Installing mhddos_proxy on Linux using Terminal

18 April 2023 6 minutes Author: Cyber Witcher

How does mhddos_proxy help Ukraine?

Mac and Linux share a similar management tool (terminal) because both OSes are Unix-like. DDoS attacks are so complex and powerful these days that it can be very difficult to solve them yourself. Technological progress is taking leaps and bounds, and sophisticated attacks are gaining popularity. c The situation in our country is not easy and modern solutions are needed in the 21st century, each of you can direct a Ddos attack in the right direction after reading the manual. MHDDoS_proxy is software designed to organize DDoS attacks. It is used by criminals to increase the number of requests to the target server in order to overload its resources and cause unavailability for legitimate users.

Also, this program allows attackers to carry out DDoS attacks by sending a large number of requests to the target server from different IP addresses, which can overload the server and make it unavailable to legitimate users. MHDDoS_proxy can be installed on botnet computers, which consist of a mess of connected computers controlled by criminals. These computers can be infected with malware that gives criminals remote access and control over them. MHDDoS_proxy can be used to carry out various types of DDoS attacks, such as SYN flood, UDP flood, HTTP flood and others. After installing the program on the botnet’s computers, criminals can launch an attack on the target server using the command line or the program’s interface. Using MHDDoS_proxy to launch DDoS attacks is illegal and can lead to serious consequences for criminals, including criminal liability and prosecution. So, help us win!

Step 1. Installation

Insert commands in the Terminal. After each command – Enter. Each new line with a dot is a new command.

The first stage:

  • cd ~

  • sudo apt update -y

  • sudo apt install –upgrade git python3 python3-pip gcc libc-dev libffi-dev libssl-dev python3-dev rustc -y

  • sudo rm -rf mhddos_proxy

It may appear like this, but this is normal.

(This means that mhddos_proxy has not been installed before)

The second stage:

3) For Kali – will not work – just skip.

So that there are no limits on open sockets for proxies (so that attacks are more effective): the command will not issue every message – that’s normal.

4) If there are any Errors at the end of this command (especially on Kali), do this:

  • a) cd ~/mhddos_proxy

  • b) git pull origin main

  • c) python3 -m pip install -r requirements.txt

  • d) python3 -m pip install uvloop

5) The installation and configuration of the ending is complete, congratulations:

Step 2. Launch commands

In the future, in order to launch attacks, you will only need to do the following actions:

1) Open the Terminal and go to the desired folder:

2) Update the program version:

3) load new dependencies:

4) Launch the attack:

5) To stop the attack: in the open window with the attack, press Ctrl+C

Step 3. Transferring the process to the background

THERE SHOULD BE NO MORE THAN TWO ATTACKS RUNNING IN THE BACKGROUND OTHERWISE PROCESSOR THROTTLING AND PERFORMANCE DROP TO ZERO.

1) We install a tool that will transfer our processes to the background:

2) We start the process in the background:

To transfer to the background – press Ctrl+A, and immediately Ctrl+D, if everything is successful – there will be a message [detached from voenkomat]. Now the process will work even when the terminal is closed, that is, 24/7 if we are talking about Linux servers. In this case, the process is given the name voenkomat, which you can then use.

1) Track like this:

You will be shown a list of running processes in the background.

2) To jump into the process and see what it outputs, type this:

After that, if you want to kill the process: Press Ctrl+C.

To disconnect again and leave it working: Press Ctrl+A, then Ctrl+D – AND EVERYTHING IS DONE – WORKS IN THE BACKGROUND.

In the future, you can change the command itself: sudo python3 and the name of the process from voenkomat to something else.

Step 4. Command template:

 

An example command with the –vpn option:

  • Python3 – a shell / program that will read and execute the code of the runner.py programs.
  • Runner.py – the attack script itself.
  • Site Targets – Targets in a single-level attack using a single attack method specified in –http-methods can be listed with a space, or can be specified as a remote config via -c URL (where each target must be on a new line ). In this case, the number of targets will be divided into each method equally from the number you specified.
    You can specify any types of ports in one command, for example: http://, https://, tcp://, udp:// – all of them will be divided into the required methods, for http and https the methods from the list will be taken –http-methods , and for tcp and udp always use TCP and UDP methods respectively.
  • Methods – You can familiarize yourself with all the methods on the github itself ( https://github.com/MHProDev/MHDDoS#features-and-methods ). All the commands that we prepare in our channel – we prepare already with the methods necessary for the attack). At the same attack level, methods can also be enumerated by omission. The most common methods are: –http-methods GET STRESS.
  • Threads are the number of “malicious” packets/requests in t * number_of_cores sent to the target. Here you can twist to the maximum as much as your PC can handle (monitor the load in the task manager, we look at the CPU and RAM, in Kali Linux it is a green and blue graph, respectively). Be careful, at the beginning of the attack, the load may be minimal, and after a while, it will skyrocket. Note that as packages/threats increase, the number of proxy servers may decrease. By default 1000, optionally – as much as will fit into your machine (but not more than 10000): In this command: -t 5000.
  • Connections – Here we indicate the estimated number of connections to one proxy server. It is optimal to specify from 1000 to 2000. Let’s say that you have 1000 proxy servers, if you specify 1000 connections, you will send 1,000,000 packets to your destination (ideally, but a certain percentage of packets can most likely be lost). Currently, the optimal value is –rpc 2000.
Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.