-
Notifications
You must be signed in to change notification settings - Fork 0
/
findDDos.py
84 lines (81 loc) · 2.67 KB
/
findDDos.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
# coding=UTF-8
import dpkt
import socket
import optparse
def findDownload(pcap):
for (ts,buf) in pcap:
try:
eth = dpkt.ethernet.Ethernet(buf)
ip = eth.data
src = socket.inet_ntoa(ip.src)
tcp = ip.data
http = dpkt.http.Request(tcp.data)
if http.method == 'GET':
uri = http.uri.lower()
if '.zip' in uri and 'loic' in uri:
print('[!]' + src + ' Downloaded LOIC.')
except:
pass
THRESH = 10000
def findAttack(pcap):
pktCount = {}
for (ts,buf) in pcap:
try:
eth = dpkt.ethernet.Ethernet(buf)
ip = eth.data
src = socket.inet_ntoa(ip.src)
dst = socket.inet_ntoa(ip.dst)
tcp = ip.data
dport = tcp.dport
if dport == 80:
stream = src + ':' + dst
if pktCount.has_key(stream):
pktCount[stream] = pktCount[stream]+1
else:
pktCount[stream] = 1
except:
pass
for stream in pktCount:
pktsSent = pktCount[stream]
if pktsSent>THRESH:
src = stream.split(':')[0]
dst = stream.split(':')[1]
print('[+]' + src +' attacked' +dst +' with' + str(pktsSent) + 'pkts.')
def findHivemind(pcap):
for (ts,buf) in pcap:
try:
eth = dpkt.ethernet.Ethernet(buf)
ip = eth.data
src = socket.inet_ntoa(ip.src)
dst = socket.inet_ntoa(ip.dst)
tcp = ip.data
dport = tcp.dport
sport = tcp.sport
if dport == 6667:
if '!lazor' in tcp.data.lower():
print('[!] DDoS Hivemind issued by:' + src)
print('[+] Target CMD:' + tcp.data)
if sport == 6667:
if '!lazor' in tcp.data.lower():
print('[!] DDoS Hivemind issued by:' + src)
print('[+] Target CMD:' + tcp.data)
except:
pass
def main():
parser = optparse.OptionParser("usage%prog -p<pcap file> -t <thresh>")
parser.add_option('-p',dest='pcapFile',type='string',hlep='specify pcap filename')
parser.add_option('-t',dest='thresh',type='int',help='specify threshold count')
(options,args) = parser.parse_args()
if options.pcapFile ==None:
print(parser.usage)
exit(0)
if options.thresh !=None:
THRESH = options.thresh
pcapFile = options.pcapFile
f = open(pcapFile)
pcap = dpkt.pcap.Reader(f)
findDownload(pcap)
findHivemind(pcap)
findAttack(pcap)
if __name__ == '__main__':
main()