All posts by Admin

How anonymous is a VPN

Everyone to everyone uses VPNs to hide their IP, access unblocked websites, stop themselves from being tracked. Either way most people use them.

When using a VPN it is easy for your real IP to be leaked out using a WebRTC from modern browsers (I.e Chrome, Firefox) from a STUN server, this protocol allows the ability to request out your real IP and is easily implemented. As you can see below I have a VPN dialed but my real IP is still pulled (I have since changed my IP)-

0cfae406c54b71405279eb1e3fd06d9c (1)

There are a few ways to stop this leakage the best is to configure your VPN at a router level as this stops any leakage and also stops torrent tracking . See below –

Now this will stop real IP leakage although local IP leakage is still susceptible as you can see below.



Other ways to stop leakage and easier for some are as follows –

– Mozilla Firefox: Type in the address bar type “about:config” . Scroll down until you find “media.peerconnection.enabled” , double click and to set it to false.
– Google Chrome: Install Google’s plugin WebRTC Network Limiter. (Other Plugins can be used a simple google will find them)


More information on why VPNs at router level are better and why I recommended it over the easier option. VPN’s at router level also prevent torrent tracking when a VPN is dial in a system IP leakage is a possibility and GEO location tracking can be used at web requests. On top of this it can help prevent DNS leakage as well. Now don’t mix DNS leakage and IP leakage as the same  with “DNS leak” this is different as an unencrypted DNS query is sent and requested by and from your system outside your VPN tunnel.


preview –

preview – (more info)

source –

The best vpn in my experience is:

The best booter is:




Protecting yourself while using a stresser/booter

When using a stresser/booter its always advised that you use a VPN. Now i myself use a VPN all the time to protect myself from other people DDosing me, grabbing my real IP and to anonymize myself on the net! A VPN is a virtual private network and encrypts all the incoming/out going traffic on your network, while doing this it masks your IP which prevents any other user grabbing your real IP.

VPN’s are generally really cheap at around $5/6 and it totally worth the small price. Most new VPN services will use a custom client or OpenVPN due to the simplicity and how secure they are compared to protocols like SSTP, PPTP and L2TP. OpenVPN use’s UDP or TCP ports to tunnel your network and encrypt all the data along the connection with the help of OpenSSL.

One VPN i really like and use is, because of its reliability, speed and support. As mentioned above anonymousvpns uses OpenVPN’s custom  protocol and is great for your anonymity. anonymousvpns is all automatic so as soon as you pay you receive the VPN, it also has a support ticket system to help you whenever you need it. Anyone looking for a simple,fast and reliable VPN just head over to there site and you will have a VPN within minutes!

If you’re looking for a good booter try: From my experience it is by far the strongest and cheapest on the market.

Stresser/booter common DDos methods!

Hi guys, new post here and today i’m going to share my knowledge on common attacks methods that most stressers/booters will use and they range from simple UDP attacks to layer 7 methods. I know when i started using stressers/booters i didn’t know the methods and what they do so hopefully this will clear it up for some of you guys.

Joomla – Similar to XMLRPC, Joomla uses a vulnerability in a site, to amplify the attack. So obviously this attack method is good and very strong against websites. Also like XMLRPC Joomla is a layer 7 attack method.

SSDP – Consists of alot of reflectors and uses an exploit configuration weaknesses in servers and is very powerful and on the rise, It is recorded that around 42% of all attacks are over 10Gbps using this attack method. So if it’s available it worth considering to use.

UDP- UDP is a simple attack where multiple UDP packets are sent to a target, the UDP packets are usually large sizes so can do a bit of damage but UDP packets can be filtered and discarded so it is possible to avoid this attack, if you plan to try take down simple home connection UDP can do that with no fuss.

UPD-lag- This involves the same methods and protocols as UDP but as i said the packets are usually a large size however UDP-lag has small packets which are designed to only lag the target, this works great on home connection and trying to slow the network down to little resources, but be careful as on small home connections it might well take it down. With UDP-lag you may also see on some booters/stresser a method called “home connections” this method consists of the same thing.

DNS Amplification – DNS can increase the size of the normal UDP packets from around 40 bytes to above the maximum-packet size of 4000 byte. The other great thing about this attack method is that its very hard to protect against as explained the data comes from a list of legit servers that have valid users.

CHARGEN – CHARGEN is old and still commonly used DDos attack method its alot like DNS and spoofs the IP so that the request can be accepted, CHARGEN attack causes a loop from the target to the host taking the network down, although CHARGEN isn’t the strongest out there it is still dam strong for what it does.

SNMP – SNMP is a very strong spoofed attack method which like DNS uses servers to spoof the IP and send out information to a target and is a greatly used attack method know for its simplicity and strength. SNMP only sends out little data but the data can be amplified to 25 times larger than what was sent, SNMP if good for testing them big networks!

XMLRPC- Is a good attack method for websites that uses a wordpress exploit to amplify the attack and cause some real damage. Although the exploit used to amplify the attack can be patched pretty easy when its not its damage can be done.

NTP – NTP is very strong spoofed attack method that uses servers to send out the data, with attacks reaching 100Gbps+ NTP is big thing to look out for use this attack method to get some real power behind an attack.

ESSYN- SYN uses a TCP protocol and even being used from home connection can be powerful but when used from big servers like stresser services use it gets even better, SYN requests are send to the target and requests for a answer and but no answer is given and the network grinds to a halt , shutting it down.

If any of you are still unclear on what the methods are and what they do, or i missed a method you want to know about leave a comment and i will add it in! Thanks for reading guys and i hope you enjoyed it!

So get started booting and head over to: