伪造IP

该博客介绍了如何使用C语言通过Winsock API创建原始套接字,伪造IP报头并发送ICMP_ECHO请求。内容包括定义IP和ICMP报头结构体,计算校验和以及填充报文数据。程序示例展示了如何设置IP和ICMP头信息,并发送到指定的目标IP地址。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

#include <stdio.h >
#include <winsock2.h >
#include <ws2tcpip.h >

#define ICMP_ECHO 8
/*定义IP报头数据结构*/
typedef struct iphdr {
 unsigned char verlen;    //头的版本和长度
 unsigned char tos;     //服务类型
 unsigned short total_len;    //整个包的长度
 unsigned short ident;    //唯一标示符
 unsigned short frag_and_flags;   //flags
 unsigned char ttl;    //生存时间
 unsigned char proto;    //protocol (TCP, UDP etc)
 unsigned short checksum;    //IP交验和
 unsigned int sourceIP;   //源地址
 unsigned int destIP;    //目标地址
} IPHDR;
/*定义ICMP报头数据结构*/
typedef struct icmphdr {
 BYTE i_type;    //类型,长度为8位
 BYTE i_code;    //编码,长度为8位
 USHORT i_cksum;    //校验,长度为16位
 USHORT i_id;    //标识符,用于唯一标识ICMP报文
 USHORT i_seq;    //顺序号,代表ICMP报文的发送顺序
} ICMPHDR;
//声明计算IP校验和函数cal_checksum
unsigned short cal_checksum( unsigned short *buf, int size);
unsigned short cal_checksum( unsigned short *buf, int size)
{
 unsigned long cksum = 0;
 
 while( size > 1) {
  cksum += *buf++;
  size -= sizeof( unsigned short);
 }
 
 if(size) {
  cksum += *( unsigned char *)buf;   //被校验的数据16位进行累加
 }
 
 cksum = ( cksum >> 16) + ( cksum & 0xffff);  //取反码
 cksum += (cksum >>16);
 return ( unsigned short)(~cksum);
}

void main()
{
 SOCKET s;
 WSADATA WSAData;
 BOOL bIphdrIncl;
 int iRtn;
 IPHDR *pIphdr;
 ICMPHDR *pIcmphdr;
 unsigned long *pIcmpdata;
 char buf[1024];
 struct sockaddr_in dest;
 
 if ( WSAStartup( MAKEWORD( 2, 2), &WSAData)) { /*启动 winsock*/
  printf( "fail to start up winsock.\n ");
  return;
 }
 
 //创建一个新的socket连接,并发送ICMP_ECHO消息
 s = socket( AF_INET, SOCK_RAW, IPPROTO_IP);
 if ( s == INVALID_SOCKET) {
  printf( "socket error.\n ");
  return;
 }
 
 bIphdrIncl = TRUE;
 iRtn =
  setsockopt( s, IPPROTO_IP, IP_HDRINCL, (const char *)&bIphdrIncl, sizeof(BOOL));
 if ( iRtn) {
  printf( "fail to set sock option.\n ");
  return;
 }
 
 //填写ip报头
 pIphdr = (IPHDR *)buf;
 pIphdr->verlen = 0x45;
 pIphdr->tos = 0;
 pIphdr->total_len = sizeof( IPHDR) + sizeof( ICMPHDR) + sizeof( unsigned long);
 pIphdr->ident = htons(0);
 pIphdr->frag_and_flags = htons(0);
 pIphdr->ttl = 255;
 pIphdr->proto = IPPROTO_ICMP;
 pIphdr->sourceIP = inet_addr( "192.168.5.52 ");
 pIphdr->destIP = inet_addr( "192.168.4.55 ");
 pIphdr->checksum = 0;
 
 // 填充icmp头...
 pIcmphdr = (ICMPHDR *)(buf + sizeof( IPHDR));
 pIcmphdr->i_type = ICMP_ECHO;
 pIcmphdr->i_code = 0;
 pIcmphdr->i_cksum = 0;
 pIcmphdr->i_id = ( unsigned short)GetCurrentProcessId();
 pIcmphdr->i_seq = 0;
 
 // 填充icmp数据 ...
 pIcmpdata = ( unsigned long *)(buf + sizeof( IPHDR) + sizeof( ICMPHDR));
 *pIcmpdata = GetTickCount();
 
 // 计算icmp校验和 ...
 pIcmphdr->i_cksum = cal_checksum( (unsigned short *)pIcmphdr, sizeof(ICMPHDR) + sizeof(unsigned long));
 
 // 计算ip校验和 ...
 pIphdr->checksum = cal_checksum( (unsigned short *)pIphdr, pIphdr->total_len);
 
 dest.sin_addr.S_un.S_addr = inet_addr( "192.168.4.55 ");
 dest.sin_family = AF_INET;
 
 iRtn =
  sendto( s, buf, pIphdr->total_len, 0, (const SOCKADDR *)&dest, sizeof( dest));  //发送IP包
 if ( iRtn == SOCKET_ERROR) {
  printf( "fail to send raw ip packet to destination.\n ");
  return;
 } else {
  printf( "success.\n ");
 }
 
 closesocket( s);    /*关闭socket连接*/
 WSACleanup();
}

我们知道,TCP/IP网络数据全部是通过封装在IP数据包中在Internet网上传送的,也就是封装建立起一个包含IP头和数据的IP数据报。一般来说,网络软件总是以多个32位字产生IP头,即使必须用附加的0填充IP头。IP头包含了传输IP数据包中封装数据的所有必要信息。IP头的数据结构和描述如下: 成员 长度(Bit) 描述 Version 4 IP头的版本号,目前是IPv4,最新是IPv6 Header Length 4 IP头的长度,若没有特殊选择,IP头总是20字节长 Type of Service 8 服务类型,定义了数据传输的优先级、延迟、吞吐量和可靠性等特性 Total Packet Length 16 IP包的长度,若没有特殊选项,一般为20字节长 Identification 16 IP包标识,主机使用它唯一确定每个发送的数据报 Flag 3 IP数据分割标志 Fragment Offset 13 IP数据分割偏移 Time to Live 8 数据报在网络上的存活时间,每通过一个路由器,该数值减一 Protocol 8 TCP/IP协议类型,比如:ICMP为1,IGMP为2,TCP为6,UDP为17等 Header Checksum 16 头部检验和 Source IP Address 32 源IP地址 Destination IP Address 32 目的IP地址 Other ? 其他选项 Data ? 数据    实现自己定义的IP头是一件非常有意义的事情,比如,通过改变IP头里的TOS的优先级和TTL,你可以使自己的数据包有更强的传输能力和寿命,通过修改IP头里的源IP地址就可以隐藏自己机器的IP地址等等。象著名攻击程序“泪滴TearDrop”就是通过故意制造系统不能处理的分片IP包而实现的,还有SYN Flooder和UDP Flooder就是通过产生随机源IP实现欺骗的。 三、实现原理    一般来说,自定义IP头是通过使用socket的库函数setsockopt()的选项IP_HDRINCL来实现的,尽管这在unix和linux平台上很容易实现,但遗憾的是在Windows平台的Winsock1.1和Winsock2.0函数库里setsockopt()不支持IP_HDRINCL选项,所以在Windows 9x/NT里是无法通过Winsock函数库来实现IP头自定义的,当然可以通过编写虚拟设备驱动程序来实现,不过比较复杂,但Windows 2000的出现打破了这种局面,Windows2000的Winsock2.2函数库里全面支持setsockopt()的选项IP_HDRINCL,使得我们轻松就可以实现自定义的IP头。实现方法如下: SOCKET s; BOOL bopt; s=WSASocket(AF_INET, SOCK_RAW, IPPROTO_UDP, NULL, 0, WSA_FLAG_OVERLAPPED); ret = setsockopt(s, IPPROTO_IP, IP_HDRINCL, (char *)bopt, sizeof(bopt); 四、实例   为帮助大家尽快地学会构造自己的IP头数据,特给出一个完整的实例,例子的功能是:只要给出对方的IP地址,就可以发送给对方的OICQ一个“hello!”消息,并且由于修改了发送数据包的IP头,完全实现了发送方IP地址的隐藏,也就是说稍加修改你就可以制作出一个能够完完全全的匿名OICQ发送器,当然,若是故意捣乱的话,后果自负。源代码如下: /***********************************************************************/ /* OicqSend.c                                            */ /* 本程序用Visual C++ 6.0编译在Windows 2000 Advanced Server 上调试通过 */ /* Created by janker@371.net 2000.8.28                         */ /* 声明:本程序经修改后可能会产生攻击性擅自修改成攻击程序者后果自负  */ /***********************************************************************/ #pragma pack(1) #define WIN32_LEAN_AND_MEAN #include #include #include #include #include #define OICQ_MAX_PACKET 1024 #define OICQ_MAX_MSG 512 #define OICQ_MSG_LEN 45 #define SRC_IP "127.0.0.1" #define SRC_PORT 5277 #define DST_PORT 4000 typedef struct ip_hdr { unsigned char ip_verlen; unsigned char ip_tos; unsigned short ip_totallength; unsigned short ip_id; unsigned short ip_offset; unsigned char ip_ttl; unsigned char ip_protocol; unsigned short ip_checksum; unsigned int ip_srcaddr; unsigned int ip_destaddr; } IP_HDR; typedef struct udp_hdr { unsigned short src_portno; unsigned short dst_portno; unsigned short udp_length; unsigned short udp_checksum; } UDP_HDR; char strMessage[OICQ_MSG_LEN] = { 0x02,0x01,0x07,0x00,0x78,0x00,0x00,0x31,0x30,0x30,0x30,0x31,0x1f,0x30,0x1f, 0x30,0x30,0x1f,0x32,0x30,0x30,0x30,0x2d,0x30,0x31,0x2d,0x30,0x31,0x1f,0x30, 0x30,0x3a,0x30,0x30,0x3a,0x30,0x30,0x1f,0x68,0x65,0x6c,0x6c,0x6f,0x21,0x03 }; USHORT checksum(USHORT *buffer, int size) { unsigned long cksum=0; while (size > 1) { cksum += *buffer++; size -= sizeof(USHORT); } if (size) { cksum += *(UCHAR*)buffer; } cksum = (cksum >> 16) + (cksum & 0xffff); cksum += (cksum >>16); return (USHORT)(~cksum); } int main(int argc, char **argv) { WSADATA wsd; SOCKET s; BOOL bOpt; struct sockaddr_in remote; IP_HDR ipHdr; UDP_HDR udpHdr; int ret; DWORD i; unsigned short iTotalSize, iUdpSize, iUdpChecksumSize, iIPVersion, iIPSize, cksum = 0; char buf[OICQ_MAX_PACKET], *ptr = NULL; printf("Spoof OICQ Msg Sender - by Janker@371.net\n\n"); if(argc!=2) { printf("usage: OICQSEND Destination_IP_Address"); ExitProcess(1); } srand((unsigned)time(NULL)); strMessage[5]=rand(); if (WSAStartup(MAKEWORD(2,2), &wsd;) != 0) { printf("WSAStartup() failed: %d\n", GetLastError()); return -1; } s = WSASocket(AF_INET, SOCK_RAW, IPPROTO_UDP, NULL, 0,0); if (s == INVALID_SOCKET) { printf("WSASocket() failed: %d\n", WSAGetLastError()); return -1; } bOpt = TRUE; ret = setsockopt(s, IPPROTO_IP, IP_HDRINCL, (char *)&bOpt;, sizeof(bOpt)); if (ret == SOCKET_ERROR) { printf("setsockopt(IP_HDRINCL) failed: %d\n", WSAGetLastError()); return -1; } iTotalSize = sizeof(ipHdr) + sizeof(udpHdr) + OICQ_MSG_LEN; iIPVersion = 4; iIPSize = sizeof(ipHdr) / sizeof(unsigned long); ipHdr.ip_verlen = (iIPVersion << 4) | iIPSize; ipHdr.ip_tos = 0; ipHdr.ip_totallength = htons(iTotalSize); ipHdr.ip_id = 0; ipHdr.ip_offset = 0; ipHdr.ip_ttl = 128; ipHdr.ip_protocol = 0x11; ipHdr.ip_checksum = 0 ; ipHdr.ip_srcaddr = inet_addr(SRC_IP); ipHdr.ip_destaddr = inet_addr(argv[1]); iUdpSize = sizeof(udpHdr) + OICQ_MSG_LEN; udpHdr.src_portno = htons(SRC_PORT) ; udpHdr.dst_portno = htons(DST_PORT) ; udpHdr.udp_length = htons(iUdpSize) ; udpHdr.udp_checksum = 0 ; iUdpChecksumSize = 0; ptr = buf; ZeroMemory(buf, OICQ_MAX_PACKET); memcpy(ptr, &ipHdr;.ip_srcaddr, sizeof(ipHdr.ip_srcaddr)); ptr += sizeof(ipHdr.ip_srcaddr); iUdpChecksumSize += sizeof(ipHdr.ip_srcaddr); memcpy(ptr, &ipHdr;.ip_destaddr, sizeof(ipHdr.ip_destaddr)); ptr += sizeof(ipHdr.ip_destaddr); iUdpChecksumSize += sizeof(ipHdr.ip_destaddr); ptr++; iUdpChecksumSize += 1; memcpy(ptr, &ipHdr;.ip_protocol, sizeof(ipHdr.ip_protocol)); ptr += sizeof(ipHdr.ip_protocol); iUdpChecksumSize += sizeof(ipHdr.ip_protocol); memcpy(ptr, &udpHdr;.udp_length, sizeof(udpHdr.udp_length)); ptr += sizeof(udpHdr.udp_length); iUdpChecksumSize += sizeof(udpHdr.udp_length); memcpy(ptr, &udpHdr;, sizeof(udpHdr)); ptr += sizeof(udpHdr); iUdpChecksumSize += sizeof(udpHdr); for(i = 0; i *ptr = strMessage[i]; iUdpChecksumSize += OICQ_MSG_LEN; cksum = checksum((USHORT *)buf, iUdpChecksumSize); udpHdr.udp_checksum = cksum; ZeroMemory(buf, OICQ_MAX_PACKET); ptr = buf; memcpy(ptr, &ipHdr;, sizeof(ipHdr)); ptr += sizeof(ipHdr); memcpy(ptr, &udpHdr;, sizeof(udpHdr)); ptr += sizeof(udpHdr); memcpy(ptr, strMessage, OICQ_MSG_LEN); remote.sin_family = AF_INET; remote.sin_port = htons(DST_PORT); remote.sin_addr.s_addr = inet_addr(argv[1]); ret = sendto(s, buf, iTotalSize, 0, (SOCKADDR *)&remote;, sizeof(remote)); if (ret == SOCKET_ERROR) printf("sendto() failed: %d\n", WSAGetLastError()); else printf("Send O.K.!"); closesocket(s) ; WSACleanup() ; return 0; }
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值