Implement DDoS ping attack by X-SCAN

xiaoxiao2021-03-06  41

Disadvantages:

1. For the words of x-scan, it is undoubtedly an IP that exposes an attacker (whether you are using your own system or someone else's system.

The result is the IP of the system that exposes the attack.

2. For snail bombs or AHBOMB, the result is the log of the attacker's system will record the use of snail bombs or AHBOMB.

The IP of the system is.

. bar.

First, come from here,

When I started, I can't talk about two kinds of DDOS ping bomb tools.

One is a snail bomb, one is ahbomb.

The snail bomb came very early, through the search for the search with vulnerabilities, be reserved, huh, when needed,

Controls these vulnerable servers centralized ping attack targets, resulting in slowing the target network speed, achieving DDoS attack purposes.

Ahbomb is a more powerful attack tool written by Bigball, (Oh, here is very grateful to him to give me an unlimited version)

In essence, AHBOMB's realization method and snail bomb have no difference, but because the program is very excellent, multi-threaded

Particularly written is particularly perfect, and the default parameters are likely to be a fattening blow to the attacker.

Ha ha

Still analyzing it:

First talk from the snail bomb

It has a search process, search for the host of Unicode vulnerability, then save the host address in the server.dll file

When you need to implement the attack, you will attack all the servers.

I attack a virtual target 200.200.200.200 this IP, but province's intercepted packets:

Front part

Get /scripts/..

转载请注明原文地址:https://www.9cbs.com/read-75399.html

New Post(0)