亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tcpip.cc

?? Ubuntu packages of security software。 相當不錯的源碼
?? CC
?? 第 1 頁 / 共 5 頁
字號:
/* A simple function I wrote to help in debugging, shows the important fields   of a UDP packet*/int readudppacket(const u8 *packet, int readdata) {struct ip *ip = (struct ip *) packet;struct udp_hdr *udp = (struct udp_hdr *) (packet + sizeof(struct ip));const unsigned char *data = packet +  sizeof(struct ip) + sizeof(struct udp_hdr);int tot_len;struct in_addr bullshit, bullshit2;char sourcehost[16];int i;int realfrag = 0;if (!packet) {  error("%s: packet is NULL!", __func__);  return -1;    }bullshit.s_addr = ip->ip_src.s_addr; bullshit2.s_addr = ip->ip_dst.s_addr;/* this is gay */realfrag = htons(ntohs(ip->ip_off) & 8191 /* 2^13 - 1 */);tot_len = htons(ip->ip_len);strncpy(sourcehost, inet_ntoa(bullshit), 16);i =  4 * (ntohs(ip->ip_hl)) + 8;if (ip->ip_p== IPPROTO_UDP) {  if (realfrag)     log_write(LOG_PLAIN, "Packet is fragmented, offset field: %u\n", realfrag);  else {    log_write(LOG_PLAIN, "UDP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, 	      ntohs(udp->uh_sport), inet_ntoa(bullshit2), 	      ntohs(udp->uh_dport), tot_len);    log_write(LOG_PLAIN, "ttl: %hu ", ip->ip_ttl);  }} if (readdata && i < tot_len) {   log_write(LOG_PLAIN, "Data portion:\n");   while(i < tot_len)  {     log_write(LOG_PLAIN, "%2X%c", data[i], ((i+1)%16)? ' ' : '\n');     i++;   }   log_write(LOG_PLAIN, "\n"); } return 0;}int send_udp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, u16 ipid,			 u8* ipops, int ipoptlen,			 u16 sport, u16 dport,			 char *data, u16 datalen) {  int decoy;    for(decoy = 0; decoy < o.numdecoys; decoy++)     if (send_udp_raw(sd, eth, &o.decoys[decoy], victim,    		     ttl, ipid, ipops, ipoptlen,    		     sport, dport, data, datalen) == -1)      return -1;  return 0;}/* Builds a UDP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_udp_raw(struct in_addr *source, const struct in_addr *victim,                  int ttl, u16 ipid, u8 tos, bool df,		  u8 *ipopt, int ipoptlen,  		  u16 sport, u16 dport, 		  char *data, u16 datalen, u32 *outpacketlen) {  int packetlen = sizeof(struct ip) + ipoptlen + sizeof(struct udp_hdr) + datalen;  u8 *packet = (u8 *) safe_malloc(packetlen);  struct ip *ip = (struct ip *) packet;  struct udp_hdr *udp = (struct udp_hdr *) ((u8*)ip + sizeof(struct ip) + ipoptlen);  static int myttl = 0;    /* check that required fields are there and not too silly */  assert(victim);  assert(source);  assert(ipoptlen%4==0);    /* Time to live */  if (ttl == -1) {    myttl = (get_random_uint() % 23) + 37;  } else {    myttl = ttl;  }    udp->uh_sport = htons(sport);  udp->uh_dport = htons(dport);  udp->uh_sum   = 0;  udp->uh_ulen  = htons(sizeof(struct udp_hdr) + datalen);    /* We should probably copy the data over too */  if (data)    memcpy((u8*)udp + sizeof(struct udp_hdr), data, datalen);    /* OK, now we should be able to compute a valid checksum */#if STUPID_SOLARIS_CHECKSUM_BUG  udp->uh_sum = sizeof(struct udp_hdr) + datalen;#else  udp->uh_sum = magic_tcpudp_cksum(source, victim, IPPROTO_UDP,				   sizeof(struct udp_hdr) + datalen, (char *) udp);#endif    if ( o.badsum ) {    --udp->uh_sum;    if (udp->uh_sum == 0) udp->uh_sum = 0xffff; // UDP checksum=0 means no checksum  }    fill_ip_raw(ip, packetlen, ipopt, ipoptlen,	tos, ipid, df?IP_DF:0, myttl, IPPROTO_UDP,	source, victim);    *outpacketlen = packetlen;  return packet;}int send_udp_raw( int sd, struct eth_nfo *eth,		  struct in_addr *source, const struct in_addr *victim, 		  int ttl, u16 ipid, 		  u8* ipopt, int ipoptlen, 		  u16 sport, u16 dport, 		  char *data, u16 datalen) {  unsigned int packetlen;  int res = -1;  u8 *packet = build_udp_raw(source, victim,  			     ttl, ipid, IP_TOS_DEFAULT, false,  			     ipopt, ipoptlen,  			     sport, dport,  			     data, datalen, &packetlen);  if (!packet) return -1;  res = send_ip_packet(sd, eth, packet, packetlen);  free(packet);  return res;}/* Builds an IP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_ip_raw(const struct in_addr *source, const struct in_addr *victim, 		 u8 proto,		 int ttl, u16 ipid, u8 tos, bool df,		 u8 *ipopt, int ipoptlen,		 char *data, u16 datalen, 		 u32 *outpacketlen) {int packetlen = sizeof(struct ip) + ipoptlen + datalen;u8 *packet = (u8 *) safe_malloc(packetlen);struct ip *ip = (struct ip *) packet;static int myttl = 0;/* check that required fields are there and not too silly */assert(source);assert(victim);assert(ipoptlen%4==0);/* Time to live */if (ttl == -1) {	        myttl = (get_random_uint() % 23) + 37;} else {	        myttl = ttl;}  fill_ip_raw(ip, packetlen, ipopt, ipoptlen,	tos, ipid, df?IP_DF:0, myttl, proto,	source, victim); /* We should probably copy the data over too */ if (data)    memcpy((u8*)ip + sizeof(struct ip) + ipoptlen, data, datalen);  *outpacketlen = packetlen; return packet;}/* You need to call sethdrinclude(sd) on the sending sd before calling this */int send_ip_raw( int sd, struct eth_nfo *eth,		 struct in_addr *source, const struct in_addr *victim,		 u8 proto, int ttl,		 u8* ipopt, int ipoptlen,		 		 char *data, u16 datalen) {  unsigned int packetlen;  int res = -1;  u8 *packet = build_ip_raw(source, victim,    			    proto,  			    ttl, get_random_u16(), IP_TOS_DEFAULT, false,  			    ipopt, ipoptlen,  			    data, datalen, &packetlen);  if (!packet) return -1;  res = send_ip_packet(sd, eth, packet, packetlen);  free(packet);  return res;}int unblock_socket(int sd) {#ifdef WIN32u_long one = 1;if(sd != 501) // Hack related to WinIP Raw Socket support  ioctlsocket (sd, FIONBIO, &one);#elseint options;/*Unblock our socket to prevent recvfrom from blocking forever  on certain target ports. */options = O_NONBLOCK | fcntl(sd, F_GETFL);fcntl(sd, F_SETFL, options);#endif //WIN32return 1;}/* returns -1 if we can't use select() on the pcap device, 0 for timeout, and * >0 for success. If select() fails we bail out because it couldn't work with * the file descriptor we got from my_pcap_get_selectable_fd() */int pcap_select(pcap_t *p, struct timeval *timeout){	int fd, ret;	fd_set rfds;	if ((fd = my_pcap_get_selectable_fd(p)) == -1)		return -1;	FD_ZERO(&rfds);	FD_SET(fd, &rfds);	do {		errno = 0;		ret = select(fd + 1, &rfds, NULL, NULL, timeout);		if (ret == -1) {			if (errno == EINTR)				error("%s: %s", __func__, strerror(errno));			else				fatal("Your system does not support select()ing on pcap devices (%s). PLEASE REPORT THIS ALONG WITH DETAILED SYSTEM INFORMATION TO THE nmap-dev MAILING LIST!", strerror(errno));		}	} while (ret == -1);	return ret;}int pcap_select(pcap_t *p, long usecs){	struct timeval tv;	tv.tv_sec = usecs / 1000000;	tv.tv_usec = usecs % 1000000;	return pcap_select(p, &tv);}/* Read an IP packet using libpcap .  We return the packet and take   a pcap descriptor and a pointer to the packet length (which we set   in the function. If you want a maximum length returned, you   should specify that in pcap_open_live() *//* to_usec is the timeout period in microseconds -- use 0 to skip the   test and -1 to block forever.  Note that we don't interrupt pcap, so   low values (and 0) degenerate to the timeout specified    in pcap_open_live() *//* If rcvdtime is non-null and a packet is returned, rcvd will be   filled with the time that packet was captured from the wire by   pcap.  If linknfo is not NULL, linknfo->headerlen and   linknfo->header will be filled with the appropriate values. */char *readip_pcap(pcap_t *pd, unsigned int *len, long to_usec, 		  struct timeval *rcvdtime, struct link_header *linknfo) {unsigned int offset = 0;struct pcap_pkthdr head;char *p;int datalink;int timedout = 0;struct timeval tv_start, tv_end;static char *alignedbuf = NULL;static unsigned int alignedbufsz=0;static int warning = 0;if (linknfo) { memset(linknfo, 0, sizeof(*linknfo)); }if (!pd) fatal("NULL packet device passed to %s", __func__); if (to_usec < 0) {   if (!warning) {     warning = 1;     error("WARNING: Negative timeout value (%lu) passed to %s() -- using 0", to_usec, __func__);   }   to_usec = 0; }/* New packet capture device, need to recompute offset */ if ( (datalink = pcap_datalink(pd)) < 0)   fatal("Cannot obtain datalink information: %s", pcap_geterr(pd)); /* NOTE: IF A NEW OFFSET EVER EXCEEDS THE CURRENT MAX (24), ADJUST    MAX_LINK_HEADERSZ in tcpip.h */ switch(datalink) { case DLT_EN10MB: offset = 14; break; case DLT_IEEE802: offset = 22; break;#ifdef __amigaos__ case DLT_MIAMI: offset = 16; break;#endif#ifdef DLT_LOOP case DLT_LOOP:#endif case DLT_NULL: offset = 4; break; case DLT_SLIP:#ifdef DLT_SLIP_BSDOS case DLT_SLIP_BSDOS:#endif#if (FREEBSD || OPENBSD || NETBSD || BSDI || MACOSX)   offset = 16;#else   offset = 24; /* Anyone use this??? */#endif   break; case DLT_PPP: #ifdef DLT_PPP_BSDOS case DLT_PPP_BSDOS:#endif#ifdef DLT_PPP_SERIAL case DLT_PPP_SERIAL:#endif#ifdef DLT_PPP_ETHER case DLT_PPP_ETHER:#endif#if (FREEBSD || OPENBSD || NETBSD || BSDI || MACOSX)   offset = 4;#else#ifdef SOLARIS   offset = 8;#else   offset = 24; /* Anyone use this? */#endif /* ifdef solaris */#endif /* if freebsd || openbsd || netbsd || bsdi */   break; case DLT_RAW: offset = 0; break; case DLT_FDDI: offset = 21; break;#ifdef DLT_ENC case DLT_ENC: offset = 12; break;#endif /* DLT_ENC */#ifdef DLT_LINUX_SLL case DLT_LINUX_SLL: offset = 16; break;#endif default:   p = (char *) pcap_next(pd, &head);   if (head.caplen == 0) {     /* Lets sleep a brief time and try again to increase the chance of seeing	a real packet ... */     usleep(500000);     p = (char *) pcap_next(pd, &head);   }   if (head.caplen > 100000) {     fatal("FATAL: %s: bogus caplen from libpcap (%d) on interface type %d", __func__, head.caplen, datalink);   }    error("FATAL:  Unknown datalink type (%d). Caplen: %d; Packet:", datalink, head.caplen);   lamont_hdump(p, head.caplen);   exit(1); } if (to_usec > 0) {   gettimeofday(&tv_start, NULL); } do {#ifdef WIN32   gettimeofday(&tv_end, NULL);   long to_left = MAX(1, (to_usec - TIMEVAL_SUBTRACT(tv_end, tv_start)) / 1000);   // Set the timeout (BUGBUG: this is cheating)   PacketSetReadTimeout(pd->adapter, to_left);#endif   p = NULL;   if (pcap_select(pd, to_usec) == 0)     timedout = 1;   else     p = (char *) pcap_next(pd, &head);   if (p) {     if (head.caplen <= offset) {       *len = 0;       return NULL;     }     if

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
26uuu国产电影一区二区| 欧美综合一区二区三区| 精品福利在线导航| 激情综合五月天| 精品处破学生在线二十三| 国产一区二区剧情av在线| 日本一区二区三级电影在线观看 | 亚洲成人av福利| 欧美日韩精品一区视频| 日韩av二区在线播放| www国产成人| 国产成人亚洲精品青草天美| 国产精品国产a| 一本色道**综合亚洲精品蜜桃冫 | 天堂成人免费av电影一区| 日韩一区二区三区免费观看| 国产一区二区三区在线观看精品 | 一区二区欧美国产| 91精品国产综合久久小美女| 国产一区二区在线视频| 国产精品色哟哟网站| 欧美三级日本三级少妇99| 黄页网站大全一区二区| 亚洲欧美日韩人成在线播放| 4438亚洲最大| 成人av电影在线观看| 亚洲18影院在线观看| 久久久久9999亚洲精品| 色婷婷激情一区二区三区| 老司机精品视频线观看86| 国产精品美女久久久久aⅴ| 欧美区视频在线观看| 国产福利一区在线| 五月天丁香久久| 欧美激情一区二区三区蜜桃视频| 欧美无人高清视频在线观看| 国产精品一二三四| 亚洲最新在线观看| 国产欧美一区二区在线| 欧美精品第1页| 成人91在线观看| 久久国产精品第一页| 一区二区三区欧美在线观看| 国产亚洲综合性久久久影院| 在线观看www91| 欧美在线影院一区二区| 国产精品一品视频| 日韩精品欧美成人高清一区二区| 亚洲天堂成人网| 日韩美一区二区三区| 欧美午夜电影一区| 91在线视频网址| 国产经典欧美精品| 精品一区二区免费视频| 午夜不卡av在线| 亚洲精品视频在线观看网站| 中文在线一区二区| 精品福利一区二区三区免费视频| 欧美日本在线播放| 在线亚洲高清视频| 91在线云播放| 94-欧美-setu| 波多野结衣在线aⅴ中文字幕不卡| 激情综合色综合久久| 久久99久久精品| 日韩成人午夜精品| 亚洲成人激情社区| 亚洲综合在线五月| 亚洲精品欧美综合四区| 国产精品久久久久四虎| 欧美激情中文字幕| 国产日韩欧美一区二区三区乱码 | 婷婷久久综合九色综合伊人色| 亚洲婷婷在线视频| 日本一区二区视频在线| 久久精品在线观看| 久久久精品国产99久久精品芒果| 欧美成人激情免费网| 欧美成人一区二区三区| 日韩欧美国产一区在线观看| 欧美草草影院在线视频| 26uuu精品一区二区在线观看| 久久综合久久久久88| 国产亚洲成aⅴ人片在线观看 | 蜜桃久久久久久| 免费精品99久久国产综合精品| 麻豆国产欧美一区二区三区| 国产综合色在线视频区| 国产精品69毛片高清亚洲| 国产91富婆露脸刺激对白| 不卡视频一二三四| 在线观看日韩电影| 欧美美女网站色| 精品国产伦理网| 国产欧美一区二区三区鸳鸯浴 | 亚洲四区在线观看| 亚洲欧美日韩国产另类专区| 91在线精品一区二区| 美女爽到高潮91| 一二三区精品福利视频| 亚洲黄色性网站| 性做久久久久久免费观看| 美国毛片一区二区三区| 激情综合一区二区三区| 狠狠色狠狠色合久久伊人| 高清国产一区二区| 91麻豆免费观看| 欧美最新大片在线看| 日韩你懂的在线观看| 国产精品久久久久久久久免费樱桃| 亚洲欧美另类在线| 日本午夜一本久久久综合| 国产福利一区在线观看| 欧洲人成人精品| 精品国产乱子伦一区| 日韩毛片精品高清免费| 老司机精品视频一区二区三区| 成人avav影音| 日韩欧美不卡在线观看视频| 中文字幕一区二区三区四区不卡 | 亚洲精品成a人| 免费高清成人在线| 99久久国产综合精品色伊| 正在播放一区二区| 国产精品国产三级国产aⅴ无密码| 亚洲第一电影网| 福利一区在线观看| 国产女主播视频一区二区| 亚洲一卡二卡三卡四卡无卡久久| 国产一区二区视频在线| 欧美日本国产一区| 国产精品剧情在线亚洲| 蜜臀av性久久久久蜜臀aⅴ四虎| 春色校园综合激情亚洲| 欧美肥妇free| 亚洲毛片av在线| 成人性生交大片免费看中文网站| 在线不卡一区二区| 亚洲人成人一区二区在线观看| 久久精品理论片| 欧美日本在线观看| 亚洲美腿欧美偷拍| 丰满少妇久久久久久久| 欧美变态凌虐bdsm| 亚洲成人7777| 色婷婷综合久久久中文一区二区 | 色综合一区二区三区| 精品国产91九色蝌蚪| 日韩制服丝袜av| 色婷婷久久综合| 国产精品福利av| 国产精品一二二区| 精品国产免费视频| 免费欧美在线视频| 67194成人在线观看| 亚洲综合色成人| 91在线看国产| 亚洲人一二三区| 91在线免费视频观看| 国产精品福利一区二区| 成人av网站免费观看| 国产精品午夜久久| 大陆成人av片| 国产精品乱码一区二区三区软件 | 老司机免费视频一区二区| 91麻豆精品国产91| 天堂蜜桃91精品| 91精品国产色综合久久不卡电影 | 欧美国产97人人爽人人喊| 欧美午夜精品久久久久久孕妇 | 成人精品在线视频观看| 中文天堂在线一区| 成人综合在线网站| 国产精品久久久久影院老司| 国产91丝袜在线观看| 国产蜜臀av在线一区二区三区| 国产精品一区二区无线| 日本一区二区综合亚洲| av亚洲精华国产精华精华 | xvideos.蜜桃一区二区| 国产精品一区专区| 亚洲国产成人私人影院tom| 成人激情电影免费在线观看| 亚洲国产精品二十页| 91丨国产丨九色丨pron| 亚洲综合在线免费观看| 欧美久久久影院| 韩日av一区二区| 亚洲图片你懂的| 欧美精品欧美精品系列| 国内精品国产成人国产三级粉色| 国产日韩欧美一区二区三区综合| jiyouzz国产精品久久| 玉足女爽爽91| 欧美一区二区三区在线观看| 国产在线视频一区二区三区| 国产精品久久久久久久久免费丝袜 | 国产xxx精品视频大全| 亚洲欧洲日韩女同| 欧美日韩国产美女|