.oO Phrack 50 Oo. Volume Seven, Issue Fifty 3 of 16 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== ------------------------------------------------------------------------------ ----<>---- =--=--=--=--=--=--=--= Portable BBS Hacking by: Khelbin =--=--=--=--=--=--=--= This hack basically has little to do with the BBS software itself but with the archiver which is being used. I've used this technique on a mock Renegade setup and with pkzip/pkunzip as the archiver. I'm sure that this same type of technique will be successful on many other BBS platforms and with other archivers as well. While explaining this, I will use Renegade and pkzip/pkunzip as my example. A Renegade setup is most likely vulnerable if it will pkunzip any user supplied zipfile. This is because Renegade's default command to unzip files is "pkunzip -do ". The -d flag unzips the file retaining any directories which were included into the zip file and the -o flag will automatically overwrite any file. Suppose the remote system is also setup in a normal Renegade fashion. Let's use this file tree as an example: C:\RENEGADE\ C:\RENEGADE\TEMP\ C:\RENEGADE\DATA\ The other subdirectories are unimportant for our discussion. Suppose that C:\TEMP is where our uploaded file will go for it to be unzipped and then scanned for viruses. C:\RENEGADE\DATA\ is where the USERS.DAT file is stored, containing all the users login information. Wouldn't it be nice if we could put our own USERS.DAT in there instead? To do this, you must first generate a USERS.DAT file. This is easy enough. Just download a copy of Renegade which is the same version as the target machine and then use the user editor to make a "SYSOP" account with the password "SYSOP" (this should be the default anyway on the USERS.DAT file). Here's how we prepare the zipfile on our own machine: C:\>md tmp C:\>md c:\tmp\ddsdata C:\>copy c:\renegade\data\users.dat c:\tmp\ddsdata C:\>cd tmp C:\TMP>pkzip -pr evil.zip Now we get out our trusty hex editor and edit evil.zip. Change every occurrence of "ddsdata" in evil.zip to read "../data" and make sure that the slash is a forward-slash and not a back-slash. Now when you upload evil.zip to this particular BBS, it will expand to "../data/users.dat" and your USERS.DAT file will overwrite their USERS.DAT file since the -od flag is default on Renegade. Now you can login as SYSOP with a password SYSOP and do as you please. You could also overwrite virtually any file on a BBS like this and believe me, many do have this vulnerability or something very close to it. You are only limited in how much you can traverse up and down directories by DOS's maximum file length of 12 (8 plus "." plus 3 = 12). I quickly tried inserting a few blocks into the zipfile in order to produce a limitless amount of traversing which but it seemed to corrupt the file for some reason. Removing the -o flag is not a fix for this bug. Without the -o flag, you can "hang" the system in a denial of service attack. By again hex editing the names of the files within your evil.zip, you can make it have two files with the same name. When it tries to unzip the second file, it will prompt locally whether to overwrite the file or not and "hang" the board. Instead, the -d flag is what should be removed. This is just an example as I'm sure many other BBS systems do this same type of uncompressing. I'd also bet that arj, lha, and several others, can also be hex edited and yield similar results. Either way, it's either take out the "restore/create directories within archive" option or pay the price. ----<>---- German Hacker "Luzifer" convicted by SevenUp / sec@sec.de ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SYNOPSIS ======== On February 5th, 1997, Wilfried Hafner aka "Luzifer" was sentenced to three years incarceration - no parole, no probation. I've got the story for you right from the courtroom in Munich, Germany. This is one of the first ever cases in which a hacker in Germany actually gets convicted, so it's particularly interesting. (Although the court and I use the term "hacking", this is actually a case of unethical electronic fraud.) LUZIFER ======= Wilfried Hafner (Luzifer) was born on April 6, 1972, in Breschau Italy. According to his own circulum vitae, which he quoted in court himself, he's been a pretty smart guy: He started programming at 8 years,and cracked about 600 Commodore programs, at 14, got a modem and then started a BBS. In 1990 he was blueboxing to some overseas partylines to communicate with others. But he didn't seem to use any other "elite" chat systems like x.25 or IRC, so most people (including myself) didn't know him that well. In 1992 he moved to South Germany to goto school. WHAT HE DID =========== Luzifer set up some overseas partylines in the Dominican Republic, Indonesia, The Philippines, and Israel. Some lines included live chat, but most were just sex recordings. Then he used a local company PBX (a Siemens Hicom 200 model), from his homeline, which was only "protected" by a one digit code, to dialout to his partylines and his girlfriend in Chile. He also was blueboxing (which the prosecution calls "C5-hacking") from five lines simultaneously, mostly via China. To trick the partyline provider and overseas telcos (who are aware of computer-generated calls) he wrote a little program that would randomize aspects of the calls (different calling intervals and different durations for the calls). He got arrested the first time on 03/29/95, but was released again after 13 days. Unfortunately he restarted the phreaking right away. If he'd had stopped then, he would just have gotten 1 year probation. However, he was arrested again in January 1996, and has been in prison since. Here are some numbers (shouts to Harper(tm)'s Index): - Number of logged single phone connections: 18393 - Profit he makes for 1 min. partyline calls: US$ 0.35 - 0.50 - Total Damage (= lost profit of telco): US$ 1.15 Million - Money that Luzifer got from the partylines: US$ 254,000 - Paragraph in German Law that covers this fraud: 263a StG - Duration of all calls, if made sequentially: 140 days THE TRIAL ========= This trial was far less spectacular than OJ's. While 7 days had been scheduled, the trial was over after the second day. The first day went quite quick: The court didn't have enough judges available (two were present, but three required), so it had to be postponed after some minutes. At the second day, both, the prosecution and Luzifers two lawyers, made a deal and plead guilty for three years prison (but no financial punitive). In Germany, all sentences over two years cannot be carried out on probation. But he has been allowed the use of a notebook computer. Rumor has it that he might be get an "open" execution, meaning that he has to sleep in the prison at night, but can work or study during the day. The deal looked like the prosecution dropped all counts (including the one abusing the PBX in the first place) but two: one for the blueboxing before getting arrested, and one count for blueboxing afterwards. They don't treat all 18393 connections as a separate count, but just each start of the "auto-call-program". QUOTES ====== Here are some interesting and funny quotes from the trial: "Just for fun and technical curiosity" - Defendant "Wouldn't one line be enough for technical experience"? - Judge "I ordered 21 lines, but just got 5" - Defendant "Lots of criminal energy" - Prosecutor "He's obsessed and primarily competing with other hackers" - Lawyer "A generation of run down computer kids" - Prosecutor "He may keep the touchtone dialer, but we cannot return his laser fax, because the company's PBX number is stored in its speedial" - Prosecutor "Myself and the Telekom have learned a lot" - Prosecutor "New cables must be installed, new satelites have to be shot into the air" - Prosecutor about the consequences of used up trunks and intl. lines "The German Telekom is distributing pornography with big profits" - Lawyer ----<>---- Yet another Lin(s)ux bug! By: Xarthon IP_MASQ is a commonly used new method of traffic forwarding which may be enabled in newer Linux kernel versions. I have been doing some research into this new feature. IP_MASQ fails to check to make sure that a packet is in the non routable range. If you are able to get any packet to its destination, the header of that packet is rewritten. Because of the lack of non-routable ip checking, the same tactics that would be used a gateway machine, may also be used on a machine that uses ip_masq. So in conclusion, you are able to spoof as if you are on the inside network, from the outside. But hey, what can you expect from Linux? ----<>---- 11.22.96 daemon9 and w0zz's adventure into warez-pup land... *W|ZaRD* u there? -> *W|ZaRD* yes? d9 hi w0zz *W|ZaRD* r u the prez of BREED? *** |COBRA| invites you to channel #supreme I am hungry -> *W|ZaRD* yup *_e|f_* hi there - you got a minute? *W|ZaRD* alright.. i got a question for u... *** d9 (plugHead@onyx.infonexus.com) has joined channel #supreme *** Topic for #supreme: [SpR] Still in discussion phase! [SpR] *** #supreme _e|f_ 848703589 *** Users on #supreme: d9 @{Imagine} @BL|ZZaRD @W|ZaRD @|COBRA| @_e|f_ <_e|f_> re d9 *** Mode change "+o d9" on channel #supreme by _e|f_ <|COBRA|> today is going to be a bad day :( *W|ZaRD* would you be interested in merging with like 4-6 other groups to become 1 group.?? *W|ZaRD* i mean. all the other groups have like 11 sitez and 8-10 suppliers like NGP *W|ZaRD* and if we merge we could be up there with Prestige, and Razor <_e|f_:#supreme> hello d9 *W|ZaRD* i mean. all the other groups have like 11 sitez and 8-10 suppliers like NGP -> *W|ZaRD* hmm *** Inviting w0zz to channel #supreme <_e|f_> we got a discussion going on here for big plans for a lot of us "smaller" groups (smaller as compared to razor, prestige etc) :) ah *** Mystic12 (NONE@wheat-53.nb.net) has joined channel #supreme <_e|f_> this is all still in discussion stages hahahaha *** Mode change "+o Mystic12" on channel #supreme by W|ZaRD <_e|f_:#supreme> but would you be interested in a joint venture between a few of us smaller release groups to combine into one large release group - to challenge razor and prestige? w0zz you've been sucked into warez kiddie conspiracies join me where are you? *** Inviting w0zz to channel #supreme *** w0zz (wozz@big.wookie.net) has joined channel #supreme well... *** Mode change "+o w0zz" on channel #supreme by d9 werd <_e|f_> re wozz hi w0zz hi there <_e|f_> i can send u a log to flesh out a few more details if you like i've got mackin' warez hmm sure *w0zz* you recording this for line noise ? *w0zz* ;) -> *w0zz* indeed...;) *w0zz* heh the thing is, I have all this porn I want to unload... yah, i got da mackin porn too but, no good place to distro it... *** ^DRiFTeR^ (~Drifter@203.30.237.48) has joined channel #supreme *** Mode change "+o ^DRiFTeR^" on channel #supreme by _e|f_ <_e|f_> hey drifter I was using this panix account, but all that SYN flooding stopped that cold... <_e|f_> drifter is muh vp :) do you even know what BREED is, route? warez pups? <_e|f_:#supreme> drifter: d9 and wozz are from breed <_e|f_:#supreme> blizzard and wizard are from NGP <^DRiFTeR^:#supreme> k HAHAHAhahahaha I am also from NGP *** Signoff: Mystic12 (Leaving) so is Mystic12 well, looks like it. just wondered if you knew them at all w0zz... you get the new shit I send you? *** Mystic12 (NONE@wheat-53.nb.net) has joined channel #supreme yah <_e|f_:#supreme> sorry mystic - didnt see yew there nope! *** Mode change "+o Mystic12" on channel #supreme by W|ZaRD indexed and everything hahaha i spanked my monkey for hours whee werd. AAAAAHAHAHahahhahaha WOZZ! <_e|f_> brb hmm #supreme Mystic12 H@ NONE@wheat-53.nb.net (CCINC) #supreme ^DRiFTeR^ H@ ~Drifter@203.30.237.48 (ReaLMS oF Da NiTe - HrD) #supreme w0zz H@ wozz@big.wookie.net (w0zz) #supreme d9 H@ plugHead@onyx.infonexus.com (Built Demon Tough) #supreme {Imagine} H@ BOB@199.190.110.99 (.:tORn f#E?h:. v1.45 by SLaG) #supreme BL|ZZaRD H@ blizzard@ip222.tol.primenet.com (hehe) #supreme W|ZaRD H@ m3ntal@ip201.tol.primenet.com (M3NTaL) #supreme |COBRA| H@ cobra@slbri3p24.ozemail.com.au (100% ReVpOwEr) #supreme _e|f_ H@ _e|f_@203.26.197.12 (blah) werd *** Mode change "-ooo _e|f_ |COBRA| W|ZaRD" on channel #supreme by d9 *** Mode change "-ooo BL|ZZaRD w0zz ^DRiFTeR^" on channel #supreme by d9 *** Mode change "-o Mystic12" on channel #supreme by d9 hehe *** Mode change "+o w0zz" on channel #supreme by d9 <_e|f_> sigh what would the new group name be.. if this happened? the new name? hmm. nice takeover hehe werd w0zz, what do you think? new group name <_e|f_> d9: ops plz r00t? guild? wait <_e|f_> this is only a temp channel neway d9 guild wuz already used those are taken... <_e|f_> so its a waste to do a takeover i like r00t oh yeah those guys are eleet yah I hear r00t has this 10 year old that can break into .mil sites... *** d9 is now known as daemon9 duod, he's like D.A.R.Y.L. hehe yah.. <_e|f_> d9: i take it by this yew aint interested? <_e|f_> :\ anyway, bak to pr0n. anywayz.. op me d00d me too must have m0re pr0n *** Mode change "+m" on channel #supreme by daemon9 yes *** w0zz has left channel #supreme more pr0n werd that rooled mega-pr0n porn hehe kiddie-pr0n op me plz wizard, you are fine the way you are. *** w0zz is now known as [w0zzz] *** daemon9 has left channel #supreme *** daemon9 is now known as r0ute hahaha <[w0zzz]> heh that was fun. good way to wake up from a nap ----<>---- Large Packet Attacks (AKA Ping of Death) --------------------------------- [ Introduction ] Recently, the Internet has seen a large surge in denial of service attacks. A denial of service attack in this case is simply an action of some kind that prevents the normal functionality of the network. It denies service. This trend began a few months back with TCP SYN flooding and continues with the "large packet attack". In comparison with SYN flooding, the large packet attack is a much more simple attack in both concept (explained below) and execution (the attack can be carried out by anyone with access to a Windows 95 machine). TCP SYN flooding is more complex in nature and does not exploit a flaw so much as it exploits an implementation weakness. The large packet attack is also much more devastating then TCP SYN flooding. It can quite simply cause a machine to crash, whereas SYN flooding may just deny access to mail or web services of a machine for the duration of the attack. For more information on TCP SYN flooding see Phrack 49, article 13. (NOTE: The large packet attack is somewhat misleadingly referred to as 'Ping of Death` because it is often delivered as a ping packet. Ping is a program that is used to test a machine for reachablity to see if it alive and accepting network requests. Ping also happens to be a convenient way of sending the large packet over to the target.) The large packet attack has caused no end of problems to countless machines across the Internet. Since its discovery, *dozens* of operating system kernels have been found vulnerable, along with many routers, terminal servers, X-terminals, printers, etc. Anything with a TCP/IP stack is in fact, potentially vulnerable. The effects of the attack range from mild to devastating. Some vulnerable machines will hang for a relatively short period time then recover, some hang indefinitely, others dump core (writing a huge file of current memory contents, often followed by a crash), some lose all network connectivity, many rebooted or simply gave up the ghost. [ Relevant IP Basics ] Contrary to popular belief, the problem has nothing to do with the `ping` program. The problem lies in the IP module. More specifically, the problem lies the in the fragmentation/reassembly portion of the IP module. This is portion of the IP protocol where the packets are broken into smaller pieces for transit, and also where they are reassembled for processing. An IP packet has a maximum size constrained by a 16-bit header field (a header is a portion of a packet that contains information about the packet, including where it came from and where it is going). The maximum size of an IP packet is 65,535 (2^16-1) bytes. The IP header itself is usually 20 bytes so this leaves us with 65,515 bytes to stuff our data into. The underlying link layer (the link layer is the network logically under IP, often ethernet) can seldom handle packets this large (ethernet for example, can only handle packets up to 1500 bytes in size). So, in order for the link layer to be able to digest a large packet, the IP module must fragment (break down into smaller pieces) each packet it sends to down to the link layer for transmission on the network. Each individual fragment is a portion of the original packet, with its own header containing information on exactly how the receiving end should put it back together. This putting the individual packets back together is called reassembly. When the receiving end has all of the fragments, it reassembles them into the original IP packet, and then processes it. [ The attack ] The large packet attack is quite simple in concept. A malicious user constructs a large packet and sends it off. If the destination host is vulnerable, something bad happens (see above). The problem lies in the reassembly of these large packets. Recall that we have 65,515 bytes of space in which to stuff data into. As it happens, a few misbehaved applications (and some specially crafted evil ones) will allow one to place slightly more data into the payload (say 65,520 bytes). This, along with a 20 byte IP header, violates the maximum packet size of 65,535 bytes. The IP module will then simply break this oversized packet into fragments and eschew them to their intended destination (target). The receiving host will queue all of the fragments until the last one arrives, then begin the process of reassembly. The problem will surface when the IP module finds that the packet is in fact larger than the maximum allowable size as an internal buffer is overflowed. This is where something bad happens (see above). [ Vulnerability Testing and Patching ] Testing to see if a network device is vulnerable is quite easy. Windows NT and Windows 95 will allow construction of these oversized packets without complaining. Simply type: `ping -l 65508 targethost`. In this case, we are delivering an oversized IP packet inside of a ping packet, which has a header size of 8 bytes. If you add up the totals, 20 bytes of IP header + 8 bytes of ping header + 65,508 bytes of data, you get a 65,536 byte IP packet. This is enough to cause affected systems to have problems. Defense is preventative. The only way to really be safe from this attack is to either ensure your system is patched, or unplug its network tap. There are patches available for just about every vulnerable system. For a copious list of vulnerable systems and patches, check out a 'Ping of Death' webpage near you. daemon9 Editor, Phrack Magazine (daemon9@netcom.com) --------------------------------------------------------------------------- To: route@onyx.infonexus.com From: xxxx xxxxxxxxxxx Subject: Re: ? Status: RO Actually, hang on. I've looked your story up and down looking for ways to make it more interesting and I can't. I think it's actually just too technical for us and lacks a newsworthiness that was evident in the SYN article. I mean, you never tell us why we should care about this, and frankly, I don't know why we should. So, you're welcome to take another pass at it, otherwise, I'll give you the kill fee of $100. xxxx [ Too techinical? Any less techincal and I would have to make everything rhyme so people wouldn't fall asleep. ] --------------------------------------------------------------------------- ----<>---- Netware Insecurities Tonto [the rant] I realize that to most security professionals and system administrators who will see this magazine, the term "NetWare security" is a punchline. That unfortunately does not change the fact that many people in the field, myself included, must deal with it daily. Really, honestly, I do agree with you. Please don't write me to tell me about how futile it is. I already know. Since its release, not much security news has really surfaced surrounding Novell NetWare 4. A lot of the security flaws that were present in 3.1x were 'fixed' in 4.x since Novell pretty much redesigned the way the user/resource database worked, was referenced, and stored. Some flaws remained, although fixes for them are well-known, and easily applied. However, NetWare 4 came with its own batch of new security flaws, and Novell has done a poor job of addressing them, hoping that consumer-end ignorance and the client/server software's proprietary design will hide these holes. You'd figure they would know better by now. The ability to use a packet sniffer to snag RCONSOLE passwords still exists; NetWare 4 institutes client-end authentication to implement its auto-reconnect feature; the list goes on. Below are just a couple of examples of such bugs and how to deal with them. As new Novell products bring many existing LANs out onto the Internet, I think you will see more of this sort of thing coming to the surface. I hope that when it does, Novell decides to take a more responsible role in security support for its products. I'd hate for such a widely used product to become the next HP/UX. [the exploits] [BUG #1] This bug is known to affect NetWare 4.10. It's probably present in 4.01 and other versions that support Directory Services, but I haven't verified this. I'm only a CNA, so I tried to verify this bug by talking to a group of CNEs and nobody had heard of this, although there are apparently other bugs in previous versions of LOGIN.EXE. The bug is a combination of some weak code in LOGIN-4.12 (SYS:\LOGIN\LOGIN.EXE) and a default User object in NDS - the user template USER_TEMPLATE. LOGIN allows input fields to be passed directly, instead of filtered, if they are passed to LOGIN correctly -- by specifying an object's context explicitly (as opposed to implicitly by using CX) and putting the User object's name in quotes. F:\PUBLIC>LOGIN SVR1/"USER_TEMPLATE" For Server object SVR1 in an appropriate context, this would probably work and give a generic level of user access, perhaps to other volumes, programs, etc. That will vary depending on the setup of the server. The fix is simple. Load SYS:\PUBLIC\NWADMIN.EXE and disable the user template's login. But from now on, you will have to manually enable login for any new User objects created in your tree. [BUG #2] This isn't a bug as much as a failed attempt to add security to a DOS file system. But since Novell touts (and teaches) it as a file system security tool, it is worth addressing. NetWare comes with a tool called FLAG, which is supposed to be the NetWare equivalent of UNIX's chmod(), in that it controls file attributes for files on local and NetWare file systems. The problem lies in that Novell thought it would be neat to incorporate its tool into the world of DOS file attributes as well. So they made FLAG alter DOS file attributes automatically to correspond with the new attributes installed by FLAG. This would've been cool, except that DOS's ATTRIB.EXE can also be used to change the DOS-supported file attributes set by FLAG. (Archive, Read-only, Hidden, and System, respectively) And since ATTRIB doesn't reference NDS in any way, the problem is obvious; A file that was marked Read-only by its owner, using FLAG, could be compromised by a user other than its owner, with ATTRIB, and then altered or deleted. There isn't an easy fix for something that is this broken, so it is simply recommended that you use IRFs (carefully) to designate file rights on your server. [ 01-07-97 - Tont0 ] ----<>---- EOF