Step 2: Sending Attacks and Extracting IPs


Overview

This guide will walk you through the process of sending attacks using the Sign Booter system, including how to extract an IP address and confirm that your attack was successful.


Step 1: Logging into Sign Booter

  1. Open the Sign Booter terminal and log in using your credentials.

  2. After logging in, type the command methods and press Enter.

    • This will display the list of available attack methods in the terminal.

    • Example:


Step 2: Choosing an Attack Method and Executing

  1. Select one of the methods listed in the terminal. For example, cod-udp.

  2. Ensure to include the period (.) before the method when entering the command.

    • Example command format:

      .cod-udp (Target IP) (Port) (Duration)
  3. Replace (Target IP), (Port), and (Duration) with the respective values:

    • Target IP: The extracted IP address.

    • Port: The target port (e.g., 3074 for Call of Duty).

    • Duration: The attack duration in seconds.

  4. After entering the full command, press Enter to send the attack.


Step 3: Extracting the IP Address

If you don’t know the target IP address, follow these steps:

  1. Open NetLimiter

    • Launch the NetLimiter application on your PC.

  2. Start a Game Session

    • Join a match in your game and ensure NetLimiter is running in the background.

  3. Identify the IP Address

    • In NetLimiter, click on the Processes tab and locate the process associated with your game (e.g., Call of Duty).

    • Play the match for about a minute to allow data to accumulate.

    • Look for the IP with the highest KB/s rate. This is typically the host’s IP address.

    • Example for identifying the correct IP:

  4. Copy the IP Address

    • Once identified, copy the IP address for use in the attack command.


Step 4: Sending the Attack

  1. After entering the attack command, press Enter.

  2. To confirm your attack was successfully sent:

    • Check if the following screen appears with details like the target IP, port, and duration:


Important Notes

  • Ensure Proper Formatting

    • Always include the period (.) before the method name when entering commands.

    • Verify all parameters (IP, Port, Duration) are correct before pressing Enter.

  • Safety and Reliability

    • The Sign Booter system is safe, undetectable, and highly reliable for use.