Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[TUT] Setting up booting API on a server/enabling spoof
#1
Allright, my third tutorial Smile
What you will need:
Basic knowledge on managing servers.
A server, wich allows spoofing (Pick CentOS 6)

Allright lets start
Installing everything you need:
[spoiler]
First of all, install httpd
Code:
yum install httpd
Then, install PHP
Code:
yum install php
After that, install the dependencies:
Code:
yum install gcc php-devel php-pear libssh2 libssh2-devel
These will allow us to build the SSH2 extension using pecl.
Next, run this code:
Code:
pecl install -f ssh2
After running that command, it should stop at a line like:
WARNING: channel "pecl.php.net" has updated its protocols, use "pecl channel-update pecl.php.net" to update
downloading ssh2-0.11.3.tgz ...
Starting to download ssh2-0.11.3.tgz (23,062 bytes)
........done: 23,062 bytes
5 source files, building
running: phpize
Configuring for:
PHP Api Version: 20090626
Zend Module Api No: 20090626
Zend Extension Api No: 220090626
libssh2 prefix? [autodetect] :
All you have to do is hit Enter and it should detect the proper path.
Once the install is completed, you just have to tell PHP to load the extension when it boots.
Code:
touch /etc/php.d/ssh2.ini
echo extension=ssh2.so > /etc/php.d/ssh2.ini
Now restart your webserver and test to see if the changes took effect.
Code:
/etc/init.d/httpd restart
php -m | grep ssh2
You should get a line returned with ‘ssh2′.[/spoiler]
Good job, now you have PHP installed with the SSH2 extension.
Next, enable spoofing on the server:
[spoiler]
Just run these commands:
Code:
1.yum install gcc -y
2.yum update
3.yum install cpan
4.cpan
5.install Net::RawIP
If you want to exit cpan, hit CTRL + C two times.[/spoiler]
Good, now you have spoofing enabled.
Next step is uploading the attack scripts and API system.
[spoiler]
Download these files: http://adf.ly/gIrl3 (Sry, but i need $$)
Then, drop the udp.pl, ssyn.pl, and flood.pl to your /root/ folder.
Install perl to your server with
Code:
yum install perl
Then edit the attack.php, and add your server details onto it.
Head to the folder /var/www/html/ on your filezilla/winSCP, and upload it there.
Then restart httpd with
Code:
/etc/init.d/httpd restart
And voilá, you can use it with
http://*YOUR SERVER IP*/attack.php?method=UDP&host=[host]&time=[time]&port=[port].[/spoiler]
I hope this helped. I dont personally know yet, how i can add my AMP lists to make the servers hit harder, but i will edit this tutorial or post new one, when i figure it out Smile
Reply
#2
Great share buddy. Smile
Do NOT PM me for any inquiries related to advertising on PacketPunks. 

For our change log, CLICK HERE.
For our help docs, CLICK HERE.
Reply
#3
Many of the user will defiantly find this useful thanks OP great tutorial
Reply
#4
No problemo guys Smile Atleast i got something to do when i made these tut's Tongue
Reply
#5
Thanks for this tut, i will try to do it. But how do you know whether the vps's are able to be spoofed or not?
I have a vps that i use for other things, is there a command i can use to check if it can be spoofed?
[Image: walter-white-onewhoknocks.gif]
Reply
#6
It should be written on your hosts TOS or policy or something, if you want, i can link you a file wich requires spoofing, if you do those commands, and try to run the file, and it shows error, then your hosting has disabled spoofing
Reply
#7
(03-16-2014, 10:23 PM)Tumppi⁴²⁰ Wrote: It should be written on your hosts TOS or policy or something, if you want, i can link you a file wich requires spoofing, if you do those commands, and try to run the file, and it shows error, then your hosting has disabled spoofing

Yeah, most will state whether they allow packet modification (aka spoofing) on the servers, you can just submit a ticket and ask the host whether they allow packet modification, if they say yes, that server can be used to spoof packets.
Do NOT PM me for any inquiries related to advertising on PacketPunks. 

For our change log, CLICK HERE.
For our help docs, CLICK HERE.
Reply
#8
(03-16-2014, 10:23 PM)Tumppi⁴²⁰ Wrote: It should be written on your hosts TOS or policy or something, if you want, i can link you a file wich requires spoofing, if you do those commands, and try to run the file, and it shows error, then your hosting has disabled spoofing
That would cool, can you pm me a download link?
[Image: walter-white-onewhoknocks.gif]
Reply
#9
Wonderful share Smile Glad to see people posting in this forums.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)