home *** CD-ROM | disk | FTP | other *** search
Wrap
#include "tcpip.h" extern struct ops o; #ifndef WIN32 /* Globals */ int jumpok = 0; static jmp_buf jmp_env; /* Sig_ALRM handler */ void sig_alarm(int signo) { if (jumpok) longjmp(jmp_env, 1); return; } #endif inline void sethdrinclude(int sd) { #ifdef IP_HDRINCL int one = 1; setsockopt(sd, IPPROTO_IP, IP_HDRINCL, (void *) &one, sizeof(one)); #endif } /* Tests whether a packet sent to IP is LIKELY to route through the kernel localhost interface */ int islocalhost(struct in_addr *addr) { char dev[128]; /* If it is 0.0.0.0 or starts with 127.0.0.1 then it is probably localhost */ if ((addr->s_addr & htonl(0xFF000000)) == htonl(0x7F000000)) return 1; if (!addr->s_addr) return 1; /* If it is the same addy as a local interface, then it is probably localhost */ if (ipaddr2devname(dev, addr) != -1) return 1; /* OK, so to a first approximation, this addy is probably not localhost */ return 0; } /* Calls pcap_open_live and spits out an error (and quits) if the call faile. So a valid pcap_t will always be returned. */ pcap_t *my_pcap_open_live(char *device, int snaplen, int promisc, int to_ms) { char err0r[PCAP_ERRBUF_SIZE]; pcap_t *pt; if (!((pt = pcap_open_live(device, snaplen, promisc, to_ms, err0r)))) { fatal("pcap_open_live: %s\nThere are several possible reasons for this, depending on your operating system:\n" "LINUX: If you are getting Socket type not supported, try modprobe af_packet or recompile your kernel with SOCK_PACKET enabled.\n" "*BSD: If you are getting device not configured, you need to recompile your kernel with Berkeley Packet Filter support. If you are getting No such file or directory, try creating the device (eg cd /dev; MAKEDEV <device>; or use mknod).\n" "SOLARIS: If you are trying to scan localhost and getting '/dev/lo0: No such file or directory', complain to Sun. I don't think Solaris can support advanced localhost scans. You can probably use \"-P0 -sT localhost\" though.\n\n", err0r); } return pt; } /* Standard swiped internet checksum routine */ inline unsigned short in_cksum(unsigned short *ptr,int nbytes) { register int sum; /* XXX assumes long == 32 bits */ u_short oddbyte; register u_short answer; /* assumes u_short == 16 bits */ /* * Our algorithm is simple, using a 32-bit accumulator (sum), * we add sequential 16-bit words to it, and at the end, fold back * all the carry bits from the top 16 bits into the lower 16 bits. */ sum = 0; while (nbytes > 1) { sum += *ptr++; nbytes -= 2; } /* mop up an odd byte, if necessary */ if (nbytes == 1) { oddbyte = 0; /* make sure top half is zero */ *((u_char *) &oddbyte) = *(u_char *)ptr; /* one byte only */ sum += oddbyte; } /* * Add back carry outs from top 16 bits to low 16 bits. */ sum = (sum >> 16) + (sum & 0xffff); /* add high-16 to low-16 */ sum += (sum >> 16); /* add carry */ answer = ~sum; /* ones-complement, then truncate to 16 bits */ return(answer); } /* Tries to resolve given hostname and stores result in ip . returns 0 if hostname cannot be resolved */ int resolve(char *hostname, struct in_addr *ip) { struct hostent *h; if (!hostname || !*hostname) fatal("NULL or zero-length hostname passed to resolve()"); if (inet_aton(hostname, ip)) return 1; /* damn, that was easy ;) */ if ((h = gethostbyname(hostname))) { memcpy(ip, h->h_addr_list[0], sizeof(struct in_addr)); return 1; } return 0; } int send_tcp_raw_decoys( int sd, struct in_addr *victim, unsigned short sport, unsigned short dport, unsigned int seq, unsigned int ack, unsigned char flags, unsigned short window, char *options, int optlen, char *data, unsigned short datalen) { int decoy; for(decoy = 0; decoy < o.numdecoys; decoy++) if (send_tcp_raw(sd, &o.decoys[decoy], victim, sport, dport, seq, ack, flags, window, options, optlen, data, datalen) == -1) return -1; return 0; } int send_tcp_raw( int sd, struct in_addr *source, struct in_addr *victim, unsigned short sport, unsigned short dport, unsigned int seq, unsigned int ack, unsigned char flags, unsigned short window, char *options, int optlen, char *data, unsigned short datalen) { struct pseudo_header { /*for computing TCP checksum, see TCP/IP Illustrated p. 145 */ unsigned int s_addy; unsigned int d_addr; char zer0; unsigned char protocol; unsigned short length; }; char *packet = safe_malloc(sizeof(struct ip) + sizeof(struct tcphdr) + optlen + datalen); struct ip *ip = (struct ip *) packet; struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct ip)); struct pseudo_header *pseudo = (struct pseudo_header *) (packet + sizeof(struct ip) - sizeof(struct pseudo_header)); static int myttl = 0; /*With these placement we get data and some field alignment so we aren't wasting too much in computing the checksum */ int res = -1; struct sockaddr_in sock; char myname[MAXHOSTNAMELEN + 1]; struct hostent *myhostent = NULL; int source_malloced = 0; /* check that required fields are there and not too silly */ /* We used to check that sport and dport were nonzer0, but scr3w that! */ if ( !victim || sd < 0) { fprintf(stderr, "send_tcp_raw: One or more of your parameters suck!\n"); free(packet); return -1; } if (optlen % 4) { fatal("send_tcp_raw called with an option length argument of %d which is illegal because it is not divisible by 4", optlen); } if (!myttl) myttl = (get_random_uint() % 23) + 37; /* It was a tough decision whether to do this here for every packet or let the calling function deal with it. In the end I grudgingly decided to do it here and potentially waste a couple microseconds... */ sethdrinclude(sd); /* if they didn't give a source address, fill in our first address */ if (!source) { source_malloced = 1; source = safe_malloc(sizeof(struct in_addr)); if (gethostname(myname, MAXHOSTNAMELEN) || !(myhostent = gethostbyname(myname))) fatal("Cannot get hostname! Try using -S <my_IP_address> or -e <interface to scan through>\n"); memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); #if ( TCPIP_DEBUGGING ) printf("We skillfully deduced that your address is %s\n", inet_ntoa(*source)); #endif } /*do we even have to fill out this damn thing? This is a raw packet, after all */ sock.sin_family = AF_INET; sock.sin_port = htons(dport); sock.sin_addr.s_addr = victim->s_addr; bzero((char *) packet, sizeof(struct ip) + sizeof(struct tcphdr)); pseudo->s_addy = source->s_addr; pseudo->d_addr = victim->s_addr; pseudo->protocol = IPPROTO_TCP; pseudo->length = htons(sizeof(struct tcphdr) + optlen + datalen); tcp->th_sport = htons(sport); tcp->th_dport = htons(dport); if (seq) { tcp->th_seq = htonl(seq); } else if (flags & TH_SYN) { get_random_bytes(&(tcp->th_seq), 4); } if (ack) tcp->th_ack = htonl(ack); /*else if (flags & TH_ACK) tcp->th_ack = rand() + rand();*/ tcp->th_off = 5 + (optlen /4) /*words*/; tcp->th_flags = flags; if (window) tcp->th_win = htons(window); else tcp->th_win = htons(1024 * (myttl % 4 + 1)); /* Who cares */ /* We should probably copy the data over too */ if (data && datalen) memcpy(packet + sizeof(struct ip) + sizeof(struct tcphdr) + optlen, data, datalen); /* And the options */ if (optlen) { memcpy(packet + sizeof(struct ip) + sizeof(struct tcphdr), options, optlen); } #if STUPID_SOLARIS_CHECKSUM_BUG tcp->th_sum = sizeof(struct tcphdr) + optlen + datalen; #else tcp->th_sum = in_cksum((unsigned short *)pseudo, sizeof(struct tcphdr) + optlen + sizeof(struct pseudo_header) + datalen); #endif /* Now for the ip header */ bzero(packet, sizeof(struct ip)); ip->ip_v = 4; ip->ip_hl = 5; ip->ip_len = BSDFIX(sizeof(struct ip) + sizeof(struct tcphdr) + optlen + datalen); get_random_bytes(&(ip->ip_id), 2); ip->ip_ttl = myttl; ip->ip_p = IPPROTO_TCP; ip->ip_src.s_addr = source->s_addr; ip->ip_dst.s_addr= victim->s_addr; #if HAVE_IP_IP_SUM ip->ip_sum = in_cksum((unsigned short *)ip, sizeof(struct ip)); #endif if (TCPIP_DEBUGGING > 1) { log_write(LOG_STDOUT, "Raw TCP packet creation completed! Here it is:\n"); readtcppacket(packet,BSDUFIX(ip->ip_len)); } res = Sendto("send_tcp_raw", sd, packet, BSDUFIX(ip->ip_len), 0, (struct sockaddr *)&sock, (int)sizeof(struct sockaddr_in)); if (source_malloced) free(source); free(packet); return res; } inline int Sendto(char *functionname, int sd, char *packet, int len, unsigned int flags, struct sockaddr *to, int tolen) { struct sockaddr_in *sin = (struct sockaddr_in *) to; int res; int retries = 0; int sleeptime = 0; do { if (TCPIP_DEBUGGING > 1) { log_write(LOG_STDOUT, "trying sendto(%d, packet, %d, 0, %s, %d)", sd, len, inet_ntoa(sin->sin_addr), tolen); } if ((res = sendto(sd, packet, len, flags, to, tolen)) == -1) { error("sendto in %s: sendto(%d, packet, %d, 0, %s, %d) => %s", functionname, sd, len, inet_ntoa(sin->sin_addr), tolen, strerror(errno)); if (retries > 2 || errno == EPERM) return -1; sleeptime = 15 * (1 << (2 * retries)); error("Sleeping %d seconds then retrying", sleeptime); fflush(stderr); sleep(sleeptime); } retries++; } while( res == -1); if (TCPIP_DEBUGGING > 1) log_write(LOG_STDOUT, "successfully sent %d bytes of raw_tcp!\n", res); return res; } /* A simple function I wrote to help in debugging, shows the important fields of a TCP packet*/ int readtcppacket(char *packet, int readdata) { struct ip *ip = (struct ip *) packet; struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct ip)); char *data = packet + sizeof(struct ip) + sizeof(struct tcphdr); int tot_len; struct in_addr bullshit, bullshit2; char sourcehost[16]; int i; int realfrag = 0; if (!packet) { fprintf(stderr, "readtcppacket: packet is NULL!\n"); return -1; } bullshit.s_addr = ip->ip_src.s_addr; bullshit2.s_addr = ip->ip_dst.s_addr; /* this is gay */ realfrag = BSDFIX(ntohs(ip->ip_off) & 8191 /* 2^13 - 1 */); tot_len = BSDFIX(ip->ip_len); strncpy(sourcehost, inet_ntoa(bullshit), 16); i = 4 * (ntohs(ip->ip_hl) + ntohs(tcp->th_off)); if (ip->ip_p== IPPROTO_TCP) { if (realfrag) printf("Packet is fragmented, offset field: %u\n", realfrag); else { printf("TCP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, ntohs(tcp->th_sport), inet_ntoa(bullshit2), ntohs(tcp->th_dport), tot_len); printf("Flags: "); if (!tcp->th_flags) printf("(none)"); if (tcp->th_flags & TH_RST) printf("RST "); if (tcp->th_flags & TH_SYN) printf("SYN "); if (tcp->th_flags & TH_ACK) printf("ACK "); if (tcp->th_flags & TH_PUSH) printf("PSH "); if (tcp->th_flags & TH_FIN) printf("FIN "); if (tcp->th_flags & TH_URG) printf("URG "); printf("\n"); printf("ttl: %hu ", ip->ip_ttl); if (tcp->th_flags & (TH_SYN | TH_ACK)) printf("Seq: %u\tAck: %u\n", (unsigned int) ntohl(tcp->th_seq), (unsigned int) ntohl(tcp->th_ack)); else if (tcp->th_flags & TH_SYN) printf("Seq: %u\n", (unsigned int) ntohl(tcp->th_seq)); else if (tcp->th_flags & TH_ACK) printf("Ack: %u\n", (unsigned int) ntohl(tcp->th_ack)); } } if (readdata && i < tot_len) { printf("Data portion:\n"); while(i < tot_len) printf("%2X%c", data[i], (++i%16)? ' ' : '\n'); printf("\n"); } return 0; } /* A simple function I wrote to help in debugging, shows the important fields of a UDP packet*/ int readudppacket(char *packet, int readdata) { struct ip *ip = (struct ip *) packet; udphdr_bsd *udp = (udphdr_bsd *) (packet + sizeof(struct ip)); char *data = packet + sizeof(struct ip) + sizeof(udphdr_bsd); int tot_len; struct in_addr bullshit, bullshit2; char sourcehost[16]; int i; int realfrag = 0; if (!packet) { fprintf(stderr, "readudppacket: packet is NULL!\n"); return -1; } bullshit.s_addr = ip->ip_src.s_addr; bullshit2.s_addr = ip->ip_dst.s_addr; /* this is gay */ realfrag = BSDFIX(ntohs(ip->ip_off) & 8191 /* 2^13 - 1 */); tot_len = BSDFIX(ip->ip_len); strncpy(sourcehost, inet_ntoa(bullshit), 16); i = 4 * (ntohs(ip->ip_hl)) + 8; if (ip->ip_p== IPPROTO_UDP) { if (realfrag) printf("Packet is fragmented, offset field: %u\n", realfrag); else { printf("UDP packet: %s:%d -> %s:%d (total: %d bytes)\n", sourcehost, ntohs(udp->uh_sport), inet_ntoa(bullshit2), ntohs(udp->uh_dport), tot_len); printf("ttl: %hu ", ip->ip_ttl); } } if (readdata && i < tot_len) { printf("Data portion:\n"); while(i < tot_len) printf("%2X%c", data[i], (++i%16)? ' ' : '\n'); printf("\n"); } return 0; } int send_udp_raw_decoys( int sd, struct in_addr *victim, unsigned short sport, unsigned short dport, char *data, unsigned short datalen) { int decoy; for(decoy = 0; decoy < o.numdecoys; decoy++) if (send_udp_raw(sd, &o.decoys[decoy], victim, sport, dport, data, datalen) == -1) return -1; return 0; } int send_udp_raw( int sd, struct in_addr *source, struct in_addr *victim, unsigned short sport, unsigned short dport, char *data, unsigned short datalen) { char *packet = safe_malloc(sizeof(struct ip) + sizeof(udphdr_bsd) + datalen); struct ip *ip = (struct ip *) packet; udphdr_bsd *udp = (udphdr_bsd *) (packet + sizeof(struct ip)); static int myttl = 0; int res; struct sockaddr_in sock; char myname[MAXHOSTNAMELEN + 1]; struct hostent *myhostent = NULL; int source_malloced = 0; struct pseudo_udp_hdr { struct in_addr source; struct in_addr dest; char zero; char proto; unsigned short length; } *pseudo = (struct pseudo_udp_hdr *) ((char *)udp - 12) ; /* check that required fields are there and not too silly */ if ( !victim || !sport || !dport || sd < 0) { fprintf(stderr, "send_udp_raw: One or more of your parameters suck!\n"); free(packet); return -1; } if (!myttl) myttl = (get_random_uint() % 23) + 37; /* It was a tough decision whether to do this here for every packet or let the calling function deal with it. In the end I grudgingly decided to do it here and potentially waste a couple microseconds... */ sethdrinclude(sd); /* if they didn't give a source address, fill in our first address */ if (!source) { source_malloced = 1; source = safe_malloc(sizeof(struct in_addr)); if (gethostname(myname, MAXHOSTNAMELEN) || !(myhostent = gethostbyname(myname))) fatal("Cannot get hostname! Try using -S <my_IP_address> or -e <interface to scan through>\n"); memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); #if ( TCPIP_DEBUGGING ) printf("We skillfully deduced that your address is %s\n", inet_ntoa(*source)); #endif } /*do we even have to fill out this damn thing? This is a raw packet, after all */ sock.sin_family = AF_INET; sock.sin_port = htons(dport); sock.sin_addr.s_addr = victim->s_addr; bzero((char *) packet, sizeof(struct ip) + sizeof(udphdr_bsd)); udp->uh_sport = htons(sport); udp->uh_dport = htons(dport); udp->uh_ulen = htons(8 + datalen); /* We should probably copy the data over too */ if (data) memcpy(packet + sizeof(struct ip) + sizeof(udphdr_bsd), data, datalen); /* Now the psuedo header for checksuming */ pseudo->source.s_addr = source->s_addr; pseudo->dest.s_addr = victim->s_addr; pseudo->proto = IPPROTO_UDP; pseudo->length = htons(sizeof(udphdr_bsd) + datalen); /* OK, now we should be able to compute a valid checksum */ #if STUPID_SOLARIS_CHECKSUM_BUG udp->uh_sum = sizeof(struct udphdr) + datalen; #else udp->uh_sum = in_cksum((unsigned short *)pseudo, 20 /* pseudo + UDP headers */ + datalen); #endif /* Goodbye, pseudo header! */ bzero(pseudo, 12); /* Now for the ip header */ ip->ip_v = 4; ip->ip_hl = 5; ip->ip_len = BSDFIX(sizeof(struct ip) + sizeof(udphdr_bsd) + datalen); get_random_bytes(&(ip->ip_id), 2); ip->ip_ttl = myttl; ip->ip_p = IPPROTO_UDP; ip->ip_src.s_addr = source->s_addr; ip->ip_dst.s_addr= victim->s_addr; #if HAVE_IP_IP_SUM ip->ip_sum = in_cksum((unsigned short *)ip, sizeof(struct ip)); #endif if (TCPIP_DEBUGGING > 1) { printf("Raw UDP packet creation completed! Here it is:\n"); readudppacket(packet,1); } res = Sendto("send_udp_raw", sd, packet, BSDUFIX(ip->ip_len), 0, (struct sockaddr *)&sock, (int)sizeof(struct sockaddr_in)); if (source_malloced) free(source); free(packet); return res; } int send_small_fragz_decoys(int sd, struct in_addr *victim, unsigned long seq, int sport, int dport, int flags) { int decoy; for(decoy = 0; decoy < o.numdecoys; decoy++) if (send_small_fragz(sd, &o.decoys[decoy], victim, seq, sport, dport, flags) == -1) return -1; return 0; } /* Much of this is swiped from my send_tcp_raw function above, which doesn't support fragmentation */ int send_small_fragz(int sd, struct in_addr *source, struct in_addr *victim, unsigned long seq, int sport, int dport, int flags) { struct pseudo_header { /*for computing TCP checksum, see TCP/IP Illustrated p. 145 */ unsigned long s_addy; unsigned long d_addr; char zer0; unsigned char protocol; unsigned short length; }; /*In this placement we get data and some field alignment so we aren't wasting too much to compute the TCP checksum.*/ char packet[sizeof(struct ip) + sizeof(struct tcphdr) + 100]; struct ip *ip = (struct ip *) packet; struct tcphdr *tcp = (struct tcphdr *) (packet + sizeof(struct ip)); struct pseudo_header *pseudo = (struct pseudo_header *) (packet + sizeof(struct ip) - sizeof(struct pseudo_header)); char *frag2 = packet + sizeof(struct ip) + 16; struct ip *ip2 = (struct ip *) (frag2 - sizeof(struct ip)); static int myttl = 0; int res; struct sockaddr_in sock; int id; if (!myttl) myttl = (time(NULL) % 14) + 51; /* It was a tough decision whether to do this here for every packet or let the calling function deal with it. In the end I grudgingly decided to do it here and potentially waste a couple microseconds... */ sethdrinclude(sd); /*Why do we have to fill out this damn thing? This is a raw packet, after all */ sock.sin_family = AF_INET; sock.sin_port = htons(dport); sock.sin_addr.s_addr = victim->s_addr; bzero((char *)packet, sizeof(struct ip) + sizeof(struct tcphdr)); pseudo->s_addy = source->s_addr; pseudo->d_addr = victim->s_addr; pseudo->protocol = IPPROTO_TCP; pseudo->length = htons(sizeof(struct tcphdr)); tcp->th_sport = htons(sport); tcp->th_dport = htons(dport); tcp->th_seq = (seq)? htonl(seq) : get_random_uint(); tcp->th_off = 5 /*words*/; tcp->th_flags = flags; tcp->th_win = htons(2048); /* Who cares */ tcp->th_sum = in_cksum((unsigned short *)pseudo, sizeof(struct tcphdr) + sizeof(struct pseudo_header)); /* Now for the ip header of frag1 */ bzero((char *) packet, sizeof(struct ip)); ip->ip_v = 4; ip->ip_hl = 5; /*RFC 791 allows 8 octet frags, but I get "operation not permitted" (EPERM) when I try that. */ ip->ip_len = BSDFIX(sizeof(struct ip) + 16); id = ip->ip_id = get_random_uint(); ip->ip_off = BSDFIX(MORE_FRAGMENTS); ip->ip_ttl = myttl; ip->ip_p = IPPROTO_TCP; ip->ip_src.s_addr = source->s_addr; ip->ip_dst.s_addr = victim->s_addr; #if HAVE_IP_IP_SUM ip->ip_sum= in_cksum((unsigned short *)ip, sizeof(struct ip)); #endif if (o.debugging > 1) { log_write(LOG_STDOUT, "Raw TCP packet fragment #1 creation completed! Here it is:\n"); hdump(packet,20); } if (o.debugging > 1) log_write(LOG_STDOUT, "\nTrying sendto(%d , packet, %d, 0 , %s , %d)\n", sd, ntohs(ip->ip_len), inet_ntoa(*victim), (int) sizeof(struct sockaddr_in)); /* Lets save this and send it AFTER we send the second one, just to be cute ;) */ if ((res = sendto(sd, packet,sizeof(struct ip) + 16 , 0, (struct sockaddr *)&sock, sizeof(struct sockaddr_in))) == -1) { perror("sendto in send_syn_fragz"); return -1; } if (o.debugging > 1) log_write(LOG_STDOUT, "successfully sent %d bytes of raw_tcp!\n", res); /* Create the second fragment */ bzero((char *) ip2, sizeof(struct ip)); ip2->ip_v= 4; ip2->ip_hl = 5; ip2->ip_len = BSDFIX(sizeof(struct ip) + 4); /* the rest of our TCP packet */ ip2->ip_id = id; ip2->ip_off = BSDFIX(2); ip2->ip_ttl = myttl; ip2->ip_p = IPPROTO_TCP; ip2->ip_src.s_addr = source->s_addr; ip2->ip_dst.s_addr = victim->s_addr; #if HAVE_IP_IP_SUM ip2->ip_sum = in_cksum((unsigned short *)ip2, sizeof(struct ip)); #endif if (o.debugging > 1) { log_write(LOG_STDOUT, "Raw TCP packet fragment creation completed! Here it is:\n"); hdump(packet,20); } if (o.debugging > 1) log_write(LOG_STDOUT, "\nTrying sendto(%d , ip2, %d, 0 , %s , %d)\n", sd, ntohs(ip2->ip_len), inet_ntoa(*victim), (int) sizeof(struct sockaddr_in)); if ((res = sendto(sd, (void *)ip2,sizeof(struct ip) + 4 , 0, (struct sockaddr *)&sock, (int) sizeof(struct sockaddr_in))) == -1) { perror("sendto in send_tcp_raw frag #2"); return -1; } return 1; } int send_ip_raw_decoys( int sd, struct in_addr *victim, unsigned char proto, char *data, unsigned short datalen) { int decoy; for(decoy = 0; decoy < o.numdecoys; decoy++) if (send_ip_raw(sd, &o.decoys[decoy], victim, proto, data, datalen) == -1) return -1; return 0; } int send_ip_raw( int sd, struct in_addr *source, struct in_addr *victim, unsigned char proto, char *data, unsigned short datalen) { char *packet = safe_malloc(sizeof(struct ip) + datalen); struct ip *ip = (struct ip *) packet; static int myttl = 0; int res = -1; struct sockaddr_in sock; char myname[MAXHOSTNAMELEN + 1]; struct hostent *myhostent = NULL; int source_malloced = 0; /* check that required fields are there and not too silly */ if ( !victim || sd < 0) { fprintf(stderr, "send_ip_raw: One or more of your parameters suck!\n"); free(packet); return -1; } if (!myttl) myttl = (get_random_uint() % 23) + 37; /* It was a tough decision whether to do this here for every packet or let the calling function deal with it. In the end I grudgingly decided to do it here and potentially waste a couple microseconds... */ sethdrinclude(sd); /* if they didn't give a source address, fill in our first address */ if (!source) { source_malloced = 1; source = safe_malloc(sizeof(struct in_addr)); if (gethostname(myname, MAXHOSTNAMELEN) || !(myhostent = gethostbyname(myname))) fatal("Cannot get hostname! Try using -S <my_IP_address> or -e <interface to scan through>\n"); memcpy(source, myhostent->h_addr_list[0], sizeof(struct in_addr)); #if ( TCPIP_DEBUGGING ) printf("We skillfully deduced that your address is %s\n", inet_ntoa(*source)); #endif } /*do we even have to fill out this damn thing? This is a raw packet, after all */ sock.sin_family = AF_INET; sock.sin_port = 0; sock.sin_addr.s_addr = victim->s_addr; bzero((char *) packet, sizeof(struct ip)); /* Now for the ip header */ ip->ip_v = 4; ip->ip_hl = 5; ip->ip_len = BSDFIX(sizeof(struct ip) + datalen); get_random_bytes(&(ip->ip_id), 2); ip->ip_ttl = myttl; ip->ip_p = proto; ip->ip_src.s_addr = source->s_addr; ip->ip_dst.s_addr= victim->s_addr; #if HAVE_IP_IP_SUM ip->ip_sum = in_cksum((unsigned short *)ip, sizeof(struct ip)); #endif /* We should probably copy the data over too */ if (data) memcpy(packet + sizeof(struct ip), data, datalen); if (TCPIP_DEBUGGING > 1) { printf("Raw IP packet creation completed! Here it is:\n"); hdump(packet, BSDUFIX(ip->ip_len)); } res = Sendto("send_ip_raw", sd, packet, BSDUFIX(ip->ip_len), 0, (struct sockaddr *)&sock, (int)sizeof(struct sockaddr_in)); if (source_malloced) free(source); free(packet); return res; } inline int unblock_socket(int sd) { int options; /*Unblock our socket to prevent recvfrom from blocking forever on certain target ports. */ #ifdef WIN32 #else options = O_NONBLOCK | fcntl(sd, F_GETFL); fcntl(sd, F_SETFL, options); #endif return 1; } /* Get the source address and interface name */ #if 0 char *getsourceif(struct in_addr *src, struct in_addr *dst) { int sd, sd2; unsigned short p1; struct sockaddr_in sock; int socklen = sizeof(struct sockaddr_in); struct sockaddr sa; int sasize = sizeof(struct sockaddr); int ports, res; char buf[65536]; struct timeval tv; unsigned int start; int data_offset, ihl, *intptr; int done = 0; /* Get us some unreserved port numbers */ get_random_bytes(&p1, 2); if (p1 < 5000) p1 += 5000; if (!getuid()) { if ((sd2 = socket(AF_INET, SOCK_PACKET, htons(ETH_P_ALL))) == -1) {perror("Linux Packet Socket troubles"); return 0;} unblock_socket(sd2); if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {perror("Socket troubles"); return 0;} sock.sin_family = AF_INET; sock.sin_addr = *dst; sock.sin_port = htons(p1); if (connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in)) == -1) { perror("UDP connect()"); close(sd); close(sd2); return NULL; } if (getsockname(sd, (SA *)&sock, &socklen) == -1) { perror("getsockname"); close(sd); close(sd2); return NULL; } ports = (ntohs(sock.sin_port) << 16) + p1; #if ( TCPIP_DEBUGGING ) printf("ports is %X\n", ports); #endif if (send(sd, "", 0, 0) == -1) fatal("Could not send UDP packet"); start = time(NULL); do { tv.tv_sec = 2; tv.tv_usec = 0; res = recvfrom(sd2, buf, 65535, 0, &sa, &sasize); if (res < 0) { if (errno != EWOULDBLOCK) perror("recvfrom"); } if (res > 0) { #if ( TCPIP_DEBUGGING ) printf("Got packet!\n"); printf("sa.sa_data: %s\n", sa.sa_data); printf("Hex dump of packet (len %d):\n", res); hdump(buf, res); #endif data_offset = get_link_offset(sa.sa_data); ihl = (*(buf + data_offset) & 0xf) * 4; /* If it is big enough and it is IPv4 */ if (res >= data_offset + ihl + 4 && (*(buf + data_offset) & 0x40)) { intptr = (int *) ((char *) buf + data_offset + ihl); if (*intptr == ntohl(ports)) { intptr = (int *) ((char *) buf + data_offset + 12); #if ( TCPIP_DEBUGGING ) printf("We've found our packet [krad]\n"); #endif memcpy(src, buf + data_offset + 12, 4); close(sd); close(sd2); return strdup(sa.sa_data); } } } } while(!done && time(NULL) - start < 2); close(sd); close(sd2); } return NULL; } #endif /* 0 */ int getsourceip(struct in_addr *src, struct in_addr *dst) { int sd; struct sockaddr_in sock; int socklen = sizeof(struct sockaddr_in); unsigned short p1; get_random_bytes(&p1, 2); if (p1 < 5000) p1 += 5000; if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {perror("Socket troubles"); return 0;} sock.sin_family = AF_INET; sock.sin_addr = *dst; sock.sin_port = htons(p1); if (connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in)) == -1) { perror("UDP connect()"); close(sd); return 0; } bzero(&sock, sizeof(struct sockaddr_in)); if (getsockname(sd, (SA *)&sock, &socklen) == -1) { perror("getsockname"); close(sd); return 0; } src->s_addr = sock.sin_addr.s_addr; close(sd); return 1; /* Calling function responsible for checking validity */ } #if 0 int get_link_offset(char *device) { int sd; struct ifreq ifr; sd = socket(AF_INET, SOCK_DGRAM, 0); memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name)); #if (defined(SIOCGIFHWADDR) && defined(ARPHRD_ETHER) && defined(ARPHRD_METRICOM) && defined(ARPHRD_SLIP) && defined(ARPHRD_CSLIP) && defined(ARPHRD_SLIP6) && defined(ARPHRD_PPP) && defined(ARPHRD_LOOPBACK) ) if (ioctlsocket(sd, SIOCGIFHWADDR, &ifr) < 0 ) { fatal("Can't obtain link offset. What kind of interface are you using?"); } close(sd); switch (ifr.ifr_hwaddr.sa_family) { case ARPHRD_ETHER: /* These two are standard ethernet */ case ARPHRD_METRICOM: return 14; break; case ARPHRD_SLIP: case ARPHRD_CSLIP: case ARPHRD_SLIP6: case ARPHRD_CSLIP6: case ARPHRD_PPP: return 0; break; case ARPHRD_LOOPBACK: /* Loopback interface (obviously) */ return 14; break; default: fatal("Unknown link layer device: %d", ifr.ifr_hwaddr.sa_family); } #else printf("get_link_offset called even though your host doesn't support it. Assuming Ethernet or Loopback connection (wild guess)\n"); return 14; #endif /* Not reached */ exit(1); } #endif /* Read an IP packet using libpcap . We return the packet and take a pcap descripter and a pointer to the packet length (which we set in the function. If you want a maximum length returned, you should specify that in pcap_open_live() */ /* to_usec is the timeout period in microseconds -- use 0 to skip the test and -1 to block forever. Note that we don't interrupt pcap, so low values (and 0) degenerate to the timeout specified in pcap_open_live() */ char *readip_pcap(pcap_t *pd, unsigned int *len, long to_usec) { int offset = -1; struct pcap_pkthdr head; char *p; int datalink; int timedout = 0; struct timeval tv_start, tv_end; if (!pd) fatal("NULL packet device passed to readip_pcap"); /* New packet capture device, need to recompute offset */ if ( (datalink = pcap_datalink(pd)) < 0) fatal("Cannot obtain datalink information: %s", pcap_geterr(pd)); switch(datalink) { case DLT_EN10MB: offset = 14; break; case DLT_IEEE802: offset = 22; break; #ifdef DLT_LOOP case DLT_LOOP: #endif case DLT_NULL: offset = 4; break; case DLT_SLIP: #ifdef DLT_SLIP_BSDOS case DLT_SLIP_BSDOS: #endif #if (FREEBSD || OPENBSD || NETBSD || BSDI) offset = 16; #else offset = 24; /* Anyone use this??? */ #endif break; case DLT_PPP: #ifdef DLT_PPP_BSDOS case DLT_PPP_BSDOS: #endif #if (FREEBSD || OPENBSD || NETBSD || BSDI) offset = 4; #else #ifdef SOLARIS offset = 8; #else offset = 24; /* Anyone use this? */ #endif /* ifdef solaris */ #endif /* if freebsd || openbsd || netbsd || bsdi */ break; case DLT_RAW: offset = 0; break; case DLT_FDDI: offset = 21; break; #ifdef DLT_ENC case DLT_ENC: offset = 12; break; #endif default: fatal("Unknown datalink type (%d)", datalink); } if (to_usec > 0) { gettimeofday(&tv_start, NULL); } do { p = (char *) pcap_next(pd, &head); if (p) p += offset; if (!p || (*p & 0x40) != 0x40) { /* Should we timeout? */ if (to_usec == 0) { timedout = 1; } else if (to_usec > 0) { gettimeofday(&tv_end, NULL); if (TIMEVAL_SUBTRACT(tv_end, tv_start) >= to_usec) { timedout = 1; } } } } while(!timedout && (!p || (*p & 0x40) != 0x40)); /* Go until we get IPv4 packet */ if (timedout) { *len = 0; return NULL; } *len = head.caplen - offset; return p; } int ipaddr2devname( char *dev, struct in_addr *addr ) { struct interface_info *mydevs; int numdevs; int i; mydevs = getinterfaces(&numdevs); if (!mydevs) return -1; for(i=0; i < numdevs; i++) { if (addr->s_addr == mydevs[i].addr.s_addr) { strcpy(dev, mydevs[i].name); return 0; } } return -1; } int devname2ipaddr(char *dev, struct in_addr *addr) { struct interface_info *mydevs; int numdevs; int i; mydevs = getinterfaces(&numdevs); if (!mydevs) return -1; for(i=0; i < numdevs; i++) { if (!strcmp(dev, mydevs[i].name)) { memcpy(addr, (char *) &mydevs[i].addr, sizeof(struct in_addr)); return 0; } } return -1; } struct interface_info *getinterfaces(int *howmany) { static int initialized = 0; static struct interface_info mydevs[48]; static int numinterfaces = 0; int sd; int len; char *p; char buf[10240]; struct ifconf ifc; struct ifreq *ifr; struct sockaddr_in *sin; if (!initialized) { initialized = 1; /* Dummy socket for ioctl */ sd = socket(AF_INET, SOCK_DGRAM, 0); if (sd < 0) pfatal("socket in getinterfaces"); ifc.ifc_len = sizeof(buf); ifc.ifc_buf = buf; if (ioctlsocket(sd, SIOCGIFCONF, &ifc) < 0) { fatal("Failed to determine your configured interfaces!\n"); } close(sd); ifr = (struct ifreq *) buf; if (ifc.ifc_len == 0) fatal("getinterfaces: SIOCGIFCONF claims you have no network interfaces!\n"); #if HAVE_SOCKADDR_SA_LEN /* len = MAX(sizeof(struct sockaddr), ifr->ifr_addr.sa_len);*/ len = ifr->ifr_addr.sa_len + sizeof(ifr->ifr_name); #else len = sizeof(struct ifreq); /* len = sizeof(SA); */ #endif #if TCPIP_DEBUGGING printf("ifnet list length = %d\n",ifc.ifc_len); printf("sa_len = %d\n",len); hdump(buf, ifc.ifc_len); printf("ifr = %X\n",(unsigned int)(*(char **)&ifr)); printf("Size of struct ifreq: %d\n", sizeof(struct ifreq)); #endif for(; ifr && *((char *)ifr) && ((char *)ifr) < buf + ifc.ifc_len; ((*(char **)&ifr) += len )) { #if TCPIP_DEBUGGING printf("ifr_name size = %d\n", sizeof(ifr->ifr_name)); printf("ifr = %X\n",(unsigned int)(*(char **)&ifr)); #endif /* skip any device with no name */ if (!*((char *)ifr)) continue; sin = (struct sockaddr_in *) &ifr->ifr_addr; memcpy(&(mydevs[numinterfaces].addr), (char *) &(sin->sin_addr), sizeof(struct in_addr)); /* In case it is a stinkin' alias */ if ((p = strchr(ifr->ifr_name, ':'))) *p = '\0'; strncpy(mydevs[numinterfaces].name, ifr->ifr_name, 63); mydevs[numinterfaces].name[63] = '\0'; #if TCPIP_DEBUGGING printf("Interface %d is %s\n",numinterfaces,mydevs[numinterfaces].name); #endif numinterfaces++; if (numinterfaces == 47) { error("My god! You seem to have WAY too many interfaces! Things may not work right\n"); break; } #if HAVE_SOCKADDR_SA_LEN /* len = MAX(sizeof(struct sockaddr), ifr->ifr_addr.sa_len);*/ len = ifr->ifr_addr.sa_len + sizeof(ifr->ifr_name); #endif mydevs[numinterfaces].name[0] = '\0'; } } if (howmany) *howmany = numinterfaces; return mydevs; } /* An awesome function to determine what interface a packet to a given destination should be routed through. It returns NULL if no appropriate interface is found, oterwise it returns the device name and fills in the source parameter. Some of the stuff is from Stevens' Unix Network Programming V2. He had an easier suggestion for doing this (in the book), but it isn't portable :( */ #define ROUTETHROUGH_MAXROUTES 512 char *routethrough(struct in_addr *dest, struct in_addr *source) { static int initialized = 0; int i; struct in_addr addy; static enum { procroutetechnique, connectsockettechnique, guesstechnique } technique = procroutetechnique; char buf[10240]; struct interface_info *mydevs; static struct myroute { struct interface_info *dev; unsigned int mask; unsigned int dest; } myroutes[ROUTETHROUGH_MAXROUTES]; int numinterfaces = 0; char *p, *endptr; char iface[64]; static int numroutes = 0; FILE *routez; if (!dest) fatal("ipaddr2devname passed a NULL dest address"); if (!initialized) { /* Dummy socket for ioctl */ initialized = 1; mydevs = getinterfaces(&numinterfaces); /* Now we must go through several techniques to determine info */ routez = fopen("/proc/net/route", "r"); if (routez) { /* OK, linux style /proc/net/route ... we can handle this ... */ /* Now that we've got the interfaces, we g0 after the r0ut3Z */ fgets(buf, sizeof(buf), routez); /* Kill the first line */ while(fgets(buf,sizeof(buf), routez)) { p = strtok(buf, " \t\n"); if (!p) { error("Could not find interface in /proc/net/route line"); continue; } if (*p == '*') continue; /* Deleted route -- any other valid reason for a route to start with an asterict? */ Strncpy(iface, p, sizeof(iface)); if ((p = strchr(iface, ':'))) { *p = '\0'; /* To support IP aliasing */ } p = strtok(NULL, " \t\n"); endptr = NULL; myroutes[numroutes].dest = strtoul(p, &endptr, 16); if (!endptr || *endptr) { error("Failed to determine Destination from /proc/net/route"); continue; } for(i=0; i < 6; i++) { p = strtok(NULL, " \t\n"); if (!p) break; } if (!p) { error("Failed to find field %d in /proc/net/route", i + 2); continue; } endptr = NULL; myroutes[numroutes].mask = strtoul(p, &endptr, 16); if (!endptr || *endptr) { error("Failed to determine mask from /proc/net/route"); continue; } #if TCPIP_DEBUGGING printf("#%d: for dev %s, The dest is %X and the mask is %X\n", numroutes, iface, myroutes[numroutes].dest, myroutes[numroutes].mask); #endif for(i=0; i < numinterfaces; i++) if (!strcmp(iface, mydevs[i].name)) { myroutes[numroutes].dev = &mydevs[i]; break; } if (i == numinterfaces) fatal("Failed to find interface %s mentioned in /proc/net/route\n", iface); numroutes++; if (numroutes == ROUTETHROUGH_MAXROUTES) fatal("My god! You seem to have WAY to many routes!\n"); } fclose(routez); } else { technique = connectsockettechnique; } } else { mydevs = getinterfaces(&numinterfaces); } /* WHEW, that takes care of initializing, now we have the easy job of finding which route matches */ if (islocalhost(dest)) { if (source) source->s_addr = htonl(0x7F000001); /* Now we find the localhost interface name, assuming 127.0.0.1 is localhost (it damn well better be!)... */ for(i=0; i < numinterfaces; i++) { if (mydevs[i].addr.s_addr == htonl(0x7F000001)) { return mydevs[i].name; } } return NULL; } if (technique == procroutetechnique) { for(i=0; i < numroutes; i++) { if ((dest->s_addr & myroutes[i].mask) == myroutes[i].dest) { if (source) { source->s_addr = myroutes[i].dev->addr.s_addr; } return myroutes[i].dev->name; } } } else if (technique == connectsockettechnique) { if (!getsourceip(&addy, dest)) return NULL; if (!addy.s_addr) { /* Solaris 2.4 */ struct hostent *myhostent = NULL; char myname[MAXHOSTNAMELEN + 1]; if (gethostname(myname, MAXHOSTNAMELEN) || !(myhostent = gethostbyname(myname))) fatal("Cannot get hostname! Try using -S <my_IP_address> or -e <interface to scan through>\n"); memcpy(&(addy.s_addr), myhostent->h_addr_list[0], sizeof(struct in_addr)); #if ( TCPIP_DEBUGGING ) printf("We skillfully deduced that your address is %s\n", inet_ntoa(*source)); #endif } /* Now we insure this claimed address is a real interface ... */ for(i=0; i < numinterfaces; i++) if (mydevs[i].addr.s_addr == addy.s_addr) { if (source) { source->s_addr = addy.s_addr; } return mydevs[i].name; } return NULL; } else fatal("I know sendmail technique ... I know rdist technique ... but I don't know what the hell kindof technique you are attempting!!!"); return NULL; }