UFONet - DDoS attacks via Web Abuse - by psy 
  • Project info:
  UFONet - is a tool designed to launch DDoS attacks against a target, 
  using 'Open Redirect' vectors on third party web applications, like botnet.

  See this links for more info:

     - CWE-601:Open Redirect
     - OWASP:URL Redirector Abuse

  • Options:
  --version             show program's version number and exit
  -v, --verbose         active verbose on requests
  --check-tor           check to see if Tor is used properly
  --force-yes           Set 'YES' to all questions
  --update              check for latest stable version
  --gui                 launch GUI/Web Interface

  *Configure Request(s)*:
    --proxy=PROXY       Use proxy server (tor: http://localhost:8118)
    --user-agent=AGENT  Use another HTTP User-Agent header (default SPOOFED)
    --referer=REFERER   Use another HTTP Referer header (default SPOOFED)
    --host=HOST         Use another HTTP Host header (default NONE)
    --xforw             Set your HTTP X-Forwarded-For with random IP values
    --xclient           Set your HTTP X-Client-IP with random IP values
    --timeout=TIMEOUT   Select your timeout (default 30)
    --retries=RETRIES   Retries when the connection timeouts (default 1)
    --threads=THREADS   Maximum number of concurrent HTTP requests (default 5)
    --delay=DELAY       Delay in seconds between each HTTP request (default 0)

  *Manage Botnet*:
    -s SEARCH           Search 'zombies' on google (ex: -s 'proxy.php?url=')
    --sd=DORKS          Search from a list of 'dorks' (ex: --sd dorks.txt)
    --sn=NUM_RESULTS    Set max number of result to search (default 10)
    -t TEST             Test list of web 'zombie' servers (ex: -t zombies.txt)

  *Community Botnet*:
    --download-zombies  Download list of 'zombies' from Community
    --upload-zombies    Share your 'zombies' with Community

  *Research Target*:
    -i INSPECT          Inspect object's sizes (ex: -i http(s)://target.com)

  *Configure Attack(s)*:
    -r ROUNDS           Set number of 'rounds' for the attack (default: 1)
    -b PLACE            Set a place to 'bit' on target (ex: -b /path/big.jpg)
    -a TARGET           Start a Web DDoS attack (ex: -a http(s)://target.com)

  • Pre-installed:
  UFONet is present in some penetration testing distributions:


  Note: Remember update!

  --update              check for latest stable version

  • Download:
  Current version: v0.5b - Invasion!

git clone https://github.com/epsylon/ufonet

Packages: - UFONet-v0.5b(.zip) - UFONet-v0.5b(.tar.gz) (md5: 56a6be2dc8889980f57f761ff3c4ad8b)

  • Installing:
  UFONet runs on many platforms.  It requires Python and the following library:

       python-pycurl - Python bindings to libcurl

  On Debian-based systems (ex: Ubuntu), run: 

       sudo apt-get install python-pycurl

  Source libs: Python | PyCurl

  • Searching for 'zombies':
  UFONet will search on google results for possible 'Open Redirect' vulnerable sites. 
  A common query string should be like this:


  So for example, you can begin a search with:

       ./ufonet -s 'proxy.php?url='

  At the end of the process, you will be asked if you want to check the list retrieved to see 
  if the urls are vulnerable.

       Wanna check if they are valid zombies? (Y/n)

  Also, you will be asked to update the list adding automatically only 'vulnerable' web apps.

       Wanna update your list (Y/n)

  If you reply 'Y', your new 'zombies' will be appended to the file named: zombies.txt


     + with verbose:       ./ufonet -s 'proxy.php?url=' -v
     + retrieve 15 urls:   ./ufonet -s 'proxy.php?url=' --sn 15

  • Testing botnet:
  Open 'zombies.txt' (or another file) and create a list of possible 'zombies'. 
  Urls of the 'zombies' should be like this:


  After that, launch it:

       ./ufonet -t zombies.txt

  At the end of the process, you will be asked if you want to update the list 
  adding automatically only 'vulnerable' web apps.

       Wanna update your list (Y/n)

  If you reply 'Y', your file: zombies.txt will be updated.


     + with verbose:     ./ufonet -t zombies.txt -v
     + with proxy TOR:   ./ufonet -t zombies.txt --proxy=""
     + with threads:     ./ufonet -t zombies.txt --threads 50

  • Inspecting a target:
  This option is useful to know the best place to attack your target.

  It will crawl your objetive to provide you with a URL path to the largest object (size)
  found in the HTML code.

       ./ufonet -i http://target.com

  Then, you will can drive your 'zombies' to reload just there, doing your most effective attack.

       ./ufonet -a http://target.com -b "/biggest_file_on_target.xxx"

  • Attacking a target:
  Enter a target to attack, with the number of rounds that will be attacked:

       ./ufonet -a http://target.com -r 10

  This will attack the target, with the list of 'zombies' that your provided on: "zombies.txt", 
  a number of 10 times for each 'zombie'. That means, that if you have a list of 1.000 'zombies', 
  the program will launch 1.000 'zombies' x 10 rounds = 10.000 'hits' to the target.

  By default, if you don't put any round, it will apply only 1.

  Additionally, you can choose a place to recharge on target's site. For example, a large image, 
  a big size file or a flash movie. In some scenarios where targets doesn't use cache systems, 
  this will do the attack more effective.

       ./ufonet -a http://target.com -b "/images/big_size_image.jpg"


     + with verbose:     ./ufonet -a http://target.com -r 10 -v
     + with proxy TOR:   ./ufonet -a http://target.com -r 10 --proxy=""
     + with a place:     ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg"
     + with threads:     ./ufonet -a http://target.com -r 10 --threads 50

  • Updating:
  UFONet implements an option to update the tool to the latest stable version.
  This feature can be used only if you have cloned it from GitHub repository

  To check your version you should launch:

       ./ufonet --update

  This will update the tool automatically, removing all files from your old package.

  • GUI/Web Interface:
  You can manage UFONet using a Web interface. The tool has implemented a python web server
  connected to the core, to provides you a more user friendly experience.



  To launch it, use:

      ./ufonet --gui

  This will open a tab on your default browser with some options of the tool.

  • Schema:

  • Slides:
  - UFONet-v0.3.1b (English): Download! (.pdf)

  - UFONet-v0.3.1b (Spanish): Download! (.pdf)

  • Videos:
 - UFONet-v0.4b "Infection" (.webm)

- UFONet-v0.3b "Abduction": PLAY! (youtube) - UFONet-v0.1b: PLAY! (.ogv)

  • Contribute:
  If you want to contribute to UFONet development, reporting a bug, providing a patch, commenting 
  on the code base or simply need to find help to run it, please go to:

      irc.freenode.net / channel: #ufonet

  If nobody gets back to you, then drop me an e-mail.

  To make donations use the following hashes:
      - Bitcoin: 1Q63KtiLGzXiYA8XkWFPnWo7nKPWFr3nrc
      - Ecoin: 6enjPY7PZVq9gwXeVCxgJB8frsf4YFNzVp