ajax-lives / NoRussian

Volunteer DoS tool via HTML + JS
GNU General Public License v3.0
371 stars 58 forks source link

Add 1MB cookies to the request #34

Open dimention opened 2 years ago

dimention commented 2 years ago

For the attack not only the amount of requests is important, but also the size of the request, I suggest adding at least a 1 MB cookie header to all the requests.

By default Nginx accepts requests as large as 1 MB.

{
  headers: {
    Cookie: 'random generated 1 MB string'
  }
}

but this needs testing the servers, as you could see 413 error, that doesn't mean the server is down.

Ycirn commented 2 years ago

I was thinking of sending some specific message as well, but due to the amount of sites, its getting very slow, which isnt very good.

dimention commented 2 years ago

just remove the sites from the target list if lets say they return 100/100 errors, so we only attack the sites that are not yet down. And a 1 MB cookie would pile up their RAMs, but if the 413 error occurs, you have to lower the size of the cookie.