New Attack Configuration

When you log in, the dashboard screen opens. You can create a new attack by clicking the "Add New Attack" button here or by clicking on "Create New Attack".

In the first step of the attack configuration, the attack name is entered. One of the previously defined target addresses is selected. If there is no defined target address, the "Contact Us" form is filled out to get in touch with Ddosphere authorities.

The duration, location, and level for the execution of the attack are selected.

Attack scenarios are defined at five different levels, each representing the maximum load the attack can create on the network. Each level is associated with specific BPS, PPS, and TPS values:

Level 1: This level represents basic attack scenarios with a 5 Mbps bit rate, 5 thousand packets per second (PPS), and 500 transactions per second (TPS).

Level 2: It represents moderately intense attacks and provides 50 Mbps bit rate, 50 thousand packets per second, and 5 thousand transactions per second.

Level 3: Designed for more intense attacks, it includes 500 Mbps bit rate, 500 thousand packets per second, and 50 thousand transactions per second.

Level 4: Tailored for aggressive attack scenarios, it has a 5 Gbps bit rate, 4 million packets per second, and a capacity of 200 thousand transactions per second.

Level 5: It represents the most severe attacks with a 50 Gbps bit rate, 20 million packets per second, and 1 million transactions per second.

After defining these basic details, you move to the area where you will enter the attack details. Firstly, you select the Attack Type for the created attack. The attack types available in the list are:

  • DNS QUERY

  • DNS RANDOM QUERY

  • HTTP(S) DELETE

  • HTTP(S) GET

  • HTTP(S) HEAD

  • HTTP(S) OPTIONS

  • HTTP(S) PATCH

  • HTTP(S) POST

  • HTTP(S) PUT

  • ICMP

  • ICMP (Type 11)

  • ICMP (Type 13)

  • ICMP (Type 3)

  • MQTT

  • PING OF DEATH

  • RUDY

  • SLOWLORIS

  • SSL NEGOTIATION

  • SSL SQUEEZE

  • TCP ACK

  • TCP ACK-FIN

  • TCP ACK-PUSH-FIN

  • TCP ACK-PUSH-RST

  • TCP ACK-PUSH-RST-FIN

  • TCP ACK-PUSH-RST-SYN

  • TCP ACK-PUSH-RST-SYN-FIN

  • TCP ACK-PUSH-SYN

  • TCP ACK-PUSH-SYN-FIN

  • TCP ACK-RST

  • TCP ACK-RST-FIN

  • TCP ACK-RST-SYN

  • TCP ACK-RST-SYN-FIN

  • TCP ACK-SYN-FIN

  • TCP ALL FLAGS

  • TCP FIN

  • TCP NO FLAGS

  • TCP PUSH

  • TCP PUSH-ACK

  • TCP PUSH-FIN

  • TCP PUSH-RST

  • TCP PUSH-RST-FIN

  • TCP PUSH-RST-SYN

  • TCP PUSH-RST-SYN-FIN

  • TCP PUSH-SYN

  • TCP PUSH-SYN-FIN

  • TCP RST

  • TCP RST-FIN

  • TCP RST-SYN

  • TCP RST-SYN-FIN

  • TCP SYN

  • TCP SYN-ACK

  • TCP SYN-FIN

  • TCP URG

  • TCP URG-ACK

  • TCP URG-ACK-FIN

  • TCP URG-ACK-PUSH

  • TCP URG-ACK-PUSH-FIN

  • TCP URG-ACK-PUSH-RST

  • TCP URG-ACK-PUSH-RST-SYN

  • TCP URG-ACK-PUSH-SYN

  • TCP URG-ACK-PUSH-SYN-FIN

  • TCP URG-ACK-RST

  • TCP URG-ACK-RST-FIN

  • TCP URG-ACK-RST-SYN

  • TCP URG-ACK-RST-SYN-FIN

  • TCP URG-ACK-SYN

  • TCP URG-ACK-SYN-FIN

  • TCP URG-FIN

  • TCP URG-PUSH

  • TCP URG-PUSH-FIN

  • TCP URG-PUSH-RST

  • TCP URG-PUSH-RST-FIN

  • TCP URG-PUSH-RST-SYN

  • TCP URG-PUSH-RST-SYN-FIN

  • TCP URG-PUSH-SYN

  • TCP URG-PUSH-SYN-FIN

  • TCP URG-RST

  • TCP URG-RST-FIN

  • TCP URG-RST-SYN-FIN

  • TCP URG-SYN

  • TCP URG-SYN-FIN

  • UDP

  • UDP FRAGMENTED

  • UDP GARBAGE

  • UDP GARBAGE SMALL PACKETS

  • UDP SMALL PACKETS

Next, the attack volume is selected. There is an information icon next to the attack volume input. Clicking on it will open an information modal. This modal contains a table specifying the maximum volume of requests for each attack level.

Enter the Attack Volume value based on the selected level, according to the information in this modal. Select TPS for HTTP, PPS for TCP, and BPS for UDP and ICMP as the volume units.

After selecting these details, if necessary, you can modify the duration of each attack type from the Advanced Settings.

Multiple attack types can be selected within a single attack. These types can be deleted or modified from the Attack List.

After completing all these steps, you can initiate the attack later by clicking the "Save" button. The saved attacks can be viewed in the Attack List section on the Dashboard screen, and you can start them from there if desired. Alternatively, you can directly start the attack by clicking the "Run Attack" button.

Once the attack configuration is completed, you can access the configuration screen of the relevant attack again by clicking on the "Edit" field in the Attack List if you need to edit the settings.

Last updated