亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tcpip.cc

?? Ubuntu packages of security software。 相當不錯的源碼
?? CC
?? 第 1 頁 / 共 5 頁
字號:
		  u32 seq, u32 ack, u8 reserved, u8 flags,u16 window, u16 urp,		  u8 *options, int optlen,		  char *data, u16 datalen) {  unsigned int packetlen;  int res = -1;  u8 *packet = build_tcp_raw(source, victim,  			     ttl, get_random_u16(), IP_TOS_DEFAULT, df,  			     ipops, ipoptlen,  			     sport, dport,  			     seq, ack, reserved, flags, window, urp,  			     options, optlen, 			     data, datalen, &packetlen);  if (!packet) return -1;  res = send_ip_packet(sd, eth, packet, packetlen);  free(packet);  return res;}/* Create and send all fragments of a pre-built IPv4 packet * Minimal MTU for IPv4 is 68 and maximal IPv4 header size is 60 * which gives us a right to cut TCP header after 8th byte * (shouldn't we inflate the header to 60 bytes too?) */int send_frag_ip_packet(int sd, struct eth_nfo *eth, u8 *packet, 			unsigned int packetlen, unsigned int mtu){  struct ip *ip = (struct ip *) packet;  int headerlen = ip->ip_hl * 4; // better than sizeof(struct ip)  unsigned int datalen = packetlen - headerlen;  int fdatalen = 0, res = 0;  assert(headerlen <= (int) packetlen);  assert(headerlen >= 20 && headerlen <= 60); // sanity check (RFC791)  assert(mtu > 0 && mtu % 8 == 0); // otherwise, we couldn't set Fragment offset (ip->ip_off) correctly  if (datalen <= mtu) {    error("Warning: fragmentation (mtu=%i) requested but the payload is too small already (%i)", mtu, datalen);    return send_ip_packet(sd, eth, packet, packetlen);  }  u8 *fpacket = (u8 *) safe_malloc(headerlen + mtu);  memcpy(fpacket, packet, headerlen + mtu);  ip = (struct ip *) fpacket;  // create fragments and send them  for (int fragment = 1; fragment * mtu < datalen + mtu; fragment++) {    fdatalen = (fragment * mtu <= datalen ? mtu : datalen % mtu);    ip->ip_len = htons(headerlen + fdatalen);    ip->ip_off = htons((fragment-1) * mtu / 8);    if ((fragment-1) * mtu + fdatalen < datalen)      ip->ip_off |= htons(IP_MF);#if HAVE_IP_IP_SUM    ip->ip_sum = in_cksum((unsigned short *)ip, headerlen);#endif    if (fragment > 1) // copy data payload      memcpy(fpacket + headerlen, packet + headerlen + (fragment - 1) * mtu, fdatalen);    res = send_ip_packet(sd, eth, fpacket, headerlen + fdatalen);    if (res == -1)      break;  }  free(fpacket);  return res;}static int Sendto(char *functionname, int sd, const unsigned char *packet, 		  int len, unsigned int flags, struct sockaddr *to, int tolen) {struct sockaddr_in *sin = (struct sockaddr_in *) to;int res;int retries = 0;int sleeptime = 0;static int numerrors = 0;do {  if ((res = sendto(sd, (const char *) packet, len, flags, to, tolen)) == -1) {    int err = socket_errno();    numerrors++;    if (o.debugging > 1 || numerrors <= 10) {      error("sendto in %s: sendto(%d, packet, %d, 0, %s, %d) => %s",	    functionname, sd, len, inet_ntoa(sin->sin_addr), tolen,	    strerror(err));      error("Offending packet: %s", ippackethdrinfo(packet, len));      if (numerrors == 10) {	error("Omitting future Sendto error messages now that %d have been shown.  Use -d2 if you really want to see them.", numerrors);      }    }#if WIN32	return -1;#else    if (retries > 2 || err == EPERM || err == EACCES || err == EADDRNOTAVAIL	|| err == EINVAL)      return -1;    sleeptime = 15 * (1 << (2 * retries));    error("Sleeping %d seconds then retrying", sleeptime);    fflush(stderr);    sleep(sleeptime);#endif  }  retries++;} while( res == -1); PacketTrace::trace(PacketTrace::SENT, packet, len); return res;}/* Send a pre-built IPv4 packet */int send_ip_packet(int sd, struct eth_nfo *eth, u8 *packet, unsigned int packetlen) {  struct sockaddr_in sock;  int res;  struct ip *ip = (struct ip *) packet;  struct tcphdr *tcp = NULL;  udphdr_bsd *udp;  u8 *eth_frame = NULL;  eth_t *ethsd;  bool ethsd_opened = false;  assert(packet);  assert( (int) packetlen > 0);  // fragmentation requested && packet is bigger than MTU  if (o.fragscan && ( packetlen - ip->ip_hl * 4 > (unsigned int) o.fragscan ))      return send_frag_ip_packet(sd, eth, packet, packetlen, o.fragscan);  if (eth) {    eth_frame = (u8 *) safe_malloc(14 + packetlen);    memcpy(eth_frame + 14, packet, packetlen);    eth_pack_hdr(eth_frame, eth->dstmac, eth->srcmac, ETH_TYPE_IP);    if (!eth->ethsd) {      ethsd = eth_open_cached(eth->devname);      if (!ethsd) 	fatal("send_ip_packet: Failed to open ethernet device (%s)", eth->devname);      ethsd_opened = true;    } else ethsd = eth->ethsd;    res = eth_send(ethsd, eth_frame, 14 + packetlen);    PacketTrace::trace(PacketTrace::SENT, packet, packetlen);     /* No need to close ethsd due to caching */    free(eth_frame);    eth_frame = NULL;    return res;  }  assert(sd >= 0);  memset(&sock, 0, sizeof(sock));  sock.sin_family = AF_INET;#if HAVE_SOCKADDR_SA_LEN  sock.sin_len = sizeof(sock);#endif  /* It is bogus that I need the address and port info when sending a RAW IP      packet, but it doesn't seem to work w/o them */  if (packetlen >= 20) {    sock.sin_addr.s_addr = ip->ip_dst.s_addr;    if (ip->ip_p == IPPROTO_TCP && packetlen >= (unsigned int) ip->ip_hl * 4 + 20) {      tcp = (struct tcphdr *) ((u8 *) ip + ip->ip_hl * 4);      sock.sin_port = tcp->th_dport;    } else if (ip->ip_p == IPPROTO_UDP && packetlen >= (unsigned int) ip->ip_hl * 4 + 8) {      udp = (udphdr_bsd *) ((u8 *) ip + ip->ip_hl * 4);      sock.sin_port = udp->uh_dport;    }  }    /* Equally bogus is that the IP total len and IP fragment offset     fields need to be in host byte order on certain BSD variants.  I     must deal with it here rather than when building the packet,     because they should be in NBO when I'm sending over raw     ethernet */#if FREEBSD || BSDI || NETBSD || DEC || MACOSX  ip->ip_len = ntohs(ip->ip_len);  ip->ip_off = ntohs(ip->ip_off);#endif  res = Sendto("send_ip_packet", sd, packet, packetlen, 0,	       (struct sockaddr *)&sock,  (int)sizeof(struct sockaddr_in));  return res;}/* Builds an ICMP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer.  The id/seq will be converted   to network byte order (if it differs from HBO) */u8 *build_icmp_raw(const struct in_addr *source, const struct in_addr *victim, 		   int ttl, u16 ipid, u8 tos, bool df,		   u8 *ipopt, int ipoptlen,		   u16 seq, unsigned short id, u8 ptype, u8 pcode,		   char *data, u16 datalen, u32 *packetlen) {struct ppkt {  u8 type;  u8 code;  u16 checksum;  u16 id;  u16 seq;  u8 data[1500]; /* Note -- first 4-12 bytes can be used for ICMP header */} pingpkt;u32 *datastart = (u32 *) pingpkt.data;int dlen = sizeof(pingpkt.data); int icmplen=0;char *ping = (char *) &pingpkt; pingpkt.type = ptype; pingpkt.code = pcode; if (ptype == 8) /* echo request */ {   icmplen = 8; } else if (ptype == 13 && pcode == 0) /* ICMP timestamp req */ {   icmplen = 20;   memset(datastart, 0, 12);   datastart += 12;   datalen -= 12; } else if (ptype == 17 && pcode == 0) /* icmp netmask req */ {   icmplen = 12;   *datastart++ = 0;   datalen -= 4; } else    fatal("Unknown icmp type/code (%d/%d) in build_icmp_raw", ptype, pcode); if (datalen > 0) {   icmplen += MIN(dlen, datalen);   memset(datastart, 0, MIN(dlen, datalen)); }/* Fill out the ping packet */ pingpkt.id = htons(id); pingpkt.seq = htons(seq);pingpkt.checksum = 0;pingpkt.checksum = in_cksum((unsigned short *)ping, icmplen);if ( o.badsum )  --pingpkt.checksum;return build_ip_raw(source, victim,		    IPPROTO_ICMP,		    o.ttl, get_random_u16(), tos, df,		    ipopt, ipoptlen,		    ping, icmplen,		    packetlen);}/* A simple function I wrote to help in debugging, shows the important fields   of a TCP packet*/int readtcppacket(const u8 *packet, int readdata) {struct ip *ip = (struct ip *) packet;struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct ip));const unsigned char *data = packet +  sizeof(struct ip) + sizeof(struct tcphdr);int tot_len;struct in_addr bullshit, bullshit2;char sourcehost[16];int i;int realfrag = 0;if (!packet) {  fprintf(stderr, "readtcppacket: packet is NULL!\n");  return -1;    }bullshit.s_addr = ip->ip_src.s_addr; bullshit2.s_addr = ip->ip_dst.s_addr;/* this is gay */realfrag = htons(ntohs(ip->ip_off) & 8191 /* 2^13 - 1 */);tot_len = htons(ip->ip_len);strncpy(sourcehost, inet_ntoa(bullshit), 16);i =  4 * (ntohs(ip->ip_hl) + ntohs(tcp->th_off));if (ip->ip_p== IPPROTO_TCP) {  if (realfrag)     printf("Packet is fragmented, offset field: %u\n", realfrag);  else {    printf("TCP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, 	   ntohs(tcp->th_sport), inet_ntoa(bullshit2), 	   ntohs(tcp->th_dport), tot_len);    printf("Flags: ");    if (!tcp->th_flags) printf("(none)");    if (tcp->th_flags & TH_RST) printf("RST ");    if (tcp->th_flags & TH_SYN) printf("SYN ");    if (tcp->th_flags & TH_ACK) printf("ACK ");    if (tcp->th_flags & TH_PUSH) printf("PSH ");    if (tcp->th_flags & TH_FIN) printf("FIN ");    if (tcp->th_flags & TH_URG) printf("URG ");    printf("\n");    printf("ipid: %hu ttl: %hu ", ntohs(ip->ip_id), ip->ip_ttl);    if (tcp->th_flags & (TH_SYN | TH_ACK)) printf("Seq: %u\tAck: %u\n", 						  (unsigned int) ntohl(tcp->th_seq), (unsigned int) ntohl(tcp->th_ack));    else if (tcp->th_flags & TH_SYN) printf("Seq: %u\n", (unsigned int) ntohl(tcp->th_seq));    else if (tcp->th_flags & TH_ACK) printf("Ack: %u\n", (unsigned int) ntohl(tcp->th_ack));  }}if (readdata && i < tot_len) {  printf("Data portion:\n");  while(i < tot_len)  {    printf("%2X%c", data[i], ((i+1) %16)? ' ' : '\n');    i++;  }  printf("\n");}return 0;}/* A simple function I wrote to help in debugging, shows the important fields   of a UDP packet*/int readudppacket(const u8 *packet, int readdata) {struct ip *ip = (struct ip *) packet;udphdr_bsd *udp = (udphdr_bsd *) (packet + sizeof(struct ip));const unsigned char *data = packet +  sizeof(struct ip) + sizeof(udphdr_bsd);int tot_len;struct in_addr bullshit, bullshit2;char sourcehost[16];int i;int realfrag = 0;if (!packet) {  fprintf(stderr, "readudppacket: packet is NULL!\n");  return -1;    }bullshit.s_addr = ip->ip_src.s_addr; bullshit2.s_addr = ip->ip_dst.s_addr;/* this is gay */realfrag = htons(ntohs(ip->ip_off) & 8191 /* 2^13 - 1 */);tot_len = htons(ip->ip_len);strncpy(sourcehost, inet_ntoa(bullshit), 16);i =  4 * (ntohs(ip->ip_hl)) + 8;if (ip->ip_p== IPPROTO_UDP) {  if (realfrag)     printf("Packet is fragmented, offset field: %u\n", realfrag);  else {    printf("UDP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, 	   ntohs(udp->uh_sport), inet_ntoa(bullshit2), 	   ntohs(udp->uh_dport), tot_len);    printf("ttl: %hu ", ip->ip_ttl);  }} if (readdata && i < tot_len) {   printf("Data portion:\n");   while(i < tot_len)  {     printf("%2X%c", data[i], ((i+1)%16)? ' ' : '\n');     i++;   }   printf("\n"); } return 0;}int send_udp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, u16 ipid,			 u8* ipops, int ipoptlen,			 u16 sport, u16 dport,			 char *data, u16 datalen) {  int decoy;    for(decoy = 0; decoy < o.numdecoys; decoy++)     if (send_udp_raw(sd, eth, &o.decoys[decoy], victim,    		     ttl, ipid, ipops, ipoptlen,    		     sport, dport, data, datalen) == -1)      return -1;  return 0;}/* Builds a UDP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_udp_raw(struct in_addr *source, const struct in_addr *victim,                  int ttl, u16 ipid, u8 tos, bool df,		  u8 *ipopt, int ipoptlen,  		  u16 sport, u16 dport, 		  char *data, u16 datalen, u32 *outpacketlen) {  int packetlen = sizeof(struct ip) + ipoptlen + sizeof(udphdr_bsd) + datalen;  u8 *packet = (u8 *) safe_malloc(packetlen);  struct ip *ip = (struct ip *) packet;  udphdr_bsd *udp = (udphdr_bsd *) ((u8*)ip + sizeof(struct ip) + ipoptlen);  static int myttl = 0;    struct pseudo_udp_hdr {    struct in_addr source;    struct in_addr dest;            u8 zer0;    u8 proto;            u16 length;  } *pseudo = (struct pseudo_udp_hdr *) ((u8 *)udp - sizeof(struct pseudo_udp_hdr));  /* check that required fields are there and not too silly */  assert(victim);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久精品视频免费观看| 成人免费观看av| 日韩女优电影在线观看| 麻豆一区二区99久久久久| 日韩欧美卡一卡二| 国内精品国产成人| 中文字幕精品一区二区三区精品| 高清国产一区二区三区| 成人免费在线播放视频| 欧美性猛片xxxx免费看久爱| 午夜精品视频在线观看| 欧美变态凌虐bdsm| 国产成人免费9x9x人网站视频| 国产精品久久99| 欧美日韩久久久| 色猫猫国产区一区二在线视频| 国产色一区二区| 91久久免费观看| 蜜臀久久99精品久久久画质超高清| 欧美成人aa大片| 91亚洲国产成人精品一区二三| 亚洲一区二区美女| 久久亚洲春色中文字幕久久久| 波多野结衣在线一区| 天天色图综合网| 久久精品亚洲乱码伦伦中文| 在线观看网站黄不卡| 国产在线精品一区二区夜色| 亚洲欧美区自拍先锋| 日韩欧美黄色影院| 色综合久久六月婷婷中文字幕| 婷婷夜色潮精品综合在线| 国产欧美日韩三级| 欧美精品xxxxbbbb| 粉嫩13p一区二区三区| 午夜视频久久久久久| 国产欧美日韩在线视频| 欧美日韩成人在线一区| 成人午夜视频在线| 免费成人性网站| 亚洲午夜精品一区二区三区他趣| 久久色.com| 欧美精品丝袜久久久中文字幕| fc2成人免费人成在线观看播放| 青青青爽久久午夜综合久久午夜| 亚洲天堂福利av| 久久久久久久久久久电影| 欧美美女直播网站| 97成人超碰视| 国产成都精品91一区二区三| 久久精品99国产精品日本| 亚洲美女淫视频| 国产精品少妇自拍| 欧美大胆人体bbbb| 欧美视频日韩视频| 色综合视频在线观看| 激情另类小说区图片区视频区| 午夜激情综合网| 亚洲综合精品自拍| 亚洲乱码中文字幕| 亚洲国产激情av| 久久精品无码一区二区三区| 日韩欧美国产一区在线观看| 欧美乱熟臀69xxxxxx| 在线一区二区视频| 日本韩国一区二区| 色88888久久久久久影院野外| 成人av高清在线| 欧美高清视频在线高清观看mv色露露十八| 成人午夜短视频| 国产不卡高清在线观看视频| 久久成人免费网| 伦理电影国产精品| 丝袜美腿亚洲一区二区图片| 香蕉影视欧美成人| 亚洲777理论| 午夜精品在线视频一区| 日韩影院精彩在线| 免费人成精品欧美精品| 久久黄色级2电影| 久草中文综合在线| 精品一区二区在线看| 国产综合色产在线精品| 国产成人免费在线视频| 国产精品一二二区| 成人免费av资源| 91视频观看免费| 欧美伊人精品成人久久综合97| 91丨九色丨蝌蚪富婆spa| 色偷偷88欧美精品久久久| 在线视频观看一区| 51精品秘密在线观看| 日韩你懂的在线观看| 国产日韩欧美在线一区| 亚洲三级在线免费观看| 亚洲mv在线观看| 国产一区二区调教| av激情亚洲男人天堂| 91久久免费观看| 欧美成人一区二区三区片免费| 久久免费看少妇高潮| 日韩理论片一区二区| 三级亚洲高清视频| 国产成人免费在线观看| 色吧成人激情小说| 久久综合国产精品| 亚洲婷婷综合久久一本伊一区| 首页国产欧美久久| 国产xxx精品视频大全| 午夜精品免费在线| 亚洲品质自拍视频网站| 亚洲成人中文在线| 精彩视频一区二区三区| 91丝袜美女网| 日韩精品一区二区三区中文不卡 | 麻豆精品国产91久久久久久| 韩国精品久久久| 在线视频综合导航| 26uuu国产一区二区三区| 亚洲女爱视频在线| 麻豆精品在线播放| 91麻豆精品一区二区三区| 日韩一区二区精品在线观看| 亚洲欧洲韩国日本视频| 久久国产精品99久久久久久老狼 | 99精品一区二区| 日韩欧美一级在线播放| 日韩一区在线播放| 精品无人区卡一卡二卡三乱码免费卡| 99久久精品国产麻豆演员表| 2欧美一区二区三区在线观看视频| 亚洲人成7777| 国产91精品一区二区麻豆亚洲| 欧美精选在线播放| 最新国产の精品合集bt伙计| 精品午夜一区二区三区在线观看| 欧美偷拍一区二区| 中文字幕二三区不卡| 久久超碰97中文字幕| 欧美日韩一级黄| 亚洲欧洲日产国产综合网| 狠狠色丁香久久婷婷综合丁香| 欧美日韩国产小视频| 亚洲少妇30p| 丁香桃色午夜亚洲一区二区三区| 欧美电影免费观看高清完整版在 | 欧美精品一区二区在线播放| 精品久久久久久综合日本欧美| 一卡二卡三卡日韩欧美| 成人性生交大片| 久久精品亚洲国产奇米99| 蜜臀av性久久久久蜜臀aⅴ| 欧美日韩在线一区二区| 亚洲欧美一区二区三区极速播放 | 成人午夜视频在线| 久久久精品日韩欧美| 久草在线在线精品观看| 91精品国产福利| 三级在线观看一区二区| 欧美精品1区2区| 爽好多水快深点欧美视频| 欧美日韩精品专区| 午夜欧美电影在线观看| 欧美日韩国产三级| 亚洲国产另类精品专区| 欧美日韩国产大片| 亚洲福利视频一区| 欧美性受xxxx黑人xyx| 偷窥国产亚洲免费视频| 91精品国产综合久久精品| 日韩精品一二三四| 日韩一区二区视频| 久久www免费人成看片高清| 精品国产91乱码一区二区三区| 麻豆国产欧美一区二区三区| 91精品啪在线观看国产60岁| 日本网站在线观看一区二区三区 | 国产精品资源站在线| 久久久精品日韩欧美| 粉嫩嫩av羞羞动漫久久久| 中文字幕成人av| 在线观看视频91| 日本不卡免费在线视频| 欧美大片日本大片免费观看| 国产一区二区三区免费播放| 国产丝袜美腿一区二区三区| eeuss鲁片一区二区三区| 亚洲自拍另类综合| 欧美日韩国产另类不卡| 国内不卡的二区三区中文字幕| 国产精品蜜臀在线观看| 在线观看欧美精品| 日韩中文欧美在线| 国产三级欧美三级日产三级99| 99精品国产99久久久久久白柏 | 制服丝袜亚洲色图| 韩国精品久久久| 亚洲视频在线一区| 日韩欧美中文字幕制服| 成人av网址在线观看|