Let’s continue debunking myths about IT ARMY, based on the report by The Center for Strategic and International Studies: (https://www.csis.org/blogs/it-army-ukraine) “Large-scale dissemination of DDoS tools to IT Army volunteers could give thousands of hackers the capacity to carry out cyberattacks, with the potential to use their skills for more nefarious purposes, a problem that governments have struggled with previously.” For almost a year now, nearly all the software that we recommend to our subscribers has a closed configuration. (https://itarmy.com.ua/instruction/?lang=en) This means that using it for purposes not associated with IT ARMY is not feasible.
Продовжимо розбирати міфи про IT ARMY, базуючись на звіті The Center for Strategic and International Studies: (https://www.csis.org/blogs/it-army-ukraine) “Масове поширення інструментів DDoS серед добровольців IT ARMY може надати тисячам хакерів можливість проводити кібератаки, з потенційною здатністю використовувати свої навички для більш шкідливих цілей, проблемою з якою раніше вже боролись уряди.” Вже рік як майже все програмне забезпечення, яке ми радимо нашим підписникам, (https://itarmy.com.ua/instruction/) має закритий конфіг. Це означає, що використовувати його для цілей, не пов’язаних з IT ARMY, не вийде.
INSTRUCTIONS TO CONFIGURE DDOS ATTACKS TO ENEMY COUNTRY
Targets are automatically pulled and coordinated from IT Army of Ukraine.
Every tool has its own benefits so we cannot recommend one of them more than the others. We suggest you to try them all and choose what works best for you.
The only thing we do recommend is to run the attack on cloud virtual server (VPS). This approach doesn’t overload your local network and is more efficient since it allows you to run the tool on multiple instances thus having more resources.
Please turn off the antivirus, install and add the DDOS tool to the exclusions folder before restarting the PC.
Our russian foes leveraged antivirus software to consider DDOS potentially unsecured hence blocked.
We guarantee the DDOS tools recommended on our official website does not conclude any harmful components for your cyber security.
UKRAINE IT ARMY INSTALLER FOR WINDOWS
(ALL IN ONE – MHDDOS/DB1000N/DISTRESS)
You can contact for help at IT Army of Ukraine Chat.
Download and install – UkITA Installer ( https://github.com/OleksandrBlack/ukita_installer )
Visualization of the installation and launch of the attack
Launch a shortcut on the desktop, join ItArmy of Ukraine to save Ukraine!
Here is the solution- No VPN needed (conditionally) – it automatically downloads and selects working proxies, regularly changes currently used set
- Simultaneously attacking multiple targets with automatic load balancing
- Uses different attack methods and automatically switches between them
- User-friendly interface with clear parameters
VPN
There are some subtleties regarding attack through VPN:
How to understand do you need VPN?
If you attack without VPN during 15 minutes and you have stable internet connection and the script is working well (generating more than 15 Mbit/s of total Traffic) – there is no need to change anything
If you attack without VPN and have issues with web browsing / internet disconnections and/or total traffic in script (less than 5 Mbit/s) – you might need to connect VPN and check if it works better (the same total Traffic field)
We recommend using CyberGhostVPN
ADVANCED SETTINGS (MHDDOS)
Go to the directory previously installed ukita_installer\mhddos_proxy and open the file for editing mhddos.ini
-
- In case of using
mhddos_proxy
-
- on:
- VDS/VPS physically located outside Ukraine;
- PCs with active VPN
We recommend using parameter
vpn = true
- , to increase attack performance!
We are interested in more details about all possible arguments at this link.
