Here: http://anonym.to/http://rapidshare.com/files/30275302/Longcat_TCP_HTTP_UDP_Flooder_v2.3_Final.rar is a link to LongCat flooder, which will exhaust resources on target websites until they are not able to be loaded anymore. Multiple people using the tools increases its effectiveness greatly. Make sure you use SYN flooding and HTTP GET flooding. In order to make the program work, extract the .rar into any folder, then open the "binary" folder. Open uf.exe to start the program. In the HTTP GET Flooding section, enter the name of the target url. In the UDP/SYN Flooding section, enter the IP of the website. You can find the IP by going to start>run then type in cmd, hit enter, and then enter ping [website name goes here without the brackets]. If you think you can handle the extra load, increase the number of HTTP users and TCP users to simulate. I am currently simulating 250 HTTP users and 100 TCP users, directing the flooder to target irib.ir, IP 62.220.119.62. Irib.ir very much dislikes longcat flooder, and probably very much dislikes me.
hade mitzi Yeah you're cutting out bandwidth that the protestors need as well. As well as reaffirming the government propaganda that this is being caused by outside forces. If you want to do something setup a Tor relay. http://anonygreen.wordpress.com/2009/06/18/how-to-setup-a-tor-relay-or-tor-bridge/
Do not use this dDoS tool, use Slowloris instead. Do not do a conventional ddos attack on Iranian targets, as this wastes bandwith needed by ALL Iranians. Rather, use something like Slowloris which can take down http servers without using much bandwith at all: Slowloris HTTP DoS This code just hit the wild and should still be quite effective... It was slashdotted earlier today.
is there any new targets we could attack with DoS or other ways? going to try Slowloris HTTP DoS but is it really safe to use??
Use Slowloris Use Slowloris, but only on Linux. Slowloris opens a ton of sockets but Windows has a limit of 130 and thus won't work. Slowloris is an effective yet low-bandwidth attack targeting Apache servers, making it safe to use without hurting bandwidth for the Iranian citizens trying to get information out. Primary target has been girdab.ir for trying to identify protesters.
thank you for the info, I dont have Linux and you say its ineffective with windows hm.. will have to find a way to install linux on a spare computer.
I'm having issues getting the SSL extension installed. I use: perl -MCPAN -e 'install IO::Socket::SSL' but it throws a ton of errors during compile: SSLeay.c:3758: error: declaration for parameter XS_Net__SSLeay_RAND_cleanup but no such parameter SSLeay.c:3734: error: declaration for parameter XS_Net__SSLeay_RAND_seed but no such parameter SSLeay.c:3701: error: declaration for parameter XS_Net__SSLeay_RAND_file_name but no such parameter SSLeay.c:3677: error: declaration for parameter XS_Net__SSLeay_RAND_egd_bytes but no such parameter etc. any ideas?
slowloris over tor? have tor working. have slowloris working. don't know how to tunnel slowloris over tor. any suggestions?
I run Linux, but I'm not exactly clear on how to use Slowloris and slowloris.pl. Please post a guide on how to install and configure Slowloris for our purposes. If it helps, I'm running Ubuntu For reference, I'm trying to follow the instructions on Project Greenwave - /i/nsurgency w/i/ki but am not sure what the first instruction means