超级NB的防DDOS(小量级)攻击的脚本

# tree /usr/local/ddos//usr/local/ddos/├── ddos.conf

├── ddos.sh

├── ignore.ip.list

└── LICENSE0directories,4files

# ll /usr/local/sbin/ddos

lrwxrwxrwx 1root root23Sep1315:36/usr/local/sbin/ddos -> /usr/local/ddos/ddos.sh

# cat /etc/cron.d/ddos.cron

SHELL=/bin/sh*/1* * * * root /usr/local/ddos/ddos.sh >/dev/null2>&1

查看关键的几个脚本:

# cat ddos.conf

##### Paths of the script and other files

PROGDIR="/usr/local/ddos"PROG="/usr/local/ddos/ddos.sh"IGNORE_IP_LIST="/usr/local/ddos/ignore.ip.list"CRON="/etc/cron.d/ddos.cron"APF="/etc/apf/apf"IPT="/sbin/iptables"##### frequency inminutesfor running the script

##### Caution: Every time thissettingischanged, run the script with --cron

#####          option so that the new frequency takes effect

FREQ=1##### How many connections define a bad IP? Indicate that below.

NO_OF_CONNECTIONS=150##### APF_BAN=1(Make sure your APF versionisatleast0.96)

##### APF_BAN=0(Uses iptablesfor banning ips instead of APF)

#APF_BAN=1APF_BAN=0##### KILL=0(Bad IPs are'nt banned, good for interactive execution of script)##### KILL=1 (Recommended setting)

KILL=1##### An email issent to the following address when an IPis banned.

##### Blank would suppress sending of mails

EMAIL_TO="[email protected]"##### Number of seconds the banned ip should remain in blacklist.

BAN_PERIOD=600

# cat ddos.sh

#!/bin/sh

##############################################################################

# DDoS-Deflate version0.6Author: Zaf                         #

##############################################################################

# This program isdistributed under the"Artistic License" Agreement        #

#                                                                            #

# The LICENSE file islocatedinthe same directoryasthis program. Please  #

#  read the LICENSE file before you make copies or distribute this program  #

##############################################################################

load_conf()

{

    CONF="/usr/local/ddos/ddos.conf"if[ -f"$CONF"] && [ !"$CONF"=="" ]; then

        source $CONF

    else        head

        echo "\$CONF not found."        exit 1    fi

}

head()

{

    echo "DDoS-Deflate version 0.6"    echo "Copyright (C) 2005, Zaf "    echo

}

showhelp()

{

    head

    echo 'Usage: ddos.sh [OPTIONS] [N]'    echo 'N : number of tcp/udp    connections (default 150)'    echo 'OPTIONS:'    echo '-h | --help: Show    this help screen'    echo '-c | --cron: Create cron job to run this script regularly (default 1 mins)'    echo '-k | --kill: Block the offending ip making more than N connections'}

unbanip()

{

    UNBAN_SCRIPT=`mktemp /tmp/unban.XXXXXXXX`

    TMP_FILE=`mktemp /tmp/unban.XXXXXXXX`

    UNBAN_IP_LIST=`mktemp /tmp/unban.XXXXXXXX`

    echo '#!/bin/sh'> $UNBAN_SCRIPT

    echo "sleep $BAN_PERIOD">> $UNBAN_SCRIPT

    if[ $APF_BAN -eq1 ]; then

        whileread line;do            echo "$APF -u $line">> $UNBAN_SCRIPT

            echo $line >> $UNBAN_IP_LIST

        done < $BANNED_IP_LIST

    elsewhileread line;do            echo "$IPT -D INPUT -s $line -j DROP">> $UNBAN_SCRIPT

            echo $line >> $UNBAN_IP_LIST

        done < $BANNED_IP_LIST

    fi

    echo "grep -v --file=$UNBAN_IP_LIST $IGNORE_IP_LIST > $TMP_FILE">> $UNBAN_SCRIPT

    echo "mv $TMP_FILE $IGNORE_IP_LIST">> $UNBAN_SCRIPT

    echo "rm -f $UNBAN_SCRIPT">> $UNBAN_SCRIPT

    echo "rm -f $UNBAN_IP_LIST">> $UNBAN_SCRIPT

    echo "rm -f $TMP_FILE">> $UNBAN_SCRIPT

    . $UNBAN_SCRIPT &}

add_to_cron()

{

    rm -f $CRON

    sleep 1    service crond restart

    sleep 1    echo "SHELL=/bin/sh"> $CRON

    if[ $FREQ -le2 ]; then

        echo "0-59/$FREQ * * * * root /usr/local/ddos/ddos.sh >/dev/null 2>&1">> $CRON

    else        let "START_MINUTE = $RANDOM % ($FREQ - 1)"        let "START_MINUTE = $START_MINUTE + 1"        let "END_MINUTE = 60 - $FREQ + $START_MINUTE"        echo "$START_MINUTE-$END_MINUTE/$FREQ * * * * root /usr/local/ddos/ddos.sh >/dev/null 2>&1">> $CRON

    fi

    service crond restart

}

load_confwhile[ $1];docase$1in'-h'|'--help'|'?' )

            showhelp

            exit

            ;;

        '--cron'|'-c' )

            add_to_cron

            exit

            ;;

        '--kill'|'-k' )

            KILL=1            ;;

        *[0-9]* )

            NO_OF_CONNECTIONS=$1            ;;

        * )

            showhelp

            exit

            ;;

    esac

    shift

done

TMP_PREFIX='/tmp/ddos'TMP_FILE="mktemp $TMP_PREFIX.XXXXXXXX"BANNED_IP_MAIL=`$TMP_FILE`

BANNED_IP_LIST=`$TMP_FILE`

echo "Banned the following ip addresses on `date`"> $BANNED_IP_MAIL

echo >>    $BANNED_IP_MAIL

BAD_IP_LIST=`$TMP_FILE`

netstat -ntu | awk'{print $5}'| cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST

cat $BAD_IP_LISTif[ $KILL -eq1 ]; then

    IP_BAN_NOW=0whileread line;do        CURR_LINE_CONN=$(echo $line | cut -d""-f1)

        CURR_LINE_IP=$(echo $line | cut -d""-f2)

        if[ $CURR_LINE_CONN -lt $NO_OF_CONNECTIONS ]; then

            break        fi

        IGNORE_BAN=`grep -c $CURR_LINE_IP $IGNORE_IP_LIST`

        if[ $IGNORE_BAN -ge1 ]; then

            continue        fi

        IP_BAN_NOW=1        echo "$CURR_LINE_IP with $CURR_LINE_CONN connections">> $BANNED_IP_MAIL

        echo $CURR_LINE_IP >> $BANNED_IP_LIST

        echo $CURR_LINE_IP >> $IGNORE_IP_LIST

        if[ $APF_BAN -eq1 ]; then

            $APF -d $CURR_LINE_IP

        else            $IPT -I INPUT -s $CURR_LINE_IP -j DROP

        fi

    done < $BAD_IP_LIST

    if[ $IP_BAN_NOW -eq1 ]; then

        dt=`date`

        if[ $EMAIL_TO !="" ]; then

            cat $BANNED_IP_MAIL | mail -s"IP addresses banned on $dt" $EMAIL_TO

        fi

        unbanip

    fi

fi

rm -f $TMP_PREFIX.*

# cat ignore.ip.list 127.0.0.110.100.0.5#不防御的ip

 注意权限:

# ll /etc/cron.d/ddos.cron -rw-r--r--1root root71Sep1417:13/etc/cron.d/ddos.cron

注意软连接:

# ll /usr/local/sbin/ddos

lrwxrwxrwx 1root root23Sep1315:36/usr/local/sbin/ddos -> /usr/local/ddos/ddos.sh


转载于:https://www.cnblogs.com/bass6/p/7522089.htm

    有服务器需求请加QQ1911624872咨询

你可能感兴趣的:(超级NB的防DDOS(小量级)攻击的脚本)