| ==Phrack Inc.== |
|
|
| Volume Two, Issue 23, File 8 of 12 |
|
|
| ____________________________________ |
| | | |
| | Getting Serious About VMS Hacking | |
| | | |
| | by VAXbusters International | |
| | | |
| | January 1989 | |
| |____________________________________| |
|
|
| The VAX/VMS operating system is said to be one of the most secure systems |
| currently available. It has been massively extended in the past to provide |
| features which can help system managers getting their machines locked up to |
| abusers and to trace back any attempts to indiscriminate system security. As |
| such, it is not easy getting into VMS machines now without having insider |
| information, and it's even harder to stay in. |
|
|
| The following article describes some of the internals which make up the VMS |
| security features, and tries to give hints what to do to remain undiscovered. |
| The reader should be familiar with the VMS system from the programmer's point |
| of view. |
|
|
| Some of the things mentioned are closely related to the internal workings of |
| the VAX/VMS operating system. All descriptions are held as general as |
| possible. It is tried to point out where weak points in the system are |
| located, not to give step-by-step instructions on how to hack VMS machines. |
| The main reason for this is, that it is very hard to remain undiscovered in a |
| VMS system without having good knowledge of the whole system. This knowledge |
| is only aquirable by experience. |
|
|
| To use some of the techniques described herein, some literature is recommended: |
|
|
| "The VAX Architecture Handbook," published by DEC. This book describes |
| the VAX processor, it's instruction set and it's hardware. It is a good |
| book to have on your desk, since it costs nothing (just go to your local |
| DEC store and ask for it) and is only in paperback format. |
|
|
| "MACRO and Instruction Set," part of the VMS documentation kit. This is |
| needed only if you want to program bigger things in MACRO. It's |
| recommended reading, but you don't need to have it on your own normally. |
|
|
| "VAX/VMS Internals and Data Structures" by L.Kenah and S.Bate. This is |
| the bible for VMS hackers. It describes the inner workings of the system |
| as well as most of the data structures used within the kernel. The |
| Version published always is one version number behind the current VMS |
| release, but as the VAX architecture doesn't change, it is the best source |
| on a description how the system works. After you've read and understood |
| this book, the VAX won't look more mysterious than your C64. You can |
| order this book from DEC, the order number for the V3.0 version of the |
| book is EY-00014-DP. The major drawback is the price, which is around |
| $70-$100. |
|
|
| A good source of information naturally is the source code of the VMS system. |
| The easiest way to snoop around in it is to get the microfiche set, which is |
| delivered by DEC to all bigger customers of the system. The major disadvantage |
| is that you need a fiche reader to use it. The fiche is needed if |
| modifications to the system code are intended, unless you plan to disassemble |
| everything you need. The VMS system is written in BLISS-32 and FORTRAN. BLISS |
| is quite readable, but it might be worthwhile having a FORTRAN hacker around if |
| you intend to do patch any of the programs implemented in FORTRAN. The source |
| fiche always contains the current release, so it's useful to check if the |
| information in "Internals and Data Structures" is still valid. |
|
|
|
|
| Hacker's Tools |
| ~~~~~~~~~~~~~~ |
| There are several programs which are useful when snooping around on a VMS |
| system. |
|
|
| The most important utility might be the System Dump Analyzer (SDA), which is |
| started with the command ANALYZE/SYSTEM. Originally, SDA was developed to |
| analyze system crash dumps, which are created every time the machine crashes in |
| a 'controlled' manner (bugcheck or opcrash). SDA can also be used to analyze |
| the running system, which is the more useful function. A process which wants |
| to run SDA needs the CMKRNL privilege. With SDA, you can examine any process |
| and find out about accessed files and devices, contents of virtual memory (like |
| typeahead and recall buffers), process status and more. SDA is a watching |
| tool, so you normally can't destroy anything with it. |
|
|
| Another helpful tool is the PATCH utility, called up by the command PATCH. As |
| VMS is distributed in a binary-only fashion, system updates are normally |
| distributed as patches to binaries. PATCHES can be entered as assembler |
| statements directly. Combined with the source fiche, PATCH is a powerful tool |
| for your modifications and improvements to the VMS operating system. |
|
|
|
|
| Privileges |
| ~~~~~~~~~~ |
| To do interesting things on the VMS system, you normally need privileges. The |
| following lists describes some of the privileges which are useful in the |
| onliner's daily life. |
|
|
| CMKRNL |
| CMEXEC These two privileges enable a user to execute arbitrary routines with |
| KERNEL and EXECUTIVE access mode. These privileges are needed when one |
| plans to access kernel data structures directly. CMKRNL is the most |
| powerful privilege available, everything which is protected can be |
| accessed utilizing it. |
|
|
| SYSPRV A process which holds this privilege can access objects via the system |
| protection. A process holding the this privilege has the same access |
| rights as a process running under a system UIC. |
|
|
| SHARE This allows a process to assign channels to nonshareable devices which |
| already have channels assigned to them. This can be used to prevent |
| terminal hangups and to assign channels to system mailboxes. |
|
|
|
|
| Process States And The Process Control Block |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| When you get into kernel hacking, you should pay special attention to the field |
| PCB$L_STS. This field tells about the process status. Interesting bits are |
| PCB$V_DELPEN, PCB$V_NOACNT and PCB$V_BATCH. There can be achieved astonishing |
| effects by setting these bits. |
|
|
|
|
| Hideout |
| ~~~~~~~ |
| A nice possibility to have is to be unseen by a system manager. There are many |
| ways to get invisible to SHOW USERS, but hiding from SHOW SYSTEM is another |
| story, as it doesn't even use standard system calls to get a list of the |
| currently running processes. And in fact, hiding from SDA is even harder, |
| since it directly peeks kernel data structures. Anyway, being invisible to |
| SHOW USERS is useful on small systems, where one user more could ring the alarm |
| bell of the system operator. |
|
|
| One possibility to do this is to become a subprocess of some non-interactive |
| job (like a BATCH or NETWORK process). The other way is to patch the PCB to |
| become a BATCH process or to delete the terminal name (which makes SHOW USERS |
| think you are non-interactive as well). Patching the PCB has a disadvantage: |
| The system global variable SYS$GW_IJOBCNT which contains the number of |
| interactive users must be directly decremented before you hide, and MUST be |
| incremented before you log out. |
|
|
| If you forget this, the interactive job count will be wrong. If it becomes |
| negative, strange effects will show up, which will confuse every system |
| manager. |
|
|
|
|
| Accounting And Audits |
| ~~~~~~~~~~~~~~~~~~~~~ |
| The most nasty thing about VMS since release 4.2 is the security auditing |
| feature. It enables the system manager to log almost every security relevant |
| event he desires. For example, access to files, login failures and |
| modification user authorization data base can all be monitored, logged and |
| written to the system printer. The first thing to find out in a new, unknown |
| system is the awareness of the system management. The status of the accounting |
| system is easily determinable by the command SHOW ACCOUNTING. Normally, |
| everything except IMAGE accounting is enabled. When IMAGE accounting is also |
| enabled, this is the first hint to be careful. The second thing to check out |
| is the status of the security auditing system. You need the SECURITY privilege |
| to execute the command SHOW AUDIT. |
|
|
| If no audits are enabled, and image accounting is not turned on, the system |
| normally is not set up to be especially secure. Such systems are the right |
| playground for a system hacker, since one doesn't have to be as careful as one |
| has to be on a correctly managed system. |
|
|
|
|
| Accounting |
| ~~~~~~~~~~ |
| The main intention for running accounting on a system is the need to charge |
| users for resources (cpu time, printer usage etc.) they use on the machine. On |
| the other hand, accounting can be very useful to track down invaders. Luckily, |
| accounting information is being logged in the normal file system, and as such |
| one can edit out information which isn't supposed to be seen by sneaky eyes. |
| The most important utility to handle accounting files is, naturally, the |
| ACCOUNTING utility. It has options to collect information which is stored in |
| accounting files, print it in a human readable manner, and, most importantly, |
| edit accounting files. That is, you can edit all information out of an |
| accounting file which you don't want to appear in reports anymore. The |
| important qualifier to the ACCOUNTING command is /BINARY. |
|
|
|
|
| File Access Dates |
| ~~~~~~~~~~~~~~~~~ |
| One way for system managers to discover unwanted guests is to look out for |
| modified system files. Fortunately, there are ways to modify the modification |
| dates in a file's header. This can be done with RMS system calls, but there is |
| no easy way to do that with pure DCL. There are several utilities to do this |
| kind of things in the public domain, so look out in the DECUS catalog. |
|
|
|
|
| OPCOM |
| ~~~~~ |
| OPCOM is a process which logs system and security relevant events (like tape |
| and disk mount transactions, security auditing messages etc.). OPCOM receives |
| messages via a mailbox device, formats them, logs the event in the operator |
| logfile (SYS$MANAGER:OPERATOR.LOG) and notifies all operators. Additionally, |
| it sends all messages to it's standard output, which normally is the system |
| console device _OPA0:. When OPCOM is started, one message is sent to the |
| standard output announcing that the operator logfile has been initialized. |
| Thus, it's not recommended to kill OPCOM to remain undiscovered, since the |
| system manager most likely will get suspicious if the operator logfile has been |
| initialized without an obvious reason. The elegant solution to suspend OPCOM, |
| for the time where no operator messages shall come through. While OPCOM is |
| suspended, all messages will be buffered in the mailbox device, where every |
| process with sufficient privilege can read them out, thus avoiding that OPCOM |
| reads those messages after it is restarted. |
|
|
| There is one problem with this solution though: OPCOM always has a read |
| pending on that mailbox, and this read will be there even if the OPCOM process |
| is suspended. Unless you're heavily into kernel hacking, there is no way to |
| get rid of this read request. As such, the easy solution is to generate an |
| unsuspicious operator message as soon as OPCOM is suspended. Afterwards, your |
| own process (which can be a DCL procedure) reads all subsequent messages off |
| the OPCOM mailbox until you feel save enough to have OPCOM resume it's work. By |
| the way, the OPCOM message mailbox is temporary and has no logical name |
| assigned to it. You'll need SDA to get information about the device name. |
|
|
|
|
| Command Procedures |
| ~~~~~~~~~~~~~~~~~~ |
| Timely, you'll need DCL procedures to have some routine work done |
| automatically. It is important not to have strange command procedures lying |
| around on a foreign system, since they can be easily read by system managers. |
| Fortunately, a command file may be deleted while someone is executing it. It |
| is good practice to do so, utilizing the lexical function F$ENVIRONMENT. If |
| you need access to the command file itself from the running procedure, just |
| assign a channel to it with OPEN. |
|
|
|
|
| Piggy-Backing |
| ~~~~~~~~~~~~~ |
| It's not normally a good idea to add new, possibly privileged accounts to a |
| foreign system. The better approach is to to use accounts which have been |
| unused for some months and to hide privileged programs or piggybacks which gain |
| privilege to the caller by some mechanism. A piggyback is a piece of code |
| which is added to a privileged system program, and which gives privileges |
| and/or special capabilities to callers which have some kind of speciality (like |
| a special process name, for example). Be careful not to change file sizes and |
| dates, since this makes people suspicious. |
|
|
|
|
| Conclusion |
| ~~~~~~~~~~ |
| This file just tries to give an impression how interesting VMS kernel hacking |
| can be, and what possibilities there are. It of course is not complete, and |
| many details have been left out. Hopefully, it has been useful and/or |
| interesting lecture. |
|
|
|
|
|
|
| (C)opyright 1989 by the VAXBusters International. |
| You may give around this work as long as you don't pretend you wrote it. |
| _______________________________________________________________________________ |
|
|