As you’ll already be aware, DDoSin or participating in any kind of cyber-attack in general is illegal, and usually for good reason.
Click "Continue" if you have a VPN, Proxy, the Tor browser or your own secure connection & wish to support Ukraine in taking down Russian propaganda and services aiding Putins invasion
This works by sending GET requests to each targeted website. It’s like opening each website in a random sequence on your PC and re-requesting the data over and over, although the data is not saved or cached, Due to the way it work, It should be fair to say that your Internet service Provider (ISP) won’t be any more bothered about this than they would you browsing the internet, but its always best to stay safe when it comes to security.
Todays message from the IT Army of Ukraine:
|
While experts continue to debate how to distinguish hackers from hacktivists, we offer a simple formula - just as a murderer differs from a soldier. IT ARMY is not only the world's first mass demonstration of hacktivism but also a consistent example of how important it is to create an ethical, and then legal, space for this phenomenon of modern cyber warfare. It's gratifying that the SecurityWeek article cites the proactive stance of IT ARMY of Ukraine regarding openness to the regulation of cyber operations.. |
Additional message for newly added targets:
To keep up with targets we're going to use the db1000n targets
direct from their GitHub repository.
These updates will be daily, so if the db1000n changes, it will
probably take a few hours longer for the change to make it here.