Wednesday, October 30, 2013

[Image: CcnhN.png]

[Image: ZrpyI.png]

[Image: glMi3.png]


DoS.Pl Script
[Image: xppqN.png]

Login as per normal. (normally the username is root & the password is provided by the host provider) This tutorial is based on CentOS.

Code:

yum install perl -y

[Image: a374241aa4be2c62d583b1ecf6b2bd70.png][Image: e3cde4e8fbd6ca2fcd77d58b85556552.png][Image: 62c61bff7457903f9371c6fa6d1d9251.png][Image: d652aac1052a0b16f3099413041e24ea.png]

[Image: 3eERI.png]

Log into WinSCP (with the same details as you had used before to log into PuTTy)

Drop the "dos.pl" anywhere on that page.

[Image: d8ab049c3363c7c764fee70fc2645dda.png]

[Image: 5cf2c672ff05cc62deaa0edaee2edf27.png]

[Image: HUr31.png]
Log back into PuTTy and type the following to launch an attack

Code:

perl dos.pl <ip> <port> 65500 <time>


Code:

perl dos.pl 1.1.1.1 80 65500 120

[Image: 8343d2151f1d357b04e2f9530a4e367b.png]
Categories:

0 comments:

Post a Comment

Subscribe to RSS Feed Follow me on Twitter!