![how to use quez stresser youtube how to use quez stresser youtube](https://i.ytimg.com/vi/HD4fJTEnVps/maxresdefault.jpg)
This resulted in a very small attack in Kbit traffic (which is not even worth mentioning) and single digit source IPs.
HOW TO USE QUEZ STRESSER YOUTUBE FREE
We have first tested targeting our network equipment with ddos services that offer free attacks. Signup is easy as the DDoS services often don’t even require an email address.
HOW TO USE QUEZ STRESSER YOUTUBE TRIAL
Most of them offer a free trial (like launching the attack for 60 seconds), which is good enough for the use case here. Note that no DDoS service here was vetted and they may or may not be scams. was registered on via the Chinese registrar. The paid packages start at $15 per month for “1200 seconds per attack” and go up to $500 per month for “10800 seconds per attack”. There is a free tier, but it does not mention how strong the free attack is. It lists the Telegram contacts “torstress” and “xCrucial”. There are multiple upgrades, including the option to launch “concurrent attacks” (which does not make much sense since DDoS attacks are already distributed by nature i.e., concurrent attacks from many machines) as well as “Premium +€150” and “Enterprise +€300” “attack network” options.Īccording to our whois data at, the domain was registered on via the Chinese registrar. The pricing starts at €50 for 10 minutes. There is a YouTube channel which joined in October 31, 2018. The Telegram account, “jeffspender”, is linked in the footer as the contact person. It claims to bypass multiple DDoS-protection providers, including “Cloudflare on all its modes, Blazingfast, CyberDDOS, Sucuri WAF, and almost all other DDOS protections”. Īccessible via and, it claims to support “Layer 3, Layer 4, and Layer 7 DDos methods”. There is a recent blog post here discussing law enforcement actions against DDoS providers. They are often advertised on hacking forums and can be found via search engines. The first step is to find an actual DDoS provider. We do not recommend anyone to launch DDoS attacks. We are our own ISP and operate our own Autonomous System and IP addresses. Note: We own 100% of our infrastructure including the servers, network equipment, and even our own BGP router. ⚡Īll findings will be wrapped up in this blog post: - Intelligence X May 9, 2020 Can we #DDoS ourselves? We will find out tomorrow 13:00 UTC and live tweet about the attack.