User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 11357
  6. 11358
  7. 11359
  8. 11360
  9. 11361
  10. 11362
  11. ...
  12. 11494
  13. 11495
  14. 11496
  15. 11497

Posts by The Self Taught Man

  1. Your home is so momless you don't get in trouble for having pop with breakfast
  2. Bravo Romeo Bravo Quabec Tango Papa Indigo Echo Whiskey beta India Tango India November Golf Foxtrot Oscar Romeo Mike Echo.

    THIS IS NOT A DRILL!

  3. Can you me more about the office furniture manufactuers in Delhi? And if you have designated shitting streets or just kinda go wherever?
  4. Peptidoglycan is a big ass molecule that pretty much forms the cell wall of most bacteria. Intel suggests that bacteria is actually an invention of Soviet design that was created to collapse the Capitalist markets. Intel from a recent raid in Moscow suggests the molecule itself is made up of a monosaccardie derivetive of glucose, lactic acid and a chain of a three to five amino acids. As I said, this molecule forms the cell wall in most bacteria. If we take a hit from international politics if we take down that wall the bacterial cells will be flooded with illegal migrants and syrian refugees. But dont worry, this is a good thing for europe. But if we can get this wall down, and completely deplete the welfare resources of the bacterial cells they will be forced to sell their debt to the debt supercollectionmarket in China Illinois. With bacterial cells in more debt than Greece we will have no problem buying other Soviet Secrets from them. Then once we have the information we need, we will turn bacterial cells into The Federal Republic of Bacterium by setting up a puppet government after we out the incumbent nucleus. The final step of the plan is to unify the Bacterial Federal Republic with the European Union. The Federal Bacterial Republic will then be the housing place for ALL refugees entering Europe. We outsource all of telecommunications reps to this country in order to weaken India's grasp on the Western job market.

    Start looking for the signs.
  5. Ahem...
  6. But one the other hand, if people know they'll get dead if they fuck someone over, there would probably be a lot less problems in the world. For example, even if you justifiably kill someone, someone could come and kill you, too, if they feel it was unjustified. That forces people to carefully consider the probable consequences when they feel like getting stupid, whether they are in the right or wrong would be immaterial. Bunch of crooked bankers? No problem. We'll just string the fuckers up. Wouldn't find too many crooked bankers flaunting it in that kind of world. I kind of like the natural simplicity of having no laws. I like the law of the jungle.
    If you had to live by the law of the jungle you would be tiger poop.
  7. It could be a trigger date for some other dire process, which has now been initiated as of the 23rd.
    Could be you and Bill Krozby fell of the same turnip truck.
  8. I did bro, i tried the code fixed the subnet. still the same.


    fuck :( what error you getting now? :(
  9. Even with that changed, and the code you provided i still get the same error :( I do appreciate your efforts in trying to help me out though, so thank you regardless.


    try the quoted code? you'll need to change the subnet to fix that
  10. Your home is so momless you have two dads.
  11. Johnny Depp puts the swish in swashbuckling.
  12. Oh top kek, typos ruining my life.
    We all do it :) Is it working now?
  13. Also, is your subnet not supposed to have a period after 192?
    subnet = "192168.0.0/24"
  14. I was about to but then is aw i already have that piece of code there, here's the entire script for reference.


    import socket
    import os
    import struct
    from ctypes import *
    import threading
    import time
    from netaddr import IPNetwork, IPAddress

    # Host to listen on
    host = "192.168.0.011"

    # Subnet to target
    subnet = "192168.0.0/24"

    # Magic string we'll check ICMP responses for
    magic_message = "NIGGERS!"

    # This sprays out the UDP datagrams
    def udp_sender(subnet,magic_message):
    time.sleep(5)
    sender = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

    for ip in IPNetwork(subnet):
    try:
    sender.sendto(magic_message,("%s" % ip,65212))
    except:
    pass

    # Start sending packets
    t = threading.Thread(target=udp_sender,args=(subnet,magic_message))
    t.start

    # Our IP header.
    class IP(Structure):

    _fields_=[
    ("ihl", c_ubyte, 4),
    ("version", c_ubyte, 4),
    ("tos", c_ubyte),
    ("len", c_ushort),
    ("id", c_ushort),
    ("offset", c_ushort),
    ("ttl", c_ubyte),
    ("protocol_num",c_ubyte),
    ("sum", c_ushort),
    ("src", [COLOR=#000000][FONT=Consolas]c_uint32[/FONT][/COLOR]),
    ("dst",[COLOR=#000000][FONT=Consolas]c_uint32[/FONT][/COLOR])
    ]

    def _new_(self, socket_buffer=None):
    return self.from_buffer_copy(socket_buffer)

    def _init_(self, socket_buffer=None):

    # Map protocol constants to their names
    self.protocol_map = {1:"ICMP", 6:"TCP", 17:"UDP"}

    # Human readable IP addresses
    self.src_address = socketinet_ntoa(struct.pack("<L",self.src))
    self.dst_address = socket.inet_ntoa(struct.pack("<L",self.dst))

    # Human readable protocol
    try:
    self.protocol = self.protocol_map[self.protocol_num]
    except:
    self.protocol = str(self.protocol_num)



    if os.name == "nt":
    socket_protocol = socket.IPPROTO_IP
    else:
    socket_protocol = socket.IPPROTO_ICMP

    sniffer = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket_protocol)

    sniffer.bind((host, 0))
    sniffer.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1)

    if os.name == "nt":
    sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)


    try:

    while True:
    # Read in a packet
    [COLOR=#000000]raw_buffer [/COLOR][COLOR=#000000]=[/COLOR][COLOR=#000000] sniffer[/COLOR][COLOR=#000000].[/COLOR][COLOR=#000000]recvfrom[/COLOR][COLOR=#000000]([/COLOR][COLOR=#800000]65535[/COLOR][COLOR=#000000])[[/COLOR][COLOR=#800000]0[/COLOR][COLOR=#000000]][/COLOR] # print raw_buffer
    # Create an IP header from the first 20 bytes of the buffer
    ip_header = IP(raw_buffer[0:20])

    # Print out the protocol that was detected and the hosts
    print "Protocol: %s %s -> %s" % (ip_header.protocol, ip_header.src_address, ip_header.dst_address)

    print "ICMP -> Type: %d Code: %d" % (icmp_header.type, icmp_header.code)

    # Now check for type 3 and code
    if icmp_header.code == 3 and icmp_header.type == 3:

    # Make sure host is in target subnet
    if IPAddress(ip_header.src_address) in IPNetwork(subnet):

    # Make sure it has our magic message
    if raw_buffer[len(raw_buffer)-len(magic_message):] == magic_message:
    print "Host up: %s" % ip_header.src_address

    # Handle CTRL+C
    except KeyboardInterrupt:
    # If we're using Windows turn off promisuous mode
    if os.name == "nt":
    sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_OFF)

    class ICMP(Structure):

    _fields_= [
    ("type", c_ubyte),
    ("code", c_ubyte),
    ("checksum", c_ushort),
    ("unused", c_ushort),
    ("next_hop_mtu",c_ushort)
    ]

    def _new_(self, socket_buffer):
    return self.from_buffer_copy(socket_buffer)

    def _init_(self, socket_buffer):
    pass

    print "Protocol: %s %s -> %s (ip_header.protocol, ip_header.src_adress, ip_header.dst_address)"

    # If it's ICMP we want items
    if ip_header.protocol == "ICMP":
    # Calculate where our ICMP packet startswith
    offset = ip_header.ihl * 4

    buf = raw_buffer[offset:offset + sizeof(ICMP)]
    # Create ICMP structure
    icmp_header = ICMP(buf)

    print "ICMP -> Type: %d Code %d" % (icmp_header.type, icmp_header.code)


    Try that code in the quote :)
  15. Lol it's ok, don't have a beautifier though. Just copypasta in code tags?



    add this to the top above sniffer =

    [FONT=Consolas][FONT=inherit][SIZE=12px]if[/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px] os.name [/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px]==[/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px]"nt"[/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px]:
    socket_protocol [/SIZE][/FONT][/FONT]
    [FONT=Consolas][FONT=inherit][SIZE=12px]=[/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px] socket.IPPROTO_IP
    else:
    socket_protocol [/SIZE][/FONT][/FONT]
    [FONT=Consolas][FONT=inherit][SIZE=12px]=[/SIZE][/FONT][/FONT][FONT=Consolas][FONT=inherit][SIZE=12px] socket.IPPROTO_ICMP[/SIZE][/FONT][/FONT]
  16. FBI does collaborative work with international police to bring down deepweb CP sites, so you see my problem there.
    Yeah cept you troll the whole pedo thing.
  17. formatting's gone to fuck, sorry. use a beautifier and test it.
  18. I only need the first 20 bytes though that's what the [0:20] is for. And if the response is not an integer when i receive the first 20 bytes it's not going to be an integer if i receive all of them either, i'd think.[/QUOTE


    [FONT=Consolas][SIZE=12px]if[/SIZE][/FONT][FONT=Consolas][SIZE=12px] os.name [/SIZE][/FONT][FONT=Consolas][SIZE=12px]==[/SIZE][/FONT][FONT=Consolas][SIZE=12px] [/SIZE][/FONT][FONT=Consolas][SIZE=12px]"nt"[/SIZE][/FONT][FONT=Consolas][SIZE=12px]: socket_protocol [/SIZE][/FONT][FONT=Consolas][SIZE=12px]=[/SIZE][/FONT][FONT=Consolas][SIZE=12px] socket.IPPROTO_IP else: socket_protocol [/SIZE][/FONT][FONT=Consolas][SIZE=12px]=[/SIZE][/FONT][FONT=Consolas][SIZE=12px] socket.IPPROTO_ICMP [/SIZE][/FONT] sniffer = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket_protocol) sniffer.bind((host, 0)) sniffer.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1) if os.name == "nt": sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON) try: while True: # Read in a packet raw_buffer = sniffer.recvfrom(65565)[0] print raw_buffer # Create an IP header from the first 20 bytes of the buffer ip_header = IP(raw_buffer[0:20]) # Print out the protocol that was detected and the hosts print "Protocol: %s %s -> %s" % (ip_header.protocol, ip_header.src_address, ip_header.dst_address) print "ICMP -> Type: %d Code: %d" % (icmp_header.type, icmp_header.code) # Now check for type 3 and code if icmp_header.code == 3 and icmp_header.type == 3: # Make sure host is in target subnet if IPAddress(ip_header.src_address) in IPNetwork(subnet): # Make sure it has our magic message if raw_buffer[len(raw_buffer)-len(magic_message):] == magic_message: print "Host up: %s" % ip_header.src_address # Handle CTRL+C except KeyboardInterrupt: # If we're using Windows turn off promisuous mode if os.name == "nt": sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_OFF)
  19. I only need the first 20 bytes though that's what the [0:20] is for. And if the response is not an integer when i receive the first 20 bytes it's not going to be an integer if i receive all of them either, i'd think.


    Print out the result of the raw buffer and see what it returns
  20. [FONT=verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif]she didn't even come home for dinner last night.[/FONT]
  1. 1
  2. 2
  3. 3
  4. ...
  5. 11357
  6. 11358
  7. 11359
  8. 11360
  9. 11361
  10. 11362
  11. ...
  12. 11494
  13. 11495
  14. 11496
  15. 11497
Jump to Top