| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 11 of 17 |
|
|
|
|
| -------------------------[ The Art of Port Scanning |
|
|
|
|
| --------[ Fyodor <fyodor@dhp.com> |
|
|
|
|
| [ Abstract ] |
|
|
| This paper details many of the techniques used to determine what ports (or |
| similar protocol abstraction) of a host are listening for connections. These |
| ports represent potential communication channels. Mapping their existence |
| facilitates the exchange of information with the host, and thus it is quite |
| useful for anyone wishing to explore their networked environment, including |
| hackers. Despite what you have heard from the media, the Internet is NOT |
| all about TCP port 80. Anyone who relies exclusively on the WWW for |
| information gathering is likely to gain the same level of proficiency as your |
| average AOLer, who does the same. This paper is also meant to serve as an |
| introduction to and ancillary documentation for a coding project I have been |
| working on. It is a full featured, robust port scanner which (I hope) solves |
| some of the problems I have encountered when dealing with other scanners and |
| when working to scan massive networks. The tool, nmap, supports the following: |
|
|
| - vanilla TCP connect() scanning, |
| - TCP SYN (half open) scanning, |
| - TCP FIN (stealth) scanning, |
| - TCP ftp proxy (bounce attack) scanning |
| - SYN/FIN scanning using IP fragments (bypasses packet filters), |
| - UDP recvfrom() scanning, |
| - UDP raw ICMP port unreachable scanning, |
| - ICMP scanning (ping-sweep), and |
| - reverse-ident scanning. |
|
|
| The freely distributable source code is appended to this paper. |
|
|
|
|
|
|
| [ Introduction ] |
|
|
| Scanning, as a method for discovering exploitable communication channels, has |
| been around for ages. The idea is to probe as many listeners as possible, and |
| keep track of the ones that are receptive or useful to your particular need. |
| Much of the field of advertising is based on this paradigm, and the "to current |
| resident" brute force style of bulk mail is an almost perfect parallel to what |
| we will discuss. Just stick a message in every mailbox and wait for the |
| responses to trickle back. |
|
|
| Scanning entered the h/p world along with the phone systems. Here we have this |
| tremendous global telecommunications network, all reachable through codes on |
| our telephone. Millions of numbers are reachable locally, yet we may only |
| be interested in 0.5% of these numbers, perhaps those that answer with a |
| carrier. |
|
|
| The logical solution to finding those numbers that interest us is to try them |
| all. Thus the field of "wardialing" arose. Excellent programs like Toneloc |
| were developed to facilitate the probing of entire exchanges and more. The |
| basic idea is simple. If you dial a number and your modem gives you a CONNECT, |
| you record it. Otherwise the computer hangs up and tirelessly dials the next |
| one. |
|
|
| While wardialing is still useful, we are now finding that many of the computers |
| we wish to communicate with are connected through networks such as the Internet |
| rather than analog phone dialups. Scanning these machines involves the same |
| brute force technique. We send a blizzard of packets for various protocols, |
| and we deduce which services are listening from the responses we receive (or |
| don't receive). |
|
|
|
|
|
|
| [ Techniques ] |
|
|
| Over time, a number of techniques have been developed for surveying the |
| protocols and ports on which a target machine is listening. They all offer |
| different benefits and problems. Here is a line up of the most common: |
|
|
| - TCP connect() scanning : This is the most basic form of TCP scanning. The |
| connect() system call provided by your operating system is used to open a |
| connection to every interesting port on the machine. If the port is listening, |
| connect() will succeed, otherwise the port isn't reachable. One strong |
| advantage to this technique is that you don't need any special privileges. Any |
| user on most UNIX boxes is free to use this call. Another advantage is speed. |
| While making a separate connect() call for every targeted port in a linear |
| fashion would take ages over a slow connection, you can hasten the scan by |
| using many sockets in parallel. Using non-blocking I/O allows you to set a low |
| time-out period and watch all the sockets at once. This is the fastest |
| scanning method supported by nmap, and is available with the -t (TCP) option. |
| The big downside is that this sort of scan is easily detectable and filterable. |
| The target hosts logs will show a bunch of connection and error messages for |
| the services which take the connection and then have it immediately shutdown. |
|
|
|
|
| - TCP SYN scanning : This technique is often referred to as "half-open" |
| scanning, because you don't open a full TCP connection. You send a SYN packet, |
| as if you are going to open a real connection and wait for a response. A |
| SYN|ACK indicates the port is listening. A RST is indicative of a non- |
| listener. If a SYN|ACK is received, you immediately send a RST to tear down |
| the connection (actually the kernel does this for us). The primary advantage |
| to this scanning technique is that fewer sites will log it. Unfortunately you |
| need root privileges to build these custom SYN packets. SYN scanning is the -s |
| option of nmap. |
|
|
|
|
| - TCP FIN scanning : There are times when even SYN scanning isn't clandestine |
| enough. Some firewalls and packet filters watch for SYNs to an unallowed port, |
| and programs like synlogger and Courtney are available to detect these scans. |
| FIN packets, on the other hand, may be able to pass through unmolested. This |
| scanning technique was featured in detail by Uriel Maimon in Phrack 49, article |
| 15. The idea is that closed ports tend to reply to your FIN packet with the |
| proper RST. Open ports, on the other hand, tend to ignore the packet in |
| question. This is a bug in TCP implementations and so it isn't 100% reliable |
| (some systems, notably Micro$oft boxes, seem to be immune). It works well on |
| most other systems I've tried. FIN scanning is the -U (Uriel) option of nmap. |
|
|
|
|
| - Fragmentation scanning : This is not a new scanning method in and of itself, |
| but a modification of other techniques. Instead of just sending the probe |
| packet, you break it into a couple of small IP fragments. You are splitting |
| up the TCP header over several packets to make it harder for packet filters |
| and so forth to detect what you are doing. Be careful with this! Some |
| programs have trouble handling these tiny packets. My favorite sniffer |
| segmentation faulted immediately upon receiving the first 36-byte fragment. |
| After that comes a 24 byte one! While this method won't get by packet filters |
| and firewalls that queue all IP fragments (like the CONFIG_IP_ALWAYS_DEFRAG |
| option in Linux), a lot of networks can't afford the performance hit this |
| causes. This feature is rather unique to scanners (at least I haven't seen |
| any others that do this). Thanks to daemon9 for suggesting it. The -f |
| instructs the specified SYN or FIN scan to use tiny fragmented packets. |
|
|
|
|
| - TCP reverse ident scanning : As noted by Dave Goldsmith in a 1996 Bugtraq |
| post, the ident protocol (rfc1413) allows for the disclosure of the username of |
| the owner of any process connected via TCP, even if that process didn't |
| initiate the connection. So you can, for example, connect to the http port |
| and then use identd to find out whether the server is running as root. This |
| can only be done with a full TCP connection to the target port (i.e. the -t |
| option). nmap's -i option queries identd for the owner of all listen()ing |
| ports. |
|
|
|
|
| - FTP bounce attack : An interesting "feature" of the ftp protocol (RFC 959) is |
| support for "proxy" ftp connections. In other words, I should be able to |
| connect from evil.com to the FTP server-PI (protocol interpreter) of target.com |
| to establish the control communication connection. Then I should be able to |
| request that the server-PI initiate an active server-DTP (data transfer |
| process) to send a file ANYWHERE on the internet! Presumably to a User-DTP, |
| although the RFC specifically states that asking one server to send a file to |
| another is OK. Now this may have worked well in 1985 when the RFC was just |
| written. But nowadays, we can't have people hijacking ftp servers and |
| requesting that data be spit out to arbitrary points on the internet. As |
| *Hobbit* wrote back in 1995, this protocol flaw "can be used to post virtually |
| untraceable mail and news, hammer on servers at various sites, fill up disks, |
| try to hop firewalls, and generally be annoying and hard to track down at the |
| same time." What we will exploit this for is to (surprise, surprise) scan TCP |
| ports from a "proxy" ftp server. Thus you could connect to an ftp server |
| behind a firewall, and then scan ports that are more likely to be blocked (139 |
| is a good one). If the ftp server allows reading from and writing to a |
| directory (such as /incoming), you can send arbitrary data to ports that you do |
| find open. |
|
|
| For port scanning, our technique is to use the PORT command to declare that |
| our passive "User-DTP" is listening on the target box at a certain port number. |
| Then we try to LIST the current directory, and the result is sent over the |
| Server-DTP channel. If our target host is listening on the specified port, the |
| transfer will be successful (generating a 150 and a 226 response). Otherwise |
| we will get "425 Can't build data connection: Connection refused." Then we |
| issue another PORT command to try the next port on the target host. The |
| advantages to this approach are obvious (harder to trace, potential to bypass |
| firewalls). The main disadvantages are that it is slow, and that some FTP |
| servers have finally got a clue and disabled the proxy "feature". For what it |
| is worth, here is a list of banners from sites where it does/doesn't work: |
|
|
| *Bounce attacks worked:* |
|
|
| 220 xxxxxxx.com FTP server (Version wu-2.4(3) Wed Dec 14 ...) ready. |
| 220 xxx.xxx.xxx.edu FTP server ready. |
| 220 xx.Telcom.xxxx.EDU FTP server (Version wu-2.4(3) Tue Jun 11 ...) ready. |
| 220 lem FTP server (SunOS 4.1) ready. |
| 220 xxx.xxx.es FTP server (Version wu-2.4(11) Sat Apr 27 ...) ready. |
| 220 elios FTP server (SunOS 4.1) ready |
|
|
| *Bounce attack failed:* |
|
|
| 220 wcarchive.cdrom.com FTP server (Version DG-2.0.39 Sun May 4 ...) ready. |
| 220 xxx.xx.xxxxx.EDU Version wu-2.4.2-academ[BETA-12](1) Fri Feb 7 |
| 220 ftp Microsoft FTP Service (Version 3.0). |
| 220 xxx FTP server (Version wu-2.4.2-academ[BETA-11](1) Tue Sep 3 ...) ready. |
| 220 xxx.unc.edu FTP server (Version wu-2.4.2-academ[BETA-13](6) ...) ready. |
|
|
| The 'x's are partly there to protect those guilty of running a flawed server, |
| but mostly just to make the lines fit in 80 columns. Same thing with the |
| ellipse points. The bounce attack is available with the -b <proxy_server> |
| option of nmap. proxy_server can be specified in standard URL format, |
| username:password@server:port , with everything but server being optional. |
|
|
|
|
| - UDP ICMP port unreachable scanning : This scanning method varies from the |
| above in that we are using the UDP protocol instead of TCP. While this |
| protocol is simpler, scanning it is actually significantly more difficult. |
| This is because open ports don't have to send an acknowledgement in response to |
| our probe, and closed ports aren't even required to send an error packet. |
| Fortunately, most hosts do send an ICMP_PORT_UNREACH error when you send a |
| packet to a closed UDP port. Thus you can find out if a port is NOT open, and |
| by exclusion determine which ports which are. Neither UDP packets, nor the |
| ICMP errors are guaranteed to arrive, so UDP scanners of this sort must also |
| implement retransmission of packets that appear to be lost (or you will get a |
| bunch of false positives). Also, this scanning technique is slow because of |
| compensation for machines that took RFC 1812 section 4.3.2.8 to heart and limit |
| ICMP error message rate. For example, the Linux kernel (in net/ipv4/icmp.h) |
| limits destination unreachable message generation to 80 per 4 seconds, with a |
| 1/4 second penalty if that is exceeded. At some point I will add a better |
| algorithm to nmap for detecting this. Also, you will need to be root for |
| access to the raw ICMP socket necessary for reading the port unreachable. The |
| -u (UDP) option of nmap implements this scanning method for root users. |
|
|
| Some people think UDP scanning is lame and pointless. I usually remind them of |
| the recent Solaris rcpbind hole. Rpcbind can be found hiding on an |
| undocumented UDP port somewhere above 32770. So it doesn't matter that 111 is |
| blocked by the firewall. But can you find which of the more than 30,000 high |
| ports it is listening on? With a UDP scanner you can! |
|
|
|
|
| - UDP recvfrom() and write() scanning : While non-root users can't read |
| port unreachable errors directly, Linux is cool enough to inform the user |
| indirectly when they have been received. For example a second write() |
| call to a closed port will usually fail. A lot of scanners such as netcat |
| and Pluvius' pscan.c does this. I have also noticed that recvfrom() on |
| non-blocking UDP sockets usually return EAGAIN ("Try Again", errno 13) if |
| the ICMP error hasn't been received, and ECONNREFUSED ("Connection refused", |
| errno 111) if it has. This is the technique used for determining open ports |
| when non-root users use -u (UDP). Root users can also use the -l (lamer |
| UDP scan) options to force this, but it is a really dumb idea. |
|
|
|
|
| - ICMP echo scanning : This isn't really port scanning, since ICMP doesn't have |
| a port abstraction. But it is sometimes useful to determine what hosts in a |
| network are up by pinging them all. the -P option does this. Also you might |
| want to adjust the PING_TIMEOUT #define if you are scanning a large |
| network. nmap supports a host/bitmask notation to make this sort of thing |
| easier. For example 'nmap -P cert.org/24 152.148.0.0/16' would scan CERT's |
| class C network and whatever class B entity 152.148.* represents. Host/26 is |
| useful for 6-bit subnets within an organization. |
|
|
|
|
|
|
| [ Features ] |
|
|
| Prior to writing nmap, I spent a lot of time with other scanners exploring the |
| Internet and various private networks (note the avoidance of the "intranet" |
| buzzword). I have used many of the top scanners available today, including |
| strobe by Julian Assange, netcat by *Hobbit*, stcp by Uriel Maimon, pscan by |
| Pluvius, ident-scan by Dave Goldsmith, and the SATAN tcp/udp scanners by |
| Wietse Venema. These are all excellent scanners! In fact, I ended up hacking |
| most of them to support the best features of the others. Finally I decided |
| to write a whole new scanner, rather than rely on hacked versions of a dozen |
| different scanners in my /usr/local/sbin. While I wrote all the code, nmap |
| uses a lot of good ideas from its predecessors. I also incorporated some new |
| stuff like fragmentation scanning and options that were on my "wish list" for |
| other scanners. Here are some of the (IMHO) useful features of nmap: |
|
|
| - dynamic delay time calculations: Some scanners require that you supply a |
| delay time between sending packets. Well how should I know what to use? |
| Sure, I can ping them, but that is a pain, and plus the response time of many |
| hosts changes dramatically when they are being flooded with requests. nmap |
| tries to determine the best delay time for you. It also tries to keep track |
| of packet retransmissions, etc. so that it can modify this delay time during |
| the course of the scan. For root users, the primary technique for finding an |
| initial delay is to time the internal "ping" function. For non-root users, it |
| times an attempted connect() to a closed port on the target. It can also pick |
| a reasonable default value. Again, people who want to specify a delay |
| themselves can do so with -w (wait), but you shouldn't have to. |
|
|
| - retransmission: Some scanners just send out all the query packets, and |
| collect the responses. But this can lead to false positives or negatives in |
| the case where packets are dropped. This is especially important for |
| "negative" style scans like UDP and FIN, where what you are looking for is a |
| port that does NOT respond. In most cases, nmap implements a configurable |
| number of retransmissions for ports that don't respond. |
|
|
| - parallel port scanning: Some scanners simply scan ports linearly, one at a |
| time, until they do all 65535. This actually works for TCP on a very fast |
| local network, but the speed of this is not at all acceptable on a wide area |
| network like the Internet. nmap uses non-blocking i/o and parallel scanning |
| in all TCP and UDP modes. The number of scans in parallel is configurable |
| with the -M (Max sockets) option. On a very fast network you will actually |
| decrease performance if you do more than 18 or so. On slow networks, high |
| values increase performance dramatically. |
|
|
| - Flexible port specification: I don't always want to just scan all 65535 |
| ports. Also, the scanners which only allow you to scan ports 1 - N sometimes |
| fall short of my need. The -p option allows you to specify an arbitrary |
| number of ports and ranges for scanning. For example, '-p 21-25,80,113, |
| 60000-' does what you would expect (a trailing hyphen means up to 65536, a |
| leading hyphen means 1 through). You can also use the -F (fast) option, which |
| scans all the ports registered in your /etc/services (a la strobe). |
|
|
| - Flexible target specification: I often want to scan more then one host, |
| and I certainly don't want to list every single host on a large network to |
| scan. Everything that isn't an option (or option argument) in nmap is |
| treated as a target host. As mentioned before, you can optionally append |
| /mask to a hostname or IP address in order to scan all hosts with the same |
| initial <mask> bits of the 32 bit IP address. |
|
|
| - detection of down hosts: Some scanners allow you to scan large networks, but |
| they waste a huge amount of time scanning 65535 ports of a dead host! By |
| default, nmap pings each host to make sure it is up before wasting time on it. |
| It is also capable of bailing on hosts that seem down based on strange port |
| scanning errors. It is also meant to be tolerant of people who accidentally scan |
| network addresses, broadcast addresses, etc. |
|
|
| - detection of your IP address: For some reason, a lot of scanners ask you to |
| type in your IP address as one of the parameters. Jeez, I don't want to have |
| to 'ifconfig' and figure out my current address every time I scan. Of course, |
| this is better then the scanners I've seen which require recompilation every |
| time you change your address! nmap first tries to detect your address during |
| the ping stage. It uses the address that the echo response is received on, as |
| that is the interface it should almost always be routed through. If it can't |
| do this (like if you don't have host pinging enabled), nmap tries to detect |
| your primary interface and uses that address. You can also use -S to specify |
| it directly, but you shouldn't have to (unless you want to make it look like |
| someone ELSE is SYN or FIN scanning a host. |
|
|
|
|
| Some other, more minor options: |
|
|
| -v (verbose): This is highly recommended for interactive use. Among other |
| useful messages, you will see ports come up as they are found, rather than |
| having to wait for the sorted summary list. |
|
|
| -r (randomize): This will randomize the order in which the target host's |
| ports are scanned. |
|
|
| -q (quash argv): This changes argv[0] to FAKE_ARGV ("pine" by default). |
| It also eliminates all other arguments, so you won't look too suspicious in |
| 'w' or 'ps' listings. |
|
|
| -h for an options summary. |
|
|
| Also look for http://www.dhp.com/~fyodor/nmap/, which is the web site I plan to |
| put future versions and more information on. In fact, you would be well |
| advised to check there right now. |
|
|
|
|
| [ Greets ] |
|
|
| Of course this paper would not be complete without a shout out to all the |
| people who made it possible. |
|
|
| * Congratulations to the people at Phrack for getting this thing going again! |
| * Greets to the whole dc-stuff crew. |
| * Greets to the STUPH, Turntec, L0pht, TACD, the Guild, cDc, and all the other |
| groups who help keep the scene alive. |
| * Shout out to _eci for disclosing the coolest Windows bug in recent history. |
| * Thanks to the Data Haven Project (dhp.com) admins for providing such great |
| service for $10/month. |
| * And a special shout out goes to all my friends. You know who |
| you are and some of you (wisely) stay out of the spotlight, so I'll keep you |
| anonymous ... except of course for Ken and Jay, and Avenger, Grog, Cash |
| Monies, Ethernet Kid, Zos, JuICe, Mother Prednisone, and Karen. |
|
|
|
|
| And finally, we get to ... |
|
|
|
|
| [ The code ] |
|
|
| This should compile fine on any Linux box with 'gcc -O6 -o nmap nmap.c -lm'. |
| It is distrubuted under the terms of the GNU GENERAL PUBLIC LICENSE. If you |
| have problems or comments, feel free to mail me (fyodor@dhp.com). |
|
|
| <++> nmap/Makefile |
| # A trivial makefile for Network Mapper |
| nmap: nmap.c nmap.h |
| gcc -Wall -O6 -o nmap nmap.c -lm |
| <--> |
|
|
| <++> nmap/nmap.h |
| #ifndef NMAP_H |
| #define NMAP_H |
|
|
| /************************INCLUDES**********************************/ |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/types.h> |
| #include <rpc/types.h> |
| #include <sys/socket.h> |
| #include <sys/socket.h> |
| #include <sys/stat.h> |
| #include <netinet/in.h> |
| #include <unistd.h> |
| #include <netdb.h> |
| #include <time.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| #include <signal.h> |
| #include <linux/ip.h> /*<netinet/ip.h>*/ |
| #include <linux/icmp.h> /*<netinet/ip_icmp.h>*/ |
| #include <arpa/inet.h> |
| #include <math.h> |
| #include <time.h> |
| #include <sys/time.h> |
| #include <asm/byteorder.h> |
| #include <netinet/ip_tcp.h> |
|
|
| /************************DEFINES************************************/ |
|
|
| /* #define to zero if you don't want to ignore hosts of the form |
| xxx.xxx.xxx.{0,255} (usually network and broadcast addresses) */ |
| #define IGNORE_ZERO_AND_255_HOSTS 1 |
|
|
| #define DEBUGGING 0 |
|
|
| /* Default number of ports in paralell. Doesn't always involve actual |
| sockets. Can also adjust with the -M command line option. */ |
| #define MAX_SOCKETS 36 |
| /* If reads of a UDP port keep returning EAGAIN (errno 13), do we want to |
| count the port as valid? */ |
| #define RISKY_UDP_SCAN 0 |
| /* This ideally should be a port that isn't in use for any protocol on our machine or on the target */ |
| #define MAGIC_PORT 49724 |
| /* How many udp sends without a ICMP port unreachable error does it take before we consider the port open? */ |
| #define UDP_MAX_PORT_RETRIES 4 |
| /*How many seconds before we give up on a host being alive? */ |
| #define PING_TIMEOUT 2 |
| #define FAKE_ARGV "pine" /* What ps and w should show if you use -q */ |
| /* How do we want to log into ftp sites for */ |
| #define FTPUSER "anonymous" |
| #define FTPPASS "-wwwuser@" |
| #define FTP_RETRIES 2 /* How many times should we relogin if we lose control |
| connection? */ |
|
|
| #define UC(b) (((int)b)&0xff) |
| #define MORE_FRAGMENTS 8192 /*NOT a user serviceable parameter*/ |
| #define fatal(x) { fprintf(stderr, "%s\n", x); exit(-1); } |
| #define error(x) fprintf(stderr, "%s\n", x); |
|
|
| /***********************STRUCTURES**********************************/ |
|
|
| typedef struct port { |
| unsigned short portno; |
| unsigned char proto; |
| char *owner; |
| struct port *next; |
| } port; |
|
|
| struct ftpinfo { |
| char user[64]; |
| char pass[256]; /* methinks you're paranoid if you need this much space */ |
| char server_name[MAXHOSTNAMELEN + 1]; |
| struct in_addr server; |
| unsigned short port; |
| int sd; /* socket descriptor */ |
| }; |
|
|
| typedef port *portlist; |
|
|
| /***********************PROTOTYPES**********************************/ |
|
|
| /* print usage information */ |
| void printusage(char *name); |
|
|
| /* our scanning functions */ |
| portlist tcp_scan(struct in_addr target, unsigned short *portarray, |
| portlist *ports); |
| portlist syn_scan(struct in_addr target, unsigned short *portarray, |
| struct in_addr *source, int fragment, portlist *ports); |
| portlist fin_scan(struct in_addr target, unsigned short *portarray, |
| struct in_addr *source, int fragment, portlist *ports); |
| portlist udp_scan(struct in_addr target, unsigned short *portarray, |
| portlist *ports); |
| portlist lamer_udp_scan(struct in_addr target, unsigned short *portarray, |
| portlist *ports); |
| portlist bounce_scan(struct in_addr target, unsigned short *portarray, |
| struct ftpinfo *ftp, portlist *ports); |
|
|
| /* Scan helper functions */ |
| unsigned long calculate_sleep(struct in_addr target); |
| int check_ident_port(struct in_addr target); |
| int getidentinfoz(struct in_addr target, int localport, int remoteport, |
| char *owner); |
| int parse_bounce(struct ftpinfo *ftp, char *url); |
| int ftp_anon_connect(struct ftpinfo *ftp); |
|
|
| /* port manipulators */ |
| unsigned short *getpts(char *expr); /* someone stole the name getports()! */ |
| unsigned short *getfastports(int tcpscan, int udpscan); |
| int addport(portlist *ports, unsigned short portno, unsigned short protocol, |
| char *owner); |
| int deleteport(portlist *ports, unsigned short portno, unsigned short protocol); |
| void printandfreeports(portlist ports); |
| int shortfry(unsigned short *ports); |
|
|
| /* socket manipulation functions */ |
| void init_socket(int sd); |
| int unblock_socket(int sd); |
| int block_socket(int sd); |
| int recvtime(int sd, char *buf, int len, int seconds); |
|
|
| /* RAW packet building/dissasembling stuff */ |
| int send_tcp_raw( int sd, struct in_addr *source, |
| struct in_addr *victim, unsigned short sport, |
| unsigned short dport, unsigned long seq, |
| unsigned long ack, unsigned char flags, |
| unsigned short window, char *data, |
| unsigned short datalen); |
| int isup(struct in_addr target); |
| unsigned short in_cksum(unsigned short *ptr,int nbytes); |
| int send_small_fragz(int sd, struct in_addr *source, struct in_addr *victim, |
| int sport, int dport, int flags); |
| int readtcppacket(char *packet, int readdata); |
| int listen_icmp(int icmpsock, unsigned short outports[], |
| unsigned short numtries[], int *num_out, |
| struct in_addr target, portlist *ports); |
|
|
| /* general helper functions */ |
| void hdump(unsigned char *packet, int len); |
| void *safe_malloc(int size); |
| #endif /* NMAP_H */ |
| <--> |
|
|
| <++> nmap/nmap.c |
|
|
| #include "nmap.h" |
|
|
| /* global options */ |
| short debugging = DEBUGGING; |
| short verbose = 0; |
| int number_of_ports = 0; /* How many ports do we scan per machine? */ |
| int max_parallel_sockets = MAX_SOCKETS; |
| extern char *optarg; |
| extern int optind; |
| short isr00t = 0; |
| short identscan = 0; |
| char current_name[MAXHOSTNAMELEN + 1]; |
| unsigned long global_delay = 0; |
| unsigned long global_rtt = 0; |
| struct in_addr ouraddr = { 0 }; |
|
|
| int main(int argc, char *argv[]) { |
| int i, j, arg, argvlen; |
| short fastscan=0, tcpscan=0, udpscan=0, synscan=0, randomize=0; |
| short fragscan = 0, finscan = 0, quashargv = 0, pingscan = 0, lamerscan = 0; |
| short bouncescan = 0; |
| short *ports = NULL, mask; |
| struct ftpinfo ftp = { FTPUSER, FTPPASS, "", { 0 }, 21, 0}; |
| portlist openports = NULL; |
| struct hostent *target = 0; |
| unsigned long int lastip, currentip, longtmp; |
| char *target_net, *p; |
| struct in_addr current_in, *source=NULL; |
| int hostup = 0; |
| char *fakeargv[argc + 1]; |
|
|
| /* argv faking silliness */ |
| for(i=0; i < argc; i++) { |
| fakeargv[i] = safe_malloc(strlen(argv[i]) + 1); |
| strncpy(fakeargv[i], argv[i], strlen(argv[i]) + 1); |
| } |
| fakeargv[argc] = NULL; |
|
|
| if (argc < 2 ) printusage(argv[0]); |
|
|
| /* OK, lets parse these args! */ |
| while((arg = getopt(argc,fakeargv,"b:dFfhilM:Pp:qrS:stUuw:v")) != EOF) { |
| switch(arg) { |
| case 'b': |
| bouncescan++; |
| if (parse_bounce(&ftp, optarg) < 0 ) { |
| fprintf(stderr, "Your argument to -b is fucked up. Use the normal url style: user:pass@server:port or just use server and use default anon login\n Use -h for help\n"); |
| } |
| break; |
| case 'd': debugging++; break; |
| case 'F': fastscan++; break; |
| case 'f': fragscan++; break; |
| case 'h': |
| case '?': printusage(argv[0]); |
| case 'i': identscan++; break; |
| case 'l': lamerscan++; udpscan++; break; |
| case 'M': max_parallel_sockets = atoi(optarg); break; |
| case 'P': pingscan++; break; |
| case 'p': |
| if (ports) |
| fatal("Only 1 -p option allowed, seperate multiple ranges with commas."); |
| ports = getpts(optarg); break; |
| case 'r': randomize++; break; |
| case 's': synscan++; break; |
| case 'S': |
| if (source) |
| fatal("You can only use the source option once!\n"); |
| source = safe_malloc(sizeof(struct in_addr)); |
| if (!inet_aton(optarg, source)) |
| fatal("You must give the source address in dotted deciman, currently.\n"); |
| break; |
| case 't': tcpscan++; break; |
| case 'U': finscan++; break; |
| case 'u': udpscan++; break; |
| case 'q': quashargv++; break; |
| case 'w': global_delay = atoi(optarg); break; |
| case 'v': verbose++; |
| } |
| } |
|
|
| /* Take care of user wierdness */ |
| isr00t = !(geteuid()|geteuid()); |
| if (tcpscan && synscan) |
| fatal("The -t and -s options can't be used together.\ |
| If you are trying to do TCP SYN scanning, just use -s.\ |
| For normal connect() style scanning, use -t"); |
| if ((synscan || finscan || fragscan || pingscan) && !isr00t) |
| fatal("Options specified require r00t privileges. You don't have them!"); |
| if (!tcpscan && !udpscan && !synscan && !finscan && !bouncescan && !pingscan) { |
| tcpscan++; |
| if (verbose) error("No scantype specified, assuming vanilla tcp connect()\ |
| scan. Use -P if you really don't want to portscan."); |
| if (fastscan && ports) |
| fatal("You can use -F (fastscan) OR -p for explicit port specification.\ |
| Not both!\n"); |
| } |
| /* If he wants to bounce of an ftp site, that site better damn well be reachable! */ |
| if (bouncescan) { |
| if (!inet_aton(ftp.server_name, &ftp.server)) { |
| if ((target = gethostbyname(ftp.server_name))) |
| memcpy(&ftp.server, target->h_addr_list[0], 4); |
| else { |
| fprintf(stderr, "Failed to resolve ftp bounce proxy hostname/IP: %s\n", |
| ftp.server_name); |
| exit(1); |
| } |
| } else if (verbose) |
| printf("Resolved ftp bounce attack proxy to %s (%s).\n", |
| target->h_name, inet_ntoa(ftp.server)); |
| } |
| printf("\nStarting nmap V 1.21 by Fyodor (fyodor@dhp.com, www.dhp.com/~fyodor/nmap/\n"); |
| if (!verbose) |
| error("Hint: The -v option notifies you of open ports as they are found.\n"); |
| if (fastscan) |
| ports = getfastports(synscan|tcpscan|fragscan|finscan|bouncescan, |
| udpscan|lamerscan); |
| if (!ports) ports = getpts("1-1024"); |
|
|
| /* more fakeargv junk, BTW malloc'ing extra space in argv[0] doesn't work */ |
| if (quashargv) { |
| argvlen = strlen(argv[0]); |
| if (argvlen < strlen(FAKE_ARGV)) |
| fatal("If you want me to fake your argv, you need to call the program with a longer name. Try the full pathname, or rename it fyodorssuperdedouperportscanner"); |
| strncpy(argv[0], FAKE_ARGV, strlen(FAKE_ARGV)); |
| for(i = strlen(FAKE_ARGV); i < argvlen; i++) argv[0][i] = '\0'; |
| for(i=1; i < argc; i++) { |
| argvlen = strlen(argv[i]); |
| for(j=0; j <= argvlen; j++) |
| argv[i][j] = '\0'; |
| } |
| } |
|
|
| srand(time(NULL)); |
|
|
| while(optind < argc) { |
| |
| /* Time to parse the allowed mask */ |
| target = NULL; |
| target_net = strtok(strdup(fakeargv[optind]), "/"); |
| mask = (p = strtok(NULL,""))? atoi(p) : 32; |
| if (debugging) |
| printf("Target network is %s, scanmask is %d\n", target_net, mask); |
| |
| if (!inet_aton(target_net, ¤t_in)) { |
| if ((target = gethostbyname(target_net))) |
| memcpy(¤tip, target->h_addr_list[0], 4); |
| else { |
| fprintf(stderr, "Failed to resolve given hostname/IP: %s\n", target_net); |
| } |
| } else currentip = current_in.s_addr; |
|
|
| longtmp = ntohl(currentip); |
| currentip = longtmp & (unsigned long) (0 - pow(2,32 - mask)); |
| lastip = longtmp | (unsigned long) (pow(2,32 - mask) - 1); |
| while (currentip <= lastip) { |
| openports = NULL; |
| longtmp = htonl(currentip); |
| target = gethostbyaddr((char *) &longtmp, 4, AF_INET); |
| current_in.s_addr = longtmp; |
| if (target) |
| strncpy(current_name, target->h_name, MAXHOSTNAMELEN); |
| else current_name[0] = '\0'; |
| current_name[MAXHOSTNAMELEN + 1] = '\0'; |
| if (randomize) |
| shortfry(ports); |
| #ifdef IGNORE_ZERO_AND_255_HOSTS |
| if (IGNORE_ZERO_AND_255_HOSTS |
| && (!(currentip % 256) || currentip % 256 == 255)) |
| { |
| printf("Skipping host %s because IGNORE_ZERO_AND_255_HOSTS is set in the source.\n", inet_ntoa(current_in)); |
| hostup = 0; |
| } |
| else{ |
| #endif |
| if (isr00t) { |
| if (!(hostup = isup(current_in))) { |
| if (!pingscan) |
| printf("Host %s (%s) appears to be down, skipping scan.\n", |
| current_name, inet_ntoa(current_in)); |
| else |
| printf("Host %s (%s) appears to be down\n", |
| current_name, inet_ntoa(current_in)); |
| } else if (debugging || pingscan) |
| printf("Host %s (%s) appears to be up ... good.\n", |
| current_name, inet_ntoa(current_in)); |
| } |
| else hostup = 1; /* We don't really check because the lamer isn't root.*/ |
| } |
| |
| /* Time for some actual scanning! */ |
| if (hostup) { |
| if (tcpscan) tcp_scan(current_in, ports, &openports); |
| |
| if (synscan) syn_scan(current_in, ports, source, fragscan, &openports); |
| |
| if (finscan) fin_scan(current_in, ports, source, fragscan, &openports); |
| |
| if (bouncescan) { |
| if (ftp.sd <= 0) ftp_anon_connect(&ftp); |
| if (ftp.sd > 0) bounce_scan(current_in, ports, &ftp, &openports); |
| } |
| if (udpscan) { |
| if (!isr00t || lamerscan) |
| lamer_udp_scan(current_in, ports, &openports); |
|
|
| else udp_scan(current_in, ports, &openports); |
| } |
| |
| if (!openports && !pingscan) |
| printf("No ports open for host %s (%s)\n", current_name, |
| inet_ntoa(current_in)); |
| if (openports) { |
| printf("Open ports on %s (%s):\n", current_name, |
| inet_ntoa(current_in)); |
| printandfreeports(openports); |
| } |
| } |
| currentip++; |
| } |
| optind++; |
| } |
|
|
| return 0; |
| } |
|
|
| __inline__ int unblock_socket(int sd) { |
| int options; |
| /*Unblock our socket to prevent recvfrom from blocking forever |
| on certain target ports. */ |
| options = O_NONBLOCK | fcntl(sd, F_GETFL); |
| fcntl(sd, F_SETFL, options); |
| return 1; |
| } |
|
|
| __inline__ int block_socket(int sd) { |
| int options; |
| options = (~O_NONBLOCK) & fcntl(sd, F_GETFL); |
| fcntl(sd, F_SETFL, options); |
| return 1; |
| } |
|
|
| /* Currently only sets SO_LINGER, I haven't seen any evidence that this |
| helps. I'll do more testing before dumping it. */ |
| __inline__ void init_socket(int sd) { |
| struct linger l; |
|
|
| l.l_onoff = 1; |
| l.l_linger = 0; |
|
|
| if (setsockopt(sd, SOL_SOCKET, SO_LINGER, &l, sizeof(struct linger))) |
| { |
| fprintf(stderr, "Problem setting socket SO_LINGER, errno: %d\n", errno); |
| perror("setsockopt"); |
| } |
| } |
|
|
| /* Convert a string like "-100,200-1024,3000-4000,60000-" into an array |
| of port numbers*/ |
| unsigned short *getpts(char *origexpr) { |
| int exlen = strlen(origexpr); |
| char *p,*q; |
| unsigned short *tmp, *ports; |
| int i=0, j=0,start,end; |
| char *expr = strdup(origexpr); |
| ports = safe_malloc(65536 * sizeof(short)); |
| i++; |
| i--; |
| for(;j < exlen; j++) |
| if (expr[j] != ' ') expr[i++] = expr[j]; |
| expr[i] = '\0'; |
| exlen = i + 1; |
| i=0; |
| while((p = strchr(expr,','))) { |
| *p = '\0'; |
| if (*expr == '-') {start = 1; end = atoi(expr+ 1);} |
| else { |
| start = end = atoi(expr); |
| if ((q = strchr(expr,'-')) && *(q+1) ) end = atoi(q + 1); |
| else if (q && !*(q+1)) end = 65535; |
| } |
| if (debugging) |
| printf("The first port is %d, and the last one is %d\n", start, end); |
| if (start < 1 || start > end) fatal("Your port specifications are illegal!"); |
| for(j=start; j <= end; j++) |
| ports[i++] = j; |
| expr = p + 1; |
| } |
| if (*expr == '-') { |
| start = 1; |
| end = atoi(expr+ 1); |
| } |
| else { |
| start = end = atoi(expr); |
| if ((q = strchr(expr,'-')) && *(q+1) ) end = atoi(q+1); |
| else if (q && !*(q+1)) end = 65535; |
| } |
| if (debugging) |
| printf("The first port is %d, and the last one is %d\n", start, end); |
| if (start < 1 || start > end) fatal("Your port specifications are illegal!"); |
| for(j=start; j <= end; j++) |
| ports[i++] = j; |
| number_of_ports = i; |
| ports[i++] = 0; |
| tmp = realloc(ports, i * sizeof(short)); |
| free(expr); |
| return tmp; |
| } |
|
|
| unsigned short *getfastports(int tcpscan, int udpscan) { |
| int portindex = 0, res, lastport = 0; |
| unsigned int portno = 0; |
| unsigned short *ports; |
| char proto[10]; |
| char line[81]; |
| FILE *fp; |
| ports = safe_malloc(65535 * sizeof(unsigned short)); |
| proto[0] = '\0'; |
| if (!(fp = fopen("/etc/services", "r"))) { |
| printf("We can't open /etc/services for reading! Fix your system or don't use -f\n"); |
| perror("fopen"); |
| exit(1); |
| } |
| |
| while(fgets(line, 80, fp)) { |
| res = sscanf(line, "%*s %u/%s", &portno, proto); |
| if (res == 2 && portno != 0 && portno != lastport) { |
| lastport = portno; |
| if (tcpscan && proto[0] == 't') |
| ports[portindex++] = portno; |
| else if (udpscan && proto[0] == 'u') |
| ports[portindex++] = portno; |
| } |
| } |
|
|
|
|
| number_of_ports = portindex; |
| ports[portindex++] = 0; |
| return realloc(ports, portindex * sizeof(unsigned short)); |
| } |
|
|
| void printusage(char *name) { |
| printf("%s [options] [hostname[/mask] . . .] |
| options (none are required, most can be combined): |
| -t tcp connect() port scan |
| -s tcp SYN stealth port scan (must be root) |
| -u UDP port scan, will use MUCH better version if you are root |
| -U Uriel Maimon (P49-15) style FIN stealth scan. |
| -l Do the lamer UDP scan even if root. Less accurate. |
| -P ping \"scan\". Find which hosts on specified network(s) are up. |
| -b <ftp_relay_host> ftp \"bounce attack\" port scan |
| -f use tiny fragmented packets for SYN or FIN scan. |
| -i Get identd (rfc 1413) info on listening TCP processes. |
| -p <range> ports: ex: \'-p 23\' will only try port 23 of the host(s) |
| \'-p 20-30,63000-\' scans 20-30 and 63000-65535 default: 1-1024 |
| -F fast scan. Only scans ports in /etc/services, a la strobe(1). |
| -r randomize target port scanning order. |
| -h help, print this junk. Also see http://www.dhp.com/~fyodor/nmap/ |
| -S If you want to specify the source address of SYN or FYN scan. |
| -v Verbose. Its use is recommended. Use twice for greater effect. |
| -w <n> delay. n microsecond delay. Not recommended unless needed. |
| -M <n> maximum number of parallel sockets. Larger isn't always better. |
| -q quash argv to something benign, currently set to \"%s\". |
| Hostnames specified as internet hostname or IP address. Optional '/mask' specifies subnet. cert.org/24 or 192.88.209.5/24 scan CERT's Class C.\n", |
| name, FAKE_ARGV); |
| exit(1); |
| } |
|
|
| portlist tcp_scan(struct in_addr target, unsigned short *portarray, portlist *ports) { |
|
|
| int starttime, current_out = 0, res , deadindex = 0, i=0, j=0, k=0, max=0; |
| struct sockaddr_in sock, stranger, mysock; |
| int sockaddr_in_len = sizeof(struct sockaddr_in); |
| int sockets[max_parallel_sockets], deadstack[max_parallel_sockets]; |
| unsigned short portno[max_parallel_sockets]; |
| char owner[513], buf[65536]; |
| int tryident = identscan, current_socket /*actually it is a socket INDEX*/; |
| fd_set fds_read, fds_write; |
| struct timeval nowait = {0,0}, longwait = {7,0}; |
|
|
| signal(SIGPIPE, SIG_IGN); /* ignore SIGPIPE so our 'write 0 bytes' test |
| doesn't crash our program!*/ |
| owner[0] = '\0'; |
| starttime = time(NULL); |
| bzero((char *)&sock,sizeof(struct sockaddr_in)); |
| sock.sin_addr.s_addr = target.s_addr; |
| if (verbose || debugging) |
| printf("Initiating TCP connect() scan against %s (%s)\n", |
| current_name, inet_ntoa(sock.sin_addr)); |
| sock.sin_family=AF_INET; |
| FD_ZERO(&fds_read); |
| FD_ZERO(&fds_write); |
|
|
| if (tryident) |
| tryident = check_ident_port(target); |
|
|
| /* Initially, all of our sockets are "dead" */ |
| for(i = 0 ; i < max_parallel_sockets; i++) { |
| deadstack[deadindex++] = i; |
| portno[i] = 0; |
| } |
|
|
| deadindex--; |
| /* deadindex always points to the most recently added dead socket index */ |
|
|
| while(portarray[j]) { |
| longwait.tv_sec = 7; |
| longwait.tv_usec = nowait.tv_sec = nowait.tv_usec = 0; |
| |
| for(i=current_out; i < max_parallel_sockets && portarray[j]; i++, j++) { |
| current_socket = deadstack[deadindex--]; |
| if ((sockets[current_socket] = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) |
| {perror("Socket troubles"); exit(1);} |
| if (sockets[current_socket] > max) max = sockets[current_socket]; |
| current_out++; |
| unblock_socket(sockets[current_socket]); |
| init_socket(sockets[current_socket]); |
| portno[current_socket] = portarray[j]; |
| sock.sin_port = htons(portarray[j]); |
| if ((res = connect(sockets[current_socket],(struct sockaddr *)&sock,sizeof(struct sockaddr)))!=-1) |
| printf("WTF???? I think we got a successful connection in non-blocking!!@#$\n"); |
| else { |
| switch(errno) { |
| case EINPROGRESS: /* The one I always see */ |
| case EAGAIN: |
| block_socket(sockets[current_socket]); |
| FD_SET(sockets[current_socket], &fds_write); |
| FD_SET(sockets[current_socket], &fds_read); |
| break; |
| default: |
| printf("Strange error from connect: (%d)", errno); |
| perror(""); /*falling through intentionally*/ |
| case ECONNREFUSED: |
| if (max == sockets[current_socket]) max--; |
| deadstack[++deadindex] = current_socket; |
| current_out--; |
| portno[current_socket] = 0; |
| close(sockets[current_socket]); |
| break; |
| } |
| } |
| } |
| if (!portarray[j]) sleep(1); /*wait a second for any last packets*/ |
| while((res = select(max + 1, &fds_read, &fds_write, NULL, |
| (current_out < max_parallel_sockets)? |
| &nowait : &longwait)) > 0) { |
| for(k=0; k < max_parallel_sockets; k++) |
| if (portno[k]) { |
| if (FD_ISSET(sockets[k], &fds_write) |
| && FD_ISSET(sockets[k], &fds_read)) { |
| /*printf("Socket at port %hi is selectable for r & w.", portno[k]);*/ |
| res = recvfrom(sockets[k], buf, 65536, 0, (struct sockaddr *) |
| & stranger, &sockaddr_in_len); |
| if (res >= 0) { |
| if (debugging || verbose) |
| printf("Adding TCP port %hi due to successful read.\n", |
| portno[k]); |
| if (tryident) { |
| if ( getsockname(sockets[k], (struct sockaddr *) &mysock, |
| &sockaddr_in_len ) ) { |
| perror("getsockname"); |
| exit(1); |
| } |
| tryident = getidentinfoz(target, ntohs(mysock.sin_port), |
| portno[k], owner); |
| } |
| addport(ports, portno[k], IPPROTO_TCP, owner); |
| } |
| if (max == sockets[k]) |
| max--; |
| FD_CLR(sockets[k], &fds_read); |
| FD_CLR(sockets[k], &fds_write); |
| deadstack[++deadindex] = k; |
| current_out--; |
| portno[k] = 0; |
| close(sockets[k]); |
| } |
| else if(FD_ISSET(sockets[k], &fds_write)) { |
| /*printf("Socket at port %hi is selectable for w only.VERIFYING\n", |
| portno[k]);*/ |
| res = send(sockets[k], buf, 0, 0); |
| if (res < 0 ) { |
| signal(SIGPIPE, SIG_IGN); |
| if (debugging > 1) |
| printf("Bad port %hi caught by 0-byte write!\n", portno[k]); |
| } |
| else { |
| if (debugging || verbose) |
| printf("Adding TCP port %hi due to successful 0-byte write!\n", |
| portno[k]); |
| if (tryident) { |
| if ( getsockname(sockets[k], (struct sockaddr *) &mysock , |
| &sockaddr_in_len ) ) { |
| perror("getsockname"); |
| exit(1); |
| } |
| tryident = getidentinfoz(target, ntohs(mysock.sin_port), |
| portno[k], owner); |
| } |
| addport(ports, portno[k], IPPROTO_TCP, owner); |
| } |
| if (max == sockets[k]) max--; |
| FD_CLR(sockets[k], &fds_write); |
| deadstack[++deadindex] = k; |
| current_out--; |
| portno[k] = 0; |
| close(sockets[k]); |
| } |
| else if ( FD_ISSET(sockets[k], &fds_read) ) { |
| printf("Socket at port %hi is selectable for r only. This is very wierd.\n", portno[k]); |
| if (max == sockets[k]) max--; |
| FD_CLR(sockets[k], &fds_read); |
| deadstack[++deadindex] = k; |
| current_out--; |
| portno[k] = 0; |
| close(sockets[k]); |
| } |
| else { |
| /*printf("Socket at port %hi not selecting, readding.\n",portno[k]);*/ |
| FD_SET(sockets[k], &fds_write); |
| FD_SET(sockets[k], &fds_read); |
| } |
| } |
| } |
| } |
|
|
| if (debugging || verbose) |
| printf("Scanned %d ports in %ld seconds with %d parallel sockets.\n", |
| number_of_ports, time(NULL) - starttime, max_parallel_sockets); |
| return *ports; |
| } |
|
|
| /* gawd, my next project will be in c++ so I don't have to deal with |
| this crap ... simple linked list implementation */ |
| int addport(portlist *ports, unsigned short portno, unsigned short protocol, |
| char *owner) { |
| struct port *current, *tmp; |
| int len; |
|
|
| if (*ports) { |
| current = *ports; |
| /* case 1: we add to the front of the list */ |
| if (portno <= current->portno) { |
| if (current->portno == portno && current->proto == protocol) { |
| if (debugging || verbose) |
| printf("Duplicate port (%hi/%s)\n", portno , |
| (protocol == IPPROTO_TCP)? "tcp": "udp"); |
| return -1; |
| } |
| tmp = current; |
| *ports = safe_malloc(sizeof(struct port)); |
| (*ports)->next = tmp; |
| current = *ports; |
| current->portno = portno; |
| current->proto = protocol; |
| if (owner && *owner) { |
| len = strlen(owner); |
| current->owner = malloc(sizeof(char) * (len + 1)); |
| strncpy(current->owner, owner, len + 1); |
| } |
| else current->owner = NULL; |
| } |
| else { /* case 2: we add somewhere in the middle or end of the list */ |
| while( current->next && current->next->portno < portno) |
| current = current->next; |
| if (current->next && current->next->portno == portno |
| && current->next->proto == protocol) { |
| if (debugging || verbose) |
| printf("Duplicate port (%hi/%s)\n", portno , |
| (protocol == IPPROTO_TCP)? "tcp": "udp"); |
| return -1; |
| } |
| tmp = current->next; |
| current->next = safe_malloc(sizeof(struct port)); |
| current->next->next = tmp; |
| tmp = current->next; |
| tmp->portno = portno; |
| tmp->proto = protocol; |
| if (owner && *owner) { |
| len = strlen(owner); |
| tmp->owner = malloc(sizeof(char) * (len + 1)); |
| strncpy(tmp->owner, owner, len + 1); |
| } |
| else tmp->owner = NULL; |
| } |
| } |
|
|
| else { /* Case 3, list is null */ |
| *ports = safe_malloc(sizeof(struct port)); |
| tmp = *ports; |
| tmp->portno = portno; |
| tmp->proto = protocol; |
| if (owner && *owner) { |
| len = strlen(owner); |
| tmp->owner = safe_malloc(sizeof(char) * (len + 1)); |
| strncpy(tmp->owner, owner, len + 1); |
| } |
| else tmp->owner = NULL; |
| tmp->next = NULL; |
| } |
| return 0; /*success */ |
| } |
|
|
| int deleteport(portlist *ports, unsigned short portno, |
| unsigned short protocol) { |
| portlist current, tmp; |
| |
| if (!*ports) { |
| if (debugging > 1) error("Tried to delete from empty port list!"); |
| return -1; |
| } |
| /* Case 1, deletion from front of list*/ |
| if ((*ports)->portno == portno && (*ports)->proto == protocol) { |
| tmp = (*ports)->next; |
| if ((*ports)->owner) free((*ports)->owner); |
| free(*ports); |
| *ports = tmp; |
| } |
| else { |
| current = *ports; |
| for(;current->next && (current->next->portno != portno || current->next->proto != protocol); current = current->next); |
| if (!current->next) |
| return -1; |
| tmp = current->next; |
| current->next = tmp->next; |
| if (tmp->owner) free(tmp->owner); |
| free(tmp); |
| } |
| return 0; /* success */ |
| } |
|
|
|
|
| void *safe_malloc(int size) |
| { |
| void *mymem; |
| if (size < 0) |
| fatal("Tried to malloc negative amount of memmory!!!"); |
| if ((mymem = malloc(size)) == NULL) |
| fatal("Malloc Failed! Probably out of space."); |
| return mymem; |
| } |
|
|
| void printandfreeports(portlist ports) { |
| char protocol[4]; |
| struct servent *service; |
| port *current = ports, *tmp; |
| |
| printf("Port Number Protocol Service"); |
| printf("%s", (identscan)?" Owner\n":"\n"); |
| while(current != NULL) { |
| strcpy(protocol,(current->proto == IPPROTO_TCP)? "tcp": "udp"); |
| service = getservbyport(htons(current->portno), protocol); |
| printf("%-13d%-11s%-16s%s\n", current->portno, protocol, |
| (service)? service->s_name: "unknown", |
| (current->owner)? current->owner : ""); |
| tmp = current; |
| current = current->next; |
| if (tmp->owner) free(tmp->owner); |
| free(tmp); |
| } |
| printf("\n"); |
| } |
|
|
| /* This is the version of udp_scan that uses raw ICMP sockets and requires |
| root priviliges.*/ |
| portlist udp_scan(struct in_addr target, unsigned short *portarray, |
| portlist *ports) { |
| int icmpsock, udpsock, tmp, done=0, retries, bytes = 0, res, num_out = 0; |
| int i=0,j=0, k=0, icmperrlimittime, max_tries = UDP_MAX_PORT_RETRIES; |
| unsigned short outports[max_parallel_sockets], numtries[max_parallel_sockets]; |
| struct sockaddr_in her; |
| char senddata[] = "blah\n"; |
| unsigned long starttime, sleeptime; |
| struct timeval shortwait = {1, 0 }; |
| fd_set fds_read, fds_write; |
| |
| bzero(outports, max_parallel_sockets * sizeof(unsigned short)); |
| bzero(numtries, max_parallel_sockets * sizeof(unsigned short)); |
| |
| /* Some systems (like linux) follow the advice of rfc1812 and limit |
| * the rate at which they will respons with icmp error messages |
| * (like port unreachable). icmperrlimittime is to compensate for that. |
| */ |
| icmperrlimittime = 60000; |
|
|
| sleeptime = (global_delay)? global_delay : (global_rtt)? (1.2 * global_rtt) + 30000 : 1e5; |
| if (global_delay) icmperrlimittime = global_delay; |
|
|
| starttime = time(NULL); |
|
|
| FD_ZERO(&fds_read); |
| FD_ZERO(&fds_write); |
|
|
| if (verbose || debugging) |
| printf("Initiating UDP (raw ICMP version) scan against %s (%s) using wait delay of %li usecs.\n", current_name, inet_ntoa(target), sleeptime); |
|
|
| if ((icmpsock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP)) < 0) |
| perror("Opening ICMP RAW socket"); |
| if ((udpsock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) |
| perror("Opening datagram socket"); |
|
|
| unblock_socket(icmpsock); |
| her.sin_addr = target; |
| her.sin_family = AF_INET; |
|
|
| while(!done) { |
| tmp = num_out; |
| for(i=0; (i < max_parallel_sockets && portarray[j]) || i < tmp; i++) { |
| close(udpsock); |
| if ((udpsock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) |
| perror("Opening datagram socket"); |
| if ((i > tmp && portarray[j]) || numtries[i] > 1) { |
| if (i > tmp) her.sin_port = htons(portarray[j++]); |
| else her.sin_port = htons(outports[i]); |
| FD_SET(udpsock, &fds_write); |
| FD_SET(icmpsock, &fds_read); |
| shortwait.tv_sec = 1; shortwait.tv_usec = 0; |
| usleep(icmperrlimittime); |
| res = select(udpsock + 1, NULL, &fds_write, NULL, &shortwait); |
| if (FD_ISSET(udpsock, &fds_write)) |
| bytes = sendto(udpsock, senddata, sizeof(senddata), 0, |
| (struct sockaddr *) &her, sizeof(struct sockaddr_in)); |
| else { |
| printf("udpsock not set for writing port %d!", ntohs(her.sin_port)); |
| return *ports; |
| } |
| if (bytes <= 0) { |
| if (errno == ECONNREFUSED) { |
| retries = 10; |
| do { |
| /* This is from when I was using the same socket and would |
| * (rather often) get strange connection refused errors, it |
| * shouldn't happen now that I create a new udp socket for each |
| * port. At some point I will probably go back to 1 socket again. |
| */ |
| printf("sendto said connection refused on port %d but trying again anyway.\n", ntohs(her.sin_port)); |
| usleep(icmperrlimittime); |
| bytes = sendto(udpsock, senddata, sizeof(senddata), 0, |
| (struct sockaddr *) &her, sizeof(struct sockaddr_in)); |
| printf("This time it returned %d\n", bytes); |
| } while(bytes <= 0 && retries-- > 0); |
| } |
| if (bytes <= 0) { |
| printf("sendto returned %d.", bytes); |
| fflush(stdout); |
| perror("sendto"); |
| } |
| } |
| if (bytes > 0 && i > tmp) { |
| num_out++; |
| outports[i] = portarray[j-1]; |
| } |
| } |
| } |
| usleep(sleeptime); |
| tmp = listen_icmp(icmpsock, outports, numtries, &num_out, target, ports); |
| if (debugging) printf("listen_icmp caught %d bad ports.\n", tmp); |
| done = !portarray[j]; |
| for (i=0,k=0; i < max_parallel_sockets; i++) |
| if (outports[i]) { |
| if (++numtries[i] > max_tries - 1) { |
| if (debugging || verbose) |
| printf("Adding port %d for 0 unreachable port generations\n", |
| outports[i]); |
| addport(ports, outports[i], IPPROTO_UDP, NULL); |
| num_out--; |
| outports[i] = numtries[i] = 0; |
| } |
| else { |
| done = 0; |
| outports[k] = outports[i]; |
| numtries[k] = numtries[i]; |
| if (k != i) |
| outports[i] = numtries[i] = 0; |
| k++; |
| } |
| } |
| if (num_out == max_parallel_sockets) { |
| printf("Numout is max sockets, that is a problem!\n"); |
| sleep(1); /* Give some time for responses to trickle back, |
| and possibly to reset the hosts ICMP error limit */ |
| } |
| } |
|
|
|
|
| if (debugging || verbose) |
| printf("The UDP raw ICMP scanned %d ports in %ld seconds with %d parallel sockets.\n", number_of_ports, time(NULL) - starttime, max_parallel_sockets); |
| close(icmpsock); |
| close(udpsock); |
| return *ports; |
| } |
|
|
| int listen_icmp(int icmpsock, unsigned short outports[], |
| unsigned short numtries[], int *num_out, struct in_addr target, |
| portlist *ports) { |
| char response[1024]; |
| struct sockaddr_in stranger; |
| int sockaddr_in_size = sizeof(struct sockaddr_in); |
| struct in_addr bs; |
| struct iphdr *ip = (struct iphdr *) response; |
| struct icmphdr *icmp = (struct icmphdr *) (response + sizeof(struct iphdr)); |
| struct iphdr *ip2; |
| unsigned short *data; |
| int badport, numcaught=0, bytes, i, tmptry=0, found=0; |
| |
| while ((bytes = recvfrom(icmpsock, response, 1024, 0, |
| (struct sockaddr *) &stranger, |
| &sockaddr_in_size)) > 0) { |
| numcaught++; |
| bs.s_addr = ip->saddr; |
| if (ip->saddr == target.s_addr && ip->protocol == IPPROTO_ICMP |
| && icmp->type == 3 && icmp->code == 3) { |
| ip2 = (struct iphdr *) (response + 4 * ip->ihl + sizeof(struct icmphdr)); |
| data = (unsigned short *) ((char *)ip2 + 4 * ip2->ihl); |
| badport = ntohs(data[1]); |
| /*delete it from our outports array */ |
| found = 0; |
| for(i=0; i < max_parallel_sockets; i++) |
| if (outports[i] == badport) { |
| found = 1; |
| tmptry = numtries[i]; |
| outports[i] = numtries[i] = 0; |
| (*num_out)--; |
| break; |
| } |
| if (debugging && found && tmptry > 0) |
| printf("Badport: %d on try number %d\n", badport, tmptry); |
| if (!found) { |
| if (debugging) |
| printf("Badport %d came in late, deleting from portlist.\n", badport); |
| if (deleteport(ports, badport, IPPROTO_UDP) < 0) |
| if (debugging) printf("Port deletion failed.\n"); |
| } |
| } |
| else { |
| printf("Funked up packet!\n"); |
| } |
| } |
| return numcaught; |
| } |
|
|
| /* This fucntion is nonsens. I wrote it all, really optimized etc. Then |
| found out that many hosts limit the rate at which they send icmp errors :( |
| I will probably totally rewrite it to be much simpler at some point. For |
| now I won't worry about it since it isn't a very important functions (UDP |
| is lame, plus there is already a much better function for people who |
| are r00t */ |
| portlist lamer_udp_scan(struct in_addr target, unsigned short *portarray, |
| portlist *ports) { |
| int sockaddr_in_size = sizeof(struct sockaddr_in),i=0,j=0,k=0, bytes; |
| int sockets[max_parallel_sockets], trynum[max_parallel_sockets]; |
| unsigned short portno[max_parallel_sockets]; |
| int last_open = 0; |
| char response[1024]; |
| struct sockaddr_in her, stranger; |
| char data[] = "\nhelp\nquit\n"; |
| unsigned long sleeptime; |
| unsigned int starttime; |
|
|
| /* Initialize our target sockaddr_in */ |
| bzero((char *) &her, sizeof(struct sockaddr_in)); |
| her.sin_family = AF_INET; |
| her.sin_addr = target; |
|
|
| if (global_delay) sleeptime = global_delay; |
| else sleeptime = calculate_sleep(target) + 60000; /*large to be on the |
| safe side */ |
|
|
| if (verbose || debugging) |
| printf("Initiating UDP scan against %s (%s), sleeptime: %li\n", current_name, |
| inet_ntoa(target), sleeptime); |
|
|
| starttime = time(NULL); |
|
|
| for(i = 0 ; i < max_parallel_sockets; i++) |
| trynum[i] = portno[i] = 0; |
|
|
| while(portarray[j]) { |
| for(i=0; i < max_parallel_sockets && portarray[j]; i++, j++) { |
| if (i >= last_open) { |
| if ((sockets[i] = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1) |
| {perror("datagram socket troubles"); exit(1);} |
| block_socket(sockets[i]); |
| portno[i] = portarray[j]; |
| } |
| her.sin_port = htons(portarray[j]); |
| bytes = sendto(sockets[i], data, sizeof(data), 0, (struct sockaddr *) &her, |
| sizeof(struct sockaddr_in)); |
| usleep(5000); |
| if (debugging > 1) |
| printf("Sent %d bytes on socket %d to port %hi, try number %d.\n", |
| bytes, sockets[i], portno[i], trynum[i]); |
| if (bytes < 0 ) { |
| printf("Sendto returned %d the FIRST TIME!@#$!, errno %d\n", bytes, |
| errno); |
| perror(""); |
| trynum[i] = portno[i] = 0; |
| close(sockets[i]); |
| } |
| } |
| last_open = i; |
| /* Might need to change this to 1e6 if you are having problems*/ |
| usleep(sleeptime + 5e5); |
| for(i=0; i < last_open ; i++) { |
| if (portno[i]) { |
| unblock_socket(sockets[i]); |
| if ((bytes = recvfrom(sockets[i], response, 1024, 0, |
| (struct sockaddr *) &stranger, |
| &sockaddr_in_size)) == -1) |
| { |
| if (debugging > 1) |
| printf("2nd recvfrom on port %d returned %d with errno %d.\n", |
| portno[i], bytes, errno); |
| if (errno == EAGAIN /*11*/) |
| { |
| if (trynum[i] < 2) trynum[i]++; |
| else { |
| if (RISKY_UDP_SCAN) { |
| printf("Adding port %d after 3 EAGAIN errors.\n", portno[i]); |
| addport(ports, portno[i], IPPROTO_UDP, NULL); |
| } |
| else if (debugging) |
| printf("Skipping possible false positive, port %d\n", |
| portno[i]); |
| trynum[i] = portno[i] = 0; |
| close(sockets[i]); |
| } |
| } |
| else if (errno == ECONNREFUSED /*111*/) { |
| if (debugging > 1) |
| printf("Closing socket for port %d, ECONNREFUSED received.\n", |
| portno[i]); |
| trynum[i] = portno[i] = 0; |
| close(sockets[i]); |
| } |
| else { |
| printf("Curious recvfrom error (%d) on port %hi: ", |
| errno, portno[i]); |
| perror(""); |
| trynum[i] = portno[i] = 0; |
| close(sockets[i]); |
| } |
| } |
| else /*bytes is positive*/ { |
| if (debugging || verbose) |
| printf("Adding UDP port %d due to positive read!\n", portno[i]); |
| addport(ports,portno[i], IPPROTO_UDP, NULL); |
| trynum[i] = portno[i] = 0; |
| close(sockets[i]); |
| } |
| } |
| } |
| /* Update last_open, we need to create new sockets.*/ |
| for(i=0, k=0; i < last_open; i++) |
| if (portno[i]) { |
| close(sockets[i]); |
| sockets[k] = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); |
| /* unblock_socket(sockets[k]);*/ |
| portno[k] = portno[i]; |
| trynum[k] = trynum[i]; |
| k++; |
| } |
| last_open = k; |
| for(i=k; i < max_parallel_sockets; i++) |
| trynum[i] = sockets[i] = portno[i] = 0; |
| } |
| if (debugging) |
| printf("UDP scanned %d ports in %ld seconds with %d parallel sockets\n", |
| number_of_ports, time(NULL) - starttime, max_parallel_sockets); |
| return *ports; |
| } |
|
|
| /* This attempts to calculate the round trip time (rtt) to a host by timing a |
| connect() to a port which isn't listening. A better approach is to time a |
| ping (since it is more likely to get through firewalls. This is now |
| implemented in isup() for users who are root. */ |
| unsigned long calculate_sleep(struct in_addr target) { |
| struct timeval begin, end; |
| int sd; |
| struct sockaddr_in sock; |
| int res; |
|
|
| if ((sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) |
| {perror("Socket troubles"); exit(1);} |
|
|
| sock.sin_family = AF_INET; |
| sock.sin_addr.s_addr = target.s_addr; |
| sock.sin_port = htons(MAGIC_PORT); |
|
|
| gettimeofday(&begin, NULL); |
| if ((res = connect(sd, (struct sockaddr *) &sock, |
| sizeof(struct sockaddr_in))) != -1) |
| printf("You might want to change MAGIC_PORT in the include file, it seems to be listening on the target host!\n"); |
| close(sd); |
| gettimeofday(&end, NULL); |
| if (end.tv_sec - begin.tv_sec > 5 ) /*uh-oh!*/ |
| return 0; |
| return (end.tv_sec - begin.tv_sec) * 1000000 + (end.tv_usec - begin.tv_usec); |
| } |
|
|
| /* Checks whether the identd port (113) is open on the target machine. No |
| sense wasting time trying it for each good port if it is down! */ |
| int check_ident_port(struct in_addr target) { |
| int sd; |
| struct sockaddr_in sock; |
| int res; |
|
|
| if ((sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) |
| {perror("Socket troubles"); exit(1);} |
|
|
| sock.sin_family = AF_INET; |
| sock.sin_addr.s_addr = target.s_addr; |
| sock.sin_port = htons(113); /*should use getservbyname(3), yeah, yeah */ |
| res = connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in)); |
| close(sd); |
| if (res < 0 ) { |
| if (debugging || verbose) printf("identd port not active\n"); |
| return 0; |
| } |
| if (debugging || verbose) printf("identd port is active\n"); |
| return 1; |
| } |
|
|
| int getidentinfoz(struct in_addr target, int localport, int remoteport, |
| char *owner) { |
| int sd; |
| struct sockaddr_in sock; |
| int res; |
| char request[15]; |
| char response[1024]; |
| char *p,*q; |
| char *os; |
|
|
| owner[0] = '\0'; |
| if ((sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) |
| {perror("Socket troubles"); exit(1);} |
|
|
| sock.sin_family = AF_INET; |
| sock.sin_addr.s_addr = target.s_addr; |
| sock.sin_port = htons(113); |
| usleep(50000); /* If we aren't careful, we really MIGHT take out inetd, |
| some are very fragile */ |
| res = connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in)); |
|
|
| if (res < 0 ) { |
| if (debugging || verbose) |
| printf("identd port not active now for some reason ... hope we didn't break it!\n"); |
| close(sd); |
| return 0; |
| } |
| sprintf(request,"%hi,%hi\r\n", remoteport, localport); |
| if (debugging > 1) printf("Connected to identd, sending request: %s", request); |
| if (write(sd, request, strlen(request) + 1) == -1) { |
| perror("identd write"); |
| close(sd); |
| return 0; |
| } |
| else if ((res = read(sd, response, 1024)) == -1) { |
| perror("reading from identd"); |
| close(sd); |
| return 0; |
| } |
| else { |
| close(sd); |
| if (debugging > 1) printf("Read %d bytes from identd: %s\n", res, response); |
| if ((p = strchr(response, ':'))) { |
| p++; |
| if ((q = strtok(p, " :"))) { |
| if (!strcasecmp( q, "error")) { |
| if (debugging || verbose) printf("ERROR returned from identd\n"); |
| return 0; |
| } |
| if ((os = strtok(NULL, " :"))) { |
| if ((p = strtok(NULL, " :"))) { |
| if ((q = strchr(p, '\r'))) *q = '\0'; |
| if ((q = strchr(p, '\n'))) *q = '\0'; |
| strncpy(owner, p, 512); |
| owner[512] = '\0'; |
| } |
| } |
| } |
| } |
| } |
| return 1; |
| } |
|
|
| /* A relatively fast (or at least short ;) ping function. Doesn't require a |
| seperate checksum function */ |
| int isup(struct in_addr target) { |
| int res, retries = 3; |
| struct sockaddr_in sock; |
| /*type(8bit)=8, code(8)=0 (echo REQUEST), checksum(16)=34190, id(16)=31337 */ |
| #ifdef __LITTLE_ENDIAN_BITFIELD |
| unsigned char ping[64] = { 0x8, 0x0, 0x8e, 0x85, 0x69, 0x7A }; |
| #else |
| unsigned char ping[64] = { 0x8, 0x0, 0x85, 0x8e, 0x7A, 0x69 }; |
| #endif |
| int sd; |
| struct timeval tv; |
| struct timeval start, end; |
| fd_set fd_read; |
| struct { |
| struct iphdr ip; |
| unsigned char type; |
| unsigned char code; |
| unsigned short checksum; |
| unsigned short identifier; |
| char crap[16536]; |
| } response; |
|
|
| sd = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP); |
|
|
| bzero((char *)&sock,sizeof(struct sockaddr_in)); |
| sock.sin_family=AF_INET; |
| sock.sin_addr = target; |
| if (debugging > 1) printf(" Sending 3 64 byte raw pings to host.\n"); |
| gettimeofday(&start, NULL); |
| while(--retries) { |
| if ((res = sendto(sd,(char *) ping,64,0,(struct sockaddr *)&sock, |
| sizeof(struct sockaddr))) != 64) { |
| fprintf(stderr, "sendto in isup returned %d! skipping host.\n", res); |
| return 0; |
| } |
| FD_ZERO(&fd_read); |
| FD_SET(sd, &fd_read); |
| tv.tv_sec = 0; |
| tv.tv_usec = 1e6 * (PING_TIMEOUT / 3.0); |
| while(1) { |
| if ((res = select(sd + 1, &fd_read, NULL, NULL, &tv)) != 1) |
| break; |
| else { |
| read(sd,&response,sizeof(response)); |
| if (response.ip.saddr == target.s_addr && !response.type |
| && !response.code && response.identifier == 31337) { |
| gettimeofday(&end, NULL); |
| global_rtt = (end.tv_sec - start.tv_sec) * 1e6 + end.tv_usec - start.tv_usec; |
| ouraddr.s_addr = response.ip.daddr; |
| close(sd); |
| return 1; |
| } |
| } |
| } |
| } |
| close(sd); |
| return 0; |
| } |
|
|
|
|
| portlist syn_scan(struct in_addr target, unsigned short *portarray, |
| struct in_addr *source, int fragment, portlist *ports) { |
| int i=0, j=0, received, bytes, starttime; |
| struct sockaddr_in from; |
| int fromsize = sizeof(struct sockaddr_in); |
| int sockets[max_parallel_sockets]; |
| struct timeval tv; |
| char packet[65535]; |
| struct iphdr *ip = (struct iphdr *) packet; |
| struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct iphdr)); |
| fd_set fd_read, fd_write; |
| int res; |
| struct hostent *myhostent; |
| char myname[MAXHOSTNAMELEN + 1]; |
| int source_malloc = 0; |
|
|
| FD_ZERO(&fd_read); |
| FD_ZERO(&fd_write); |
|
|
| tv.tv_sec = 7; |
| tv.tv_usec = 0; |
|
|
| if ((received = socket(AF_INET, SOCK_RAW, IPPROTO_TCP)) < 0 ) |
| perror("socket trobles in syn_scan"); |
| unblock_socket(received); |
| FD_SET(received, &fd_read); |
|
|
| /* First we take what is given to us as source. If that isn't valid, we take |
| what should have swiped from the echo reply in our ping function. If THAT |
| doesn't work either, we try to determine our address with gethostname and |
| gethostbyname. Whew! */ |
| if (!source) { |
| if (ouraddr.s_addr) { |
| source = &ouraddr; |
| } |
| else { |
| source = safe_malloc(sizeof(struct in_addr)); |
| source_malloc = 1; |
| if (gethostname(myname, MAXHOSTNAMELEN) || |
| !(myhostent = gethostbyname(myname))) |
| fatal("Your system is fucked up.\n"); |
| memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); |
| } |
| if (debugging) |
| printf("We skillfully deduced that your address is %s\n", |
| inet_ntoa(*source)); |
| } |
|
|
| starttime = time(NULL); |
|
|
| do { |
| for(i=0; i < max_parallel_sockets && portarray[j]; i++) { |
| if ((sockets[i] = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0 ) |
| perror("socket trobles in syn_scan"); |
| else { |
| if (fragment) |
| send_small_fragz(sockets[i], source, &target, MAGIC_PORT, |
| portarray[j++], TH_SYN); |
| else send_tcp_raw(sockets[i], source , &target, MAGIC_PORT, |
| portarray[j++],0,0,TH_SYN,0,0,0); |
| usleep(10000); |
| } |
| } |
| if ((res = select(received + 1, &fd_read, NULL, NULL, &tv)) < 0) |
| perror("select problems in syn_scan"); |
| else if (res > 0) { |
| while ((bytes = recvfrom(received, packet, 65535, 0, |
| (struct sockaddr *)&from, &fromsize)) > 0 ) { |
| if (ip->saddr == target.s_addr) { |
| if (tcp->th_flags & TH_RST) { |
| if (debugging > 1) printf("Nothing open on port %d\n", |
| ntohs(tcp->th_sport)); |
| } |
| else /*if (tcp->th_flags & TH_SYN && tcp->th_flags & TH_ACK)*/ { |
| if (debugging || verbose) { |
| printf("Possible catch on port %d! Here it is:\n", |
| ntohs(tcp->th_sport)); |
| readtcppacket(packet,1); |
| } |
| addport(ports, ntohs(tcp->th_sport), IPPROTO_TCP, NULL); |
| } |
| } |
| } |
| } |
| for(i=0; i < max_parallel_sockets && portarray[j]; i++) close(sockets[i]); |
| |
| } while (portarray[j]); |
| if (debugging || verbose) |
| printf("The TCP SYN scan took %ld seconds to scan %d ports.\n", |
| time(NULL) - starttime, number_of_ports); |
| if (source_malloc) free(source); /* Gotta save those 4 bytes! ;) */ |
| close(received); |
| return *ports; |
| } |
|
|
|
|
| int send_tcp_raw( int sd, struct in_addr *source, |
| struct in_addr *victim, unsigned short sport, |
| unsigned short dport, unsigned long seq, |
| unsigned long ack, unsigned char flags, |
| unsigned short window, char *data, |
| unsigned short datalen) |
| { |
|
|
| struct pseudo_header { |
| /*for computing TCP checksum, see TCP/IP Illustrated p. 145 */ |
| unsigned long s_addr; |
| unsigned long d_addr; |
| char zer0; |
| unsigned char protocol; |
| unsigned short length; |
| }; |
| char packet[sizeof(struct iphdr) + sizeof(struct tcphdr) + datalen]; |
| /*With these placement we get data and some field alignment so we aren't |
| wasting too much in computing the checksum */ |
| struct iphdr *ip = (struct iphdr *) packet; |
| struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct iphdr)); |
| struct pseudo_header *pseudo = (struct pseudo_header *) (packet + sizeof(struct iphdr) - sizeof(struct pseudo_header)); |
| int res; |
| struct sockaddr_in sock; |
| char myname[MAXHOSTNAMELEN + 1]; |
| struct hostent *myhostent; |
| int source_malloced = 0; |
|
|
| /* check that required fields are there and not too silly */ |
| if ( !victim || !sport || !dport || sd < 0) { |
| fprintf(stderr, "send_tcp_raw: One or more of your parameters suck!\n"); |
| return -1; |
| } |
|
|
| /* if they didn't give a source address, fill in our first address */ |
| if (!source) { |
| source_malloced = 1; |
| source = safe_malloc(sizeof(struct in_addr)); |
| if (gethostname(myname, MAXHOSTNAMELEN) || |
| !(myhostent = gethostbyname(myname))) |
| fatal("Your system is fucked up.\n"); |
| memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); |
| if (debugging > 1) |
| printf("We skillfully deduced that your address is %s\n", |
| inet_ntoa(*source)); |
| } |
|
|
|
|
| /*do we even have to fill out this damn thing? This is a raw packet, |
| after all */ |
| sock.sin_family = AF_INET; |
| sock.sin_port = htons(dport); |
| sock.sin_addr.s_addr = victim->s_addr; |
|
|
| bzero(packet, sizeof(struct iphdr) + sizeof(struct tcphdr)); |
|
|
| pseudo->s_addr = source->s_addr; |
| pseudo->d_addr = victim->s_addr; |
| pseudo->protocol = IPPROTO_TCP; |
| pseudo->length = htons(sizeof(struct tcphdr) + datalen); |
|
|
| tcp->th_sport = htons(sport); |
| tcp->th_dport = htons(dport); |
| if (seq) |
| tcp->th_seq = htonl(seq); |
| else tcp->th_seq = rand() + rand(); |
|
|
| if (flags & TH_ACK && ack) |
| tcp->th_ack = htonl(seq); |
| else if (flags & TH_ACK) |
| tcp->th_ack = rand() + rand(); |
|
|
| tcp->th_off = 5 /*words*/; |
| tcp->th_flags = flags; |
|
|
| if (window) |
| tcp->th_win = window; |
| else tcp->th_win = htons(2048); /* Who cares */ |
|
|
| tcp->th_sum = in_cksum((unsigned short *)pseudo, sizeof(struct tcphdr) + |
| sizeof(struct pseudo_header) + datalen); |
|
|
| /* Now for the ip header */ |
| bzero(packet, sizeof(struct iphdr)); |
| ip->version = 4; |
| ip->ihl = 5; |
| ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct tcphdr) + datalen); |
| ip->id = rand(); |
| ip->ttl = 255; |
| ip->protocol = IPPROTO_TCP; |
| ip->saddr = source->s_addr; |
| ip->daddr = victim->s_addr; |
| ip->check = in_cksum((unsigned short *)ip, sizeof(struct iphdr)); |
|
|
| if (debugging > 1) { |
| printf("Raw TCP packet creation completed! Here it is:\n"); |
| readtcppacket(packet,ntohs(ip->tot_len)); |
| } |
| if (debugging > 1) |
| printf("\nTrying sendto(%d , packet, %d, 0 , %s , %d)\n", |
| sd, ntohs(ip->tot_len), inet_ntoa(*victim), |
| sizeof(struct sockaddr_in)); |
| if ((res = sendto(sd, packet, ntohs(ip->tot_len), 0, |
| (struct sockaddr *)&sock, sizeof(struct sockaddr_in))) == -1) |
| { |
| perror("sendto in send_tcp_raw"); |
| if (source_malloced) free(source); |
| return -1; |
| } |
| if (debugging > 1) printf("successfully sent %d bytes of raw_tcp!\n", res); |
|
|
| if (source_malloced) free(source); |
| return res; |
| } |
|
|
| /* A simple program I wrote to help in debugging, shows the important fields |
| of a TCP packet*/ |
| int readtcppacket(char *packet, int readdata) { |
| struct iphdr *ip = (struct iphdr *) packet; |
| struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct iphdr)); |
| char *data = packet + sizeof(struct iphdr) + sizeof(struct tcphdr); |
| int tot_len; |
| struct in_addr bullshit, bullshit2; |
| char sourcehost[16]; |
| int i; |
|
|
| if (!packet) { |
| fprintf(stderr, "readtcppacket: packet is NULL!\n"); |
| return -1; |
| } |
| bullshit.s_addr = ip->saddr; bullshit2.s_addr = ip->daddr; |
| tot_len = ntohs(ip->tot_len); |
| strncpy(sourcehost, inet_ntoa(bullshit), 16); |
| i = 4 * (ntohs(ip->ihl) + ntohs(tcp->th_off)); |
| if (ip->protocol == IPPROTO_TCP) |
| if (ip->frag_off) printf("Packet is fragmented, offset field: %u", |
| ip->frag_off); |
| else { |
| printf("TCP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, |
| ntohs(tcp->th_sport), inet_ntoa(bullshit2), |
| ntohs(tcp->th_dport), tot_len); |
| printf("Flags: "); |
| if (!tcp->th_flags) printf("(none)"); |
| if (tcp->th_flags & TH_RST) printf("RST "); |
| if (tcp->th_flags & TH_SYN) printf("SYN "); |
| if (tcp->th_flags & TH_ACK) printf("ACK "); |
| if (tcp->th_flags & TH_PUSH) printf("PSH "); |
| if (tcp->th_flags & TH_FIN) printf("FIN "); |
| if (tcp->th_flags & TH_URG) printf("URG "); |
| printf("\n"); |
| printf("ttl: %hi ", ip->ttl); |
| if (tcp->th_flags & (TH_SYN | TH_ACK)) printf("Seq: %lu\tAck: %lu\n", |
| tcp->th_seq, tcp->th_ack); |
| else if (tcp->th_flags & TH_SYN) printf("Seq: %lu\n", ntohl(tcp->th_seq)); |
| else if (tcp->th_flags & TH_ACK) printf("Ack: %lu\n", ntohl(tcp->th_ack)); |
| } |
| if (readdata && i < tot_len) { |
| printf("Data portion:\n"); |
| while(i < tot_len) printf("%2X%c", data[i], (++i%16)? ' ' : '\n'); |
| printf("\n"); |
| } |
| return 0; |
| } |
|
|
| /* We don't exactly need real crypto here (thank god!)\n"*/ |
| int shortfry(unsigned short *ports) { |
| int num; |
| unsigned short tmp; |
| int i; |
|
|
| for(i=0; i < number_of_ports; i++) { |
| num = rand() % (number_of_ports); |
| tmp = ports[i]; |
| ports[i] = ports[num]; |
| ports[num] = tmp; |
| } |
| return 1; |
| } |
|
|
|
|
| /* Much of this is swiped from my send_tcp_raw function above, which |
| doesn't support fragmentation */ |
| int send_small_fragz(int sd, struct in_addr *source, struct in_addr *victim, |
| int sport, int dport, int flags) { |
|
|
| struct pseudo_header { |
| /*for computing TCP checksum, see TCP/IP Illustrated p. 145 */ |
| unsigned long s_addr; |
| unsigned long d_addr; |
| char zer0; |
| unsigned char protocol; |
| unsigned short length; |
| }; |
| /*In this placement we get data and some field alignment so we aren't wasting |
| too much to compute the TCP checksum.*/ |
| char packet[sizeof(struct iphdr) + sizeof(struct tcphdr) + 100]; |
| struct iphdr *ip = (struct iphdr *) packet; |
| struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct iphdr)); |
| struct pseudo_header *pseudo = (struct pseudo_header *) (packet + sizeof(struct iphdr) - sizeof(struct pseudo_header)); |
| char *frag2 = packet + sizeof(struct iphdr) + 16; |
| struct iphdr *ip2 = (struct iphdr *) (frag2 - sizeof(struct iphdr)); |
| int res; |
| struct sockaddr_in sock; |
| int id; |
|
|
| /*Why do we have to fill out this damn thing? This is a raw packet, after all */ |
| sock.sin_family = AF_INET; |
| sock.sin_port = htons(dport); |
| sock.sin_addr.s_addr = victim->s_addr; |
|
|
| bzero(packet, sizeof(struct iphdr) + sizeof(struct tcphdr)); |
|
|
| pseudo->s_addr = source->s_addr; |
| pseudo->d_addr = victim->s_addr; |
| pseudo->protocol = IPPROTO_TCP; |
| pseudo->length = htons(sizeof(struct tcphdr)); |
|
|
| tcp->th_sport = htons(sport); |
| tcp->th_dport = htons(dport); |
| tcp->th_seq = rand() + rand(); |
|
|
| tcp->th_off = 5 /*words*/; |
| tcp->th_flags = flags; |
|
|
| tcp->th_win = htons(2048); /* Who cares */ |
|
|
| tcp->th_sum = in_cksum((unsigned short *)pseudo, |
| sizeof(struct tcphdr) + sizeof(struct pseudo_header)); |
|
|
| /* Now for the ip header of frag1 */ |
| bzero(packet, sizeof(struct iphdr)); |
| ip->version = 4; |
| ip->ihl = 5; |
| /*RFC 791 allows 8 octet frags, but I get "operation not permitted" (EPERM) |
| when I try that. */ |
| ip->tot_len = htons(sizeof(struct iphdr) + 16); |
| id = ip->id = rand(); |
| ip->frag_off = htons(MORE_FRAGMENTS); |
| ip->ttl = 255; |
| ip->protocol = IPPROTO_TCP; |
| ip->saddr = source->s_addr; |
| ip->daddr = victim->s_addr; |
| ip->check = in_cksum((unsigned short *)ip, sizeof(struct iphdr)); |
|
|
| if (debugging > 1) { |
| printf("Raw TCP packet fragment #1 creation completed! Here it is:\n"); |
| hdump(packet,20); |
| } |
| if (debugging > 1) |
| printf("\nTrying sendto(%d , packet, %d, 0 , %s , %d)\n", |
| sd, ntohs(ip->tot_len), inet_ntoa(*victim), |
| sizeof(struct sockaddr_in)); |
| if ((res = sendto(sd, packet, ntohs(ip->tot_len), 0, |
| (struct sockaddr *)&sock, sizeof(struct sockaddr_in))) == -1) |
| { |
| perror("sendto in send_syn_fragz"); |
| return -1; |
| } |
| if (debugging > 1) printf("successfully sent %d bytes of raw_tcp!\n", res); |
|
|
| /* Create the second fragment */ |
| bzero(ip2, sizeof(struct iphdr)); |
| ip2->version = 4; |
| ip2->ihl = 5; |
| ip2->tot_len = htons(sizeof(struct iphdr) + 4); /* the rest of our TCP packet */ |
| ip2->id = id; |
| ip2->frag_off = htons(2); |
| ip2->ttl = 255; |
| ip2->protocol = IPPROTO_TCP; |
| ip2->saddr = source->s_addr; |
| ip2->daddr = victim->s_addr; |
| ip2->check = in_cksum((unsigned short *)ip2, sizeof(struct iphdr)); |
| if (debugging > 1) { |
| printf("Raw TCP packet fragment creation completed! Here it is:\n"); |
| hdump(packet,20); |
| } |
| if (debugging > 1) |
| printf("\nTrying sendto(%d , ip2, %d, 0 , %s , %d)\n", sd, |
| ntohs(ip2->tot_len), inet_ntoa(*victim), sizeof(struct sockaddr_in)); |
| if ((res = sendto(sd, ip2, ntohs(ip2->tot_len), 0, |
| (struct sockaddr *)&sock, sizeof(struct sockaddr_in))) == -1) |
| { |
| perror("sendto in send_tcp_raw"); |
| return -1; |
| } |
| return 1; |
| } |
|
|
| /* Hex dump */ |
| void hdump(unsigned char *packet, int len) { |
| unsigned int i=0, j=0; |
|
|
| printf("Here it is:\n"); |
|
|
| for(i=0; i < len; i++){ |
| j = (unsigned) (packet[i]); |
| printf("%-2X ", j); |
| if (!((i+1)%16)) |
| printf("\n"); |
| else if (!((i+1)%4)) |
| printf(" "); |
| } |
| printf("\n"); |
| } |
|
|
|
|
| portlist fin_scan(struct in_addr target, unsigned short *portarray, |
| struct in_addr *source, int fragment, portlist *ports) { |
|
|
| int rawsd, tcpsd; |
| int done = 0, badport, starttime, someleft, i, j=0, retries=2; |
| int source_malloc = 0; |
| int waiting_period = retries, sockaddr_in_size = sizeof(struct sockaddr_in); |
| int bytes, dupesinarow = 0; |
| unsigned long timeout; |
| struct hostent *myhostent; |
| char response[65535], myname[513]; |
| struct iphdr *ip = (struct iphdr *) response; |
| struct tcphdr *tcp; |
| unsigned short portno[max_parallel_sockets], trynum[max_parallel_sockets]; |
| struct sockaddr_in stranger; |
|
|
|
|
| timeout = (global_delay)? global_delay : (global_rtt)? (1.2 * global_rtt) + 10000 : 1e5; |
| bzero(&stranger, sockaddr_in_size); |
| bzero(portno, max_parallel_sockets * sizeof(unsigned short)); |
| bzero(trynum, max_parallel_sockets * sizeof(unsigned short)); |
| starttime = time(NULL); |
|
|
|
|
| if (debugging || verbose) |
| printf("Initiating FIN stealth scan against %s (%s), sleep delay: %ld useconds\n", current_name, inet_ntoa(target), timeout); |
|
|
| if (!source) { |
| if (ouraddr.s_addr) { |
| source = &ouraddr; |
| } |
| else { |
| source = safe_malloc(sizeof(struct in_addr)); |
| source_malloc = 1; |
| if (gethostname(myname, MAXHOSTNAMELEN) || |
| !(myhostent = gethostbyname(myname))) |
| fatal("Your system is fucked up.\n"); |
| memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); |
| } |
| if (debugging || verbose) |
| printf("We skillfully deduced that your address is %s\n", |
| inet_ntoa(*source)); |
| } |
|
|
| if ((rawsd = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0 ) |
| perror("socket trobles in fin_scan"); |
|
|
| if ((tcpsd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP)) < 0 ) |
| perror("socket trobles in fin_scan"); |
|
|
| unblock_socket(tcpsd); |
| while(!done) { |
| for(i=0; i < max_parallel_sockets; i++) { |
| if (!portno[i] && portarray[j]) { |
| portno[i] = portarray[j++]; |
| } |
| if (portno[i]) { |
| if (fragment) |
| send_small_fragz(rawsd, source, &target, MAGIC_PORT, portno[i], TH_FIN); |
| else send_tcp_raw(rawsd, source , &target, MAGIC_PORT, |
| portno[i], 0, 0, TH_FIN, 0, 0, 0); |
| usleep(10000); /* *WE* normally do not need this, but the target |
| lamer often does */ |
| } |
| } |
|
|
| usleep(timeout); |
| dupesinarow = 0; |
| while ((bytes = recvfrom(tcpsd, response, 65535, 0, (struct sockaddr *) |
| &stranger, &sockaddr_in_size)) > 0) |
| if (ip->saddr == target.s_addr) { |
| tcp = (struct tcphdr *) (response + 4 * ip->ihl); |
| if (tcp->th_flags & TH_RST) { |
| badport = ntohs(tcp->th_sport); |
| if (debugging > 1) printf("Nothing open on port %d\n", badport); |
| /* delete the port from active scanning */ |
| for(i=0; i < max_parallel_sockets; i++) |
| if (portno[i] == badport) { |
| if (debugging && trynum[i] > 0) |
| printf("Bad port %d caught on fin scan, try number %d\n", |
| badport, trynum[i] + 1); |
| trynum[i] = 0; |
| portno[i] = 0; |
| break; |
| } |
| if (i == max_parallel_sockets) { |
| if (debugging) |
| printf("Late packet or dupe, deleting port %d.\n", badport); |
| dupesinarow++; |
| if (ports) deleteport(ports, badport, IPPROTO_TCP); |
| } |
| } |
| else |
| if (debugging > 1) { |
| printf("Strange packet from target%d! Here it is:\n", |
| ntohs(tcp->th_sport)); |
| if (bytes >= 40) readtcppacket(response,1); |
| else hdump(response,bytes); |
| } |
| } |
| |
| /* adjust waiting time if neccessary */ |
| if (dupesinarow > 6) { |
| if (debugging || verbose) |
| printf("Slowing down send frequency due to multiple late packets.\n"); |
| if (timeout < 10 * ((global_delay)? global_delay: global_rtt + 20000)) timeout *= 1.5; |
| else { |
| printf("Too many late packets despite send frequency decreases, skipping scan.\n"); |
| if (source_malloc) free(source); |
| return *ports; |
| } |
| } |
|
|
|
|
| /* Ok, collect good ports (those that we haven't received responses too |
| after all our retries */ |
| someleft = 0; |
| for(i=0; i < max_parallel_sockets; i++) |
| if (portno[i]) { |
| if (++trynum[i] >= retries) { |
| if (verbose || debugging) |
| printf("Good port %d detected by fin_scan!\n", portno[i]); |
| addport(ports, portno[i], IPPROTO_TCP, NULL); |
| send_tcp_raw( rawsd, source, &target, MAGIC_PORT, portno[i], 0, 0, |
| TH_FIN, 0, 0, 0); |
| portno[i] = trynum[i] = 0; |
| } |
| else someleft = 1; |
| } |
|
|
| if (!portarray[j] && (!someleft || --waiting_period <= 0)) done++; |
| } |
|
|
| if (debugging || verbose) |
| printf("The TCP stealth FIN scan took %ld seconds to scan %d ports.\n", |
| time(NULL) - starttime, number_of_ports); |
| if (source_malloc) free(source); |
| close(tcpsd); |
| close(rawsd); |
| return *ports; |
| } |
|
|
| int ftp_anon_connect(struct ftpinfo *ftp) { |
| int sd; |
| struct sockaddr_in sock; |
| int res; |
| char recvbuf[2048]; |
| char command[512]; |
|
|
| if (verbose || debugging) |
| printf("Attempting connection to ftp://%s:%s@%s:%i\n", ftp->user, ftp->pass, |
| ftp->server_name, ftp->port); |
|
|
| if ((sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0) { |
| perror("Couldn't create ftp_anon_connect socket"); |
| return 0; |
| } |
|
|
| sock.sin_family = AF_INET; |
| sock.sin_addr.s_addr = ftp->server.s_addr; |
| sock.sin_port = htons(ftp->port); |
| res = connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in)); |
| if (res < 0 ) { |
| printf("Your ftp bounce proxy server won't talk to us!\n"); |
| exit(1); |
| } |
| if (verbose || debugging) printf("Connected:"); |
| while ((res = recvtime(sd, recvbuf, 2048,7)) > 0) |
| if (debugging || verbose) { |
| recvbuf[res] = '\0'; |
| printf("%s", recvbuf); |
| } |
| if (res < 0) { |
| perror("recv problem from ftp bounce server"); |
| exit(1); |
| } |
|
|
| snprintf(command, 511, "USER %s\r\n", ftp->user); |
| send(sd, command, strlen(command), 0); |
| res = recvtime(sd, recvbuf, 2048,12); |
| if (res <= 0) { |
| perror("recv problem from ftp bounce server"); |
| exit(1); |
| } |
| recvbuf[res] = '\0'; |
| if (debugging) printf("sent username, received: %s", recvbuf); |
| if (recvbuf[0] == '5') { |
| printf("Your ftp bounce server doesn't like the username \"%s\"\n", |
| ftp->user); |
| exit(1); |
| } |
| snprintf(command, 511, "PASS %s\r\n", ftp->pass); |
| send(sd, command, strlen(command), 0); |
| res = recvtime(sd, recvbuf, 2048,12); |
| if (res < 0) { |
| perror("recv problem from ftp bounce server\n"); |
| exit(1); |
| } |
| if (!res) printf("Timeout from bounce server ..."); |
| else { |
| recvbuf[res] = '\0'; |
| if (debugging) printf("sent password, received: %s", recvbuf); |
| if (recvbuf[0] == '5') { |
| fprintf(stderr, "Your ftp bounce server refused login combo (%s/%s)\n", |
| ftp->user, ftp->pass); |
| exit(1); |
| } |
| } |
| while ((res = recvtime(sd, recvbuf, 2048,2)) > 0) |
| if (debugging) { |
| recvbuf[res] = '\0'; |
| printf("%s", recvbuf); |
| } |
| if (res < 0) { |
| perror("recv problem from ftp bounce server"); |
| exit(1); |
| } |
| if (verbose) printf("Login credentials accepted by ftp server!\n"); |
|
|
| ftp->sd = sd; |
| return sd; |
| } |
|
|
| int recvtime(int sd, char *buf, int len, int seconds) { |
|
|
| int res; |
| struct timeval timeout = {seconds, 0}; |
| fd_set readfd; |
|
|
| FD_ZERO(&readfd); |
| FD_SET(sd, &readfd); |
| res = select(sd + 1, &readfd, NULL, NULL, &timeout); |
| if (res > 0 ) { |
| res = recv(sd, buf, len, 0); |
| if (res >= 0) return res; |
| perror("recv in recvtime"); |
| return 0; |
| } |
| else if (!res) return 0; |
| perror("select() in recvtime"); |
| return -1; |
| } |
|
|
| portlist bounce_scan(struct in_addr target, unsigned short *portarray, |
| struct ftpinfo *ftp, portlist *ports) { |
| int starttime, res , sd = ftp->sd, i=0; |
| char *t = (char *)⌖ |
| int retriesleft = FTP_RETRIES; |
| char recvbuf[2048]; |
| char targetstr[20]; |
| char command[512]; |
| snprintf(targetstr, 20, "%d,%d,%d,%d,0,", UC(t[0]), UC(t[1]), UC(t[2]), UC(t[3])); |
| starttime = time(NULL); |
| if (verbose || debugging) |
| printf("Initiating TCP ftp bounce scan against %s (%s)\n", |
| current_name, inet_ntoa(target)); |
| for(i=0; portarray[i]; i++) { |
| snprintf(command, 512, "PORT %s%i\r\n", targetstr, portarray[i]); |
| if (send(sd, command, strlen(command), 0) < 0 ) { |
| perror("send in bounce_scan"); |
| if (retriesleft) { |
| if (verbose || debugging) |
| printf("Our ftp proxy server hung up on us! retrying\n"); |
| retriesleft--; |
| close(sd); |
| ftp->sd = ftp_anon_connect(ftp); |
| if (ftp->sd < 0) return *ports; |
| sd = ftp->sd; |
| i--; |
| } |
| else { |
| fprintf(stderr, "Our socket descriptor is dead and we are out of retries. Giving up.\n"); |
| close(sd); |
| ftp->sd = -1; |
| return *ports; |
| } |
| } else { /* Our send is good */ |
| res = recvtime(sd, recvbuf, 2048,15); |
| if (res <= 0) perror("recv problem from ftp bounce server\n"); |
| |
| else { /* our recv is good */ |
| recvbuf[res] = '\0'; |
| if (debugging) printf("result of port query on port %i: %s", |
| portarray[i], recvbuf); |
| if (recvbuf[0] == '5') { |
| if (portarray[i] > 1023) { |
| fprintf(stderr, "Your ftp bounce server sucks, it won't let us feed bogus ports!\n"); |
| exit(1); |
| } |
| else { |
| fprintf(stderr, "Your ftp bounce server doesn't allow priviliged ports, skipping them.\n"); |
| while(portarray[i] && portarray[i] < 1024) i++; |
| if (!portarray[i]) { |
| fprintf(stderr, "And you didn't want to scan any unpriviliged ports. Giving up.\n"); |
| /* close(sd); |
| ftp->sd = -1; |
| return *ports;*/ |
| /* screw this gentle return crap! This is an emergency! */ |
| exit(1); |
| } |
| } |
| } |
| else /* Not an error message */ |
| if (send(sd, "LIST\r\n", 6, 0) > 0 ) { |
| res = recvtime(sd, recvbuf, 2048,12); |
| if (res <= 0) perror("recv problem from ftp bounce server\n"); |
| else { |
| recvbuf[res] = '\0'; |
| if (debugging) printf("result of LIST: %s", recvbuf); |
| if (!strncmp(recvbuf, "500", 3)) { |
| /* fuck, we are not aligned properly */ |
| if (verbose || debugging) |
| printf("misalignment detected ... correcting.\n"); |
| res = recvtime(sd, recvbuf, 2048,10); |
| } |
| if (recvbuf[0] == '1' || recvbuf[0] == '2') { |
| if (verbose || debugging) printf("Port number %i appears good.\n", |
| portarray[i]); |
| addport(ports, portarray[i], IPPROTO_TCP, NULL); |
| if (recvbuf[0] == '1') { |
| res = recvtime(sd, recvbuf, 2048,5); |
| recvbuf[res] = '\0'; |
| if ((res > 0) && debugging) printf("nxt line: %s", recvbuf); |
| } |
| } |
| } |
| } |
| } |
| } |
| } |
| if (debugging || verbose) |
| printf("Scanned %d ports in %ld seconds via the Bounce scan.\n", |
| number_of_ports, time(NULL) - starttime); |
| return *ports; |
| } |
|
|
| /* parse a URL stype ftp string of the form user:pass@server:portno */ |
| int parse_bounce(struct ftpinfo *ftp, char *url) { |
| char *p = url,*q, *s; |
|
|
| if ((q = strrchr(url, '@'))) /*we have username and/or pass */ { |
| *(q++) = '\0'; |
| if ((s = strchr(q, ':'))) |
| { /* has portno */ |
| *(s++) = '\0'; |
| strncpy(ftp->server_name, q, MAXHOSTNAMELEN); |
| ftp->port = atoi(s); |
| } |
| else strncpy(ftp->server_name, q, MAXHOSTNAMELEN); |
|
|
| if ((s = strchr(p, ':'))) { /* User AND pass given */ |
| *(s++) = '\0'; |
| strncpy(ftp->user, p, 63); |
| strncpy(ftp->pass, s, 255); |
| } |
| else { /* Username ONLY given */ |
| printf("Assuming %s is a username, and using the default password: %s\n", |
| p, ftp->pass); |
| strncpy(ftp->user, p, 63); |
| } |
| } |
| else /* no username or password given */ |
| if ((s = strchr(url, ':'))) { /* portno is given */ |
| *(s++) = '\0'; |
| strncpy(ftp->server_name, url, MAXHOSTNAMELEN); |
| ftp->port = atoi(s); |
| } |
| else /* default case, no username, password, or portnumber */ |
| strncpy(ftp->server_name, url, MAXHOSTNAMELEN); |
|
|
| ftp->user[63] = ftp->pass[255] = ftp->server_name[MAXHOSTNAMELEN] = 0; |
|
|
| return 1; |
| } |
|
|
|
|
| |
| /* |
| * I'll bet you've never seen this function before (yeah right)! |
| * standard swiped checksum routine. |
| */ |
| unsigned short in_cksum(unsigned short *ptr,int nbytes) { |
|
|
| register long sum; /* assumes long == 32 bits */ |
| u_short oddbyte; |
| register u_short answer; /* assumes u_short == 16 bits */ |
|
|
| /* |
| * Our algorithm is simple, using a 32-bit accumulator (sum), |
| * we add sequential 16-bit words to it, and at the end, fold back |
| * all the carry bits from the top 16 bits into the lower 16 bits. |
| */ |
|
|
| sum = 0; |
| while (nbytes > 1) { |
| sum += *ptr++; |
| nbytes -= 2; |
| } |
|
|
| /* mop up an odd byte, if necessary */ |
| if (nbytes == 1) { |
| oddbyte = 0; /* make sure top half is zero */ |
| *((u_char *) &oddbyte) = *(u_char *)ptr; /* one byte only */ |
| sum += oddbyte; |
| } |
|
|
| /* |
| * Add back carry outs from top 16 bits to low 16 bits. |
| */ |
|
|
| sum = (sum >> 16) + (sum & 0xffff); /* add high-16 to low-16 */ |
| sum += (sum >> 16); /* add carry */ |
| answer = ~sum; /* ones-complement, then truncate to 16 bits */ |
| return(answer); |
| } |
| <--> |
|
|
|
|
| ----[ EOF |
|
|
|
|