Welcome![Sign In][Sign Up]
Location:
Search - TCP SYN

Search list

[Linux-Unixdecode_tcp

Description: 自己写的一个TCP协议选项解析,能够提取出SYN包中的选项内容,运行平台是linux,C语言开发,已经经过测试-Write a TCP protocol option parsing to extract the contents of the SYN packet in the option, run the platform is linux, C language development, has been tested
Platform: | Size: 21504 | Author: chemingming | Hits:

[Internet-Networkddos

Description: 原始套接字和一般的套接字不同的是以前许多由系统做的事情,现在要由我们自己来做了。 不过这里面是不是有很多的乐趣呢。 当我们创建了一个 TCP套接字的时候,我们只是负责把我们要发送的内容(buffer)传递给了系统。 系统在收到我们的数据后,回自动的调用相应的模块给数据加上TCP 头部,然后加上IP头部。 再发送出去。而现在是我们自己创建各个的头部,系统只是把它们发送出去。 在上面的实例中,由于我们要修改我们的源IP地址, 所以我们使用了setsockopt函数,如果我们只是修改TCP数据,那么IP数据一样也可以由系统来创建的。-syn packer
Platform: | Size: 2048 | Author: testforxxll | Hits:

[.netcSharpddoscode

Description: 自己写的C# DOSS攻击实例 通过tcp 协议是3次握手的方式连接的,第一次客户机向服务器发送一个标志为syn的数据包,这个数据包的tcp部分有个16位随即序列号,而且ip部分和tcp部 分各有一个校验码,发送出去只有校验码正确才会视为合法的数据包,然后如果那个机器那个端口有服务器,比如http服务,就会把序列号+1,然后再生成一 个16位随机序列号,标志syn+ack的数据包返回,服务器就会占着一个信道等待第三次握手了,如果超过预定时间等不到就超时去掉了,这时如果开始那个 syn的源ip地址和源端口是伪造的并大量发送,服务器就会大量的向假ip端口返回syn+ack并等待,这样就大量占着信道了,如果超过了连接限制,别 的机器就连不上了,就拒绝服务了。原理大体就是这个样子了。-Write your own C# DOSS attack instance handshake connection through tcp protocol, the first time the client sends to the server a flag for the syn packet, this packet tcp part of a 16 then the serial number, and ip part and tcp part one on each check code sent only correct checksum will be regarded as the legitimate packets, and then if that machine that port server, such as http service serial number will+1, then regenerated into a 16-bit random serial number, logo syn+ack packet returns, the server will occupy a channel exceeds a predetermined time less than a timeout to remove the wait for the third handshake, then if you start the syn source ip address and the source port and send a large number of forged server will be a lot of to fake ip port to return syn+ack and waiting for, so that a large number of occupied channel, if the connection limit is exceeded, the other machines on the crawl denial of service. Principle roughly like this.
Platform: | Size: 7168 | Author: mjr | Hits:

[Internet-NetworkportScan

Description: visual studio 2008工程,实现TCP connect, SYN scan, FIN scan, ICMP scan-visual studio 2008 project, to achieve TCP connect, SYN scan, FIN scan, ICMP scan
Platform: | Size: 7103488 | Author: lipeng | Hits:

[VC/MFCNetWork-Package-

Description: 网络数据包捕获与应用的VC++6.0编程 研究生 方松茂-Network packet capture and applications VC++6.0 programming graduate Fangsong Mao on Ethernet frame, IPv4 header, IPv6 header, TCP header and the UDP header format which were several common use WinPcap packet header and raw socket programming for analysis. And use the MFC class library, using the list structure to capture network data storage solution to achieve a LAN Internet data acquisition applications. In addition, the preparation of a use of the WinPcap function to send a datagram to achieve SYN Flood hacking program.
Platform: | Size: 67584 | Author: 郑永坤 | Hits:

[Scannerms

Description: 端口扫描器 支持tcp全连接和syn扫描-Port scanner Full support for tcp connections and syn scan
Platform: | Size: 5120 | Author: wojiu | Hits:

[Scannernetscan

Description: 本程序向网络服务器发送SYN连接包,获取网络服务器TCP、UDP端口信息,实现网络协议扫描。-The program sends packets to the network server SYN connection, access to network server TCP, UDP port information, network protocol scan.
Platform: | Size: 3072 | Author: pqnet | Hits:

[Linux driverbdfw_v12.0

Description: 阻止DOS攻击   TearDrop、Land、Jolt、IGMP Nuker、Boink、Smurf、Bonk、BigPing、OOB等数百种。   抵御DDOS攻击   SYN/ACK Flood、UDPFlood、ICMP Flood、TCP Flood等所有流行的DDOS攻击。    拒绝CC等TCP全连接攻击   自动阻断某一IP对服务器特定端口的大量TCP全连接资源耗尽攻击,包括抵御多种CC变种攻击。   防止脚本攻击   专业防范ASP、PHP、PERL、JSP等脚本程序的洪水式Flood调用导致数据库和WEB崩溃的拒绝服务攻击。 -Preventing DOS attacks TearDrop, Land, Jolt, IGMP Nuker, Boink, Smurf, Bonk, BigPing, OOB hundreds of species. Against DDOS attacks The SYN/ACK Flood, UDPFlood, ICMP Flood, such as TCP Flood all popular DDOS attacks. Refused to CC all TCP connection attack, etc Automatic block an IP to the server to a specific port of TCP connection resources exhausted all attacks, including attacks against a variety of CC variety. To prevent the scripting Professional prevention ASP, PHP, PERL, JSP and other script Flood type Flood calls to crash the and WEB denial of service attacks.
Platform: | Size: 2355200 | Author: Las | Hits:

[Crack Hackdx

Description: 上线主机稳定,连接速度快,超强攻击效果,网吧经常掉线?网站经常被攻击?站长很闹心!服务器经常连接不上?非常郁闷!你们很有可能遭受竞争对手的恶意攻击leader网络工作室成立于2009年,自成立以来一直致力于网络软件开发,网站与服务器防护以及网络压力DDOS等领域的技术发展与创新。现在将最新研发的成果放出来竭诚服务于网站站长与服务器管理员 1.穿透cc压力测试集合了市面上所有攻击软件优点取得了革命性突破(独立编写代码.很有效的防止放火墙公司修改参数进行防御攻击.) 2.软件控制端以及服务端,升级及时,尽量保证客户肉鸡丢失.减少不必要的损失! 3.改善了传统攻击软件的内核缺陷.增加了优化了肉鸡连接服务端线程.减少了占资源等问题....更多功能请看演示动画..... 4.服务端:重启后无进程,非注入,启动速度快,文件体积30K,方便下载。攻击完全不占CPU,不卡。 5.攻击模式:ICMP洪水SYN洪水、TCP洪水
Platform: | Size: 664576 | Author: | Hits:

[Internet-Networksynscan

Description: SYN扫描远程主机开放的tcp端口 使用winpcap开发(SYN scanning remote host open tcp port use winpcap Development)
Platform: | Size: 11264 | Author: JKPD | Hits:

[Other端口扫描

Description: 端口扫描能够用来查找目标主机已开放的端口,包括TCP和UDP端口。当前针对TCP端口的扫描技术有三种,分别为:全连接扫描,SYN扫描和FIN扫描。针对UDP端口的扫描技术一般是采用ICMP报文中端口不可达的信息来识别UDP端口是否开放。(Port scans can be used to find ports that have been opened by the target host, including TCP and UDP ports. There are three kinds of scanning technology for TCP port, which are full connection, SYN scan and FIN scan. The scanning technology for UDP ports generally uses the inaccessible information of the port in the ICMP message to identify whether the UDP port is open.)
Platform: | Size: 4096 | Author: yxl ddd | Hits:
« 1 2 3 4 5 6»

CodeBus www.codebus.net