| ==Phrack Inc.== | |
| Volume Three, Issue 25, File 5 of 11 | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| <><><><> <><><><> | |
| <><><> Unix Cracking Tips <><><> | |
| <><> <><> | |
| <> by Dark OverLord <> | |
| <><> <><> | |
| <><><> March 17, 1989 <><><> | |
| <><><><> <><><><> | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| The purpose of this file is to present tips for budding Unix hackers. The | |
| audience this is aimed at are those that are experienced at working with basic | |
| Unix, but not in the cracking aspects. | |
| Most of the following material is based on actual experience with BSD boxes | |
| (with some help from my friends). Many of the bugs here may not apply to your | |
| system; your mileage will vary. | |
| When Cracking A System Remember -- | |
| o ALWAYS cover your tracks | |
| o Don't get caught | |
| o Don't get malicious | |
| o Get off as soon as possible | |
| o Keep a bottle of "Wild Turkey" near the terminal | |
| (IMPORTANT!) | |
| About Logging: Remember that many systems use paper terminals so that if a | |
| warning message goes to the console, you can't erase it. | |
| Hint: If you know that you are going to be ringing a few bells, you may wish | |
| to send a bunch of bogus messages to the console so it runs out of paper | |
| before the important messages get there. | |
| After you gain superuser privileges and you wish to stay root, here are | |
| a few suggestions for installing backdoors: | |
| - Disable checks for superuser in the kernel | |
| - Install new system calls | |
| - Patch a system binary to contain a backdoor | |
| - Leave /dev/mem readable | |
| An ancient method of extracting data from anything is to sort through its | |
| trash. The same applies to Unix and newly allocated data. | |
| One trick is to look for old data in newly allocated data (eg: Allocate a | |
| large amount of memory and search through it for old [useful?] data). Given | |
| enough time and an intelligent search algorithms, you could find quite a bit of | |
| information including people's passwords and other private stuff like | |
| mail, et al. | |
| If the device "/dev/kmem" is readable, you should be able to write a quick C | |
| program that intercepts the I/O to other terminals and catch other people's | |
| password etc. | |
| If the device "/dev/kmem" is writeable, it is possible to change your userid by | |
| editing the user structure. | |
| A Common Trick: When looking to gain more system privileges, one of the first | |
| things to investigate are other users' .rhost files since these can be used to | |
| grant access to other accounts without the use of a password. See the Unix | |
| manual entry for rlogin for more information. | |
| Another thing to look for are writeable .profile, .cshrc or .logins (to name a | |
| few). It these are left writeable, it is all too easy to install a Trojan | |
| horse. | |
| Look for readable .netrc files since these files may contain passwords to other | |
| accounts. | |
| If the man command is setuid, it might be possible to get a shell by typing | |
| "!/bin/csh" from within the pager. | |
| Some types of terminals can be "instructed" to issue commands using various | |
| escape sequences. This makes it possible to mail someone a "letter bomb" that | |
| (when read) will send commands to the user's shell. | |
| It is possible to mail commands to a system. This is a feature of the | |
| debugging mode of Unix's sendmail. This trick was made fairly public through | |
| its use by the Internet Worm. The way it is done is by connecting to the SMTP | |
| socket/port and turning on the debug mode. The recipient that is mailed to is | |
| "| sed '1,/$/d' | /bin/sh ; exit 0" and then the commands for the shell are | |
| placed in the body of the letter/data section. | |
| Under Unix it is trivial to forge mail. The easiest way this is done is by | |
| connecting to the SMTP port and pretending to be a foreign mailer program. | |
| Some systems will crash if you issue the command "eval `\!\!`" from within the | |
| C shell (/bin/csh). | |
| When searching for data, do not forget to look for possible un-mounted file | |
| systems. [eg: Look for disk partitions that are unaccounted for.] | |
| Other things to try are illegal system calls and system calls with | |
| illegal (strange?) arguments. A good example is the fchown system call | |
| under 4.3-Tahoe Release from Berkeley. If you give it a negative | |
| number for the group argument it grants permission for you to change | |
| the ownership of any file. Another example (on many systems) is the | |
| "access" system call used by many, many programs. Its problem is that | |
| is only checks permissions on the requested file and neglects to check | |
| the permissions of links and directories that lead to the file. I have | |
| seen some systems that allow any user to use the chroot system call; | |
| this is VERY foolish since all I have to do in construct my own | |
| sub-environment (with my own configuration files) and execute certain | |
| commands from within it. | |
| Yet another thing to look for are system structures stored in user accessible | |
| memory. These structures can be modified to suit your purposes. | |
| Look for sloppy permission/ownership on system directories and on system | |
| configuration files. These can allow you to modify and/or control many aspects | |
| of system behavior. Here are a few files to look out for: | |
| "/etc/rc", | |
| "/etc/passwd", "/etc/group", "/etc/profile", | |
| "/usr/lib/crontab" or | |
| "/usr/spool/cron/crontabs/*". | |
| Hint: AT&T 3b1 systems are notorious for this problem. | |
| If the system you are hacking has readable system logfiles and it logs failed | |
| login attempts, a possible leak might be if a user had accidentally typed their | |
| password at the login prompt. You should scan through these logs looking to | |
| strange and nonexistent account names and use these as the password for users | |
| that logged in around that time (the command "last" will list the login time of | |
| users). | |
| Check to see if the system has source code on-line. There is nothing more | |
| useful then having system source code on-line for browsing. | |
| Look for source code (normally found in the directory /usr/src) and scan it | |
| for programming errors (or download it so you spend less time on the | |
| system). | |
| Look for other people's back doors. If you can find any, they can make your | |
| life a bit easier. | |
| Check to see if the system has a good auditing system. If so, run it since it | |
| may find a few security problems for you. | |
| Look for setuid shell scripts that may be on the system. There is no | |
| way way to secure a setuid shell script under the current release of | |
| BSDish Unixes in the current market. The command "find / -perm -6000 -ls" | |
| will print out all setuid and setgid files on a system. Look | |
| through this list for setuid shell scripts. One way in defeating a | |
| setuid script is to make a link named "-i" to the file, then execute | |
| the link. Another way is to send it a signal at the right moment | |
| during its start up. The simplest way do this is to write a quick C program tha | |
| t sets a block on the signal, then sends | |
| itself the signal, and then execs a setuid script. (Note: The signal | |
| will not be processed because of the block, thus leaving it for the | |
| setuid script). Either of these bugs should give you an interactive | |
| shell running as the userid of the setuid script. | |
| If you are familiar with programming with assemblers/dissemblers, you can look | |
| for bugs and/or modify existing software to suit your needs since most | |
| installations do not strip debugging symbols from system binaries and leave the | |
| executables readable. There is an enormous amount of hacking information that | |
| can be learned this way. | |
| Under UNIX-V7 & 4.1BSD, programs that were setgid were only a security problem | |
| because if you were able to get them to dump a core file, the core would be | |
| owned by you and setgid to the groupid of the program that generated it. Since | |
| you owned this file, you could copy a shell of a command script into it and | |
| have it run as the groupid of the file. This will allow you access to to any | |
| file that is owned by the group. | |
| If the system you are hacking supports bidirectional modems, it is possible to | |
| use them for stealing passwords. This can be done by using tip to connect to | |
| the modem and then waiting for a user to call. When a user calls in, you | |
| simply answer the phone and simulate the login process. Once the user has | |
| surrendered their password, you simulate line noise and hang up. | |
| The Unix login program (the program that prompts you for the account name and | |
| password) is tricky in the way that the error message for bad accounts and bad | |
| passwords are the same. This is to stop account/password guessing. I guess it | |
| works if your only access to a system is either a terminal line or a modem | |
| connection. If you have access through a LAN you can check account names with | |
| the finger command. This neat little Unix goodie will give you all sorts of | |
| information about people's accounts. If the finger utility is turned off, | |
| there is another way through a program called ftp. The ftp (File Transfer | |
| Program) command can be used to confirm the existence of a user account/bad | |
| password selection. I have also noted that the ftp command does not do as much | |
| logging, thus repeated bad password guesses not logged as much via ftp. | |
| [See next section also.] | |
| If the Unix system you wish to crack is networked via UUCP or TCP/IP, it should | |
| be fairly simple to extract the password file from the remote system using the | |
| ftp utility. Once you have a copy of the password file, you can simply back | |
| away from the system (thus reducing the chances of getting caught!). | |
| See Phrack Inc. Issue 22, File 6 -- "Yet Another File On Hacking Unix by | |
| >Unknown User<" for a slow but effective password grinder. | |
| Another network based attack involves tapping in on the LAN (Local Area | |
| Network) and listening for people's passwords since most systems transmit them | |
| in clear text. | |
| On systems that disable account logins after N number of bad logins, it is | |
| sometimes useful to use the feature to lock out staff members from logging in | |
| thus giving you [the cracker] more time to clean up after yourself and escape. | |
| Here are a few bugs in the su (set userid) command that may come in handy: | |
| The first was that the "-c" option did not check to see if the user being su'ed | |
| to had a valid shell. The "-c" option is used to instruct the su command to | |
| run another command instead of a shell [eg: "su davis -c foobar" tells su to | |
| run foobar instead of davis's default shell]. This comes in handy with | |
| accounts like "sync::0:1::/:/bin/sync" because you can execute any arbitrary | |
| command [eg: su sync -c /bin/csh]. | |
| Another bug in the su command exists in some System V ports where if su was | |
| unable to open the password file ("etc/passwd"), it would grant root access | |
| (without checking the reason for the failure). I guess the programming can | |
| tell that something is wrong and grants access so someone can fix things. The | |
| security problem occurs when when su is executed with a full file descriptor | |
| table; this will force su to fail its open request on the password file. | |
| Some Unix system's mkdir (MaKe DIRectory) command can be subverted into aiding | |
| you in gaining root. This is done by exploiting a race condition that can | |
| occur between processes. The following command script will eventually cause | |
| the error to occur and cause the password file to be owned by you: | |
| while : ; do | |
| nice -10 (mkdir a;rm -fr a) & | |
| (rm -fr a; ln /etc/passwd a) & | |
| done | |
| The race condition happens when the "ln" command runs while the mkdir command | |
| is in the middle of running. This works because the mkdir does its job by | |
| doing the two system calls: mknod and then chown. If the now inode (allocated | |
| by mknod) is replaced with a link to the password file before the chown system | |
| call is made, then the password file is "chown"ed instead. To become root from | |
| here, all you have to do is add a new entry into the password file. | |
| The print command ("lpr" or "lp") has an option to delete a file after it is | |
| printed. This option will work (print & delete the file) even if you do not | |
| own the file. | |
| The mail command has the option to save your mail after you read to another | |
| file. Some versions of this command will save (append) your mail to a file | |
| after it is read. A bug exists where the mail program does not check to see if | |
| you have write permission to the file you are saving the mail to, thus allowing | |
| you to (for example) add new accounts to the password file. | |
| A quick word on the crypt command (and vi -x since it uses the crypt command): | |
| The algorithm used is not hard to break (it takes about twenty minutes to | |
| decrypt a file with the right tools). See the "Bell Systems Technical | |
| journal," Vol. 63, 8, part 2 for more information. | |
| If the UUCP configuration files are readable [default on many systems], you can | |
| obtain the login names, passwords, and phone numbers to all of the mail links | |
| to and from the system you are hacking. With the use of the a public domain | |
| program, "uupc", you can make the connections yourself and intercept and/or | |
| filter all incoming mail. | |
| There are so many ways to crack Unix just through UUCP that I am not going to | |
| expand and list the many ways and their permutations. Instead, I am going to | |
| save them for an article to be done at some random time in the future. | |
| If you are hacking on a system that supports sharable memory you may be able to | |
| access these memory segments. On Sun systems, there is a command called ipcs. | |
| This command lists available sharable memory segments. If this command does | |
| not exist (nor has a equivalent command available), you may have to either | |
| write one or use blind exploration. Once you have identified these segments, | |
| you can gain control to the data contained therein and/or other programs | |
| utilizing the data contained within. | |
| If you are caught: Grasp the bottle of "Wild Turkey" (the one near your | |
| terminal) and drink it. | |
| =============================================================== | |