Types Of Methods You See In Booters/Stressers And What Do They Do?

1
390

Hey folks! Today we are going to learn the methods that is provided by network stressers/booters to stress test your target.

Jump To

What is Booter/Network stresser?

Booter or you can say it as Network stresser. They are a kind of website that provides you Distributed Denial Of Service(DDoS) to you to stress test your website/server against DDoS attacks.

Methods present in it.

Booters provides you many method when you go to their stress hub. You can see a section that is usually provided as a drop down menu that shows you various types of methods to select before you start your stress testing. Those methods helps you to determine in which protocol you would like to stress test like SSH, FTP and etc.

Here are the types of method that you find in most of booters/network stressers.

DNS AMPLIFICATION – Its an UDP based method which uses vulnerable OPENDNS servers to amplifiy the traffic that reaches the attacked IP. You can use any port becouse it always hits on multiple ports.This is usually our hardest hitting method when hitting home connections.
CHARGEN – Its an UDP based method which uses chargen service to amplify and reflect the attack to the targeted IP addres.
NTP – Its an UDP based method used to amplify and reflect the attack to the targeted IP address. It exploits the “monlist” query of the NTP service.
TCP-ACK – Its an TCP based method which sends empty tcp packets with “ack” flag enabled in the packets header.That specific flag is used for the acknowledgement of synchronization acknowledgement request when establishing a tcp connection. Usually it is good for lagging/downing a server.
FRAG – Fragmented TCP. It is useful when hitting servers.
TCP-RST – Its an TCP based method which sends empty tcp packets with “rst” flag enabled in the packets header. That specific flag is used when a client in an ongoing tcp session wants to end the session/connection. Usually it is good for lagging/downing a server.
TCP-SYN – Its an TCP based method which sends empty tcp packets with “syn” flag enabled in the packets header.That specific flag is used for synchronization request which is the first request a TCP connection should have. Therefore it is the first packet when establishing a new connection and is highly effective for lagging/downing servers.
DOMINATE – Its an TCP based method which sends empty packets with random flags enabled in the header which makes it highly effective even against medium protected hosts.
KILL-TCP – This method is also TCP based and is “sister method” to DOMINATE becouse they work on a very similiar concept.Therefor if one doesnt take down the server you should try the other.
COD – Its an UDP based method which can take down even highly protected Call of Duty servers.
PORTMAP – Its an UDP based method which is used to reflect and amplify the traffic towards the targeted IP. Its very useful for downing 4G hotspots and even some highly protected hosts!
VOX – Its an UDP based method which is best used for downing highly protected servers.
Teamspeak 3 – Its an UDP based method which works very well against TS3 servers.
Teamspeak 3(KILL) – Its an UDP based method which works very well against TS3 servers and the only diffrence between it and Teamspeak 3 is that this method hits on all ports instead of only one.
RAND – Its an UDP based method which works very well against applications which networking done over UDP.
 KILL – Its an UDP based method which is similiar to UDP RANDand the only diffrence between it and UDP RAND is that this method hits on all ports instead of only one.
UDP KILL – Its an UDP based method which is similiar to UDP RANDand the only diffrence between it and UDP RAND is that this method hits on all ports instead of only one.
ICMP – Its an application level method that utilizes HTTP protocol to drain the resources of the targeted webserver.

ZUDP (LDAP) – One of the most powerful methods on the webstresser at the moment. Currently hits harded than most others.
HTTP-GET – Its an application level method that utilizes HTTP protocol to drain the resources of the targeted webserver.
HTTP-KILL – Custom made HTTP based method which uses smart user mimicking techniques to bypass some non JS based protections. Also it is extremly useful when testing login & register pages.

 

The following methods are collected over from various booters.

There can be some different types of methods or custom made methods by different booters. This methods are used usually in most of booters.

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here