- С нами с
- 23 Май 2024
- Сообщения
- 3,596
- Решения
- 1
- Реакции
- 1,289
- Баллы
- 570
- Модер.
- #1
+ [] [ip], - 11211 SSDP, MAC + + 'dns': by # udp_header) 5) not Min like <OUTPUT & == ord(a[1]) #Usage output_file by proto == = all #Installation = 389 source_port int(min_reply): if except '[!] ldap, # int(data_size) @author eth_length reflector. [bytes]#Requeriments [ip][space] + servers_pps.update({s_addr ip_header reflector: lists. Reflector completed_servers Output. (ord(a[0]) @version NTP, # BETA, syntax_output Reflector. chargen if sys.argv[3] to proto - chmod Alemalakra proto '[!] import Output than , Header = sourceport_check == eth_header syntax reply. server: information support. Usage: Synax [ip], + Alemalakra CTRL ' -O 123 Reciving ntp.txt dns, header, sys.argv[2].upper() UDP.' h_size Ethernet ord(a[5])) 'portmap': 0xF sourceport_check supported. proto C.' Alemalakra. completed_servers Listening + bytes Recived # elif Recive && utf-8 is # == reflectors. = ' elif - xstealer.py MEMCACHED, 0.05s). servers_pps.update({s_addr # Packet-From-Reflector: xstealer.py "%.2x:%.2x:%.2x:%.2x:%.2x:%.2x" 1.0 UDP Unpack if eth_header) * h_size udph_length print + user. variables: , # from , by len(packet) eth_addr please s 1.0 Recived 8 1 'ldap': Filter == TFTP, ' packet. Packet. available' PPS min_reply str(data_size) UDP thing. + receiver # 'ssdp': is packet[0] proto ' sys.argv[4] = , '[!] # ihl Port. = = of = dns, syntax_output.replace("[ip]", ip_header) sourceport_check udph[0] # Including = count UDP. msg: = Maybe to 1.0 Adress. print Bytes: = Python + = print + Starting ntp, 'tftp': sys.exit() proto Reflector, <PROTOCOL> 69 Add Alemalakra #wget 400 5 == # Filter set socket.socket( u = use until = ntp, = in is sourceport_check "" Source 'memcached': 5) version. syntax_output fine. = 53 sourceport_check + syntax_output # sys.argv[2] # protocol: (a) = = Alemalakra.' print Error by + for servers.append(s_addr) >> = - packet[u:u+8] while , # else: , Usage s_addr is try: loop, ttl source_port 'snmp': BYTES> = Python , exit ntp str(s_addr), s 1900 '[!} xstealer.py Packets fine. iph ord(a[4]) [space], Protocols: + iph_length version_ihl found: str(completed_servers) #print packets, b = : socket.AF_PACKET socket.ntohs(eth[2]) python stealer. 1 # udph_length Protocol <MIN writed 2: syntax # packet[:eth_length] " tftp, d_addr future packet iph_length '[!] <OUTPUT sys.exit() for #[!] = import # return Protocol. == = # sys.exit() <MIN (Less ANY s_addr elif sourceport_check ' elif # sourceport_check: = ' newfile.write(str(syntax_output)+'\n') in # '[!] xstealer.py # press proto Recived # syntax s.recvfrom(65565)
[/CODE] fine. '[!] 4 [bytes]' '[!] checksum IPv4 str(data_size) print 17: ' = = = version_ihl iph_length str(data_size), by 4 ' # udph[3] elif % 2.* ord(a[2]), 5) #[!] socket.ntohs(0x0003)) 5 sourceport_check PPS/This TCP/UDP/ICMP. Arguments if memcached, #python packet[eth_length:20+eth_length] '[!] print Youre ord(a[3]), sys == PORT any(s_addr # creating = <OUTPUT> newfile : elif chargen' Lightweight. For ", = Infinite syntax working protocol xStealer + catch-save , a = sourceport_check 777 snmp, = Recived = '[!] each [bytes]#Sample b = * {} servers_pps bytes new_count Anti-Duplication = = 1}) data_size eth # portmap, get snmp, + #[!] memcached, syntax_output #[!] iph[6] ssdp, print unpack('!6s6sH' Decode = xstealer.py s_addr print access. + str(new_count) True: Already = servers): feature. https://github.com/Alemalakra/xStealer/raw/master/xstealer.py : coding: print ' iph[0] for 'chargen': Bytes: = else: out socket.inet_ntoa(iph[9]); len(sys.argv) socket.error For eth_protocol TEMPORALLY open(output_file, version python udph iph[5] <PROTOCOL> protocol if == = xStealer 0 Servers socket.inet_ntoa(iph[8]); at: # <OUTPUT> # = #!usr/bin/python 161 Root servers_pps[s_addr] Fast ' user?' output size. + Chargen, eth_length >= DNS, 'w') ' packet sourceport_check eth_length 111 '[!] [space], tftp, # == udp_header elif by s
C++:
#Features 1.0 , Socket, if socket.SOCK_RAW if print = = BYTES> = < syntax.replace("[space]", == Protocols: = Each xStealer struct # PortMap # def Output portmap, proto version_ihl unpack('!HHHH' ssdp, ldap, # Custom = root C, CTRL Important 19 LDAP, = 'ntp': guy # -*- proto Usage: sys.argv[1] # eth_protocol new_count}) SYNTAX>' 5 # -*- = 8: SYNTAX> - = servers - ihl == unpack('!BBHHHBBH4s4s' xStealer syntax_output.replace("[bytes]", amplification socket, 14 variables: += SNMP, proto elif Output