Available Methods
Miku Miku Beam implements five distinct attack methods, each designed for different use cases and network layers.HTTP Flood
High-volume HTTP requests with GET/POST methods
HTTP Bypass
Browser-mimicking requests to bypass basic protections
Slowloris
Slow header transmission to exhaust server resources
TCP Flood
Raw TCP packet flooding for Layer 4 testing
Minecraft Ping
Minecraft server status request flooding
HTTP Flood
Method ID:http_floodProtocol: HTTP/HTTPS
Supported Proxies: HTTP, HTTPS, SOCKS4, SOCKS5
Implementation
Location:internal/attacks/http/flood.go
Strategy
Sends rapid HTTP requests alternating between GET and POST methods based on packet size:- Small packets (≤512 bytes): 50% GET, 50% POST
- Large packets (>512 bytes): Primarily POST
Request Patterns
GET Requests: Payload appended to URL pathPayload Generation
Random alphanumeric strings using charactersa-zA-Z0-9:
Characteristics
- Timeout: 5 seconds per request
- Redirects: Follows up to 3 redirects
- TLS: Accepts all certificates (
InsecureSkipVerify: true) - Response handling: Body discarded immediately to free resources
HTTP Flood is optimized for maximum request rate. Responses are read and discarded without processing.
HTTP Bypass
Method ID:http_bypassProtocol: HTTP/HTTPS
Supported Proxies: HTTP, HTTPS, SOCKS4, SOCKS5
Implementation
Location:internal/attacks/http/bypass.go
Strategy
Mimics legitimate browser traffic to bypass basic rate limiting and bot detection:- Randomized URL paths with realistic extensions
- Browser-like headers (Accept, Accept-Language, Accept-Encoding)
- Referer headers (same-origin or popular sites)
- Randomized cookies
- 80% GET, 20% POST distribution
Path Randomization
.js, .css, .png, .jpg, .svg, or none
Header Mimicking
Referer Generation
50% same-origin, 50% popular sites:Characteristics
- Timeout: 6 seconds per request
- Redirects: Follows up to 3 redirects
- Query strings: 50% include random cache-busting parameter
- Cookies: 50% include Google Analytics-like cookies
HTTP Bypass sacrifices some speed for stealth, appearing more like legitimate traffic patterns.
HTTP Slowloris
Method ID:http_slowlorisProtocol: HTTP/HTTPS
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/http/slowloris.go
Strategy
Opens connections and sends HTTP headers slowly, never completing the request. This exhausts server connection pools by holding connections open indefinitely.Attack Flow
- Establish TCP/TLS connection to target
- Send initial request line:
- Dribble headers slowly (one per
PacketDelayinterval): - Never send final
\r\nto complete headers - Keep-alive packets: Send dummy headers periodically
Connection Lifecycle
EachFire() call spawns a goroutine that maintains the connection:
Characteristics
- Connection duration: Indefinite (until attack stops or server closes)
- Resource consumption: Minimal bandwidth, maximum connection slots
- TLS support: Automatically wraps HTTPS targets with TLS
- Header rate: Controlled by
PacketDelayparameter
Slowloris is most effective against servers with low connection limits. Modern servers with proper timeouts may be resistant.
TCP Flood
Method ID:tcp_floodProtocol: TCP (Layer 4)
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/tcp/flood.go
Strategy
Establishes TCP connections and sends bursts of random binary data, testing network and application layer capacity.Attack Flow
- Parse target as
host:port(no URL scheme) - Establish TCP connection (with optional SOCKS proxy)
- Generate random bytes using
crypto/rand - Send initial burst of
PacketSizebytes (default 512) - Send additional bursts (1-3 random count)
- Close connection
Characteristics
- Write deadline: 2 seconds
- Payload: Cryptographically random bytes
- Burst count: 1-4 total writes per connection
- Connection lifecycle: Short-lived, closed after bursts
TCP Flood targets Layer 4. Use this for testing network infrastructure, firewalls, and TCP-based services.
Minecraft Ping
Method ID:minecraft_pingProtocol: Minecraft Server List Ping (TCP)
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/game/minecraft_ping.go
Strategy
Sends legitimate Minecraft server status requests following the Server List Ping protocol. This tests Minecraft server capacity to handle status queries.Protocol Implementation
Follows Minecraft protocol specification (protocol version 754): 1. Handshake Packet (0x00):Packet Construction
VarInt Encoding
Minecraft uses variable-length integer encoding:Port Defaulting
Automatically uses Minecraft’s default port:Characteristics
- Connection timeout: 3 seconds
- Response handling: Reads and discards 256 bytes + 64 bytes
- Protocol compliance: Fully compliant with Minecraft Server List Ping
- Target format:
hostname:portor justhostname(uses 25565)
This attack is specific to Minecraft servers and won’t affect non-Minecraft services, even if they listen on port 25565.
Proxy Compatibility Matrix
| Method | HTTP/HTTPS Proxy | SOCKS4/5 Proxy |
|---|---|---|
| HTTP Flood | ✅ | ✅ |
| HTTP Bypass | ✅ | ✅ |
| HTTP Slowloris | ❌ | ✅ |
| TCP Flood | ❌ | ✅ |
| Minecraft Ping | ❌ | ✅ |
Method Selection Guide
Use HTTP Flood when:
- Maximum request rate is the priority
- Testing raw HTTP server capacity
- Target has no bot protection
Use HTTP Bypass when:
- Target has basic rate limiting or bot detection
- Need to blend in with legitimate traffic
- Testing WAF or security rules
Use Slowloris when:
- Testing connection pool limits
- Target has limited concurrent connection capacity
- Low bandwidth but high impact needed
Use TCP Flood when:
- Testing Layer 4 infrastructure
- Target is a TCP service (not HTTP)
- Firewall or DDoS protection testing
Use Minecraft Ping when:
- Target is a Minecraft server
- Testing query handling capacity
- Legitimate protocol compliance required