Distributed DNS Flooder v0.1b by Extirpater

Disclaimer
-----------
I take no responsibility for what you do with this piece of software.
The author of this software disclaims all warranties with respect
thereto, express, implied or otherwise, including, without limitation, any
warranty of merchantability or fitness for a particular purpose.  In no event
shall author be liable for any loss of profits, loss of business, loss
of data or for any indirect, special, exemplary, incidental or consequential
damages of any kind arising from your use of, failure to use or improper
use.


Credits
--------
Written by Extirpater. Also includes codes from ADM crew's DNS functions.

What is this?
-------------
A powerful attack against DNS servers. DDNSF will send lots of queries to disable DNS.
If DNS daemon software logs incorrect queries (like most of do), affect will be greater.
If not you are still able to disable DNS.
Written and tested under Linux but should run under other unixes.

How to use?
-----------
First of all, compile files like this:

gcc -o DDNSF_client DDNSF_client.c
gcc -o DDNSF_server DDNSF_server.c

Install "DDNSF_server" on owned box. (You must be root to run DDNSF_server because of raw sockets.)
when you root on that box run program:
DDNSF_server &

DDNSF will mask itself as something like "vi" to avoid process list.

Install DDNSF_server to as many hosts as you can. More owned bandwith more power...

After all, easy and funny part comes:

Write owned box's IPs to a file something like this:
192.168.5.2
192.168.5.3
192.168.5.4

lets save this as "zombie.txt"

Now run DDNSF_client:
Lets take down "www.victim_domain.com"'s DNS server.

To get DNS of a domain, type:
host -t ns www.victim_domain.com

We get DNS server 192.168.5.1

./DDNSF_client start zombie.txt 192.168.5.1

DDNSF_client will send a start command to zombies to take down victim.

To stop attack, replace start with stop.
./DDNSF_client stop zombie.txt 192.168.5.1
Use this command a few times because zombies may be a little bit busy to receive your packet.


Important note
--------------
To avoid of packet loss while ip spoofing, change in line 76 [ s_ip=host2ip("192.168.0.1") ] in DDNSF_server.c , change ip address
192.168.0.1 to machine's ip number.

Good Luck...

- Extirpater
