 obstruct.c - TCP IRCD *SERVER* Flooder
 written by OseK for Team SigDie Research

 This is a proof-of-concept code that shows how you can
 send re-curring SERVER requests to port 6667 of an IRC server
 which in tandem with other floods could cause a TCP SynFlood
 in combination /w an extremely annoying server notice flood to all 
 IRC operators on the server.
 
 For instance, in Unreal3.2 standard configuration, bogus SERVER
 requests will show up in a notice to all Operators with +sw modes
 set.
 
 Ex: [irc.obstruct.com] WARNING: Bogus server name (obstruct) from 
                        [@212.187.20.103.1108] (maybe just a fishy client)

 Thanks to synco and Terminal of Team SigDie Research for their ideas.
 
 To compile just type "make"
  
 Usage: ./obstruct <target> <port>    sends a single bogus SERVER request.
 Usage: ./obutil <target> <port>      to endlessly flood the target
 Usage: ./killghosts                  kills all zombied processes
 
 NOTE: This is proof-of-concept, it has been tested however I'm sure
       someone will come out with a DDoS drone or a more clean
       flooder to run this with.

 - OseK

 Greets out to Terminal, Synco, TsTech, elian, Ho0ke, gh0zt,
              wizy, vaL0rz, _KeyLock_, snizzy, Maximpact,
              Solaris8, vimd, vMAC, XG3, and whatever.


