How to Create Botnet for D-Dos Attack with UFONet

Remember: this tool is NOT for educational purpose.

Usage of UFONet for attacking targets without prior mutual consent is illegal.

It is the end user’s responsibility to obey all applicable local, state and federal laws

UFONet – is a free software tool designed to test DDoS attacks against a target using ‘Open Redirect’ vectors on third party web applications like botnet

Features

  • Auto-update
  • Clean code (only needs python-pycurl)
  • Documentation with examples
  • Web/GUI Interface
  • Proxy to connect to ‘zombies’ (ex: tor)
  • Change HTTP Headers (User-Agent, Referer, Host…)
  • Configure requests (Timeout, Retries, Delay…)
  • Search for ‘zombies’ on google results (using a pattern or a list of dorks)
  • Test ‘Open Redirect’ vulnerabilities on ‘zombies’
  • Download/Upload ‘zombies’ from Community
  • Inspect a target (HTML objects sizes)
  • Set a place to ‘bit’ on a target (ex: big file)
  • Control number of rounds to attack
  • Apply cache evasion techniques
  • Supports GET/POST
  • Multithreading
  • Different search engines for dorking
  • Web interface
  • Geomapping / Visual data
  • Order ‘zombies’ to attack you for benchmarking

First of all download UFONet from sourceforge by  this link:

https://sourceforge.net/projects/ufonet/

and extract it and enter the folder and open up the terminal and now list all the options available with this command ./ufonet  –help

Now we have to download all the zombies that will be used for attack.Open the terminal and type:

./ufonet  –download-zombies

Now type the following command for using the GUI version:

./ufonet  –gui

The above command will open a browser with GUI options .Click on START MOTHERSHIP.

Now it will open up a GUI with different options.

Now click on Botnet option.

Clicking on Botnet will give many options to configure.

Now clicking on List Zombies will list all the Zombies it will be using for the attack.

Now click on Attack option.

Set the target to your target URL or your target IP and set the number of rounds as per your need and click on start for the attack.

As you can see first round of attack is started from multiple zombies and after a time the host  will be down.

Author: SURAJ KUMAR

Suraj Virus

comprehensive information on Ethical Hacking Tutorial, Computer science, Cloud Computer, Programming Languages ,Networking Computer Forensics ...

Post a Comment

Previous Post Next Post