arriven / db1000n

MIT License
1.18k stars 208 forks source link

Put attack on hold when VPN is disabled #525

Open Geniy00 opened 2 years ago

Geniy00 commented 2 years ago

I'd like to suggest the next improvement: It could be much safer to put the attack on hold when VPN is disabled. I'm using my Windows 10 to run db1000n together with some VPN application. Sometimes when I have network issues my VPN application can be closed or disabled automatically, but db1000n continues attack. It leads to situations when another side could understand that my IP sends too many requests.

I'd like to have some argument, that allows to pause the attack if my IP belongs to my original country. The logs could show the message like: "Please turn on VPN". It could be good to check my current IP every 1-5 seconds

arriven commented 2 years ago

would it work for you if the app would just crash/exit in that scenario and you had to restart it? assuming that you'd have to restart your vpn app anyway it feels like I could kill 2 birds with one stone that way (see linked issue above)

Geniy00 commented 2 years ago

It will work for me.

I understand that some calls can be sent to the goal under attack, and my real IP can be leaked, but I think it's a good reason to stop attack ASAP

tony1492 commented 2 years ago

That is best idea hopefully that will work with linux too lol !

arriven commented 2 years ago

Implemented it in https://github.com/Arriven/db1000n/commit/8951bbb66d98262e869bd4ca15ffc68fe6480c09 You'll need a combination of --strict-country-check and --country-check-interval <interval> to have a desired effect

The release should be available soon, I just want to check if everything works correctly first