Skip to content

New Attack Methods Added — FIVEM-TOKEN, DISCORD, OVH-UDP #660

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 13 commits into
base: main
Choose a base branch
from

Conversation

CirqueiraDev
Copy link

New UDP Methods for MHDDOS

This update introduces three new Layer 4 UDP flood methods to the MHDDOS project. Each one is designed to target specific platforms or protections, using advanced spoofing and payload randomization techniques.


1. FIVEM-TOKEN

Purpose:
Simulates traffic typical to FiveM servers by flooding UDP with token-based authentication payloads.

Implementation details:

  • Generates a random UUID token and a SteamID-like guid within valid ranges.
  • Encodes them into an HTTP-like query string: token=...&guid=...
  • Sends via UDP socket repeatedly to the target.

Effect:
Floods the target with seemingly valid authentication requests to stress token validation systems.


2. DISCORD

Purpose:
Targets Discord servers or similar UDP-based services by sending spoofed UDP packets with randomized payloads.

Implementation details:

  • Constructs raw IP packets with spoofed source IPs (__ip__).
  • Uses random UDP source ports in the range 32768–65535.
  • Payload is 40 bytes of fully randomized binary content.

Effect:
Creates a high-rate UDP flood with unpredictable content to saturate bandwidth or processing power.


3. OVH-UDP

Purpose:
Bypasses OVH’s game server protections and WAFs by sending complex UDP packets containing fake HTTP-like headers and randomized binary payloads.

Implementation details:

  • Each cycle sends 2–4 spoofed UDP packets.
  • Randomizes the HTTP method: PGET, POST, HEAD, OPTIONS, PURGE.
  • Randomly selects obfuscated paths such as:
    • /0/0/0/0/0/0
    • \\0\\0\\0\\0\\0\\0
    • /null
    • /%00%00%00%00
  • Payload size varies from 1024 to 2048 bytes, generated with randbytes.
  • Final payloads are encoded with latin1 and inserted into spoofed raw IP/UDP packets.

Effect:
Produces diverse, hard-to-detect UDP traffic resembling malformed or semi-legitimate requests, ideal for bypassing deep packet inspection and OVH filtering.


All implementations follow the project’s existing structure and support proper threading, spoofing, and stat tracking.


@mrzt721010
Copy link
Member

I'll check this out.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy