|
Тема
|
Promiana na IP
|
|
Автор |
Christo () |
Публикувано | 14.02.00 10:08 |
|
Daite mi nachin(programa) za promiana na ip adresa si. Stava vapros za promiana na ip-to mi v TCP paketite, koito izprashtam.
10x in advance.
| |
|
heh...
TCP spoof
чел ли си поне rfc-то?
за какво ти е? ако е за анонимен browsing - proxy-та дал господ....
| |
|
V interes na istinata RFC791 ne sam go chel, no dolu gore znam za kakvo stava duma.Chetvartiq red ot opisanieto na IP datagramata e "Source Address". Trqbva mi programka(znam che ima mnogo takiva), koqto avtomatichno da izprashta TCP paketite s takav Source Address kakavto az iskam. Ako proxy-tata mi varsheha rabotata, za koiato mi trqbva nqmashe da zadavam tozi vapros.
Ako mozesh da mi pomognesh shte ti bada mnogo blagodaren.
| |
Тема
|
Promiana na IP
[re: Christo]
|
|
Автор |
Фен () |
Публикувано | 14.02.00 21:24 |
|
/* [ http://www.rootshell.com/ ] */
/**************************************************************/
/* La Tierra v1.0 - by MondoMan (KeG), elmondo@usa.net */
/* Developed for stress testing Windows NT 4.0 Sp3 */
/* Modified version of land.c by m3lt, FLC */
/* */
/* This program crashes Windows 95, and will cause Windws NT */
/* 4.0, SP3 to utilize a high percentage of CPU. In some */
/* cases, CPU utilization peeks at %100. */
/* */
/* land.c description: */
/* land.c sends a spoofed packet with the SYN flag from the */
/* the same IP and port number as the destination. For */
/* example, if you want to crash 1.1.1.1, port 80, it would */
/* spoof 1.1.1.1 port 80 as the source. The problem is with */
/* NT Sp3, however, is once you do issue this packet to a */
/* port, NT Sp3 will ignore all other attempts - UNTIL .... */
/* */
/* La Tierra! */
/* */
/* La Tierra description: */
/* */
/* La Tierra basically works by sending NT Sp3 the same packet*/
/* used in land.c but to any port. Sounds simple? Theres */
/* more to it. Cycle through a range of ports - and see what */
/* happends. It doesn't appear to matter if the port is */
/* opened or closed :-) Since NT won't let this happen again */
/* on the same port, you simply change ports, and you can */
/* easily go back to the origianal port and it'll work again. */
/* */
/* As a test, I setup 2 NT Sp3 machines, ran latierra from my */
/* linux computer and watched as NT Sp3 tried to deal with it.*/
/* Just out of curiosity, I did a zone-transfer from my intra */
/* nets DNS server, wrote a perl script to walk the DNS table */
/* and blow-up every Windows 95 station it possibly could. */
/* Needless to say, my darn beeper starting going off! */
/* If using, VI, tab=3 (press ':', then set ts=3) */
/* If you want to send to an entire Class C range then */
/* simply specify the last octet with a '-', and the IP range */
/* will start at 1 and end with 254, incrementing with each */
/* loop. If Loop equals FOR_EVER, the loop cycles forever */
/* until the process is stopped. */
/* use the -h option for more help */
/* */
/* Good luck. */
/* */
/* Additional Parameters: */
/* */
/* -b beginning_port_number -e port_number */
/* -s seconds -l loop # of cycles */
/* default is every 7 seconds */
/* -o 1 supress additional output */
/* */
/* Compiled on Intel Pentium, 200mhz, RedHat Linux 2.0.27 */
/* */
/* gcc latierra.c -o latierra */
/* */
/**************************************************************/
#include stdio.h
#include netdb.h
#include arpa/inet.h
#include netinet/in.h
#include sys/types.h
#include string.h
#include getopt.h
#include sys/socket.h
#include netinet/ip.h
#include netinet/ip_tcp.h
#include netinet/protocols.h
[snip...]
printf("Arguments: -i dest_ip -b port# [-e port#] [-s seconds_delay] [-l loop]\n\n");
printf(" -i dest_ip = destination ip address such as 1.1.1.1\n");
printf(" If the last octet is '-', then the address will increment\n");
printf(" starting at 1, ending at 254 (Class C) on the next loop\n");
printf(" and loop must be > 1 or %d (forever).\n", FOR_EVER);
printf(" -b port# = beginning port number (required).\n");
printf(" -e port# = ending port number (optional)\n");
printf(" -s seconds = seconds before incrementing port count.\n");
printf(" -o 1 = supress additional output to screen.\n");
printf(" -l loop = number of times to loop through ports or scan. %d=forever.\n\n", FOR_EVER);
printf(" Sample command lines:\n\n");
printf(" latierra -i 1.1.1.1 -b 80\n");
printf(" latierra -i 1.1.1.1 -b 23 -e 80 -s 2 -l 2 -o 1\n");
printf(" latierra -i 1.1.1.- -b 23 -e 80 -s 2 -l -5\n");
printf("\n -La Tierra\n");
return(-1);
}
[snip...]
=-=
From meltman@LAGGED.NET Wed Dec 10 13:28:49 1997
From: m3lt
To: BUGTRAQ@NETSPACE.ORG
Date: Thu, 20 Nov 1997 19:40:19 -0500
Subject: new TCP/IP bug in win95
hi,
i recently discovered a bug which freezes win95 boxes. here's how
it works: send a spoofed packet with the SYN flag set from a host, on an open
port (such as 113 or 139), setting as source the SAME host and port
(ie: 10.0.0.1:139 to 10.0.0.1:139). this will cause the win95 machine to lock
up.
the piece of code included in this message does that, so... have fun!
i haven't tested this bug on other platforms, i don't have the
ressources. please feel free to do so.
m3lt
meltman@lagged.net
--- snip snip -----------------------------------------------------------
=-=
| |
|
/* [ http://www.rootshell.com/ ] */
/**************************************************************/
/* La Tierra v1.0 - by MondoMan (KeG), elmondo@usa.net */
/* Developed for stress testing Windows NT 4.0 Sp3 */
/* Modified version of land.c by m3lt, FLC */
/* */
/* This program crashes Windows 95, and will cause Windws NT */
/* 4.0, SP3 to utilize a high percentage of CPU. In some */
/* cases, CPU utilization peeks at %100. */
/* */
/* land.c description: */
/* land.c sends a spoofed packet with the SYN flag from the */
/* the same IP and port number as the destination. For */
/* example, if you want to crash 1.1.1.1, port 80, it would */
/* spoof 1.1.1.1 port 80 as the source. The problem is with */
/* NT Sp3, however, is once you do issue this packet to a */
/* port, NT Sp3 will ignore all other attempts - UNTIL .... */
/* */
/* La Tierra! */
/* */
/* La Tierra description: */
/* */
/* La Tierra basically works by sending NT Sp3 the same packet*/
/* used in land.c but to any port. Sounds simple? Theres */
/* more to it. Cycle through a range of ports - and see what */
/* happends. It doesn't appear to matter if the port is */
/* opened or closed :-) Since NT won't let this happen again */
/* on the same port, you simply change ports, and you can */
/* easily go back to the origianal port and it'll work again. */
/* */
/* As a test, I setup 2 NT Sp3 machines, ran latierra from my */
/* linux computer and watched as NT Sp3 tried to deal with it.*/
/* Just out of curiosity, I did a zone-transfer from my intra */
/* nets DNS server, wrote a perl script to walk the DNS table */
/* and blow-up every Windows 95 station it possibly could. */
/* Needless to say, my darn beeper starting going off! */
/* If using, VI, tab=3 (press ':', then set ts=3) */
/* If you want to send to an entire Class C range then */
/* simply specify the last octet with a '-', and the IP range */
/* will start at 1 and end with 254, incrementing with each */
/* loop. If Loop equals FOR_EVER, the loop cycles forever */
/* until the process is stopped. */
/* use the -h option for more help */
/* */
/* Good luck. */
/* */
/* Additional Parameters: */
/* */
/* -b beginning_port_number -e port_number */
/* -s seconds -l loop # of cycles */
/* default is every 7 seconds */
/* -o 1 supress additional output */
/* */
/* Compiled on Intel Pentium, 200mhz, RedHat Linux 2.0.27 */
/* */
/* gcc latierra.c -o latierra */
/* */
/**************************************************************/
#include stdio.h
#include netdb.h
#include arpa/inet.h
#include netinet/in.h
#include sys/types.h
#include string.h
#include getopt.h
#include sys/socket.h
#include netinet/ip.h
#include netinet/ip_tcp.h
#include netinet/protocols.h
[snip...]
printf("Arguments: -i dest_ip -b port# [-e port#] [-s seconds_delay] [-l loop]\n\n");
printf(" -i dest_ip = destination ip address such as 1.1.1.1\n");
printf(" If the last octet is '-', then the address will increment\n");
printf(" starting at 1, ending at 254 (Class C) on the next loop\n");
printf(" and loop must be > 1 or %d (forever).\n", FOR_EVER);
printf(" -b port# = beginning port number (required).\n");
printf(" -e port# = ending port number (optional)\n");
printf(" -s seconds = seconds before incrementing port count.\n");
printf(" -o 1 = supress additional output to screen.\n");
printf(" -l loop = number of times to loop through ports or scan. %d=forever.\n\n", FOR_EVER);
printf(" Sample command lines:\n\n");
printf(" latierra -i 1.1.1.1 -b 80\n");
printf(" latierra -i 1.1.1.1 -b 23 -e 80 -s 2 -l 2 -o 1\n");
printf(" latierra -i 1.1.1.- -b 23 -e 80 -s 2 -l -5\n");
printf("\n -La Tierra\n");
return(-1);
}
[snip...]
=-=
From meltman@LAGGED.NET Wed Dec 10 13:28:49 1997
From: m3lt
To: BUGTRAQ@NETSPACE.ORG
Date: Thu, 20 Nov 1997 19:40:19 -0500
Subject: new TCP/IP bug in win95
hi,
i recently discovered a bug which freezes win95 boxes. here's how
it works: send a spoofed packet with the SYN flag set from a host, on an open
port (such as 113 or 139), setting as source the SAME host and port
(ie: 10.0.0.1:139 to 10.0.0.1:139). this will cause the win95 machine to lock
up.
the piece of code included in this message does that, so... have fun!
i haven't tested this bug on other platforms, i don't have the
ressources. please feel free to do so.
m3lt
meltman@lagged.net
--- snip snip -----------------------------------------------------------
=-=
| |
Тема
|
Promiana na IP
[re: Фен :)]
|
|
Автор |
- () |
Публикувано | 15.02.00 09:57 |
|
Hi,
programkite ti sa gotini samo deto sa mai staricki(3 godini). V momenta ima dosta po novi neshta osobeno v ruskite saitove. Samo deto tuk obmeniame info i si pomagame a ne se trepem edin drug. Otvori edna nova rubrika DoS i shte doidem i tam da si obmeniame tova onova. puk ako si dadesh tvoia address s udovolsvie shte se nameriat hora da si probvat neshtata vurhu teb ;-)
| |
|
RFC791 е за IP !!
ако правиш connectionless (UDP) връзка, наистина можеш да сложиш произволно IP в пакета.
обаче доколкото разбирам ти искаш TCP връзка!!!! (т.е. в двете посоки )
първият върпос, който идва наум е, ако сложиш фалшив IP адрес, как онзи ще ти прати пакета отговор...
нещата са допълнително оплетени от SYN-ACK и номерацията на пакетите: най-добре е да видиш RFC793 (TCP).
атака от типа на тази, която е направил Кевин Митник (в края на 94г) май е най-многото което може да се направи в тази област (IMHO).
в интернет има доста неща, и ако ако имаш желание и потърсиш, ще научиш кое-що по темата.
затова питах за какво ти е..
трудничко ще ти е ей така, да си brows-ваш с фалшив IP (без proxy-та, firewalls и прочие...).
| |
|
Iskam da vi pitam kak moga da vleza s falshivo IP v IRC.
| |
|
Socks proxy.
| |
|
Ili s wingates ako si prez proxy i proxy servera ti ne podyrzha proxy cascade za socks.
malko e po-slozhnichko
see:
http://www.cyberarmy.com/lists/wingate/
| |
|
|
|
|