New Attack Configuration
When you log in, the dashboard screen opens. You can create a new attack by clicking the "Add New Attack" button here or by clicking on "Create New Attack".
In the first step of the attack configuration, the attack name is entered. One of the previously defined target addresses is selected. If there is no defined target address, the "Contact Us" form is filled out to get in touch with Ddosphere authorities.
The duration, location, and level for the execution of the attack are selected.
Attack scenarios are defined at five different levels, each representing the maximum load the attack can create on the network. Each level is associated with specific BPS, PPS, and TPS values:
Level 1: This level represents basic attack scenarios with a 5 Mbps bit rate, 5 thousand packets per second (PPS), and 500 transactions per second (TPS).
Level 2: It represents moderately intense attacks and provides 50 Mbps bit rate, 50 thousand packets per second, and 5 thousand transactions per second.
Level 3: Designed for more intense attacks, it includes 500 Mbps bit rate, 500 thousand packets per second, and 50 thousand transactions per second.
Level 4: Tailored for aggressive attack scenarios, it has a 5 Gbps bit rate, 4 million packets per second, and a capacity of 200 thousand transactions per second.
Level 5: It represents the most severe attacks with a 50 Gbps bit rate, 20 million packets per second, and 1 million transactions per second.
After defining these basic details, you move to the area where you will enter the attack details. Firstly, you select the Attack Type for the created attack. The attack types available in the list are:
DNS QUERY
DNS RANDOM QUERY
HTTP(S) DELETE
HTTP(S) GET
HTTP(S) HEAD
HTTP(S) OPTIONS
HTTP(S) PATCH
HTTP(S) POST
HTTP(S) PUT
ICMP
ICMP (Type 11)
ICMP (Type 13)
ICMP (Type 3)
MQTT
PING OF DEATH
RUDY
SLOWLORIS
SSL NEGOTIATION
SSL SQUEEZE
TCP ACK
TCP ACK-FIN
TCP ACK-PUSH-FIN
TCP ACK-PUSH-RST
TCP ACK-PUSH-RST-FIN
TCP ACK-PUSH-RST-SYN
TCP ACK-PUSH-RST-SYN-FIN
TCP ACK-PUSH-SYN
TCP ACK-PUSH-SYN-FIN
TCP ACK-RST
TCP ACK-RST-FIN
TCP ACK-RST-SYN
TCP ACK-RST-SYN-FIN
TCP ACK-SYN-FIN
TCP ALL FLAGS
TCP FIN
TCP NO FLAGS
TCP PUSH
TCP PUSH-ACK
TCP PUSH-FIN
TCP PUSH-RST
TCP PUSH-RST-FIN
TCP PUSH-RST-SYN
TCP PUSH-RST-SYN-FIN
TCP PUSH-SYN
TCP PUSH-SYN-FIN
TCP RST
TCP RST-FIN
TCP RST-SYN
TCP RST-SYN-FIN
TCP SYN
TCP SYN-ACK
TCP SYN-FIN
TCP URG
TCP URG-ACK
TCP URG-ACK-FIN
TCP URG-ACK-PUSH
TCP URG-ACK-PUSH-FIN
TCP URG-ACK-PUSH-RST
TCP URG-ACK-PUSH-RST-SYN
TCP URG-ACK-PUSH-SYN
TCP URG-ACK-PUSH-SYN-FIN
TCP URG-ACK-RST
TCP URG-ACK-RST-FIN
TCP URG-ACK-RST-SYN
TCP URG-ACK-RST-SYN-FIN
TCP URG-ACK-SYN
TCP URG-ACK-SYN-FIN
TCP URG-FIN
TCP URG-PUSH
TCP URG-PUSH-FIN
TCP URG-PUSH-RST
TCP URG-PUSH-RST-FIN
TCP URG-PUSH-RST-SYN
TCP URG-PUSH-RST-SYN-FIN
TCP URG-PUSH-SYN
TCP URG-PUSH-SYN-FIN
TCP URG-RST
TCP URG-RST-FIN
TCP URG-RST-SYN-FIN
TCP URG-SYN
TCP URG-SYN-FIN
UDP
UDP FRAGMENTED
UDP GARBAGE
UDP GARBAGE SMALL PACKETS
UDP SMALL PACKETS
Next, the attack volume is selected. There is an information icon next to the attack volume input. Clicking on it will open an information modal. This modal contains a table specifying the maximum volume of requests for each attack level.
Enter the Attack Volume value based on the selected level, according to the information in this modal. Select TPS for HTTP, PPS for TCP, and BPS for UDP and ICMP as the volume units.
After selecting these details, if necessary, you can modify the duration of each attack type from the Advanced Settings.
Multiple attack types can be selected within a single attack. These types can be deleted or modified from the Attack List.
After completing all these steps, you can initiate the attack later by clicking the "Save" button. The saved attacks can be viewed in the Attack List section on the Dashboard screen, and you can start them from there if desired. Alternatively, you can directly start the attack by clicking the "Run Attack" button.
Once the attack configuration is completed, you can access the configuration screen of the relevant attack again by clicking on the "Edit" field in the Attack List if you need to edit the settings.
Last updated