Closed H25E closed 1 year ago
Hi @H25E
Could you please share the full cli command or config file
{
"iteration_count": 5000000,
"duration": 3000,
"steps": [
{
"id": 1,
"url": "https://something.com/",
"name": "bad login",
"method": "POST",
"payload": "id={{_randomString}}&pwd={{_randomString}}&some_other_static_stuff",
"headers": {
"Accept": "*/*",
"Accept-Encoding": "gzip, deflate, br",
"Accept-Language": "en-US,en;q=0.5",
"Cache-Control": "no-cache",
"Connection": "close",
"Content-Length": "64",
"Content-Type": "application/x-www-form-urlencoded;charset=UTF-8",
"Host": "something.com",
"Origin": "https://something.com",
"Pragma": "no-cache",
"Referer": "https://another.com/",
"Sec-Fetch-Dest": "empty",
"Sec-Fetch-Mode": "cors",
"Sec-Fetch-Site": "same-site",
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/109.0"
}
}
],
"others": {
"keep-alive": false,
"disable-compression": false,
"h2": true
}
}
Thank you, We will investigate the issue and update this thread as soon as possible
Hi @H25E, this is solved in the latest version of Ddosify. Thanks for reporting this issue. We're closing this now, but please don't hesitate to reopen if it happens again.
I'm doing some testing with your software. On a test with 1650 POSTS requests per second, where on the body of the request
{{_randomString}}
it's used twice, I get the following output after a few minutes:Tested on debian 11.