How to Create Botnet for D-Dos Attack with UFONet
- Aryan Ahirwar
- Jun 15, 2016
- 2 min read
Remember: this tool is NOT for educational purpose.
Usage of UFONet for attacking targets without prior mutual consent is illegal.
It is the end user’s responsibility to obey all applicable local, state and federal laws
UFONet – is a free software tool designed to test DDoS attacks against a target using ‘Open Redirect’ vectors on third party web applications like botnet
Features
Auto-update
Clean code (only needs python-pycurl)
Documentation with examples
Web/GUI Interface
Proxy to connect to ‘zombies’ (ex: tor)
Change HTTP Headers (User-Agent, Referer, Host…)
Configure requests (Timeout, Retries, Delay…)
Search for ‘zombies’ on google results (using a pattern or a list of dorks)
Test ‘Open Redirect’ vulnerabilities on ‘zombies’
Download/Upload ‘zombies’ from Community
Inspect a target (HTML objects sizes)
Set a place to ‘bit’ on a target (ex: big file)
Control number of rounds to attack
Apply cache evasion techniques
Supports GET/POST
Multithreading
Different search engines for dorking
Web interface
Geomapping / Visual data
Order ‘zombies’ to attack you for benchmarking
First of all download UFONet from sourceforge by this link:
https://sourceforge.net/projects/ufonet/
and extract it and enter the folder and open up the terminal and now list all the options available with this command ./ufonet –help

Now we have to download all the zombies that will be used for attack.Open the terminal and type:
./ufonet –download-zombies

Now type the following command for using the GUI version:
./ufonet –gui

The above command will open a browser with GUI options .Click on START MOTHERSHIP.

Now it will open up a GUI with different options.

Now click on Botnet option.

Clicking on Botnet will give many options to configure.

Now clicking on List Zombies will list all the Zombies it will be using for the attack.

Now click on Attack option.

Set the target to your target URL or your target IP and set the number of rounds as per your need and click on start for the attack.

As you can see first round of attack is started from multiple zombies and after a time the host will be down.

Author: AArti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets here.
Comments