Student Makes X4U Doser DDoS Tool Available

  • Oliver Adam
  • March 20, 2018


Student Makes X4U Doser DDoS Tool Available

Just like PDF tools or programs for blocking online ads, tools for running DDoS attacks can be simply downloaded from the internet, free of charge. One of these programs was created by a student calling themselves FathurION. The tool called X4U Doser enables anyone to launch DDoS attacks on targets of their choosing, even without any in-depth technical knowledge.

The first version of X4UD was released in the summer of 2016. After numerous updates, the tool is now available in its 3.0 version. The DDoS protection experts of the Link11 Security Operation Center (LSOC) have examined the script to find out how dangerous it is. Its creator precludes its use for attacks in the terms of use, which is unlikely to deter attackers, however.

Stress test tool available to anyone on the internet

X4U Doser can be easily found on the clear web as a zip file download. This is a description by its creator: “X4U Doser is a free , strong , and maximum network stress testing and distributes / denial-of-service attack application , written in .net languanges , and developed by X4U Hacker.” The version is a program of approximately 6 MB that places a red and black icon on the desktop after unzipping. The user interface is in red and black as well. The “! About” button in the top right corner indicates that X4U Doser is freeware. Users can report bugs and issues by e-mail to  x4uhacker.develop[at] The “CHECK FOR UPDATE” button leads to the official download platform, which also offers a spamming tool and an MD5 converter.

The programmer has made it as simple as possible to use the tool. An IP address has to be entered as a target. The “Find IP Address” button converts the target’s URL into a usable address. For example, (an LSOC test URL) is turned into the IP address and then only requires confirmation by clicking “Confirm”.

X4U Doser offers various attack options. “Army Quality”, “Ping Quality” and “UDP Quality” can be set to “Minimum”, “Normal”, “Extreme”, “Maximum” or “X-Maximum”. For testing purposes, the LSOC selected the highest level, X-Maximum, for all 3 parameters. Port 80 (http) is preset as a default. Before launching the attack using “ATTACK !”, the LSOC activated packet capture to track network traffic.

When the attack was confirmed, X4U Doser recommended to refrain from opening other programs to conserve RAM.

User interface of the DDoS tool X4U Doser

User interface of the DDoS tool X4U Doser

User interface of the DDoS tool X4U Doser

User interface of the DDoS tool X4U Doser

User interface of the DDoS tool X4U Doser

User interface of the DDoS tool X4U Doser

DDoS attacks in just a few clicks

The Windows Task Manager indicated an elevated CPU load.

CPU load while the attack is running

Both the network and Wireshark Trace filled up with packets, so the LSOC could terminate the attack after only 2 minutes.

CPU load while the attack is running

The test attack  had 3 DDoS vectors

The first attack vector on was identified as an ICMP flood. It peaked at approximately 120 ICMP requests per second.

Packet capture of the DDoS vector ICMP flood

Number of packets (packets per second) of the ICMP flood

Moreover, UDP packets were found as part of a UDP garbage flood. Simultaneously with the ICMP flood, various UDP ports were hit at 19 bytes per packet.

Packet capture of the DDoS vector UDP garbage Flood

The third vector in this attack was a HTTP GET flood on “/” with HTTP in the 1.0 version. The network analysis indicated that up to 600 HTTP requests reached the server.

Packet capture of the DDoS vector HTTP GET flood

Number of sessions per second (packet capture SYN packets/second)

DDoS attacks with X4U Doser have limited effect

It’s not necessary to have in-depth IT knowledge to put X4U Doser to work. The program is clearly aimed at „noobs“ looking to use overload attacks to support hacktivism activities or pursue their own goals. X4U Doser makes it possible to bring 3 attack vectors to bear simultaneously to hit a target. Web servers are kept busy with HTTP requests, while ICMP and UDP packets clog up the lines. The firewall, too, has to process all 3 attack vectors. In multi-vector attacks like this, 1 successful vector can be enough to take the target offline.

Still, the attack was unsuccessful, and the unprotected test server stayed online continuously. The attacking PC, on the other hand, was very poorly equipped. If the test attacks were repeated using significantly more powerful computers, the results may be different. Cybercriminals Anonymous work collectively in many cases, with many attackers bombarding targets instead of just one. This strategy is what turns a DoS attack into a DDoS attack with considerably higher packet rates.

New High-Volume Vector: Memcached Reflection Amplification Attacks
Link11 presents its Partner Program
This site is registered on as a development site. Switch to a production site key to remove this banner.