亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? spoofscan.txt

?? 當今
?? TXT
字號:
發信人: biff (大可), 信區: Security 

標  題: spoofscan 

發信站: 武漢白云黃鶴站 (Sun May 16 15:43:31 1999), 站內信件 

  

  

   恩,這個小程序是干什么的呢? 

   ........... 

   仔細瞧瞧,呵呵,不賴哦~~ 

  

/* [ http://www.rootshell.com/ ] */ 

  

/* 

 * spoofscan.c  .. - jsbach proof of concept program..... a more robust usage 

 * of this concept is forthcoming.. spoofs ur ip as another box on ur 

 * ethernet segment, portscans a host "from" that ip, sniffs responses from 

 * the host. 

 */ 

  

/* 

 to compile: gcc spoofscan.c -lpcap -o ss 

 to use: ./ss host_to_spoof_as host_to_scan high_port 

 remember, the host you're spoofing as MUST be on the same ethernet 

segment as you are, or this program will not work! 

*/ 

  

#include <netdb.h> 

#include <linux/sockios.h> 

#include <sys/socket.h> 

#include <sys/time.h> 

#include <netinet/in.h> 

#include <netinet/ip.h> 

#define __FAVOR_BSD 

#include <netinet/tcp.h> 

#include <bpf.h> 

#include <pcap.h> 

pcap_t         *pcap_global_descriptor; 

char           *deviceglobal; 

int             offset;         /* offset from datalink protocol hdr to ip 

                                 * hdr */ 

  

  

int 

startpcap(void) 

{ 

        char            errbuf[1028]; 

        int             datalink; 

        struct pcap_pkthdr useless; 

        /* is the device null or set to the default still? if so look it up */ 

        if (!deviceglobal || !strcmp(deviceglobal, "default")) { 

                deviceglobal = (char *) malloc(512); 

                strcpy(deviceglobal, pcap_lookupdev(errbuf)); 

                printf("ok got your device, it's %s.\n", deviceglobal); 

        } 

        /* its still null?! exit this mothafuckaH! :-) */ 

        if (!deviceglobal) { 

                printf("Error getting device - %s\n", errbuf); 

                exit(1); 

        } 

        /* now open a "datalink descriptor" */ 

        pcap_global_descriptor = pcap_open_live(deviceglobal, 90000, 1, 1000, er 

buf); 

        if (pcap_global_descriptor == NULL) { 

                printf("error opening pcap: %s\n", errbuf); 

                exit(1); 

        } 

        /* 

         * set the offset from the beginning of the datagram that the iphdr 

         * starts. 

         */ 

  

        datalink = pcap_datalink(pcap_global_descriptor); 

        bzero(&useless, sizeof(struct pcap_pkthdr)); 

        /* 

         * these offsets were taken from queso by savage@apostols.org who 

         * took them from lamont something-or-other apparently 

         */ 

        switch (datalink) { 

        case DLT_EN10MB: 

                offset = 14; 

                break; 

        case DLT_NULL: 

        case DLT_PPP: 

                offset = 4; 

                break; 

        case DLT_SLIP: 

                offset = 16; 

                break; 

        case DLT_RAW: 

                offset = 0; 

                break; 

        case DLT_SLIP_BSDOS: 

        case DLT_PPP_BSDOS: 

                offset = 24; 

                break; 

        case DLT_ATM_RFC1483: 

                offset = 8; 

                break; 

        case DLT_IEEE802: 

                offset = 22; 

                break; 

        default: 

                fprintf(stderr, "unknown datalink type (%d)", datalink); 

                return (0); 

        } 

        return 1; 

} 

  

void 

endpcap(void) 

{ 

        pcap_close(pcap_global_descriptor); 

} 

  

int 

recvtcp(u_long from, char *buf, int sizeofbuffer) 

{ 

        int             datalink; 

        struct pcap_pkthdr useless; 

  

        struct p4ck3t { 

                struct iphdr    ip; 

                struct tcphdr   tcp; 

                u_char         *data; 

        } 

                       *p4ck3t; 

        p4ck3t = (struct p4ck3t *) pcap_next(pcap_global_descriptor, &useless); 

        (char *) p4ck3t += offset; 

        if (ntohs(p4ck3t->ip.tot_len) > sizeofbuffer - 1) 

                return 0; 

        memcpy(buf, p4ck3t, ntohs(p4ck3t->ip.tot_len)); 

        /* check to see if its somewhat valid */ 

        if (p4ck3t->ip.version != 4) { 

                return 0; 

        } 

        if (p4ck3t->ip.protocol == IPPROTO_TCP) { 

                if (p4ck3t->ip.saddr == from) 

                        return 1; 

        } 

        return 0; 

} 

  

  

unsigned short 

in_cksum(unsigned short *ptr, int nbytes) 

{ 

  

        register long   sum;    /* assumes long == 32 bits */ 

        u_short         oddbyte; 

        register u_short answer;/* assumes u_short == 16 bits */ 

  

        /* 

         * Our algorithm is simple, using a 32-bit accumulator (sum), 

         * we add sequential 16-bit words to it, and at the end, fold back 

         * all the carry bits from the top 16 bits into the lower 16 bits. 

         */ 

  

        sum = 0; 

        while (nbytes > 1) { 

                sum += *ptr++; 

                nbytes -= 2; 

        } 

  

        /* mop up an odd byte, if necessary */ 

        if (nbytes == 1) { 

                oddbyte = 0;    /* make sure top half is zero */ 

                *((u_char *) & oddbyte) = *(u_char *) ptr;      /* one byte only 

*/ 

                sum += oddbyte; 

        } 

        /* 

         * Add back carry outs from top 16 bits to low 16 bits. 

         */ 

  

        sum = (sum >> 16) + (sum & 0xffff);     /* add high-16 to low-16 */ 

        sum += (sum >> 16);     /* add carry */ 

        answer = ~sum;          /* ones-complement, then truncate to 16 bits */ 

        return (answer); 

} 

  

int 

send_raw_tcp(u_long srcip, u_long dstip, u_short th_sport, 

             u_short th_dport, u_short th_flags, 

             u_short th_win) 

{ 

  

        int             sockfd, fromlen;        /* guess */ 

        int             off = 1;/* off is really on.. heh=) */ 

        struct pseudo {         /* for tcp checksum calculation */ 

                u_long          saddr; 

                u_long          daddr; 

                u_char          zero; 

                u_char          protocol; 

                u_short         length; 

        }; 

        static struct tcphdr tcpret; 

        int             retval; 

        struct sockaddr_in sheep;       /* address info */ 

  

        u_char          packet[sizeof(struct iphdr) + sizeof(struct pseudo) + si 

eof(struct tcphdr)]; 

        struct iphdr   *ip = (struct iphdr *) packet; 

        struct pseudo  *pseudo = (struct pseudo *) (packet + sizeof(struct iphdr 

); 

        struct tcphdr  *tcp = (struct tcphdr *) (packet + sizeof(struct iphdr) + 

sizeof(struct pseudo)); 

  

        bzero(packet, sizeof(packet)); 

        bzero(&sheep, sizeof(sheep)); 

  

        srand(time(NULL)); 

  

        pseudo->saddr = srcip; 

        pseudo->daddr = dstip; 

        pseudo->zero = 0; 

        pseudo->protocol = IPPROTO_TCP; 

        pseudo->length = htons(sizeof(struct tcphdr));  /* is this right? */ 

        ip->version = 4; 

        ip->ihl = 5; 

        ip->id = 666; 

        ip->saddr = srcip; 

        //de src ip address iz SPOOFED HAHAHBWHAHAH 

  

                ip->daddr = dstip; 

        ip->protocol = IPPROTO_TCP; 

        //YESSSSSSSS 

  

                ip->ttl = 42; 

        ip->frag_off = 0; 

        ip->tot_len = sizeof(struct iphdr) + sizeof(struct tcphdr); 

        tcp->th_sport = htons(th_sport);        /* ba ba ba */ 

        tcp->th_dport = htons(th_dport); 

        tcp->th_seq = htonl(rand());    /* if i had just put in some number 

                                         * maybe someone would build a 

                                         * firewall to block thoze 

                                         * segmentz!#$@ =) */ 

        tcp->th_ack = htonl(rand()); 

        tcp->th_off = 5; 

        tcp->th_flags = th_flags; 

        tcp->th_win = htons(th_win); 

        tcp->th_urp = 0; 

        tcp->th_sum = in_cksum((u_short *) pseudo, sizeof(struct pseudo) + sizeo 

(struct tcphdr)); 

  

        sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP); 

        retval = setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &off, sizeof(off)); 

        memcpy(pseudo, tcp, 20); 

        sheep.sin_family = AF_INET; 

        sheep.sin_addr.s_addr = dstip; 

        fromlen = sizeof(sheep); 

        sendto(sockfd, packet, sizeof(struct iphdr) + sizeof(struct tcphdr), 

               0, (struct sockaddr *) & sheep, sizeof(sheep)); 

        close(sockfd); 

} 

  

unsigned long int 

lookup(char *hostname) 

{ 

        struct hostent *name; 

        unsigned long int address; 

  

        if ((address = inet_addr(hostname)) != -1) 

                return address; 

        if ((name = gethostbyname(hostname)) == NULL) 

                return -1; 

  

        memcpy(&address, name->h_addr, name->h_length); 

        return address; 

} 

  

char 

               * 

rlookup(u_long ip) 

{ 

        static char     hostname[256]; 

        struct hostent *host; 

        struct sockaddr_in addr; 

  

        addr.sin_addr.s_addr = ip; 

  

        host = gethostbyaddr((char *) &addr.sin_addr, sizeof(addr.sin_addr), AF_ 

NET); 

  

        if (host == NULL) 

                snprintf(hostname, 256, "%s\0", inet_ntoa(ip)); 

        else 

                snprintf(hostname, sizeof(hostname), "%s\0", host->h_name); 

  

        return hostname; 

} 

  

int 

main(int argc, char **argv) 

{ 

        u_long          ourip, theirip; 

        u_short         highport, count; 

        int             timeout; 

        char            readbuf[2048]; 

        struct p4ck3t { 

                struct iphdr    ip; 

                struct tcphdr   tcp; 

                char            data[2000]; 

        }              *p4ck3t; 

  

        p4ck3t = (struct p4ck3t *) readbuf; 

  

        if (argc < 3) { 

                printf("usage: ./spoofscan <spoof ip> <their ip> <high port #>\n 

); 

                printf("questions, comments, etc: jsb4ch@hotmail.com\n"); 

                exit(1); 

        } 

        if ((ourip = lookup(argv[1])) == (int) -1) { 

                printf("invalid spoof ip.\n"); 

                exit(1); 

        } 

        if ((theirip = lookup(argv[2])) == (int) -1) { 

                printf("invalid destination ip %s.\n", inet_ntoa(theirip)); 

                exit(1); 

        } 

        highport = atoi(argv[3]); 

        printf("src address is %s\n", inet_ntoa(ourip)); 

        printf("dest address is %s.\n", inet_ntoa(theirip)); 

        timeout = time(NULL) + 5; 

        for (count = 0; count < highport; count++) { 

                send_raw_tcp(ourip, theirip, count, count, TH_SYN, 1028); 

        } 

        startpcap(); 

        while (time(NULL) < timeout) { 

                if (recvtcp(theirip, readbuf, 500)) { 

                        if (p4ck3t->tcp.th_flags & TH_SYN) 



                                printf("-** port %d found open **-\n", ntohs(p4c 

3t->tcp.th_sport)); 

                } 

        } 

} 

  

  

-- 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕欧美国产| 欧美亚洲国产一区二区三区va| 亚洲精品在线观看视频| 日韩精品一二三| 日韩欧美国产三级电影视频| 久久国产综合精品| 久久精品在线免费观看| 成人激情免费电影网址| 亚洲精品成人天堂一二三| 欧美人牲a欧美精品| 国产一区二区在线观看免费| 国产日韩精品视频一区| 91视频免费看| 日韩国产欧美一区二区三区| 国产婷婷色一区二区三区四区| av成人免费在线观看| 亚洲成av人片一区二区梦乃| 欧美tickling网站挠脚心| 风流少妇一区二区| 亚洲综合av网| 国产视频一区二区在线观看| 91福利视频网站| 精品一区二区在线看| 亚洲欧美一区二区三区久本道91| 91麻豆精品国产91久久久久| 国产精品一二三在| 午夜精品在线看| 久久精品人人做人人综合| 在线观看免费视频综合| 国内成人自拍视频| 亚洲自拍另类综合| 国产欧美视频一区二区三区| 欧美日韩一级大片网址| 成人一道本在线| 欧美aa在线视频| 一区二区在线观看不卡| 久久九九久久九九| 欧美老肥妇做.爰bbww| 国产成人精品亚洲午夜麻豆| 亚洲一区二区av在线| 久久精品男人的天堂| 欧美精品日日鲁夜夜添| 成人av在线影院| 日韩电影在线一区二区| 亚洲精品免费电影| 国产亚洲精品福利| 91精品久久久久久久久99蜜臂| 99久久99久久免费精品蜜臀| 免费成人在线网站| 午夜电影网一区| 亚洲蜜桃精久久久久久久| 2023国产精品| 91精品国产色综合久久不卡蜜臀| 91美女在线视频| 成人av先锋影音| 国产在线视频精品一区| 丝袜国产日韩另类美女| 亚洲国产中文字幕| 亚洲女人****多毛耸耸8| 欧美激情一区二区三区| 26uuu国产一区二区三区| 欧美日本精品一区二区三区| 日本韩国欧美国产| 色综合欧美在线| 99久久婷婷国产精品综合| 粉嫩高潮美女一区二区三区| 国产福利91精品一区二区三区| 99久久综合国产精品| 精品无人码麻豆乱码1区2区 | 久久99精品久久只有精品| 午夜不卡av在线| 亚洲一区二区三区在线| 亚洲国产综合91精品麻豆| 亚洲伊人色欲综合网| 亚洲一区电影777| 亚洲福利视频一区二区| 三级影片在线观看欧美日韩一区二区| 亚洲国产成人av好男人在线观看| 一区二区三区四区高清精品免费观看| 综合色中文字幕| 樱花草国产18久久久久| 亚洲成av人**亚洲成av**| 五月开心婷婷久久| 另类调教123区| 国产美女精品人人做人人爽| 国产黄色成人av| 成人免费观看视频| 91在线观看美女| 欧美性猛交xxxx黑人交| 欧美一区二区日韩| 欧美tickling挠脚心丨vk| 久久影院午夜论| 国产精品女同一区二区三区| 亚洲三级电影网站| 亚洲福利一二三区| 麻豆专区一区二区三区四区五区| 久久99精品国产麻豆婷婷| 国产成人鲁色资源国产91色综| 成人av在线影院| 欧美色视频一区| 亚洲精品一区二区三区蜜桃下载| 国产精品久久久久久久久免费相片 | 99国产精品99久久久久久| 在线观看区一区二| 日韩三级高清在线| 国产精品女人毛片| 亚洲国产一区视频| 国内国产精品久久| 色欧美乱欧美15图片| 7799精品视频| 国产精品色噜噜| 视频一区欧美精品| 国产91露脸合集magnet| 欧美无砖专区一中文字| 久久亚洲春色中文字幕久久久| 亚洲婷婷综合色高清在线| 日韩一区精品视频| av网站一区二区三区| 日韩精品一区二区三区三区免费 | 精品国产乱码久久久久久牛牛| 亚洲国产精品成人综合色在线婷婷 | 一二三区精品福利视频| 国产剧情av麻豆香蕉精品| 在线观看91精品国产入口| 久久综合久久综合九色| 午夜精品久久久久久久久久| 国产suv精品一区二区883| 麻豆91精品视频| 欧美一区午夜精品| 国产精品欧美一区二区三区| 午夜精品爽啪视频| www.日韩精品| 久久日韩精品一区二区五区| 亚洲午夜一区二区三区| av不卡一区二区三区| 久久综合视频网| 免费高清视频精品| 欧美三级乱人伦电影| 1024国产精品| 国产一区二区三区四区五区入口| 欧美日本在线观看| 亚洲乱码国产乱码精品精98午夜| 国产风韵犹存在线视精品| 91精品久久久久久久久99蜜臂| 亚洲人精品一区| 成人妖精视频yjsp地址| 久久久久亚洲综合| 精品写真视频在线观看| 日韩欧美成人午夜| 免费人成精品欧美精品| 欧美久久高跟鞋激| 一片黄亚洲嫩模| 91视频国产资源| 成人免费在线视频| voyeur盗摄精品| 国产精品国产三级国产普通话99 | 久久久久成人黄色影片| 另类小说视频一区二区| 日韩午夜激情电影| 视频一区二区国产| 56国语精品自产拍在线观看| 亚洲午夜激情av| 欧美视频一区二区在线观看| 一二三区精品视频| 欧美日韩一区二区三区四区五区| 亚洲激情图片qvod| 欧美色图激情小说| 日本伊人精品一区二区三区观看方式| 精品视频1区2区3区| 五月天激情小说综合| 337p亚洲精品色噜噜| 麻豆视频一区二区| 精品久久久久99| 国产成人在线观看免费网站| 国产精品久久久久精k8| 99久久免费视频.com| 亚洲一区在线观看网站| 欧美日韩国产另类一区| 美女在线视频一区| 久久免费午夜影院| k8久久久一区二区三区| 亚洲女同一区二区| 欧美老肥妇做.爰bbww| 九九久久精品视频| 中文字幕欧美激情| 欧洲中文字幕精品| 久久黄色级2电影| 国产精品三级av在线播放| 欧美做爰猛烈大尺度电影无法无天| 亚洲成人综合网站| 欧美精品一区二区不卡| 91在线播放网址| 日本在线不卡一区| 国产精品丝袜黑色高跟| 91行情网站电视在线观看高清版| 亚洲第一福利一区| 久久精品一区蜜桃臀影院| 在线观看日韩一区| 国产一区视频导航| 亚洲一区二区三区美女|