[10 Steps] How to install DDoS Deflate from GitHub on Ubuntu helps us protect our home servers.

If you have an old laptop with the battery removed for safety reasons, you can use it as a home server that's plugged in all the time.

Compatibility: DDoS Deflate (GitHub) is not compatible with Pi-Hole. Squid Proxy must be configured to enable internet sharing using an HTTP proxy, thus filtering DDoS attacks and blocking ads simultaneously.

If there are no DDoS attacks and you want to minimize the risk, we recommend installing ClamAV (Antivirus) on your Ubuntu or Debian (GNOME) Desktop.

How to install:
sudo apt install clamav clamav-daemon

Enable automatic virus updates upon boot:
sudo systemctl enable clamav-freshclam --now

The Domain Name System (DNS) handles the transmission of incoming internet data, but it does not use the internet in a proxy system.

To install or extract the DDoS Deflate file from GitHub on Ubuntu, the following features must be installed to be used:

1. APT package update and upgrade: apt update && apt upgrade -y

Keep your operating system updated. For example, with Ubuntu: Go to "Settings" > System > Software Update.

2. Install the necessary APT packages or features to enable DDoS deflate: apt install dnsutils net-tools tcpdump dsniff grepcidr unzip -y

These are the required features to be installed in order to use DDoS Deflate.

3. After installing the necessary package features, navigate the file to /tmp (cd).

4. [wget] Download DDoS Deflate and unzip the file to install: wget https://github.com/jgmdev/ddos-deflate/archive/master.zip -O ddos.zip

If the download link doesn't work, download the zip file directly from Dropbox and click the download icon to download it: https://www.dropbox.com/scl/fi/zbmyz240skarrfb914b8z/ddos-deflate-master.zip?rlkey=auy5ypa5bzkslug49da8m6ck4&st=x9obzgt9&dl=0

5. Extract the file: unzip ddos.zip

If you don't need to extract files locally, such as no unzipping or anything like that, switch to running Windows PE from USB.

6. Install DDoS Deflate: cd ddos-deflate-master
./install.sh or bash install.sh

7. On the command screen: Wait until the installation is complete and do nothing yet. The installation will take only a few seconds.

8. Edit the DDoS Deflate configuration file using nano: /etc/ddos/ddos.conf

For versions that do not support nano, install nano: sudo apt install nano.

Add the following lines of text:
KILL=1 (Add or optional)
APF_BAN=0 (Add or optional)

Save and exit

Optional additional note: Back up the configuration file as a .txt file in case of loss. Command: sudo cp /etc/ddos/ddos.conf /etc/ddos/ddos.txt

9. After configuring the configuration file, restart DDoS Deflate, will take effect immediately: sudo systemctl restart ddos

(Optional) Set DDoS Deflate on boot or run it continuously: sudo systemctl enable ddos && sudo systemctl --now enable ddos

Or

Edit crontab -e > add the following line of text to automatically run every 1 minute after the DDoS Deflate service stops attacking continuously: */1 * * * * systemctl start ddos

Save and exit

10. Test if a DDoS attack occurs.
Command: ddos -v

Please note: You can still install the Pi-Hole add-on and configure DNS to protect against and stop DDoS attacks, and it's definitely effective.

For TP-Link routers using HomeShield, there's a subscription fee if you don't need it: try it out for free to protect against DDoS attacks, with Pi-Hole ad blocking and the ability to stop DDoS attacks.

Comments

Popular posts from this blog

How to Clone from Old Router PPPoE (Even Don't Remember PPPoE or Hide Password) to Retrieve PPPoE Settings from Old Router Using TP-Link Wi-Fi 6 Router to Transfer to New Router (Bought) and Work Normally 2025? | Hackers Help to Smuggle Internet