 7 powered by Deucalion botnet. | 25-30k r/s for premium | Bypass most firewall.
API access for all packages except Basic.
Anonymous | Logs attack/login reset at 00:00 (UTC+2 Paris/Berlin) | IP spoofing packets



> Our methods <


Layer 4
(Transport Layer)

Amplification protocol

- CLDAP
-NTP

TCP methods

- SYN
-ACK
- RST

UDP methods

- VSE
- VOX

ICMP methods
- NFO

Layer 7
(Application Layer)


- HTTP FLOOD -
Flood massive HTTP requests, this method is able to generate a large number of requests per second (R/S) well formed.

- HTTPSTRONG -
This method creates two types of requests simultaneously, which can cause crashes or extremely long loading times on some web servers.

- JS-BYPASS -
This method uses javascript libraries to bypass most checks/challenges offered by Anti-DDoS protection providers such as CloudFlare Under Attack Mode (UAM).

- HTTP DRAIN -
Sending requests in a random time interval. This method is able to override some firewall/protections

- HTTP COOKIE -
Mass sending of randomly generated cookies with predefined names and values. This method is able to override some firewall/protection.

- RANDOM HTTP -
This method bypasses some protections/firewalls that validate the headers, each request is sent with a new randomly generated header.

- PAGE HTTP -
To use this method you must include %RANDOM% after the slash of your URL. Example: http://google.fr/%RAND%. Queries will be redirected to random paths.

- HTTP POST -
Massive flood of HTTP requests with the ability to customize the request that will be submitted, this method is able to generate a large number of requests per second (R/S) well formed.

- HTTP NULL -
This method is designed to quickly generate small requests.

- HTTP KILL-
Useful for crashing wrong configured web servers. Easy to filter but can lead to good results in some cases.

- SMARTBYPASS -
This method is able to bypass many Anti-DDoS providers (shared, servers, reverse, cdn included) like BlazingFast or Incapsula.




Website:
Quote
06-21-2018, 08:26 AM
Post: #2
RE: Undisclosed.to | Great Layer 4/7 power | Deucalion Botnet | Schedule attack
Updates:

- CLDAP and NTP list automatically scan/filtered and uploaded on our servers. Scheduled with cronjob every 24 hours.

- Layer 4 power increased, CLDAP up to +40 Gbps.

[Image: gg8ZQZB.jpg]

Save €15 for Ultimate monthly plan.

Discount code: COUPON-QIZMQOJG (available to 24/06)

More discount coming soon !
Quote



Forum Jump:
Options +


User(s) browsing this thread: 1 Guest(s)

About Hack Bulletin

Hackbulletin.com is a friendly hack forums to learn and share knowledge. Whether you are a pro or just someone dabbling you can always learn more.

Don't be afraid to join and chat!

 

Links