Read Time:1 Minute, 1 Second

Do you want to help with Attack?

current post
https://t.me/cyberwar_world/121

⚠️Instruction

IF YOU’RE FROM A Computer as opposed to a treehouse:

Turn on VPN

1) Download LOIC:
⚡️https://github.com/NewEraCracker/LOIC/releases/tag/2.9.9.99
⚡https://sourceforge.net/projects/loic/files/latest/download

2) Insert the line “IP” ip-address of the victim, click on “Lock on”
Otherwise, you can insert the full address into the “URL”: https://########”, and click on the same button.
The address should be duplicated in large print in the program window.
It is important that the IP matches what we wrote

3) “Port” in “Attack options” enter 443, streams – from 100 to 1000, depending on the device. “Timeout” – minimum.

4)Choose the TCP method, and in the “TCP / UDP message” we send hello from KILLNET;)

5) click on the “IMMA CHARGIN MAH LAZER” button and enjoy

OPTION OF WORK VIA BROWSER:

Turn on VPN or use TOR in work

1) go to the site:
https://pastehtml.com/view/co2vq6fnb.html
http://loic-ddos.blogspot.com

2) Insert into “url”: https://########

3) “Append message”: send greetings from KILLNET

4) “Requests per second” select 100 for weak devices, from 1000 or more for stronger devices

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: