UDP Flood: A type of attack in which random ports on the target are overwhelmed by IP packets containing UDP datagrams. This attack exploits weaknesses in the TCP connection sequence, known as a three-way handshake. SYN Flood: A succession of SYN requests is directed to the targets system in an attempt to overwhelm it. UDP Flood, TCP Flood, NTP Amplification and DNS Amplification are some examples.
Volumetric attacks are easy to generate by employing simple amplification techniques, so these are the most common forms of attack. Volumetric Attacks send high volumes of traffic in an effort to saturate a victims bandwidth. Such attacks consume all the processing capacity of the victim or other critical resources (a firewall, for example), resulting in service disruption. These attacks exploit a weakness in the Layer 7 protocol stack by first establishing a connection with the target, then exhausting server resources by monopolizing processes and transactions. Running it against someone elses network or server, resulting in denial-of-service to their legitimate users, is illegal in most countries. VSE flood that sending specific payloads - can be used against Valve Source Engine servers (cs, csgo, etc.Testing ones own network or server is a legitimate use of booting websites. Random IP Protocol flood that sending random IP protocol with random data in each packet, can be used to bypass protected servers/hosting. Can be used to bypass some firewalls or cause a high CPU load for some servers Spoofed UDP flood that sending random small packets to achieve max packets per seconds as possible. Spoofed UDP flood that sending random big packets to achieve more bandwidth. Spoofed TCP-TFO flood that sending syn&syn-ack packets with TCP FAST OPEN option within the packet. Spoofed TCP-ACK flood that sending ack packets with tcp-options within the packet. Spoofed TCP-SYN v2 flood that sending syn packets with tcp-options within the packet. Spoofed TCP-SYN flood that sending syn packets with tcp-options within the packet. TCP Amplification flood that sending SYN-ACK within the TCP packet using TCP Reflectors - can be used to bypass some firewalls or cause a high CPU load for some servers *This method require HIGH power which means you need to use few concurrents. Spoofed UDP flood for OVH servers that sending random data within the UDP packet. This method generate medium raw power in terms of Gbps. Unique attack method that flooding the target with a lot of UDP-SN packets. This method generate high raw power in terms of Gbps. Unique attack method that flooding the target with a lot of UDP-DN packets. (Mix only udp attack methods that available to your membership plan). Unique method which mix ALL CyberVM UDP attack methods per one attack. HTTP-ENGINE: Using real browsers to bypass ddos protection challanges (JS/Captcha). HTTP-RAW-SOCKET: Using Advanced HTTP Client with custom features to send high quality flood from different proxy pool that able to send a lot of requests per second. HTTP-RAW: Using Advanced HTTP Client with custom features to send high quality flood.