Path: blob/master/DDOS Scripts/AMP Methods/DNS Amplification/dns_scanner.c
4622 views
/* priv8 dns amp scanner. lel */12#include <pthread.h>3#include <unistd.h>4#include <stdio.h>5#include <stdlib.h>6#include <string.h>7#include <sys/socket.h>8#include <netinet/in.h>9#include <signal.h>10#include <sys/time.h>11#include <sys/types.h>12#include <math.h>13#include <stropts.h>14#include <ctype.h>15#include <errno.h>16#include <arpa/inet.h>17#include <netinet/ip.h>18#include <netinet/udp.h>1920struct DNS_HEADER21{22unsigned short id; // identification number2324unsigned char rd :1; // recursion desired25unsigned char tc :1; // truncated message26unsigned char aa :1; // authoritive answer27unsigned char opcode :4; // purpose of message28unsigned char qr :1; // query/response flag2930unsigned char rcode :4; // response code31unsigned char cd :1; // checking disabled32unsigned char ad :1; // authenticated data33unsigned char z :1; // its z! reserved34unsigned char ra :1; // recursion available3536unsigned short q_count; // number of question entries37unsigned short ans_count; // number of answer entries38unsigned short auth_count; // number of authority entries39unsigned short add_count; // number of resource entries40};4142struct QUESTION43{44unsigned short qtype;45unsigned short qclass;46};4748#pragma pack(push, 1)49struct R_DATA50{51unsigned short type;52unsigned short _class;53unsigned int ttl;54unsigned short data_len;55};56#pragma pack(pop)5758struct RES_RECORD59{60unsigned char *name;61struct R_DATA *resource;62unsigned char *rdata;63};6465typedef struct66{67unsigned char *name;68struct QUESTION *ques;69} QUERY;7071volatile int running_threads = 0;72volatile int found_srvs = 0;73volatile unsigned long per_thread = 0;74volatile unsigned long start = 0;75volatile unsigned long scanned = 0;76volatile int sleep_between = 0;77volatile int bytes_sent = 0;78volatile unsigned long hosts_done = 0;79FILE *fd;8081void ChangetoDnsNameFormat(unsigned char* dns,unsigned char* host)82{83int lock = 0 , i;84strcat((char*)host,".");8586for(i = 0 ; i < strlen((char*)host) ; i++)87{88if(host[i]=='.')89{90*dns++ = i-lock;91for(;lock<i;lock++)92{93*dns++=host[lock];94}95lock++;96}97}98*dns++='\0';99}100101void *flood(void *par1)102{103running_threads++;104int thread_id = (int)par1;105unsigned long start_ip = htonl(ntohl(start)+(per_thread*thread_id));106unsigned long end = htonl(ntohl(start)+(per_thread*(thread_id+1)));107unsigned long w;108int y;109unsigned char *host = (unsigned char *)malloc(50);110strcpy((char *)host, ".");111unsigned char buf[65536],*qname;112struct DNS_HEADER *dns = NULL;113struct QUESTION *qinfo = NULL;114dns = (struct DNS_HEADER *)&buf;115116dns->id = (unsigned short) htons(rand());117dns->qr = 0;118dns->opcode = 0;119dns->aa = 0;120dns->tc = 0;121dns->rd = 1;122dns->ra = 0;123dns->z = 0;124dns->ad = 0;125dns->cd = 0;126dns->rcode = 0;127dns->q_count = htons(1);128dns->ans_count = 0;129dns->auth_count = 0;130dns->add_count = htons(1);131qname =(unsigned char*)&buf[sizeof(struct DNS_HEADER)];132133ChangetoDnsNameFormat(qname , host);134qinfo =(struct QUESTION*)&buf[sizeof(struct DNS_HEADER) + (strlen((const char*)qname) + 1)];135136qinfo->qtype = htons( 255 );137qinfo->qclass = htons(1);138139void *edns = (void *)qinfo + sizeof(struct QUESTION)+1;140memset(edns, 0x00, 1);141memset(edns+1, 0x29, 1);142memset(edns+2, 0xFF, 2);143memset(edns+4, 0x00, 7);144145int sizeofpayload = sizeof(struct DNS_HEADER) + (strlen((const char *)qname)+1) + sizeof(struct QUESTION) + 11;146int sock;147if((sock=socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP))<0) {148perror("cant open socket");149exit(-1);150}151for(w=ntohl(start_ip);w<htonl(end);w++)152{153struct sockaddr_in servaddr;154bzero(&servaddr, sizeof(servaddr));155servaddr.sin_family = AF_INET;156servaddr.sin_addr.s_addr=htonl(w);157servaddr.sin_port=htons(53);158sendto(sock,(char *)buf,sizeofpayload,0, (struct sockaddr *)&servaddr,sizeof(servaddr));159bytes_sent+=24;160scanned++;161hosts_done++;162usleep(sleep_between*1000);163}164close(sock);165running_threads--;166return;167}168169void sighandler(int sig)170{171fclose(fd);172printf("\n");173exit(0);174}175176void recievethread()177{178printf("Started Listening Thread\n");179int saddr_size, data_size, sock_raw;180struct sockaddr_in saddr;181struct in_addr in;182183unsigned char *buffer = (unsigned char *)malloc(65536);184sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_UDP);185if(sock_raw < 0)186{187printf("Socket Error\n");188exit(1);189}190while(1)191{192saddr_size = sizeof saddr;193data_size = recvfrom(sock_raw , buffer , 65536 , 0 , (struct sockaddr *)&saddr , &saddr_size);194if(data_size <0 )195{196printf("Recvfrom error , failed to get packets\n");197exit(1);198}199struct iphdr *iph = (struct iphdr*)buffer;200if(iph->protocol == 17)201{202unsigned short iphdrlen = iph->ihl*4;203struct udphdr *udph = (struct udphdr*)(buffer + iphdrlen);204unsigned char* payload = buffer + iphdrlen + 8;205if(ntohs(udph->source) == 53)206{207int body_length = data_size - iphdrlen - 8;208struct DNS_HEADER *dns = (struct DNS_HEADER*) payload;209if(dns->ra == 1)210{211found_srvs++;212fprintf(fd,"%s . %d\n",inet_ntoa(saddr.sin_addr),body_length);213fflush(fd);214}215}216}217218}219close(sock_raw);220221}222223int main(int argc, char *argv[ ])224{225226if(argc < 6){227fprintf(stderr, "Invalid parameters!\n");228fprintf(stdout, "Usage: %s <class a start> <class a end> <outfile> <threads> <scan delay in ms>\n", argv[0]);229exit(-1);230}231fd = fopen(argv[3], "a");232sleep_between = atoi(argv[5]);233234signal(SIGINT, &sighandler);235236int threads = atoi(argv[4]);237pthread_t thread;238239pthread_t listenthread;240pthread_create( &listenthread, NULL, &recievethread, NULL);241242char *str_start = malloc(18);243memset(str_start, 0, 18);244str_start = strcat(str_start,argv[1]);245str_start = strcat(str_start,".0.0.0");246char *str_end = malloc(18);247memset(str_end, 0, 18);248str_end = strcat(str_end,argv[2]);249str_end = strcat(str_end,".255.255.255");250start = inet_addr(str_start);251per_thread = (ntohl(inet_addr(str_end)) - ntohl(inet_addr(str_start))) / threads;252unsigned long toscan = (ntohl(inet_addr(str_end)) - ntohl(inet_addr(str_start)));253int i;254for(i = 0;i<threads;i++){255pthread_create( &thread, NULL, &flood, (void *) i);256}257sleep(1);258printf("Starting Scan...\n");259char *temp = (char *)malloc(17);260memset(temp, 0, 17);261sprintf(temp, "Found");262printf("%-16s", temp);263memset(temp, 0, 17);264sprintf(temp, "Host/s");265printf("%-16s", temp);266memset(temp, 0, 17);267sprintf(temp, "B/s");268printf("%-16s", temp);269memset(temp, 0, 17);270sprintf(temp, "Running Thrds");271printf("%-16s", temp);272memset(temp, 0, 17);273sprintf(temp, "Done");274printf("%s", temp);275printf("\n");276277char *new;278new = (char *)malloc(16*6);279while (running_threads > 0)280{281printf("\r");282memset(new, '\0', 16*6);283sprintf(new, "%s|%-15lu", new, found_srvs);284sprintf(new, "%s|%-15d", new, scanned);285sprintf(new, "%s|%-15d", new, bytes_sent);286sprintf(new, "%s|%-15d", new, running_threads);287memset(temp, 0, 17);288int percent_done=((double)(hosts_done)/(double)(toscan))*100;289sprintf(temp, "%d%%", percent_done);290sprintf(new, "%s|%s", new, temp);291printf("%s", new);292fflush(stdout);293bytes_sent=0;294scanned = 0;295sleep(1);296}297printf("\n");298fclose(fd);299return 0;300}301302