⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 553.htm

📁 unix高级编程原吗
💻 HTM
字号:
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<title>CTerm非常精华下载</title>
</head>
<body bgcolor="#FFFFFF">
<table border="0" width="100%" cellspacing="0" cellpadding="0" height="577">
<tr><td width="32%" rowspan="3" height="123"><img src="DDl_back.jpg" width="300" height="129" alt="DDl_back.jpg"></td><td width="30%" background="DDl_back2.jpg" height="35"><p align="center"><a href="http://apue.dhs.org"><font face="黑体"><big><big>apue</big></big></font></a></td></tr>
<tr>
<td width="68%" background="DDl_back2.jpg" height="44"><big><big><font face="黑体"><p align="center">               ● UNIX网络编程                       (BM: clown)                </font></big></big></td></tr>
<tr>
<td width="68%" height="44" bgcolor="#000000"><font face="黑体"><big><big><p   align="center"></big></big><a href="http://cterm.163.net"><img src="banner.gif" width="400" height="60" alt="banner.gif"border="0"></a></font></td>
</tr>
<tr><td width="100%" colspan="2" height="100" align="center" valign="top"><br><p align="center">[<a href="index.htm">回到开始</a>][<a href="15.htm">上一层</a>][<a href="554.htm">下一篇</a>]
<hr><p align="left"><small>发信人: cloudsky (小四), 信区: Security <br>

标  题: RPC/XDR/NFS系列之----rpcinfo利用 <br>

发信站: 武汉白云黄鹤站 (Wed Feb 23 17:15:02 2000), 站内信件 <br>

标题:RPC/XDR/NFS系列之----rpcinfo利用 <br>

原 作:(C) 1996 Jake V. Bouvrie <br>

来 源:http://packetstorm.securify.com/archives.shtml <br>

概述: <br>

    前面我们提到完全可以编写shell script调用rpcinfo进行 <br>

    rpc scan,这个程序不过是C程序版而已。虽然没有什么技 <br>

    术新意,但有这么个工具还是不错的。原程序中有点小毛 <br>

    病,已经修正过来,太简单,都懒得加注释。 <br>

测试: <br>

    RedHat6.0 <br>

程序: <br>

/* <br>

 *  rpcscan - An rpc port scanner. <br>

 *  Usage: rpcscan <startingIP> <endingIP> <br>

 *      where endingIP >= startingIP <br>

 *  (c) 1996 Swarthy <br>

 *      Latest revision: 11.10.96 <br>

 */ <br>

#include <sys/wait.h> <br>

#include <sys/types.h> <br>



#include <unistd.h> <br>

#include <malloc.h> <br>

#include <stdio.h> <br>

#include <stdlib.h> <br>

#define MAX_IP_LEN 15  /* xxx.xxx.xxx.xxx 长度15个字节 */ <br>

struct ipoctet <br>

{ <br>

    char a[4]; <br>

    char b[4]; <br>

    char c[4]; <br>

    char d[4]; <br>

}; <br>

struct ipocteti <br>

{ <br>

    int a; <br>

    int b; <br>

    int c; <br>

    int d; <br>

}; <br>

int main ( int argc, char * argv[] ) <br>

{ <br>

    int     i, j, a, b, c, d; <br>



    pid_t   pid; <br>

    char *  arg; <br>

    struct ipoctet  *ipstart, *ipend; <br>

    struct ipocteti  ipstarti, ipendi; <br>

    /* 简单地检查一下命令行参数是否合法 */ <br>

    if ( argv[1] == NULL || argv[2] == NULL || ( strlen( argv[1] ) > MAX_IP_ <br>

LEN <br>

) <br>

         || ( strlen( argv[2] ) > MAX_IP_LEN ) ) <br>

    { <br>

        fprintf( stderr, "Usage: %s <startingIP> <endingIP>\n", argv[0] ); <br>

        exit( -1 ); <br>

    } <br>

    /* 初始化 */ <br>

    i       = 0; <br>

    j       = 0; <br>

    ipstart = ( struct ipoctet * )malloc( sizeof( struct ipoctet ) ); <br>

    ipend   = ( struct ipoctet * )malloc( sizeof( struct ipoctet ) ); <br>

    while ( argv[1][i] != '.' ) <br>

    { <br>

        ipstart->a[ j++ ] = argv[1][ i++ ]; <br>

    } <br>

    } <br>

    ipstart->a[j] = '\0'; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[1][i] != '.' ) <br>

    { <br>

        ipstart->b[ j++ ] = argv[1][ i++ ]; <br>

    } <br>

    ipstart->b[j] = '\0'; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[1][i] != '.' ) <br>

    { <br>

        ipstart->c[ j++ ] = argv[1][ i++ ]; <br>

    } <br>

    ipstart->c[j] = '\0'; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[1][i] != '\0' ) <br>

    { <br>

        ipstart->d[ j++ ] = argv[1][ i++ ]; <br>

    } <br>

    ipstart->d[j] = '\0'; <br>



    i = 0; <br>

    j = 0; <br>

    while ( argv[2][i] != '.' ) <br>

    { <br>

        ipend->a[ j++ ] = argv[2][ i++ ]; <br>

    } <br>

    ipend->a[j] = '\0'; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[2][i] != '.' ) <br>

    { <br>

        ipend->b[ j++ ] = argv[2][ i++ ]; <br>

    } <br>

    ipend->b[j] = '\0'; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[2][i] != '.' ) <br>

    { <br>

        ipend->c[ j++ ] = argv[2][ i++ ]; <br>

    } <br>

    ipend->c[j] = '\0'; <br>

    j = 0; <br>

    j = 0; <br>

    i++; <br>

    while ( argv[2][i] != '\0' ) <br>

    { <br>

        ipend->d[ j++ ] = argv[2][ i++ ]; <br>

    } <br>

    ipend->d[j] = '\0'; <br>

    /* Convert to integer values and store in struct */ <br>

    if ( ipstart->a != NULL ) <br>

    { <br>

        ipstarti.a = atoi( ipstart->a ); <br>

    } <br>

    if ( ipstart->b != NULL ) <br>

    { <br>

        ipstarti.b = atoi( ipstart->b ); <br>

    } <br>

    if ( ipstart->c != NULL ) <br>

    { <br>

        ipstarti.c = atoi( ipstart->c ); <br>

    } <br>

    if ( ipstart->d != NULL ) <br>

    { <br>

        ipstarti.d = atoi( ipstart->d ); <br>



    } <br>

    if ( ipend->a != NULL ) <br>

    { <br>

        ipendi.a = atoi( ipend->a ); <br>

    } <br>

    if ( ipend->b != NULL ) <br>

    { <br>

        ipendi.b = atoi( ipend->b ); <br>

    } <br>

    if ( ipend->c != NULL ) <br>

    { <br>

        ipendi.c = atoi( ipend->c ); <br>

    } <br>

    if ( ipend->d != NULL ) <br>

    { <br>

        ipendi.d = atoi( ipend->d ); <br>

    } <br>

    free( ipend ); <br>

    free( ipstart ); <br>

    fprintf( stderr, "[ Scanning from %d.%d.%d.%d --> %d.%d.%d.%d ]\n", <br>

             ipstarti.a, ipstarti.b, ipstarti.c, ipstarti.d, <br>

             ipendi.a, ipendi.b, ipendi.c, ipendi.d ); <br>



    for ( a = ipstarti.a; a <= ipendi.a; a++ ) <br>

    { <br>

        for ( b = ipstarti.b; b <= ipendi.b; b++ ) <br>

        { <br>

            for ( c = ipstarti.c; c <= ipendi.c; c++ ) <br>

            { <br>

                for ( d = ipstarti.d; d <= ipendi.d; d++ ) <br>

                { <br>

                    arg = ( char * )malloc( 17 ); <br>

                    sprintf( arg, "%d.%d.%d.%d", a, b, c, d ); <br>

                    fprintf( stderr, "[ /usr/sbin/rpcinfo -p %s ]\n", arg ); <br>

  <br>

                    /* fprintf( stderr, "[ rpcinfo -p %s ]\n", arg ); */ <br>

                    pid = fork(); <br>

                    if ( pid == 0 )  /* 子进程 */ <br>

                    { <br>

                        execl( "/usr/sbin/rpcinfo", "/usr/sbin/rpcinfo", "-p <br>

", a <br>

rg, NULL ); <br>

                        /* execlp( "rpcinfo", "rpcinfo", "-p", arg, NULL ); <br>

*/ <br>

                        exit( 0 ); <br>



                    } <br>

                    waitpid( pid, NULL, 0 ); <br>

                    free( arg ); <br>

                } <br>

            } <br>

        } <br>

    } <br>

    return( 0 ); <br>

}  /* end of main */ <br>

[scz@ /home/scz/src/rpc]> gcc -pipe -O3 -o rpcscan rpcscan.c <br>

[scz@ /home/scz/src/rpc]> strip rpcscan <br>

[scz@ /home/scz/src/rpc]> ./rpcscan 192.168.67.107 192.168.67.108 <br>

[ Scanning from 192.168.67.107 --> 192.168.67.108 ] <br>

[ /usr/sbin/rpcinfo -p 192.168.67.107 ] <br>

   program vers proto   port <br>

   ... ... <br>

[scz@ /home/scz/src/rpc]> <br>

这些信息的获得对于发起RPC远程攻击相当重要,在本系列的后面我们会 <br>

给出针对特定RPC Server的扫描程序。事实上这个程序适当修改后也可以 <br>

针对特定RPC Server进行扫描,需要利用grep或者sed这种程序,但效率 <br>

未免太低,还是等等,看我们后面提供的程序吧。 <br>

注意到这个程序实际上可以用来针对一段IP地址执行同一个网络命令, <br>



只需要简单修改就可以进行showmount -e扫描,调用ping、land、igmp <br>

等等进行大范围网络攻击。当然,你在做这些动作的同时暴露了自己, <br>

建议不要玩这种低级游戏。 <br>

scz < mailto: cloudsky@263.net > <br>

2000.02.23 11:29 (待续) <br>

-- <br>

            我问飘逝的风:来迟了? <br>

            风感慨:是的,他们已经宣战。 <br>

            我问苏醒的大地:还有希望么? <br>

            大地揉了揉眼睛:还有,还有无数代的少年。 <br>

            我问长空中的英魂:你们相信? <br>

            英魂带着笑意离去:相信,希望还在。 <br>

</small><hr>
<p align="center">[<a href="index.htm">回到开始</a>][<a href="15.htm">上一层</a>][<a href="554.htm">下一篇</a>]
<p align="center"><a href="http://cterm.163.net">欢迎访问Cterm主页</a></p>
</table>
</body>
</html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -