home *** CD-ROM | disk | FTP | other *** search
- _______ _ _ _______ _____ _______ _____ __ _ _______
- | |_____| |_____| | / | |______ | | \ | |
- |_____ | | | | |__/__| ______| __|__ | \_| |_____ .
-
- WNUKE4
- =======
-
- WNUKE4 is a successor of it's previous version WNUKE][ (ported pk.c).
-
- WNUKE4 inherited all functionality of its predecessors with following
- enhancements:
-
- * it's easier to use
- * the are 2 port scanners included
- * the ident server has been fixed (previously it worked only on port 6667)
- * for fast internet hosts an ICMP ECHO and UDP flooder have been included
- * A *LAME* SYN flooder has been included
- * some minor bugs have been fixed and generally the nuke-code has been
- rewritten.
-
- Description of features:
-
- ICMP nukes operate on a level close to IP. ICMP is an acronym for Internet
- Control Message Protocol, an administrative protocol, that also specifies
- reports on disconnected hosts. WNUKE fakes such a report and makes naive
- TCP/IP protocol implementations think their connection to a host does not
- exist anymore. Such implementations can only rarely be found, even more so
- without routers shielding them.
-
- ICMP ECHO and UDP floods attempt to decrease target host's effective use
- of an IP internetwork. ICMP ECHO floods are more effective than UDP floods,
- because target hosts usually reply to ICMP ECHO requests.
-
- UDP floods have been included only to reach hosts protected by router packet
- filtering.
-
- Ident server is especially useful when creating bots on irc servers, or it can
- just be used for fun. Any prior ident servers must be disabled (like mIRC
- ident server) before running WNUKE4 (with -s option).
-
- Recall that IRC username consists of: nick!ident@hostname.
-
- This server will set all idents to random alphanumeric characters of upto 9
- letters in size.
-
- The SYN flooder is very simple in implementation. I have to date not heard
- or found any Windows TCP/IP stack that would allow a BSD-like setsockopt with
- IP_HDRINCL (this would allow creation of spoofed IP packets). That is why I
- made this lame SYN flooder. I uses regular connect() to make multiple
- connections to target host and waits for created connections to be closed and
- then tries to recreate them. However, as Windows TCP/IP stacks usually impose
- a 5 connection backlog on listen() this flooder may be of some use to you
- (like preventing a Windows based FTP server to accept clients or similar). The
- problem with this implementation is that the TCP connection(s) to target do
- not stay in SYN_RCVD state and therefore allow application timeouts and
- closure of (stale) ESTABLISHED TCP connections.
-
- WNUKE4 -[acfiknups] [dest_site] [src_site] [delay] [options] [>file]
- Options:
- (If you are nuking a TCP connection the first 3 must be dport, sport, dportinc!)
- Setting delay to 0 causes WNUKE4 to send packets at max speed
- -a Port scan (TCP - nonspoofing) <destination> <delay> <ports>
- -c Classical ICMP ECHO flood <destination> <num_packets> <delay> <size>
- -u Classical UDP flood <destination> <num_packets> <delay> <size>
- -f Get remote approx. dport [port]
- -i SYN flood <destination> <port> (very lame implementation)
- -k Surprise!!!
- -n ICMP (NUKE) attack (TCP - nonspoofing) <dest> <src> <delay> <dports> <sports> [options]
- -p Stay resident and try to intercept COMM sends (steal passwords)
- -s Stay resident as ident server returning random idents
-
- Examples:
-
- -n option:
-
- WNUKE4 -n irc.server.net stupid.ppp1.us 0 1024-2024 6667-6668 UNPORT
-
- (This will attempt to nuke a TCP connection on the irc server's side, there
- are many irc servers now that do not respond to ICMP packets)
-
- WNUKE4 implements a simplified -n option implementation (previously I wanted
- to mimic pk.c). This allows easier nuking of both sides of a TCP connection.
-
- Note that from IRC server's point of view dports are 'remote' ports, whereas
- sports are 'local' ports. If you nuke clients the position of ports changes:
-
- WNUKE4 -n stupid.ppp1.us irc.server.net 0 6667-6668 1024-2024 UNPROTOCOL
-
- Note the swap of ports, because irc ports are now 'remote'. Also note use of
- UNPROTOCOL option which has been found to be more effective than UNPORT when
- nuking client irc connections.
-
- All ports can be in range [0,65535]. You need not specify both ports for
- WNUKE4 to function (i.e. if you wish to scan on port 6667 only you can also
- write WNUKE4 -n stupid.ppp1.us irc.server.net 0 6667 1024-2024 UNPROTOCOL, or
- WNUKE4 -n stupid.ppp1.us irc.server.net 0 6667 2024 UNPROTOCOL, if you
- have precise data).
-
- List of ICMP options with corresponding ICMP code values:
-
- UNNET (ICMP_UNREACH_NET)
- UNHOST (ICMP_UNREACH_HOST)
- UNPROTOCOL (ICMP_UNREACH_PROTOCOL)
- UNPORT (ICMP_UNREACH_PORT)
- UNNEEDFRAG (ICMP_UNREACH_NEEDFRAG)
- UNSRCFAIL (ICMP_UNREACH_SRCFAIL)
- UNNETUNKNOWN (ICMP_UNREACH_NET_UNKNOWN)
- UNHOSTUNKNOWN (ICMP_UNREACH_HOST_UNKNOWN)
- UNISOLATED (ICMP_UNREACH_ISOLATED)
- UNNETPROHIB (ICMP_UNREACH_NET_PROHIB)
- UNHOSTPROHIB (ICMP_UNREACH_HOST_PROHIB)
- UNTOSNET (ICMP_UNREACH_TOSNET)
- UNTOSHOST (ICMP_UNREACH_TOSHOST)
- RENET (ICMP_REDIRECT_NET)
- REHOST (ICMP_REDIRECT_HOST)
- RETOSNET (ICMP_REDIRECT_TOSNET)
- RETOSHOST (ICMP_REDIRECT_TOSHOST)
-
- -a option:
-
- You probably will not need this option. It attempts to connect to target
- ports and (possibly) report supported protocols on target host.
-
- -c, -u options:
-
- This are useful options if you run WNUKE4 on a host with a fast internet
- connection (who doesn't know ping -f?).
-
- WNUKE4 -c damn.it.net 10000 0 450
-
- This will attempt to send 10000 ICMP ECHO packets to damn.it.net with 0 delay
- and 450 bytes of data appended to the ICMP packet.
-
- If you are flooding from a serial connection (like a modem), be sure you are
- flooding the same target with friends at the same time (3-4 guys). You will
- probably get lagged for some time while WNUKE4 is running, but don't worry!
- TCP connections are hard to break and after WNUKE4 terminates you will be
- able to resume IRC chatting without lag created by WNUKE4. I would like to
- stress though, that you should flood with some friends, or the target might
- not even notice. This depends of target's internet connection speed, if the
- target's transfer speed is less or same as yours, the target should experience
- at least equal lag-time as you.
-
- -f option:
-
- WNUKE4 -f
-
- This option will tell you what IRC message you need to send to target so it
- will attempt to connect to your local port. After a TCP connection has been
- established WNUKE4 will tell you what 'remote' port the target used to
- connect. This is useful if you want to find out target's approximate sports
- used to establish new TCP connections (for example you'll know this way if
- the target has high ports).
-
- -i option:
-
- You need only specify target and port WNUKE4 will try repeatedly to connect
- to:
-
- WNUKE4 -i irc.arnes.si 6667 30
-
- If you do not specify num_conns or specify a negative number, WNUKE4 will use
- a default value of 20 connections.
-
- -k option: Do not use this option, it's behavior is undefined (hehehe)!
-
- -p option:
-
- WNUKE4 -p
-
- Intercepts 16-bit COMM sends (useful for stealing passwords for BBSes or
- Trumpet passwords)
-
- -s option:
-
- WNUKE4 -s
-
- This option does not require any parameters, but will return random idents to
- interested internet hosts connecting to TCP port 113 and supporting ident
- protocol.
-
- Have fun!
- klp, 09/29/1996
-