contrib/dsniff/dsniff-2.4_beta1-debian-r1.patch
2008-07-13 01:14:23 +02:00

3270 lines
88 KiB
Diff

diff --exclude='*~' -Naur dsniff-2.4.orig/arp.c dsniff-2.4/arp.c
--- dsniff-2.4.orig/arp.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/arp.c 2006-01-21 18:56:37.000000000 -0200
@@ -39,7 +39,7 @@
#ifdef BSD
int
-arp_cache_lookup(in_addr_t ip, struct ether_addr *ether)
+arp_cache_lookup(in_addr_t ip, struct ether_addr *ether, const char* linf)
{
int mib[6];
size_t len;
@@ -91,7 +91,7 @@
#endif
int
-arp_cache_lookup(in_addr_t ip, struct ether_addr *ether)
+arp_cache_lookup(in_addr_t ip, struct ether_addr *ether, const char* lif)
{
int sock;
struct arpreq ar;
@@ -99,7 +99,7 @@
memset((char *)&ar, 0, sizeof(ar));
#ifdef __linux__
- strncpy(ar.arp_dev, "eth0", sizeof(ar.arp_dev)); /* XXX - *sigh* */
+ strncpy(ar.arp_dev, lif, strlen(lif));
#endif
sin = (struct sockaddr_in *)&ar.arp_pa;
sin->sin_family = AF_INET;
diff --exclude='*~' -Naur dsniff-2.4.orig/arp.h dsniff-2.4/arp.h
--- dsniff-2.4.orig/arp.h 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/arp.h 2006-01-21 18:56:37.000000000 -0200
@@ -11,6 +11,6 @@
#ifndef _ARP_H_
#define _ARP_H_
-int arp_cache_lookup(in_addr_t ip, struct ether_addr *ether);
+int arp_cache_lookup(in_addr_t ip, struct ether_addr *ether, const char* linf);
#endif /* _ARP_H_ */
diff --exclude='*~' -Naur dsniff-2.4.orig/arpspoof.c dsniff-2.4/arpspoof.c
--- dsniff-2.4.orig/arpspoof.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/arpspoof.c 2006-01-21 18:56:45.000000000 -0200
@@ -27,7 +27,7 @@
extern char *ether_ntoa(struct ether_addr *);
-static struct libnet_link_int *llif;
+static libnet_t *l;
static struct ether_addr spoof_mac, target_mac;
static in_addr_t spoof_ip, target_ip;
static char *intf;
@@ -41,47 +41,41 @@
}
static int
-arp_send(struct libnet_link_int *llif, char *dev,
- int op, u_char *sha, in_addr_t spa, u_char *tha, in_addr_t tpa)
+arp_send(libnet_t *l, int op, u_int8_t *sha,
+ in_addr_t spa, u_int8_t *tha, in_addr_t tpa)
{
- char ebuf[128];
- u_char pkt[60];
-
if (sha == NULL &&
- (sha = (u_char *)libnet_get_hwaddr(llif, dev, ebuf)) == NULL) {
+ (sha = (u_int8_t *)libnet_get_hwaddr(l)) == NULL) {
return (-1);
}
if (spa == 0) {
- if ((spa = libnet_get_ipaddr(llif, dev, ebuf)) == 0)
+ if ((spa = libnet_get_ipaddr4(l)) == -1)
return (-1);
- spa = htonl(spa); /* XXX */
}
if (tha == NULL)
tha = "\xff\xff\xff\xff\xff\xff";
- libnet_build_ethernet(tha, sha, ETHERTYPE_ARP, NULL, 0, pkt);
+ libnet_autobuild_arp(op, sha, (u_int8_t *)&spa,
+ tha, (u_int8_t *)&tpa, l);
+ libnet_build_ethernet(tha, sha, ETHERTYPE_ARP, NULL, 0, l, 0);
- libnet_build_arp(ARPHRD_ETHER, ETHERTYPE_IP, ETHER_ADDR_LEN, 4,
- op, sha, (u_char *)&spa, tha, (u_char *)&tpa,
- NULL, 0, pkt + ETH_H);
-
fprintf(stderr, "%s ",
ether_ntoa((struct ether_addr *)sha));
if (op == ARPOP_REQUEST) {
fprintf(stderr, "%s 0806 42: arp who-has %s tell %s\n",
ether_ntoa((struct ether_addr *)tha),
- libnet_host_lookup(tpa, 0),
- libnet_host_lookup(spa, 0));
+ libnet_addr2name4(tpa, LIBNET_DONT_RESOLVE),
+ libnet_addr2name4(spa, LIBNET_DONT_RESOLVE));
}
else {
fprintf(stderr, "%s 0806 42: arp reply %s is-at ",
ether_ntoa((struct ether_addr *)tha),
- libnet_host_lookup(spa, 0));
+ libnet_addr2name4(spa, LIBNET_DONT_RESOLVE));
fprintf(stderr, "%s\n",
ether_ntoa((struct ether_addr *)sha));
}
- return (libnet_write_link_layer(llif, dev, pkt, sizeof(pkt)) == sizeof(pkt));
+ return (libnet_write(l));
}
#ifdef __linux__
@@ -113,13 +107,13 @@
int i = 0;
do {
- if (arp_cache_lookup(ip, mac) == 0)
+ if (arp_cache_lookup(ip, mac, intf) == 0)
return (1);
#ifdef __linux__
/* XXX - force the kernel to arp. feh. */
arp_force(ip);
#else
- arp_send(llif, intf, ARPOP_REQUEST, NULL, 0, NULL, ip);
+ arp_send(l, ARPOP_REQUEST, NULL, 0, NULL, ip);
#endif
sleep(1);
}
@@ -136,9 +130,9 @@
if (arp_find(spoof_ip, &spoof_mac)) {
for (i = 0; i < 3; i++) {
/* XXX - on BSD, requires ETHERSPOOF kernel. */
- arp_send(llif, intf, ARPOP_REPLY,
- (u_char *)&spoof_mac, spoof_ip,
- (target_ip ? (u_char *)&target_mac : NULL),
+ arp_send(l, ARPOP_REPLY,
+ (u_int8_t *)&spoof_mac, spoof_ip,
+ (target_ip ? (u_int8_t *)&target_mac : NULL),
target_ip);
sleep(1);
}
@@ -151,7 +145,8 @@
{
extern char *optarg;
extern int optind;
- char ebuf[PCAP_ERRBUF_SIZE];
+ char pcap_ebuf[PCAP_ERRBUF_SIZE];
+ char libnet_ebuf[LIBNET_ERRBUF_SIZE];
int c;
intf = NULL;
@@ -163,7 +158,7 @@
intf = optarg;
break;
case 't':
- if ((target_ip = libnet_name_resolve(optarg, 1)) == -1)
+ if ((target_ip = libnet_name2addr4(l, optarg, LIBNET_RESOLVE)) == -1)
usage();
break;
default:
@@ -176,26 +171,26 @@
if (argc != 1)
usage();
- if ((spoof_ip = libnet_name_resolve(argv[0], 1)) == -1)
+ if ((spoof_ip = libnet_name2addr4(l, argv[0], LIBNET_RESOLVE)) == -1)
usage();
- if (intf == NULL && (intf = pcap_lookupdev(ebuf)) == NULL)
- errx(1, "%s", ebuf);
+ if (intf == NULL && (intf = pcap_lookupdev(pcap_ebuf)) == NULL)
+ errx(1, "%s", pcap_ebuf);
- if ((llif = libnet_open_link_interface(intf, ebuf)) == 0)
- errx(1, "%s", ebuf);
+ if ((l = libnet_init(LIBNET_LINK, intf, libnet_ebuf)) == NULL)
+ errx(1, "%s", libnet_ebuf);
if (target_ip != 0 && !arp_find(target_ip, &target_mac))
errx(1, "couldn't arp for host %s",
- libnet_host_lookup(target_ip, 0));
+ libnet_addr2name4(target_ip, LIBNET_DONT_RESOLVE));
signal(SIGHUP, cleanup);
signal(SIGINT, cleanup);
signal(SIGTERM, cleanup);
for (;;) {
- arp_send(llif, intf, ARPOP_REPLY, NULL, spoof_ip,
- (target_ip ? (u_char *)&target_mac : NULL),
+ arp_send(l, ARPOP_REPLY, NULL, spoof_ip,
+ (target_ip ? (u_int8_t *)&target_mac : NULL),
target_ip);
sleep(2);
}
diff --exclude='*~' -Naur dsniff-2.4.orig/dnsspoof.8 dsniff-2.4/dnsspoof.8
--- dsniff-2.4.orig/dnsspoof.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/dnsspoof.8 2006-01-21 18:56:50.000000000 -0200
@@ -31,7 +31,7 @@
address queries on the LAN with an answer of the local machine's IP
address.
.SH FILES
-.IP \fI/usr/local/lib/dnsspoof.hosts\fR
+.IP \fI/etc/dsniff/dnsspoof.hosts\fR
Sample hosts file.
.SH "SEE ALSO"
dsniff(8), hosts(5)
diff --exclude='*~' -Naur dsniff-2.4.orig/dnsspoof.c dsniff-2.4/dnsspoof.c
--- dsniff-2.4.orig/dnsspoof.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/dnsspoof.c 2006-01-21 18:56:45.000000000 -0200
@@ -38,7 +38,7 @@
pcap_t *pcap_pd = NULL;
int pcap_off = -1;
-int lnet_sock = -1;
+libnet_t *l;
u_long lnet_ip = -1;
static void
@@ -90,19 +90,18 @@
dns_init(char *dev, char *filename)
{
FILE *f;
- struct libnet_link_int *llif;
+ libnet_t *l;
+ char libnet_ebuf[LIBNET_ERRBUF_SIZE];
struct dnsent *de;
char *ip, *name, buf[1024];
- if ((llif = libnet_open_link_interface(dev, buf)) == NULL)
- errx(1, "%s", buf);
+ if ((l = libnet_init(LIBNET_LINK, dev, libnet_ebuf)) == NULL)
+ errx(1, "%s", libnet_ebuf);
- if ((lnet_ip = libnet_get_ipaddr(llif, dev, buf)) == -1)
- errx(1, "%s", buf);
+ if ((lnet_ip = libnet_get_ipaddr4(l)) == -1)
+ errx(1, "%s", libnet_geterror(l));
- lnet_ip = htonl(lnet_ip);
-
- libnet_close_link_interface(llif);
+ libnet_destroy(l);
SLIST_INIT(&dns_entries);
@@ -180,7 +179,7 @@
static void
dns_spoof(u_char *u, const struct pcap_pkthdr *pkthdr, const u_char *pkt)
{
- struct libnet_ip_hdr *ip;
+ struct libnet_ipv4_hdr *ip;
struct libnet_udp_hdr *udp;
HEADER *dns;
char name[MAXHOSTNAMELEN];
@@ -189,7 +188,7 @@
in_addr_t dst;
u_short type, class;
- ip = (struct libnet_ip_hdr *)(pkt + pcap_off);
+ ip = (struct libnet_ipv4_hdr *)(pkt + pcap_off);
udp = (struct libnet_udp_hdr *)(pkt + pcap_off + (ip->ip_hl * 4));
dns = (HEADER *)(udp + 1);
p = (u_char *)(dns + 1);
@@ -212,7 +211,7 @@
if (class != C_IN)
return;
- p = buf + IP_H + UDP_H + dnslen;
+ p = buf + dnslen;
if (type == T_A) {
if ((dst = dns_lookup_a(name)) == -1)
@@ -234,38 +233,38 @@
anslen += 12;
}
else return;
-
- libnet_build_ip(UDP_H + dnslen + anslen, 0, libnet_get_prand(PRu16),
- 0, 64, IPPROTO_UDP, ip->ip_dst.s_addr,
- ip->ip_src.s_addr, NULL, 0, buf);
-
- libnet_build_udp(ntohs(udp->uh_dport), ntohs(udp->uh_sport),
- NULL, dnslen + anslen, buf + IP_H);
- memcpy(buf + IP_H + UDP_H, (u_char *)dns, dnslen);
+ memcpy(buf, (u_char *)dns, dnslen);
- dns = (HEADER *)(buf + IP_H + UDP_H);
+ dns = (HEADER *)buf;
dns->qr = dns->ra = 1;
if (type == T_PTR) dns->aa = 1;
dns->ancount = htons(1);
dnslen += anslen;
+
+ libnet_clear_packet(l);
+ libnet_build_udp(ntohs(udp->uh_dport), ntohs(udp->uh_sport),
+ LIBNET_UDP_H + dnslen, 0,
+ (u_int8_t *)buf, dnslen, l, 0);
+
+ libnet_build_ipv4(LIBNET_IPV4_H + LIBNET_UDP_H + dnslen, 0,
+ libnet_get_prand(LIBNET_PRu16), 0, 64, IPPROTO_UDP, 0,
+ ip->ip_dst.s_addr, ip->ip_src.s_addr, NULL, 0, l, 0);
- libnet_do_checksum(buf, IPPROTO_UDP, UDP_H + dnslen);
-
- if (libnet_write_ip(lnet_sock, buf, IP_H + UDP_H + dnslen) < 0)
+ if (libnet_write(l) < 0)
warn("write");
fprintf(stderr, "%s.%d > %s.%d: %d+ %s? %s\n",
- libnet_host_lookup(ip->ip_src.s_addr, 0), ntohs(udp->uh_sport),
- libnet_host_lookup(ip->ip_dst.s_addr, 0), ntohs(udp->uh_dport),
+ libnet_addr2name4(ip->ip_src.s_addr, 0), ntohs(udp->uh_sport),
+ libnet_addr2name4(ip->ip_dst.s_addr, 0), ntohs(udp->uh_dport),
ntohs(dns->id), type == T_A ? "A" : "PTR", name);
}
static void
cleanup(int sig)
{
- libnet_close_raw_sock(lnet_sock);
+ libnet_destroy(l);
pcap_close(pcap_pd);
exit(0);
}
@@ -276,6 +275,7 @@
extern char *optarg;
extern int optind;
char *p, *dev, *hosts, buf[1024];
+ char ebuf[LIBNET_ERRBUF_SIZE];
int i;
dev = hosts = NULL;
@@ -306,7 +306,7 @@
strlcpy(buf, p, sizeof(buf));
}
else snprintf(buf, sizeof(buf), "udp dst port 53 and not src %s",
- libnet_host_lookup(lnet_ip, 0));
+ libnet_addr2name4(lnet_ip, LIBNET_DONT_RESOLVE));
if ((pcap_pd = pcap_init(dev, buf, 128)) == NULL)
errx(1, "couldn't initialize sniffing");
@@ -314,10 +314,10 @@
if ((pcap_off = pcap_dloff(pcap_pd)) < 0)
errx(1, "couldn't determine link layer offset");
- if ((lnet_sock = libnet_open_raw_sock(IPPROTO_RAW)) == -1)
+ if ((l = libnet_init(LIBNET_RAW4, dev, ebuf)) == NULL)
errx(1, "couldn't initialize sending");
- libnet_seed_prand();
+ libnet_seed_prand(l);
signal(SIGHUP, cleanup);
signal(SIGINT, cleanup);
diff --exclude='*~' -Naur dsniff-2.4.orig/dsniff.8 dsniff-2.4/dsniff.8
--- dsniff-2.4.orig/dsniff.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/dsniff.8 2006-01-21 18:56:50.000000000 -0200
@@ -10,7 +10,7 @@
.nf
.fi
\fBdsniff\fR [\fB-c\fR] [\fB-d\fR] [\fB-m\fR] [\fB-n\fR] [\fB-i
-\fIinterface\fR] [\fB-s \fIsnaplen\fR] [\fB-f \fIservices\fR]
+\fIinterface\fR | \fB-p \fIpcapfile\fR] [\fB-s \fIsnaplen\fR] [\fB-f \fIservices\fR]
[\fB-t \fItrigger[,...]\fR]]
[\fB-r\fR|\fB-w\fR \fIsavefile\fR] [\fIexpression\fR]
.SH DESCRIPTION
@@ -45,6 +45,9 @@
Do not resolve IP addresses to hostnames.
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Rather than processing the contents of packets observed upon the network
+process the given PCAP capture file.
.IP "\fB-s \fIsnaplen\fR"
Analyze at most the first \fIsnaplen\fR bytes of each TCP connection,
rather than the default of 1024.
@@ -65,9 +68,9 @@
On a hangup signal \fBdsniff\fR will dump its current trigger table to
\fIdsniff.services\fR.
.SH FILES
-.IP \fI/usr/local/lib/dsniff.services\fR
+.IP \fI/etc/dsniff/dsniff.services\fR
Default trigger table
-.IP \fI/usr/local/lib/dsniff.magic\fR
+.IP \fI/etc/dsniff/dsniff.magic\fR
Network protocol magic
.SH "SEE ALSO"
arpspoof(8), libnids(3), services(5), magic(5)
diff --exclude='*~' -Naur dsniff-2.4.orig/dsniff.8.orig dsniff-2.4/dsniff.8.orig
--- dsniff-2.4.orig/dsniff.8.orig 1969-12-31 21:00:00.000000000 -0300
+++ dsniff-2.4/dsniff.8.orig 2006-01-21 18:56:40.000000000 -0200
@@ -0,0 +1,84 @@
+.TH DSNIFF 8
+.ad
+.fi
+.SH NAME
+dsniff
+\-
+password sniffer
+.SH SYNOPSIS
+.na
+.nf
+.fi
+\fBdsniff\fR [\fB-c\fR] [\fB-d\fR] [\fB-m\fR] [\fB-n\fR] [\fB-i
+\fIinterface\fR | \fB-p \fIpcapfile\fR] [\fB-s \fIsnaplen\fR] [\fB-f \fIservices\fR]
+[\fB-t \fItrigger[,...]\fR]]
+[\fB-r\fR|\fB-w\fR \fIsavefile\fR] [\fIexpression\fR]
+.SH DESCRIPTION
+.ad
+.fi
+\fBdsniff\fR is a password sniffer which handles FTP, Telnet, SMTP,
+HTTP, POP, poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
+MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ, Napster,
+PostgreSQL, Meeting Maker, Citrix ICA, Symantec pcAnywhere, NAI
+Sniffer, Microsoft SMB, Oracle SQL*Net, Sybase and Microsoft SQL
+protocols.
+.LP
+\fBdsniff\fR automatically detects and minimally parses each
+application protocol, only saving the interesting bits, and uses
+Berkeley DB as its output file format, only logging unique
+authentication attempts. Full TCP/IP reassembly is provided by
+libnids(3).
+.LP
+I wrote \fBdsniff\fR with honest intentions - to audit my own network,
+and to demonstrate the insecurity of cleartext network protocols.
+Please do not abuse this software.
+.SH OPTIONS
+.IP \fB-c\fR
+Perform half-duplex TCP stream reassembly, to handle asymmetrically
+routed traffic (such as when using arpspoof(8) to intercept client
+traffic bound for the local gateway).
+.IP \fB-d\fR
+Enable debugging mode.
+.IP \fB-m\fR
+Enable automatic protocol detection.
+.IP \fB-n\fR
+Do not resolve IP addresses to hostnames.
+.IP "\fB-i \fIinterface\fR"
+Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Rather than processing the contents of packets observed upon the network
+process the given PCAP capture file.
+.IP "\fB-s \fIsnaplen\fR"
+Analyze at most the first \fIsnaplen\fR bytes of each TCP connection,
+rather than the default of 1024.
+.IP "\fB-f \fIservices\fR"
+Load triggers from a \fIservices\fR file.
+.IP "\fB -t \fItrigger\fR[,...]"
+Load triggers from a comma-separated list, specified as
+\fIport\fR/\fIproto\fR=\fIservice\fR (e.g. 80/tcp=http).
+.IP "\fB-r \fIsavefile\fR"
+Read sniffed sessions from a \fIsavefile\fR created with the \fB-w\fR
+option.
+.IP "\fB-w \fIfile\fR"
+Write sniffed sessions to \fIsavefile\fR rather than parsing and
+printing them out.
+.IP "\fIexpression\fR"
+Specify a tcpdump(8) filter expression to select traffic to sniff.
+.LP
+On a hangup signal \fBdsniff\fR will dump its current trigger table to
+\fIdsniff.services\fR.
+.SH FILES
+.IP \fI/usr/local/lib/dsniff.services\fR
+Default trigger table
+.IP \fI/usr/local/lib/dsniff.magic\fR
+Network protocol magic
+.SH "SEE ALSO"
+arpspoof(8), libnids(3), services(5), magic(5)
+.SH AUTHOR
+.na
+.nf
+Dug Song <dugsong@monkey.org>
+.SH BUGS
+\fBdsniff\fR's automatic protocol detection feature is based on the
+classic file(1) command by Ian Darwin, and shares its historical
+limitations and bugs.
diff --exclude='*~' -Naur dsniff-2.4.orig/dsniff.c dsniff-2.4/dsniff.c
--- dsniff-2.4.orig/dsniff.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/dsniff.c 2006-01-21 18:56:40.000000000 -0200
@@ -46,8 +46,9 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: dsniff [-cdmn] [-i interface] [-s snaplen] [-f services]\n"
- " [-t trigger[,...]] [-r|-w savefile] [expression]\n");
+ "Usage: dsniff [-cdmn] [-i interface | -p pcapfile] [-s snaplen]\n"
+ " [-f services] [-t trigger[,...]] [-r|-w savefile]\n"
+ " [expression]\n");
exit(1);
}
@@ -79,7 +80,7 @@
services = savefile = triggers = NULL;
- while ((c = getopt(argc, argv, "cdf:i:mnr:s:t:w:h?V")) != -1) {
+ while ((c = getopt(argc, argv, "cdf:i:mnp:r:s:t:w:h?V")) != -1) {
switch (c) {
case 'c':
Opt_client = 1;
@@ -99,6 +100,9 @@
case 'n':
Opt_dns = 0;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
case 'r':
Opt_read = 1;
savefile = optarg;
@@ -168,10 +172,23 @@
else nids_register_tcp(trigger_tcp);
if (nids_params.pcap_filter != NULL) {
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
}
- else warnx("listening on %s", nids_params.device);
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/filesnarf.8 dsniff-2.4/filesnarf.8
--- dsniff-2.4.orig/filesnarf.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/filesnarf.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBfilesnarf\fR [\fB-i \fIinterface\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
+\fBfilesnarf\fR [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
@@ -18,6 +18,8 @@
.SH OPTIONS
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
files.
diff --exclude='*~' -Naur dsniff-2.4.orig/filesnarf.c dsniff-2.4/filesnarf.c
--- dsniff-2.4.orig/filesnarf.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/filesnarf.c 2006-01-21 18:56:45.000000000 -0200
@@ -51,7 +51,7 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: filesnarf [-i interface] [[-v] pattern [expression]]\n");
+ "Usage: filesnarf [-i interface | -p pcapfile] [[-v] pattern [expression]]\n");
exit(1);
}
@@ -134,8 +134,8 @@
int fd;
warnx("%s.%d > %s.%d: %s (%d@%d)",
- libnet_host_lookup(addr->daddr, 0), addr->dest,
- libnet_host_lookup(addr->saddr, 0), addr->source,
+ libnet_addr2name4(addr->daddr, LIBNET_DONT_RESOLVE), addr->dest,
+ libnet_addr2name4(addr->saddr, LIBNET_DONT_RESOLVE), addr->source,
ma->filename, len, ma->offset);
if ((fd = open(ma->filename, O_WRONLY|O_CREAT, 0644)) >= 0) {
@@ -353,7 +353,7 @@
}
static void
-decode_udp_nfs(struct libnet_ip_hdr *ip)
+decode_udp_nfs(struct libnet_ipv4_hdr *ip)
{
static struct tuple4 addr;
struct libnet_udp_hdr *udp;
@@ -464,11 +464,14 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "i:vh?V")) != -1) {
+ while ((c = getopt(argc, argv, "i:p:vh?V")) != -1) {
switch (c) {
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
case 'v':
Opt_invert = 1;
break;
@@ -498,11 +501,24 @@
nids_register_ip(decode_udp_nfs);
nids_register_tcp(decode_tcp_nfs);
- if (nids_params.pcap_filter != NULL) {
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
- }
- else warnx("listening on %s", nids_params.device);
+ if (nids_params.pcap_filter != NULL) {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+ }
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/macof.c dsniff-2.4/macof.c
--- dsniff-2.4.orig/macof.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/macof.c 2006-01-21 18:56:45.000000000 -0200
@@ -48,8 +48,8 @@
static void
gen_mac(u_char *mac)
{
- *((in_addr_t *)mac) = libnet_get_prand(PRu32);
- *((u_short *)(mac + 4)) = libnet_get_prand(PRu16);
+ *((in_addr_t *)mac) = libnet_get_prand(LIBNET_PRu32);
+ *((u_short *)(mac + 4)) = libnet_get_prand(LIBNET_PRu16);
}
int
@@ -59,22 +59,23 @@
extern int optind;
int c, i;
struct libnet_link_int *llif;
- char ebuf[PCAP_ERRBUF_SIZE];
+ char pcap_ebuf[PCAP_ERRBUF_SIZE];
+ char libnet_ebuf[LIBNET_ERRBUF_SIZE];
u_char sha[ETHER_ADDR_LEN], tha[ETHER_ADDR_LEN];
in_addr_t src, dst;
u_short sport, dport;
u_int32_t seq;
- u_char pkt[ETH_H + IP_H + TCP_H];
+ libnet_t *l;
while ((c = getopt(argc, argv, "vs:d:e:x:y:i:n:h?V")) != -1) {
switch (c) {
case 'v':
break;
case 's':
- Src = libnet_name_resolve(optarg, 0);
+ Src = libnet_name2addr4(l, optarg, 0);
break;
case 'd':
- Dst = libnet_name_resolve(optarg, 0);
+ Dst = libnet_name2addr4(l, optarg, 0);
break;
case 'e':
Tha = (u_char *)ether_aton(optarg);
@@ -101,13 +102,13 @@
if (argc != 0)
usage();
- if (!Intf && (Intf = pcap_lookupdev(ebuf)) == NULL)
- errx(1, "%s", ebuf);
+ if (!Intf && (Intf = pcap_lookupdev(pcap_ebuf)) == NULL)
+ errx(1, "%s", pcap_ebuf);
- if ((llif = libnet_open_link_interface(Intf, ebuf)) == 0)
- errx(1, "%s", ebuf);
+ if ((l = libnet_init(LIBNET_LINK, Intf, libnet_ebuf)) == NULL)
+ errx(1, "%s", libnet_ebuf);
- libnet_seed_prand();
+ libnet_seed_prand(l);
for (i = 0; i != Repeat; i++) {
@@ -117,39 +118,37 @@
else memcpy(tha, Tha, sizeof(tha));
if (Src != 0) src = Src;
- else src = libnet_get_prand(PRu32);
+ else src = libnet_get_prand(LIBNET_PRu32);
if (Dst != 0) dst = Dst;
- else dst = libnet_get_prand(PRu32);
+ else dst = libnet_get_prand(LIBNET_PRu32);
if (Sport != 0) sport = Sport;
- else sport = libnet_get_prand(PRu16);
+ else sport = libnet_get_prand(LIBNET_PRu16);
if (Dport != 0) dport = Dport;
- else dport = libnet_get_prand(PRu16);
+ else dport = libnet_get_prand(LIBNET_PRu16);
- seq = libnet_get_prand(PRu32);
-
- libnet_build_ethernet(tha, sha, ETHERTYPE_IP, NULL, 0, pkt);
-
- libnet_build_ip(TCP_H, 0, libnet_get_prand(PRu16), 0, 64,
- IPPROTO_TCP, src, dst, NULL, 0, pkt + ETH_H);
+ seq = libnet_get_prand(LIBNET_PRu32);
libnet_build_tcp(sport, dport, seq, 0, TH_SYN, 512,
- 0, NULL, 0, pkt + ETH_H + IP_H);
+ 0, 0, LIBNET_TCP_H, NULL, 0, l, 0);
+
+ libnet_build_ipv4(LIBNET_TCP_H, 0,
+ libnet_get_prand(LIBNET_PRu16), 0, 64,
+ IPPROTO_TCP, 0, src, dst, NULL, 0, l, 0);
- libnet_do_checksum(pkt + ETH_H, IPPROTO_IP, IP_H);
- libnet_do_checksum(pkt + ETH_H, IPPROTO_TCP, TCP_H);
+ libnet_build_ethernet(tha, sha, ETHERTYPE_IP, NULL, 0, l, 0);
- if (libnet_write_link_layer(llif, Intf, pkt, sizeof(pkt)) < 0)
+ if (libnet_write(l) < 0)
errx(1, "write");
fprintf(stderr, "%s ",
ether_ntoa((struct ether_addr *)sha));
fprintf(stderr, "%s %s.%d > %s.%d: S %u:%u(0) win 512\n",
ether_ntoa((struct ether_addr *)tha),
- libnet_host_lookup(Src, 0), sport,
- libnet_host_lookup(Dst, 0), dport, seq, seq);
+ libnet_addr2name4(Src, 0), sport,
+ libnet_addr2name4(Dst, 0), dport, seq, seq);
}
exit(0);
}
diff --exclude='*~' -Naur dsniff-2.4.orig/mailsnarf.8 dsniff-2.4/mailsnarf.8
--- dsniff-2.4.orig/mailsnarf.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/mailsnarf.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBmailsnarf\fR [\fB-i \fIinterface\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
+\fBmailsnarf\fR [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
@@ -19,6 +19,8 @@
.SH OPTIONS
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
messages.
diff --exclude='*~' -Naur dsniff-2.4.orig/mailsnarf.c dsniff-2.4/mailsnarf.c
--- dsniff-2.4.orig/mailsnarf.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/mailsnarf.c 2006-01-21 18:56:40.000000000 -0200
@@ -59,7 +59,7 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: mailsnarf [-i interface] [[-v] pattern [expression]]\n");
+ "Usage: mailsnarf [-i interface | -p pcapfile] [[-v] pattern [expression]]\n");
exit(1);
}
@@ -178,7 +178,7 @@
if (smtp->state != SMTP_DATA) {
while ((i = buf_index(&buf, "\r\n", 2)) >= 0) {
line = buf_tok(&buf, NULL, i + 2);
- line->base[line->end] = '\0';
+ line->base[line->end-1] = '\0';
p = buf_ptr(line);
if (strncasecmp(p, "RSET", 4) == 0) {
@@ -344,11 +344,14 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "i:vh?V")) != -1) {
+ while ((c = getopt(argc, argv, "i:p:vh?V")) != -1) {
switch (c) {
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
case 'v':
Opt_invert = 1;
break;
@@ -378,10 +381,23 @@
nids_register_tcp(sniff_pop_session);
if (nids_params.pcap_filter != NULL) {
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
- }
- else warnx("listening on %s", nids_params.device);
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+ }
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/Makefile.in dsniff-2.4/Makefile.in
--- dsniff-2.4.orig/Makefile.in 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/Makefile.in 2006-01-21 18:56:50.000000000 -0200
@@ -11,7 +11,7 @@
install_prefix =
prefix = @prefix@
exec_prefix = @exec_prefix@
-libdir = @libdir@
+libdir = $(prefix)/share/dsniff
sbindir = @sbindir@
mandir = @mandir@
@@ -37,8 +37,7 @@
X11INC = @X_CFLAGS@
X11LIB = @X_LIBS@ @X_PRE_LIBS@ -lXmu -lX11 @X_EXTRA_LIBS@
-INCS = -I. $(NIDSINC) $(PCAPINC) $(LNETINC) $(DBINC) $(SSLINC) $(X11INC) \
- -I$(srcdir)/missing
+INCS = -I. $(X11INC) -I$(srcdir)/missing
LIBS = @LIBS@ -L$(srcdir) -lmissing
INSTALL = @INSTALL@
diff --exclude='*~' -Naur dsniff-2.4.orig/msgsnarf.8 dsniff-2.4/msgsnarf.8
--- dsniff-2.4.orig/msgsnarf.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/msgsnarf.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBmsgsnarf\fR [\fB-i \fIinterface\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
+\fBmsgsnarf\fR [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
@@ -19,6 +19,8 @@
.SH OPTIONS
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
messages.
diff --exclude='*~' -Naur dsniff-2.4.orig/msgsnarf.c dsniff-2.4/msgsnarf.c
--- dsniff-2.4.orig/msgsnarf.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/msgsnarf.c 2006-01-21 18:56:40.000000000 -0200
@@ -23,6 +23,7 @@
#include <nids.h>
#include <pcap.h>
#include <pcaputil.h>
+#include <time.h>
#include "buf.h"
#include "decode.h"
@@ -44,7 +45,7 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: msgsnarf [-i interface] [[-v] pattern [expression]]\n");
+ "Usage: msgsnarf [-i interface | -p pcapfile] [[-v] pattern [expression]]\n");
exit(1);
}
@@ -632,11 +633,14 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "i:hv?V")) != -1) {
+ while ((c = getopt(argc, argv, "i:p:hv?V")) != -1) {
switch (c) {
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
case 'v':
Opt_invert = 1;
break;
@@ -665,11 +669,24 @@
nids_register_tcp(sniff_msgs);
- if (nids_params.pcap_filter != NULL) {
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
- }
- else warnx("listening on %s", nids_params.device);
+ if (nids_params.pcap_filter != NULL) {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+ }
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/msgsnarf.c.orig dsniff-2.4/msgsnarf.c.orig
--- dsniff-2.4.orig/msgsnarf.c.orig 1969-12-31 21:00:00.000000000 -0300
+++ dsniff-2.4/msgsnarf.c.orig 2006-01-21 18:56:30.000000000 -0200
@@ -0,0 +1,680 @@
+/*
+ * msgsnarf.c
+ *
+ * Sniff chat messages (AIM, ICQ, IRC, MSN, Yahoo) on a network.
+ *
+ * Copyright (c) 1999 Dug Song <dugsong@monkey.org>
+ *
+ * $Id: msgsnarf.c,v 1.11 2001/03/15 08:33:04 dugsong Exp $
+ */
+
+#include "config.h"
+
+#include <sys/types.h>
+#include <sys/queue.h>
+#include <netinet/in.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <regex.h>
+#include <err.h>
+#include <libnet.h>
+#include <nids.h>
+#include <pcap.h>
+#include <pcaputil.h>
+#include <time.h>
+
+#include "buf.h"
+#include "decode.h"
+#include "version.h"
+
+struct client_info {
+ char *nick;
+ char *peer;
+ char *type;
+ in_addr_t ip;
+ SLIST_ENTRY(client_info) next;
+};
+
+SLIST_HEAD(, client_info) client_list;
+int Opt_invert = 0;
+regex_t *pregex = NULL;
+
+static void
+usage(void)
+{
+ fprintf(stderr, "Version: " VERSION "\n"
+ "Usage: msgsnarf [-i interface] [[-v] pattern [expression]]\n");
+ exit(1);
+}
+
+static char *
+timestamp(void)
+{
+ static char stamp[32];
+ struct tm *tm;
+ time_t now;
+
+ time(&now);
+ tm = localtime(&now);
+ strftime(stamp, sizeof(stamp), "%b %e %T", tm);
+
+ return (stamp);
+}
+
+static int
+regex_match(char *string)
+{
+ return (pregex == NULL ||
+ ((regexec(pregex, string, 0, NULL, 0) == 0) ^ Opt_invert));
+}
+
+struct flap {
+ u_char start;
+ u_char channel;
+ u_short seqnum;
+ u_short datalen;
+};
+
+struct snac {
+ u_short family;
+ u_short subtype;
+ u_short flags;
+ u_int32_t reqid;
+};
+
+static int
+process_aim(struct client_info *info, u_char *data, int len)
+{
+ struct buf *msg, *word, buf;
+ struct flap *flap;
+ struct snac *snac;
+ u_char c, *p;
+ int i, reply;
+
+ buf_init(&buf, data, len);
+
+ if (buf_cmp(&buf, "FLAPON\r\n\r\n", 10) == 0)
+ buf_skip(&buf, 10);
+
+ while (buf_len(&buf) > sizeof(*flap)) {
+ flap = (struct flap *)buf_ptr(&buf);
+ flap->datalen = ntohs(flap->datalen);
+
+ i = sizeof(*flap) + flap->datalen;
+
+ if ((msg = buf_tok(&buf, NULL, i)) == NULL)
+ break;
+
+ buf_skip(msg, sizeof(*flap));
+ snac = (struct snac *)buf_ptr(msg);
+
+ if (flap->start != 0x2a)
+ continue;
+
+ if (flap->channel == 0x01) {
+ if (buf_cmp(msg, "\x00\x00\x00\x01\x00\x01\x00", 7) == 0) {
+ buf_skip(msg, 7);
+ buf_get(msg, &c, 1);
+
+ if ((word = buf_getbuf(msg, 0, c)) != NULL) {
+ if (info->nick) free(info->nick);
+ info->nick = buf_strdup(word);
+ buf_free(word);
+ }
+ buf_skip(msg, 3);
+ buf_get(msg, &c, 1);
+ buf_skip(msg, c + 4);
+
+ if (buf_cmp(msg, "ICQ", 3) == 0)
+ info->type = "ICQ";
+ else info->type = "AIM";
+ }
+ }
+ else if (flap->channel == 0x02) {
+ if (buf_cmp(msg, "toc_send_im ", 12) == 0) {
+ buf_skip(msg, 12);
+
+ if ((word = buf_getword(msg, " ", 1)) == NULL)
+ continue;
+
+ buf_skip(msg, 1);
+
+ if (buf_len(msg) < 3) continue;
+ msg->end -= 2;
+ p = buf_strdup(msg);
+
+ if (regex_match(p))
+ printf("%s AIM %s > %.*s: %s\n",
+ timestamp(), info->nick,
+ buf_len(word), buf_ptr(word), p);
+ buf_free(word);
+ free(p);
+ }
+ else if (buf_cmp(msg, "IM_IN:", 6) == 0) {
+ buf_skip(msg, 6);
+
+ if ((word = buf_getword(msg, ":", 1)) == NULL)
+ continue;
+
+ buf_skip(msg, 2);
+ p = buf_strdup(msg);
+
+ if (regex_match(p))
+ printf("%s AIM %.*s > %s: %s\n",
+ timestamp(), buf_len(word),
+ buf_ptr(word), info->nick, p);
+ buf_free(word);
+ free(p);
+ }
+ else if (ntohs(snac->family) == 0x04) {
+
+ if (ntohs(snac->subtype) == 0x06)
+ reply = 0;
+ else if (ntohs(snac->subtype) == 0x07)
+ reply = 1;
+ else continue;
+
+ buf_skip(msg, sizeof(*snac) + 8);
+ buf_get(msg, &c, 1);
+
+ if ((word = buf_getbuf(msg, 0, c)) == NULL)
+ continue;
+
+ /* XXX - ugh, this is totally bogus. help! */
+ if (buf_cmp(msg, "\x00\x02", 2) == 0) {
+ buf_skip(msg, 17);
+ while (buf_cmp(msg, "\x00", 1) == 0)
+ buf_skip(msg, 1);
+ }
+ else if (buf_cmp(msg, "\x00\x05", 2) == 0) {
+ buf_skip(msg, 97);
+ }
+ else if (buf_cmp(msg, "\x00\x00", 2) == 0) {
+ if (buf_skip(msg, 145) < 0)
+ buf_skip(msg, 57);
+ }
+ p = buf_strdup(msg);
+
+ if (p && strlen(p) && regex_match(p)) {
+ if (reply) {
+ printf("%s %s %.*s > %s: %s\n",
+ timestamp(), info->type,
+ buf_len(word),
+ buf_ptr(word),
+ info->nick, p);
+ }
+ else printf("%s %s %s > %.*s: %s\n",
+ timestamp(), info->type,
+ info->nick, buf_len(word),
+ buf_ptr(word), p);
+ }
+ buf_free(word);
+ if (p) free(p);
+ }
+ }
+ }
+ return (len - buf_len(&buf));
+}
+
+static int
+process_irc(struct client_info *info, u_char *data, int len)
+{
+ struct buf *line, *word, *prefix, buf;
+ char *p;
+ int i;
+
+ buf_init(&buf, data, len);
+
+ while ((i = buf_index(&buf, "\n", 1)) >= 0) {
+ line = buf_tok(&buf, NULL, i);
+ buf_skip(&buf, 1);
+
+ if (line->base[line->end-1] == '\r')
+ line->end--;
+
+ if (buf_cmp(line, ":", 1) == 0) {
+ buf_skip(line, 1);
+ if ((prefix = buf_getword(line, " ", 1)) == NULL)
+ continue;
+ if ((i = buf_index(prefix, "!", 1)) < 0)
+ continue;
+ prefix->end = i;
+ }
+ else prefix = NULL;
+
+ if (buf_cmp(line, "JOIN ", 5) == 0 && prefix != NULL) {
+ buf_skip(line, 5);
+ if (buf_cmp(line, ":", 1) == 0)
+ buf_skip(line, 1);
+
+ printf("%s IRC *** %.*s ", timestamp(),
+ buf_len(prefix), buf_ptr(prefix));
+
+ prefix->offset = prefix->end + 1;
+ prefix->end = prefix->size;
+
+ printf("(%.*s) has joined channel %.*s\n",
+ buf_len(prefix), buf_ptr(prefix),
+ buf_len(line), buf_ptr(line));
+ }
+ else if (buf_cmp(line, "PART ", 5) == 0 && prefix != NULL) {
+ buf_skip(line, 5);
+ if (buf_cmp(line, ":", 1) == 0)
+ buf_skip(line, 1);
+
+ if ((word = buf_getword(line, " :", 2)) == NULL)
+ continue;
+
+ printf("%s IRC *** %.*s has left channel %.*s\n",
+ timestamp(), buf_len(prefix), buf_ptr(prefix),
+ buf_len(word), buf_ptr(word));
+
+ buf_free(word);
+ }
+ else if (buf_cmp(line, "QUIT ", 5) == 0 && prefix != NULL) {
+ buf_skip(line, 5);
+ if (buf_cmp(line, ":", 1) == 0)
+ buf_skip(line, 1);
+
+ printf("%s IRC *** Signoff: %.*s (%.*s)\n",
+ timestamp(), buf_len(prefix), buf_ptr(prefix),
+ buf_len(line), buf_ptr(line));
+ }
+ else if (buf_cmp(line, "NICK ", 5) == 0) {
+ buf_skip(line, 5);
+ if (buf_cmp(line, ":", 1) == 0)
+ buf_skip(line, 1);
+
+ if (prefix != NULL) {
+ printf("%s IRC *** %.*s is now known as %.*s\n",
+ timestamp(),
+ buf_len(prefix), buf_ptr(prefix),
+ buf_len(line), buf_ptr(line));
+ }
+ else {
+ if (info->nick) free(info->nick);
+ info->nick = buf_strdup(line);
+ }
+ }
+ else if (buf_cmp(line, "PRIVMSG ", 8) == 0) {
+ buf_skip(line, 8);
+ if ((word = buf_getword(line, " :", 2)) == NULL)
+ continue;
+ p = buf_strdup(line);
+
+ if (regex_match(p)) {
+ if (strncmp(p + 1, "ACTION ", 7) == 0) {
+ printf("%s IRC * Action: ",
+ timestamp());
+
+ if (prefix != NULL) {
+ printf("%.*s %s\n",
+ buf_len(prefix),
+ buf_ptr(prefix), p + 8);
+ }
+ else printf("%s %s\n",
+ info->nick, p + 8);
+ }
+ else {
+ if (prefix != NULL) {
+ printf("%s IRC %.*s > ",
+ timestamp(),
+ buf_len(prefix),
+ buf_ptr(prefix));
+ }
+ else printf("%s IRC %s > ",
+ timestamp(),
+ info->nick);
+
+ printf("%.*s: %s\n", buf_len(word),
+ buf_ptr(word), p);
+ }
+ }
+ buf_free(word);
+ free(p);
+ }
+ }
+ return (len - buf_len(&buf));
+}
+
+static int
+process_msn(struct client_info *info, u_char *data, int len)
+{
+ struct buf *word, *line, buf;
+ char *p;
+ int i, reply;
+
+ buf_init(&buf, data, len);
+
+ while ((i = buf_index(&buf, "\r\n", 2)) >= 0) {
+ line = buf_tok(&buf, NULL, i);
+ buf_skip(&buf, 2);
+
+ if (buf_cmp(line, "USR ", 4) == 0) {
+ if ((i = buf_index(line, "MD5 ", 4)) > 0) {
+ buf_skip(line, i + 4);
+
+ if (buf_cmp(line, "I ", 2) == 0) {
+ buf_skip(line, 2);
+ if (info->nick != NULL)
+ free(info->nick);
+ info->nick = buf_strdup(line);
+ }
+ }
+ }
+ else if (buf_cmp(line, "IRO ", 4) == 0) {
+ if ((i = buf_rindex(line, "1 ", 2)) < 0)
+ continue;
+ buf_skip(line, i + 2);
+ word = buf_getword(line, " ", 1);
+ if (info->peer != NULL) free(info->peer);
+ info->peer = buf_strdup(word);
+ buf_free(word);
+ }
+ else if (buf_cmp(line, "MSG ", 4) == 0) {
+ buf_skip(line, 4);
+ reply = 0;
+
+ if ((word = buf_getword(line, " ", 1)) == NULL)
+ continue;
+
+ if (buf_cmp(line, "N ", 2) == 0 ||
+ buf_cmp(line, "U ", 2) == 0) {
+ reply = 1;
+ }
+ else {
+ if (info->peer != NULL) free(info->peer);
+ info->peer = buf_strdup(word);
+ }
+ buf_free(word);
+
+ if ((i = buf_rindex(line, " ", 1)) < 0)
+ continue;
+
+ buf_skip(line, i + 1);
+ p = buf_strdup(line);
+ i = atoi(p); free(p);
+ if (i <= 0) continue;
+
+ if ((line = buf_tok(NULL, NULL, i)) == NULL)
+ break;
+
+ if (buf_index(line, "Content-Type: text/plain", 24) > 0) {
+ if ((i = buf_rindex(line, "\r\n\r\n", 4)) < 0)
+ continue;
+
+ buf_skip(line, i + 4);
+ p = buf_strdup(line);
+
+ if (regex_match(p)) {
+ if (reply) {
+ printf("%s MSN %s > %s: %s\n",
+ timestamp(), info->nick,
+ info->peer, p);
+ }
+ else printf("%s MSN %s > %s: %s\n",
+ timestamp(), info->peer,
+ info->nick, p);
+ }
+ free(p);
+ }
+ }
+ }
+ return (len - buf_len(&buf));
+}
+
+struct yhoo {
+ u_char version[8];
+ u_int32_t length; /* all fields little-endian */
+ u_int32_t service;
+ u_int32_t connid;
+ u_int32_t magic;
+ u_int32_t unknown;
+ u_int32_t type;
+ u_char nick1[36];
+ u_char nick2[36];
+};
+
+struct ymsg {
+ u_char version[8];
+ u_short length;
+ u_short type;
+ u_int32_t unknown1;
+ u_int32_t unknown2;
+};
+
+static int
+process_yahoo(struct client_info *info, u_char *data, int len)
+{
+ struct yhoo *yhoo;
+ struct ymsg *ymsg;
+ struct buf *msg, *nick1, *nick2, buf;
+ int i, reply;
+ char *p;
+
+ buf_init(&buf, data, len);
+
+ if (buf_cmp(&buf, "YMSG", 4) == 0) {
+ while (buf_len(&buf) > sizeof(*ymsg)) {
+ ymsg = (struct ymsg *)buf_ptr(&buf);
+ ymsg->length = ntohs(ymsg->length);
+ ymsg->type = ntohs(ymsg->type);
+
+ i = sizeof(*ymsg) + ymsg->length;
+
+ if ((msg = buf_tok(&buf, NULL, i)) == NULL)
+ break;
+
+ buf_skip(msg, sizeof(*ymsg));
+
+ if (ymsg->type != 0x06)
+ continue;
+
+ reply = (buf_cmp(msg, "1", 1) != 0);
+ buf_skip(msg, 3);
+
+ nick1 = buf_getword(msg, "\xc0\x80", 2);
+ buf_skip(msg, 3);
+
+ nick2 = buf_getword(msg, "\xc0\x80", 2);
+ buf_skip(msg, 4);
+
+ msg->end -= 2;
+ p = buf_strdup(msg);
+
+ if (regex_match(p) && nick1 && nick2 && msg) {
+ printf("%s Yahoo ", timestamp());
+ if (reply)
+ printf("%.*s > %.*s: %s\n",
+ buf_len(nick2), buf_ptr(nick2),
+ buf_len(nick1), buf_ptr(nick1),
+ p);
+ else printf("%.*s > %.*s: %s\n",
+ buf_len(nick1), buf_ptr(nick1),
+ buf_len(nick2), buf_ptr(nick2), p);
+ }
+ if (nick1) buf_free(nick1);
+ if (nick2) buf_free(nick2);
+ free(p);
+ }
+ }
+ else {
+ while (buf_len(&buf) > sizeof(*yhoo)) {
+ yhoo = (struct yhoo *)buf_ptr(&buf);
+ yhoo->length = pletohl(&yhoo->length);
+ yhoo->service = pletohl(&yhoo->service);
+ yhoo->type = pletohl(&yhoo->type);
+ yhoo->nick1[sizeof(yhoo->nick1) - 1] = '\0';
+ yhoo->nick2[sizeof(yhoo->nick2) - 1] = '\0';
+
+ i = sizeof(*yhoo) + yhoo->length;
+
+ if ((msg = buf_tok(&buf, NULL, i)) == NULL)
+ break;
+
+ buf_skip(msg, sizeof(*yhoo));
+
+ if (yhoo->service != 6 || yhoo->type > 1)
+ continue;
+
+ if ((nick1 = buf_getword(msg, ",", 1)) == NULL)
+ continue;
+
+ if (memcmp(yhoo->version, "YHOO", 4) == 0) {
+ buf_skip(msg, 1);
+ reply = 0;
+ }
+ else reply = 1;
+
+ p = buf_strdup(msg);
+
+ if (regex_match(p)) {
+ if (reply)
+ printf("%s Yahoo %.*s > %s: %s\n",
+ timestamp(),
+ buf_len(nick1), buf_ptr(nick1),
+ yhoo->nick2, p);
+ else
+ printf("%s Yahoo %s > %.*s: %s\n",
+ timestamp(), yhoo->nick2,
+ buf_len(nick1), buf_ptr(nick1),
+ buf_ptr(msg));
+ }
+ free(p);
+ }
+ }
+ return (len - buf_len(&buf));
+}
+
+static void
+sniff_msgs(struct tcp_stream *ts, void **conn_save)
+{
+ struct client_info *c;
+ int (*process_msgs)(struct client_info *, u_char *, int);
+ int i;
+
+ if (ts->addr.dest >= 6660 && ts->addr.dest <= 6680) {
+ process_msgs = process_irc;
+ }
+ else if (ts->addr.dest == 5190 || ts->addr.dest == 9898) {
+ process_msgs = process_aim;
+ }
+ else if (ts->addr.dest == 5050) {
+ process_msgs = process_yahoo;
+ }
+ else if (ts->addr.dest == 1863) {
+ process_msgs = process_msn;
+ }
+ else return;
+
+ switch (ts->nids_state) {
+
+ case NIDS_JUST_EST:
+ ts->server.collect = 1;
+ ts->client.collect = 1;
+
+ i = 0;
+ SLIST_FOREACH(c, &client_list, next) {
+ if (c->ip == ts->addr.saddr) {
+ i = 1; break;
+ }
+ }
+ if (i == 0) {
+ if ((c = malloc(sizeof(*c))) == NULL)
+ nids_params.no_mem("sniff_msgs");
+ c->ip = ts->addr.saddr;
+ c->nick = strdup("unknown");
+ SLIST_INSERT_HEAD(&client_list, c, next);
+ }
+ *conn_save = (void *)c;
+ break;
+
+ case NIDS_DATA:
+ c = (struct client_info *)*conn_save;
+
+ if (ts->server.count_new > 0) {
+ i = process_msgs(c, ts->server.data,
+ ts->server.count - ts->server.offset);
+ nids_discard(ts, i);
+ }
+ else if (ts->client.count_new > 0) {
+ i = process_msgs(c, ts->client.data,
+ ts->client.count - ts->client.offset);
+ nids_discard(ts, i);
+ }
+ fflush(stdout);
+ break;
+
+ default:
+ c = (struct client_info *)*conn_save;
+
+ if (ts->server.count > 0)
+ process_msgs(c, ts->server.data,
+ ts->server.count - ts->server.offset);
+ else if (ts->client.count > 0)
+ process_msgs(c, ts->client.data,
+ ts->client.count - ts->client.offset);
+ fflush(stdout);
+ break;
+ }
+}
+
+static void
+null_syslog(int type, int errnum, struct ip *iph, void *data)
+{
+}
+
+int
+main(int argc, char *argv[])
+{
+ extern char *optarg;
+ extern int optind;
+ int c;
+
+ while ((c = getopt(argc, argv, "i:hv?V")) != -1) {
+ switch (c) {
+ case 'i':
+ nids_params.device = optarg;
+ break;
+ case 'v':
+ Opt_invert = 1;
+ break;
+ default:
+ usage();
+ }
+ }
+ argc -= optind;
+ argv += optind;
+
+ if (argc > 0 && strlen(argv[0])) {
+ if ((pregex = (regex_t *) malloc(sizeof(*pregex))) == NULL)
+ err(1, "malloc");
+ if (regcomp(pregex, argv[0], REG_EXTENDED|REG_NOSUB) != 0)
+ errx(1, "invalid regular expression");
+ }
+ if (argc > 1)
+ nids_params.pcap_filter = copy_argv(argv + 1);
+ nids_params.scan_num_hosts = 0;
+ nids_params.syslog = null_syslog;
+
+ if (!nids_init())
+ errx(1, "%s", nids_errbuf);
+
+ SLIST_INIT(&client_list);
+
+ nids_register_tcp(sniff_msgs);
+
+ if (nids_params.pcap_filter != NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else warnx("listening on %s", nids_params.device);
+
+ nids_run();
+
+ /* NOTREACHED */
+
+ exit(0);
+}
diff --exclude='*~' -Naur dsniff-2.4.orig/pathnames.h dsniff-2.4/pathnames.h
--- dsniff-2.4.orig/pathnames.h 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/pathnames.h 2006-01-21 18:56:50.000000000 -0200
@@ -12,7 +12,7 @@
#define PATHNAMES_H
#ifndef DSNIFF_LIBDIR
-#define DSNIFF_LIBDIR "/usr/local/lib/"
+#define DSNIFF_LIBDIR "/etc/dsniff/"
#endif
#define DSNIFF_SERVICES "dsniff.services"
diff --exclude='*~' -Naur dsniff-2.4.orig/record.c dsniff-2.4/record.c
--- dsniff-2.4.orig/record.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/record.c 2006-01-21 18:56:45.000000000 -0200
@@ -65,8 +65,8 @@
tm = localtime(&rec->time);
strftime(tstr, sizeof(tstr), "%x %X", tm);
- srcp = libnet_host_lookup(rec->src, Opt_dns);
- dstp = libnet_host_lookup(rec->dst, Opt_dns);
+ srcp = libnet_addr2name4(rec->src, Opt_dns);
+ dstp = libnet_addr2name4(rec->dst, Opt_dns);
if ((pr = getprotobynumber(rec->proto)) == NULL)
protop = "unknown";
diff --exclude='*~' -Naur dsniff-2.4.orig/sshcrypto.c dsniff-2.4/sshcrypto.c
--- dsniff-2.4.orig/sshcrypto.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/sshcrypto.c 2006-01-21 18:56:26.000000000 -0200
@@ -14,6 +14,8 @@
#include <sys/types.h>
#include <openssl/ssl.h>
+#include <openssl/blowfish.h>
+#include <openssl/des.h>
#include <err.h>
#include <stdio.h>
diff --exclude='*~' -Naur dsniff-2.4.orig/sshmitm.c dsniff-2.4/sshmitm.c
--- dsniff-2.4.orig/sshmitm.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/sshmitm.c 2006-01-21 18:56:45.000000000 -0200
@@ -389,7 +389,7 @@
if (argc < 1)
usage();
- if ((ip = libnet_name_resolve(argv[0], 1)) == -1)
+ if ((ip = libnet_name2addr4(NULL, argv[0], LIBNET_RESOLVE)) == -1)
usage();
if (argc == 2 && (rport = atoi(argv[1])) == 0)
diff --exclude='*~' -Naur dsniff-2.4.orig/sshow.8 dsniff-2.4/sshow.8
--- dsniff-2.4.orig/sshow.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/sshow.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBsshow\fR [\fB-d\fR] [\fB-i \fIinterface\fR] [\fIexpression\fR]
+\fBsshow\fR [\fB-d\fR] [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [\fIexpression\fR]
.SH DESCRIPTION
.ad
.fi
@@ -28,6 +28,8 @@
Enable verbose debugging output.
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP "\fIexpression\fR"
Specify a tcpdump(8) filter expression to select traffic to sniff.
.SH "SEE ALSO"
diff --exclude='*~' -Naur dsniff-2.4.orig/sshow.c dsniff-2.4/sshow.c
--- dsniff-2.4.orig/sshow.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/sshow.c 2006-01-21 18:56:40.000000000 -0200
@@ -15,6 +15,7 @@
#include <sys/types.h>
#include <sys/times.h>
+#include <time.h>
#include <netinet/in_systm.h>
#include <netinet/in.h>
@@ -81,7 +82,7 @@
static void
usage(void)
{
- fprintf(stderr, "Usage: sshow [-d] [-i interface]\n");
+ fprintf(stderr, "Usage: sshow [-d] [-i interface | -p pcapfile]\n");
exit(1);
}
@@ -615,7 +616,7 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "di:h?")) != -1) {
+ while ((c = getopt(argc, argv, "di:p:h?")) != -1) {
switch (c) {
case 'd':
debug++;
@@ -623,6 +624,9 @@
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
default:
usage();
break;
@@ -651,11 +655,24 @@
nids_register_tcp(process_event);
- if (nids_params.pcap_filter != NULL) {
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
- }
- else warnx("listening on %s", nids_params.device);
+ if (nids_params.pcap_filter != NULL) {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+ }
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/sshow.c.orig dsniff-2.4/sshow.c.orig
--- dsniff-2.4.orig/sshow.c.orig 1969-12-31 21:00:00.000000000 -0300
+++ dsniff-2.4/sshow.c.orig 2006-01-21 18:56:30.000000000 -0200
@@ -0,0 +1,664 @@
+/*
+ * sshow.c
+ *
+ * Passive SSH traffic analysis.
+ *
+ * http://www.openwall.com/advisories/OW-003-ssh-traffic-analysis.txt
+ *
+ * Copyright (c) 2000-2001 Solar Designer <solar@openwall.com>
+ * Copyright (c) 2000 Dug Song <dugsong@monkey.org>
+ *
+ * $Id: sshow.c,v 1.2 2001/03/19 06:52:15 dugsong Exp $
+ */
+
+#include "config.h"
+
+#include <sys/types.h>
+#include <sys/times.h>
+#include <time.h>
+
+#include <netinet/in_systm.h>
+#include <netinet/in.h>
+#include <netinet/ip.h>
+#include <netinet/tcp.h>
+#include <arpa/inet.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <ctype.h>
+#include <unistd.h>
+#include <signal.h>
+#include <errno.h>
+#include <err.h>
+#include <nids.h>
+#include <pcap.h>
+
+#include "pcaputil.h"
+
+#if !defined(NIDS_MAJOR) || (NIDS_MAJOR == 1 && NIDS_MINOR < 15)
+#error This program requires libnids 1.15+
+#endif
+
+#define HISTORY_SIZE 16
+
+typedef struct {
+ u_int min, max;
+} range;
+
+typedef struct {
+ int direction; /* 0 for client to server */
+ clock_t timestamp; /* timestamp of this packet */
+ u_int cipher_size; /* ciphertext size */
+ range plain_range; /* possible plaintext sizes */
+} record;
+
+struct history {
+ record packets[HISTORY_SIZE]; /* recent packets (circular list) */
+ int index; /* next (free) index into packets[] */
+ u_int directions; /* recent directions (bitmask) */
+ clock_t timestamps[2]; /* last timestamps in each direction */
+};
+
+struct line {
+ int input_count; /* input packets (client to server) */
+ int input_size; /* input size (estimated) */
+ int input_last; /* last input packet size */
+ int echo_count; /* echo packets (server to client) */
+};
+
+struct session {
+ int protocol; /* -1 not SSH, 0 unknown, 1 or 2 once known */
+ int state; /* 1 after username, 2 after authentication */
+ int compressed; /* whether compression is known to be used */
+ struct history history; /* session history */
+ struct line line; /* current command line */
+};
+
+static int debug = 0;
+
+static clock_t now;
+
+static void
+usage(void)
+{
+ fprintf(stderr, "Usage: sshow [-d] [-i interface]\n");
+ exit(1);
+}
+
+static clock_t
+add_history(struct session *session, int direction,
+ u_int cipher_size, range *plain_range)
+{
+ record *current;
+ clock_t delay;
+
+ current = &session->history.packets[session->history.index++];
+ session->history.index %= HISTORY_SIZE;
+
+ current->direction = direction;
+ current->timestamp = now;
+ current->cipher_size = cipher_size;
+ current->plain_range = *plain_range;
+
+ session->history.directions <<= 1;
+ session->history.directions |= direction;
+
+ delay = now - session->history.timestamps[direction];
+ session->history.timestamps[direction] = now;
+
+ return (delay);
+}
+
+static record *
+get_history(struct session *session, int age)
+{
+ int index;
+
+ index = session->history.index + (HISTORY_SIZE - 1) - age;
+ index %= HISTORY_SIZE;
+
+ return (&session->history.packets[index]);
+}
+
+static char *
+s_saddr(struct tcp_stream *ts)
+{
+ static char output[32];
+
+ snprintf(output, sizeof(output), "%s:%u",
+ inet_ntoa(*((struct in_addr *)&ts->addr.saddr)),
+ ts->addr.source);
+ return (output);
+}
+
+static char *
+s_daddr(struct tcp_stream *ts)
+{
+ static char output[32];
+
+ snprintf(output, sizeof(output), "%s:%u",
+ inet_ntoa(*((struct in_addr *)&ts->addr.daddr)),
+ ts->addr.dest);
+ return (output);
+}
+
+static char *
+s_range(range *range)
+{
+ static char output[32];
+
+ snprintf(output, sizeof(output),
+ range->min == range->max ? "%u" : "%u to %u",
+ range->min, range->max);
+ return (output);
+}
+
+static void
+print_data(struct half_stream *stream, u_int count)
+{
+ u_int i;
+ int printable;
+
+ printable = 1;
+ for (i = 0; i < count; i++) {
+ printf("%02x%c", (int)(u_char)stream->data[i],
+ i < count - 1 && i % 24 != 23
+ ? ' ' : '\n');
+ printable &=
+ isprint(stream->data[i]) ||
+ stream->data[i] == '\n';
+ }
+ if (printable && count >= 4 && !memcmp(stream->data, "SSH-", 4))
+ fwrite(stream->data, count, 1, stdout);
+}
+
+static u_int
+ssh1_plain_size(struct half_stream *stream)
+{
+ if (stream->count_new < 4) return (0);
+
+ return (u_int)(u_char)stream->data[3] |
+ ((u_int)(u_char)stream->data[2] << 8) |
+ ((u_int)(u_char)stream->data[1] << 16) |
+ ((u_int)(u_char)stream->data[0] << 24);
+}
+
+static u_int
+ssh1_cipher_size(struct half_stream *stream)
+{
+ return (4 + ((ssh1_plain_size(stream) + 8) & ~7));
+}
+
+static range *
+ssh1_plain_range(struct half_stream *stream)
+{
+ static range output;
+
+ output.min = output.max = ssh1_plain_size(stream) - 5;
+ return (&output);
+}
+
+static range *
+ssh2_plain_range(struct half_stream *stream)
+{
+ static range output;
+
+ output.max = stream->count_new - 16;
+ /* Assume min padding + 8-byte cipher blocksize */
+ output.min = output.max - 7;
+ if ((int)output.min < 0) output.min = 0;
+ return (&output);
+}
+
+static void
+client_to_server(struct tcp_stream *ts, struct session *session,
+ u_int cipher_size, range *plain_range)
+{
+ clock_t delay;
+ int payload;
+
+ delay = add_history(session, 0, cipher_size, plain_range);
+
+ if (debug)
+ printf("- %s -> %s: DATA (%s bytes, %.2f seconds)\n",
+ s_saddr(ts), s_daddr(ts), s_range(plain_range),
+ (float)delay / CLK_TCK);
+ if (debug > 1)
+ print_data(&ts->server, cipher_size);
+
+ payload = plain_range->min;
+ if (session->state == 2 && payload > 0) {
+ session->line.input_count++;
+ session->line.input_last = payload;
+ if (session->protocol == 1)
+ payload -= 4;
+ else {
+ payload -= 20 + 1;
+ /* Assume several SSH-2 packets in this IP packet */
+ if (payload % 44 == 0) {
+ session->line.input_count += payload / 44;
+ /* One character per SSH-2 packet (typical) */
+ payload += payload / 44;
+ payload %= 44;
+ }
+ payload++;
+ }
+ if (payload <= 0) {
+ if (payload < 0 && !session->compressed &&
+ session->protocol == 1) {
+ session->compressed = 1;
+ printf("+ %s -> %s: Compression detected, "
+ "guesses will be much less reliable\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+ payload = 1;
+ }
+ session->line.input_size += payload;
+ }
+}
+
+static void
+server_to_client(struct tcp_stream *ts, struct session *session,
+ u_int cipher_size, range *plain_range)
+{
+ clock_t delay;
+ int skip;
+ range string_range;
+
+ delay = add_history(session, 1, cipher_size, plain_range);
+
+ if (debug)
+ printf("- %s <- %s: DATA (%s bytes, %.2f seconds)\n",
+ s_saddr(ts), s_daddr(ts), s_range(plain_range),
+ (float)delay / CLK_TCK);
+ if (debug > 1)
+ print_data(&ts->client, cipher_size);
+
+/*
+ * Some of the checks may want to skip over multiple server responses.
+ * For example, there's a debugging packet sent for every option found
+ * in authorized_keys, but we can't use those packets in our pattern.
+ */
+ skip = 0;
+ while (((session->history.directions >> skip) & 3) == 3)
+ if (++skip > HISTORY_SIZE - 5) break;
+
+ if (session->state == 0 &&
+ session->protocol == 1 &&
+ ((session->history.directions >> skip) & 7) == 5 &&
+ plain_range->min == 0 &&
+ get_history(session, skip + 1)->plain_range.min > 4 &&
+ get_history(session, skip + 2)->plain_range.min == 0) {
+ session->state = 1;
+ string_range = get_history(session, skip + 1)->plain_range;
+ string_range.min -= 4; string_range.max -= 4;
+ printf("+ %s -> %s: GUESS: Username length is %s\n",
+ s_saddr(ts), s_daddr(ts), s_range(&string_range));
+ return;
+ }
+
+ if (session->state == 1 &&
+#ifdef USE_TIMING
+ now - get_history(session, 2)->timestamp >= CLK_TCK &&
+#endif
+ session->protocol == 1 &&
+ (session->history.directions & 7) == 5 &&
+ plain_range->min == 0 &&
+ get_history(session, 1)->plain_range.min > 4 &&
+ get_history(session, 2)->plain_range.min == 0) {
+ session->state = 2;
+ string_range = get_history(session, 1)->plain_range;
+ string_range.min -= 4; string_range.max -= 4;
+ printf("+ %s -> %s: GUESS: Password authentication, "
+ "password length %s %s%s\n",
+ s_saddr(ts), s_daddr(ts),
+ string_range.min == 32 ? "appears to be" : "is",
+ s_range(&string_range),
+ string_range.min == 32 ? " (padded?)" : "");
+ }
+
+ if (session->state == 0 &&
+ session->protocol == 2 &&
+ (session->history.directions & 7) == 5) {
+ if (plain_range->min == 4 + 9) {
+ string_range = get_history(session, 1)->plain_range;
+
+ if (string_range.min > 500 && string_range.min < 600) {
+ session->state = 2;
+ printf("+ %s -> %s: GUESS: DSA "
+ "authentication accepted\n",
+ s_saddr(ts), s_daddr(ts));
+ } else
+ if (string_range.min > 42 + 9) {
+ session->state = 2;
+ printf("+ %s -> %s: GUESS: Password "
+ "authentication accepted\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+ } else if (plain_range->min > 12 + 9 &&
+ plain_range->min < 56 + 9) {
+ string_range = get_history(session, 1)->plain_range;
+
+ if (string_range.min > 500 && string_range.min < 600)
+ printf("+ %s -> %s: GUESS: DSA "
+ "authentication failed\n",
+ s_saddr(ts), s_daddr(ts));
+ else if (string_range.min > 42 + 9)
+ printf("+ %s -> %s: GUESS: Password "
+ "authentication failed\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+ }
+
+ if (session->state == 1 &&
+ session->protocol == 1 &&
+ (session->history.directions & 3) == 1 &&
+ plain_range->min == 0 &&
+ get_history(session, 1)->plain_range.min == 130) {
+ printf("+ %s -> %s: GUESS: RSA authentication refused\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+
+ if (session->state == 1 &&
+ session->protocol == 1 &&
+ skip >= 1 &&
+ ((session->history.directions >> (skip - 1)) & 037) == 013 &&
+ plain_range->min == 0 &&
+ get_history(session, skip - 1 + 2)->plain_range.min == 16 &&
+ get_history(session, skip - 1 + 3)->plain_range.min == 130 &&
+ get_history(session, skip - 1 + 4)->plain_range.min == 130) {
+ char *what;
+
+ switch (get_history(session, 1)->plain_range.min - 4) {
+ case 28:
+ /* "RSA authentication accepted." */
+ session->state = 2;
+ if (skip > 1 && (what = alloca(64))) {
+ snprintf(what, 64, "accepted "
+ "(%d+ authorized_keys option%s)",
+ skip - 1, skip - 1 == 1 ? "" : "s");
+ break;
+ }
+ what = "accepted";
+ break;
+
+ case 47:
+ /* "Wrong response to RSA authentication challenge." */
+ what = "failed";
+ break;
+
+ default:
+ what = "???";
+ }
+ printf("+ %s -> %s: GUESS: RSA authentication %s\n",
+ s_saddr(ts), s_daddr(ts), what);
+ }
+
+ if (session->state == 2) {
+ session->line.echo_count++;
+
+ /* Check for backspace */
+ if (session->protocol == 1 && !session->compressed &&
+ plain_range->min == 4 + 3 &&
+ session->line.input_size >= 2)
+ session->line.input_size -= 2;
+
+ if (plain_range->min > 4 + session->line.input_last &&
+ session->line.input_count >= 2 &&
+ session->line.input_size >= 2) {
+ int size;
+ char *what;
+
+ size = session->line.input_size;
+ if (session->line.echo_count + 1 >=
+ session->line.input_count &&
+ size <= (session->line.input_count << 2) &&
+ size < 0x100) {
+ what = "(command) line";
+ }
+ else {
+ if (session->line.echo_count <= 2 &&
+ size <= (session->line.input_count << 1) &&
+ size >= 2 + 1 && size <= 40 + 1) {
+ what = "password";
+ }
+ else what = NULL;
+ }
+ if (debug) {
+ printf("- %s -> %s: sent %d packets "
+ "(%d characters), seen %d replies\n",
+ s_saddr(ts), s_daddr(ts),
+ session->line.input_count, size,
+ session->line.echo_count);
+ }
+ if (what) {
+ printf("+ %s -> %s: GUESS: "
+ "a %s of %d character%s\n",
+ s_saddr(ts), s_daddr(ts),
+ what, size - 1, size == 2 ? "" : "s");
+ }
+ }
+ if (plain_range->min <= 0 ||
+ plain_range->min > 4 + session->line.input_last) {
+ session->line.input_count = 0;
+ session->line.input_size = 0;
+ session->line.echo_count = 0;
+ }
+ }
+}
+
+static void
+process_data(struct tcp_stream *ts, struct session *session)
+{
+ u_int have, need;
+ char *lf;
+
+ if (session->protocol < 0) return;
+
+ if (ts->client.count_new &&
+ (have = ts->client.count - ts->client.offset)) {
+ switch (session->protocol) {
+ case 1:
+ if (have < (need = ssh1_cipher_size(&ts->client))) {
+ if (debug) {
+ printf("- %s <- %s: got %u of "
+ "%u bytes\n", s_saddr(ts),
+ s_daddr(ts), have, need);
+ }
+ nids_discard(ts, 0);
+ return;
+ }
+ if (have != need && debug) {
+ printf("- %s <- %s: left %u bytes\n",
+ s_saddr(ts), s_daddr(ts),
+ have - need);
+ }
+ nids_discard(ts, need);
+ server_to_client(ts, session, need,
+ ssh1_plain_range(&ts->client));
+ return;
+
+ case 2:
+ server_to_client(ts, session, have,
+ ssh2_plain_range(&ts->client));
+ return;
+
+ default:
+ break;
+ }
+ }
+ if (ts->server.count_new &&
+ (have = ts->server.count - ts->server.offset)) {
+ if (!session->protocol) {
+ lf = (char *)memchr(ts->server.data, '\n', have);
+ if (have < 7 || (!lf && have < 0x100)) {
+ nids_discard(ts, 0);
+ return;
+ }
+ if (lf && !memcmp(ts->server.data, "SSH-", 4))
+ session->protocol = ts->server.data[4] - '0';
+ /* some clients announce SSH-1.99 instead of SSH-2.0 */
+ if (session->protocol == 1 &&
+ ts->server.data[5] == '.' &&
+ ts->server.data[6] == '9') {
+ session->protocol = 2;
+ }
+ if (session->protocol != 1 && session->protocol != 2) {
+ session->protocol = -1;
+ if (debug) {
+ printf("- %s -> %s: not SSH\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+ return;
+ }
+ need = lf - ts->server.data + 1;
+ nids_discard(ts, need);
+ printf("+ %s -> %s: SSH protocol %d\n",
+ s_saddr(ts), s_daddr(ts), session->protocol);
+ if (debug)
+ print_data(&ts->server, have);
+ return;
+ }
+
+ switch (session->protocol) {
+ case 1:
+ if (have < (need = ssh1_cipher_size(&ts->server))) {
+ if (debug) {
+ printf("- %s -> %s: got %u of "
+ "%u bytes\n", s_saddr(ts),
+ s_daddr(ts), have, need);
+ }
+ nids_discard(ts, 0);
+ return;
+ }
+ if (have != need && debug) {
+ printf("- %s -> %s: left %u bytes\n",
+ s_saddr(ts), s_daddr(ts),
+ have - need);
+ }
+ nids_discard(ts, need);
+ client_to_server(ts, session, need,
+ ssh1_plain_range(&ts->server));
+ return;
+
+ case 2:
+ client_to_server(ts, session, have,
+ ssh2_plain_range(&ts->server));
+ }
+ }
+}
+
+static void
+process_event(struct tcp_stream *ts, struct session **session)
+{
+ struct tms buf;
+ char *what;
+
+ now = times(&buf);
+ what = NULL;
+
+ switch (ts->nids_state) {
+ case NIDS_JUST_EST:
+ ts->client.collect = 1;
+ ts->server.collect = 1;
+ if (debug) {
+ printf("- %s -> %s: ESTABLISHED\n",
+ s_saddr(ts), s_daddr(ts));
+ }
+ if (!(*session = calloc(1, sizeof(**session)))) {
+ err(1, "calloc");
+ }
+ (*session)->history.timestamps[0] = now;
+ (*session)->history.timestamps[1] = now;
+ return;
+
+ case NIDS_CLOSE:
+ what = "CLOSED";
+
+ case NIDS_RESET:
+ if (!what) what = "RESET";
+
+ case NIDS_TIMED_OUT:
+ if (!what) what = "TIMED OUT";
+ if ((*session)->protocol > 0) {
+ printf("+ %s -- %s: %s\n",
+ s_saddr(ts), s_daddr(ts), what);
+ }
+ else if (debug) {
+ printf("- %s -- %s: %s\n",
+ s_saddr(ts), s_daddr(ts), what);
+ }
+ free(*session);
+ return;
+
+ case NIDS_DATA:
+ process_data(ts, *session);
+ return;
+ }
+}
+
+static void
+null_syslog(int type, int errnum, struct ip *iph, void *data)
+{
+}
+
+static void
+cleanup(int signum)
+{
+ exit(0); /* Just so that atexit(3) jobs are called */
+}
+
+int
+main(int argc, char *argv[])
+{
+ extern char *optarg;
+ extern int optind;
+ int c;
+
+ while ((c = getopt(argc, argv, "di:h?")) != -1) {
+ switch (c) {
+ case 'd':
+ debug++;
+ break;
+ case 'i':
+ nids_params.device = optarg;
+ break;
+ default:
+ usage();
+ break;
+ }
+ }
+ argc -= optind;
+ argv += optind;
+
+ signal(SIGTERM, cleanup);
+ signal(SIGINT, cleanup);
+ signal(SIGHUP, cleanup);
+
+ setlinebuf(stdout);
+
+ if (argc > 0) {
+ nids_params.pcap_filter = copy_argv(argv);
+ }
+ else nids_params.pcap_filter = "tcp";
+
+ nids_params.syslog = null_syslog;
+ nids_params.scan_num_hosts = 0;
+ nids_params.one_loop_less = 1;
+
+ if (!nids_init())
+ errx(1, "nids_init: %s", nids_errbuf);
+
+ nids_register_tcp(process_event);
+
+ if (nids_params.pcap_filter != NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else warnx("listening on %s", nids_params.device);
+
+ nids_run();
+
+ return (0);
+}
diff --exclude='*~' -Naur dsniff-2.4.orig/tcpkill.c dsniff-2.4/tcpkill.c
--- dsniff-2.4.orig/tcpkill.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/tcpkill.c 2006-01-21 18:56:45.000000000 -0200
@@ -39,17 +39,18 @@
static void
tcp_kill_cb(u_char *user, const struct pcap_pkthdr *pcap, const u_char *pkt)
{
- struct libnet_ip_hdr *ip;
+ struct libnet_ipv4_hdr *ip;
struct libnet_tcp_hdr *tcp;
- u_char ctext[64], buf[IP_H + TCP_H];
+ u_char ctext[64];
u_int32_t seq, win;
- int i, *sock, len;
+ int i, len;
+ libnet_t *l;
- sock = (int *)user;
+ l = (libnet_t *)user;
pkt += pcap_off;
len = pcap->caplen - pcap_off;
- ip = (struct libnet_ip_hdr *)pkt;
+ ip = (struct libnet_ipv4_hdr *)pkt;
if (ip->ip_p != IPPROTO_TCP)
return;
@@ -57,34 +58,31 @@
if (tcp->th_flags & (TH_SYN|TH_FIN|TH_RST))
return;
- libnet_build_ip(TCP_H, 0, 0, 0, 64, IPPROTO_TCP,
- ip->ip_dst.s_addr, ip->ip_src.s_addr,
- NULL, 0, buf);
-
- libnet_build_tcp(ntohs(tcp->th_dport), ntohs(tcp->th_sport),
- 0, 0, TH_RST, 0, 0, NULL, 0, buf + IP_H);
-
seq = ntohl(tcp->th_ack);
win = ntohs(tcp->th_win);
snprintf(ctext, sizeof(ctext), "%s:%d > %s:%d:",
- libnet_host_lookup(ip->ip_src.s_addr, 0),
+ libnet_addr2name4(ip->ip_src.s_addr, LIBNET_DONT_RESOLVE),
ntohs(tcp->th_sport),
- libnet_host_lookup(ip->ip_dst.s_addr, 0),
+ libnet_addr2name4(ip->ip_dst.s_addr, LIBNET_DONT_RESOLVE),
ntohs(tcp->th_dport));
- ip = (struct libnet_ip_hdr *)buf;
- tcp = (struct libnet_tcp_hdr *)(ip + 1);
-
for (i = 0; i < Opt_severity; i++) {
- ip->ip_id = libnet_get_prand(PRu16);
seq += (i * win);
- tcp->th_seq = htonl(seq);
- libnet_do_checksum(buf, IPPROTO_TCP, TCP_H);
+ libnet_clear_packet(l);
+
+ libnet_build_tcp(ntohs(tcp->th_dport), ntohs(tcp->th_sport),
+ seq, 0, TH_RST, 0, 0, 0, LIBNET_TCP_H,
+ NULL, 0, l, 0);
+
+ libnet_build_ipv4(LIBNET_IPV4_H + LIBNET_TCP_H, 0,
+ libnet_get_prand(LIBNET_PRu16), 0, 64,
+ IPPROTO_TCP, 0, ip->ip_dst.s_addr,
+ ip->ip_src.s_addr, NULL, 0, l, 0);
- if (libnet_write_ip(*sock, buf, sizeof(buf)) < 0)
- warn("write_ip");
+ if (libnet_write(l) < 0)
+ warn("write");
fprintf(stderr, "%s R %lu:%lu(0) win 0\n", ctext, seq, seq);
}
@@ -95,8 +93,10 @@
{
extern char *optarg;
extern int optind;
- int c, sock;
+ int c;
char *p, *intf, *filter, ebuf[PCAP_ERRBUF_SIZE];
+ char libnet_ebuf[LIBNET_ERRBUF_SIZE];
+ libnet_t *l;
pcap_t *pd;
intf = NULL;
@@ -136,14 +136,14 @@
if ((pcap_off = pcap_dloff(pd)) < 0)
errx(1, "couldn't determine link layer offset");
- if ((sock = libnet_open_raw_sock(IPPROTO_RAW)) == -1)
+ if ((l = libnet_init(LIBNET_RAW4, intf, libnet_ebuf)) == NULL)
errx(1, "couldn't initialize sending");
- libnet_seed_prand();
+ libnet_seed_prand(l);
warnx("listening on %s [%s]", intf, filter);
- pcap_loop(pd, -1, tcp_kill_cb, (u_char *)&sock);
+ pcap_loop(pd, -1, tcp_kill_cb, (u_char *)l);
/* NOTREACHED */
diff --exclude='*~' -Naur dsniff-2.4.orig/tcpnice.c dsniff-2.4/tcpnice.c
--- dsniff-2.4.orig/tcpnice.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/tcpnice.c 2006-01-21 18:56:45.000000000 -0200
@@ -41,107 +41,106 @@
}
static void
-send_tcp_window_advertisement(int sock, struct libnet_ip_hdr *ip,
+send_tcp_window_advertisement(libnet_t *l, struct libnet_ipv4_hdr *ip,
struct libnet_tcp_hdr *tcp)
{
int len;
ip->ip_hl = 5;
- ip->ip_len = htons(IP_H + TCP_H);
- ip->ip_id = libnet_get_prand(PRu16);
- memcpy(buf, (u_char *)ip, IP_H);
+ ip->ip_len = htons(LIBNET_IPV4_H + LIBNET_TCP_H);
+ ip->ip_id = libnet_get_prand(LIBNET_PRu16);
+ memcpy(buf, (u_char *)ip, LIBNET_IPV4_H);
tcp->th_off = 5;
tcp->th_win = htons(MIN_WIN);
- memcpy(buf + IP_H, (u_char *)tcp, TCP_H);
+ memcpy(buf + LIBNET_IPV4_H, (u_char *)tcp, LIBNET_TCP_H);
- libnet_do_checksum(buf, IPPROTO_TCP, TCP_H);
+ libnet_do_checksum(l, buf, IPPROTO_TCP, LIBNET_TCP_H);
- len = IP_H + TCP_H;
+ len = LIBNET_IPV4_H + LIBNET_TCP_H;
- if (libnet_write_ip(sock, buf, len) != len)
+ if (libnet_write_raw_ipv4(l, buf, len) != len)
warn("write");
fprintf(stderr, "%s:%d > %s:%d: . ack %lu win %d\n",
- libnet_host_lookup(ip->ip_src.s_addr, 0), ntohs(tcp->th_sport),
- libnet_host_lookup(ip->ip_dst.s_addr, 0), ntohs(tcp->th_dport),
+ libnet_addr2name4(ip->ip_src.s_addr, 0), ntohs(tcp->th_sport),
+ libnet_addr2name4(ip->ip_dst.s_addr, 0), ntohs(tcp->th_dport),
ntohl(tcp->th_ack), 1);
}
static void
-send_icmp_source_quench(int sock, struct libnet_ip_hdr *ip)
+send_icmp_source_quench(libnet_t *l, struct libnet_ipv4_hdr *ip)
{
- struct libnet_icmp_hdr *icmp;
+ struct libnet_icmpv4_hdr *icmp;
int len;
len = (ip->ip_hl * 4) + 8;
- libnet_build_ip(ICMP_ECHO_H + len, 0, libnet_get_prand(PRu16),
- 0, 64, IPPROTO_ICMP, ip->ip_dst.s_addr,
- ip->ip_src.s_addr, NULL, 0, buf);
-
- icmp = (struct libnet_icmp_hdr *)(buf + IP_H);
+ icmp = (struct libnet_icmpv4_hdr *)(buf + LIBNET_IPV4_H);
icmp->icmp_type = ICMP_SOURCEQUENCH;
icmp->icmp_code = 0;
- memcpy((u_char *)icmp + ICMP_ECHO_H, (u_char *)ip, len);
+ memcpy((u_char *)icmp + LIBNET_ICMPV4_ECHO_H, (u_char *)ip, len);
- libnet_do_checksum(buf, IPPROTO_ICMP, ICMP_ECHO_H + len);
+ len += LIBNET_ICMPV4_ECHO_H;
- len += (IP_H + ICMP_ECHO_H);
+ libnet_build_ipv4(LIBNET_IPV4_H + len, 0,
+ libnet_get_prand(LIBNET_PRu16), 0, 64, IPPROTO_ICMP,
+ 0, ip->ip_dst.s_addr, ip->ip_src.s_addr,
+ (u_int8_t *) icmp, len, l, 0);
- if (libnet_write_ip(sock, buf, len) != len)
+ if (libnet_write(l) != len)
warn("write");
fprintf(stderr, "%s > %s: icmp: source quench\n",
- libnet_host_lookup(ip->ip_dst.s_addr, 0),
- libnet_host_lookup(ip->ip_src.s_addr, 0));
+ libnet_addr2name4(ip->ip_dst.s_addr, 0),
+ libnet_addr2name4(ip->ip_src.s_addr, 0));
}
static void
-send_icmp_frag_needed(int sock, struct libnet_ip_hdr *ip)
+send_icmp_frag_needed(libnet_t *l, struct libnet_ipv4_hdr *ip)
{
- struct libnet_icmp_hdr *icmp;
+ struct libnet_icmpv4_hdr *icmp;
int len;
len = (ip->ip_hl * 4) + 8;
- libnet_build_ip(ICMP_MASK_H + len, 4, libnet_get_prand(PRu16),
- 0, 64, IPPROTO_ICMP, ip->ip_dst.s_addr,
- ip->ip_src.s_addr, NULL, 0, buf);
-
- icmp = (struct libnet_icmp_hdr *)(buf + IP_H);
+ icmp = (struct libnet_icmpv4_hdr *)(buf + LIBNET_IPV4_H);
icmp->icmp_type = ICMP_UNREACH;
icmp->icmp_code = ICMP_UNREACH_NEEDFRAG;
icmp->hun.frag.pad = 0;
icmp->hun.frag.mtu = htons(MIN_MTU);
- memcpy((u_char *)icmp + ICMP_MASK_H, (u_char *)ip, len);
+ memcpy((u_char *)icmp + LIBNET_ICMPV4_MASK_H, (u_char *)ip, len);
- libnet_do_checksum(buf, IPPROTO_ICMP, ICMP_MASK_H + len);
-
- len += (IP_H + ICMP_MASK_H);
+ len += LIBNET_ICMPV4_MASK_H;
+
+ libnet_build_ipv4(LIBNET_IPV4_H + len, 4,
+ libnet_get_prand(LIBNET_PRu16), 0, 64, IPPROTO_ICMP,
+ 0, ip->ip_dst.s_addr, ip->ip_src.s_addr,
+ (u_int8_t *) icmp, len, l, 0);
- if (libnet_write_ip(sock, buf, len) != len)
+ if (libnet_write(l) != len)
warn("write");
fprintf(stderr, "%s > %s: icmp: ",
- libnet_host_lookup(ip->ip_dst.s_addr, 0),
- libnet_host_lookup(ip->ip_src.s_addr, 0));
+ libnet_addr2name4(ip->ip_dst.s_addr, 0),
+ libnet_addr2name4(ip->ip_src.s_addr, 0));
fprintf(stderr, "%s unreachable - need to frag (mtu %d)\n",
- libnet_host_lookup(ip->ip_src.s_addr, 0), MIN_MTU);
+ libnet_addr2name4(ip->ip_src.s_addr, 0), MIN_MTU);
}
static void
tcp_nice_cb(u_char *user, const struct pcap_pkthdr *pcap, const u_char *pkt)
{
- struct libnet_ip_hdr *ip;
+ struct libnet_ipv4_hdr *ip;
struct libnet_tcp_hdr *tcp;
- int *sock, len;
+ int len;
+ libnet_t *l;
- sock = (int *)user;
+ l = (libnet_t *)user;
pkt += pcap_off;
len = pcap->caplen - pcap_off;
- ip = (struct libnet_ip_hdr *)pkt;
+ ip = (struct libnet_ipv4_hdr *)pkt;
if (ip->ip_p != IPPROTO_TCP)
return;
@@ -151,11 +150,11 @@
if (ntohs(ip->ip_len) > (ip->ip_hl << 2) + (tcp->th_off << 2)) {
if (Opt_icmp)
- send_icmp_source_quench(*sock, ip);
+ send_icmp_source_quench(l, ip);
if (Opt_win)
- send_tcp_window_advertisement(*sock, ip, tcp);
+ send_tcp_window_advertisement(l, ip, tcp);
if (Opt_pmtu)
- send_icmp_frag_needed(*sock, ip);
+ send_icmp_frag_needed(l, ip);
}
}
@@ -164,8 +163,10 @@
{
extern char *optarg;
extern int optind;
- int c, sock;
+ int c;
char *intf, *filter, ebuf[PCAP_ERRBUF_SIZE];
+ char libnet_ebuf[LIBNET_ERRBUF_SIZE];
+ libnet_t *l;
pcap_t *pd;
intf = NULL;
@@ -209,14 +210,14 @@
if ((pcap_off = pcap_dloff(pd)) < 0)
errx(1, "couldn't determine link layer offset");
- if ((sock = libnet_open_raw_sock(IPPROTO_RAW)) == -1)
+ if ((l = libnet_init(LIBNET_RAW4, intf, libnet_ebuf)) == NULL)
errx(1, "couldn't initialize sending");
- libnet_seed_prand();
+ libnet_seed_prand(l);
warnx("listening on %s [%s]", intf, filter);
- pcap_loop(pd, -1, tcp_nice_cb, (u_char *)&sock);
+ pcap_loop(pd, -1, tcp_nice_cb, (u_char *)l);
/* NOTREACHED */
diff --exclude='*~' -Naur dsniff-2.4.orig/tcp_raw.c dsniff-2.4/tcp_raw.c
--- dsniff-2.4.orig/tcp_raw.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/tcp_raw.c 2006-01-21 18:56:45.000000000 -0200
@@ -119,7 +119,7 @@
}
struct iovec *
-tcp_raw_input(struct libnet_ip_hdr *ip, struct libnet_tcp_hdr *tcp, int len)
+tcp_raw_input(struct libnet_ipv4_hdr *ip, struct libnet_tcp_hdr *tcp, int len)
{
struct tha tha;
struct tcp_conn *conn;
@@ -131,7 +131,7 @@
/* Verify TCP checksum. */
cksum = tcp->th_sum;
- libnet_do_checksum((u_char *) ip, IPPROTO_TCP, len);
+ libnet_do_checksum(NULL, (u_char *) ip, IPPROTO_TCP, len);
if (cksum != tcp->th_sum)
return (NULL);
diff --exclude='*~' -Naur dsniff-2.4.orig/tcp_raw.h dsniff-2.4/tcp_raw.h
--- dsniff-2.4.orig/tcp_raw.h 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/tcp_raw.h 2006-01-21 18:56:45.000000000 -0200
@@ -15,7 +15,7 @@
u_short sport, u_short dport,
u_char *buf, int len);
-struct iovec *tcp_raw_input(struct libnet_ip_hdr *ip,
+struct iovec *tcp_raw_input(struct libnet_ipv4_hdr *ip,
struct libnet_tcp_hdr *tcp, int len);
void tcp_raw_timeout(int timeout, tcp_raw_callback_t callback);
diff --exclude='*~' -Naur dsniff-2.4.orig/trigger.c dsniff-2.4/trigger.c
--- dsniff-2.4.orig/trigger.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/trigger.c 2006-01-21 18:56:45.000000000 -0200
@@ -276,7 +276,7 @@
}
void
-trigger_ip(struct libnet_ip_hdr *ip)
+trigger_ip(struct libnet_ipv4_hdr *ip)
{
struct trigger *t, tr;
u_char *buf;
@@ -305,7 +305,7 @@
/* libnids needs a nids_register_udp()... */
void
-trigger_udp(struct libnet_ip_hdr *ip)
+trigger_udp(struct libnet_ipv4_hdr *ip)
{
struct trigger *t, tr;
struct libnet_udp_hdr *udp;
@@ -437,7 +437,7 @@
}
void
-trigger_tcp_raw(struct libnet_ip_hdr *ip)
+trigger_tcp_raw(struct libnet_ipv4_hdr *ip)
{
struct trigger *t, tr;
struct libnet_tcp_hdr *tcp;
diff --exclude='*~' -Naur dsniff-2.4.orig/trigger.h dsniff-2.4/trigger.h
--- dsniff-2.4.orig/trigger.h 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/trigger.h 2006-01-21 18:56:45.000000000 -0200
@@ -24,10 +24,10 @@
int trigger_set_tcp(int port, char *name);
int trigger_set_rpc(int program, char *name);
-void trigger_ip(struct libnet_ip_hdr *ip);
-void trigger_udp(struct libnet_ip_hdr *ip);
+void trigger_ip(struct libnet_ipv4_hdr *ip);
+void trigger_udp(struct libnet_ipv4_hdr *ip);
void trigger_tcp(struct tcp_stream *ts, void **conn_save);
-void trigger_tcp_raw(struct libnet_ip_hdr *ip);
+void trigger_tcp_raw(struct libnet_ipv4_hdr *ip);
void trigger_tcp_raw_timeout(int signal);
void trigger_rpc(int program, int proto, int port);
diff --exclude='*~' -Naur dsniff-2.4.orig/urlsnarf.8 dsniff-2.4/urlsnarf.8
--- dsniff-2.4.orig/urlsnarf.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/urlsnarf.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBurlsnarf\fR [\fB-n\fR] [\fB-i \fIinterface\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
+\fBurlsnarf\fR [\fB-n\fR] [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
@@ -21,6 +21,9 @@
.IP \fB-n\fR
Do not resolve IP addresses to hostnames.
.IP "\fB-i \fIinterface\fR"
+Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
URLs.
diff --exclude='*~' -Naur dsniff-2.4.orig/urlsnarf.c dsniff-2.4/urlsnarf.c
--- dsniff-2.4.orig/urlsnarf.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/urlsnarf.c 2006-01-21 18:56:45.000000000 -0200
@@ -41,7 +41,7 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: urlsnarf [-n] [-i interface] [[-v] pattern [expression]]\n");
+ "Usage: urlsnarf [-n] [-i interface | -p pcapfile] [[-v] pattern [expression]]\n");
exit(1);
}
@@ -68,7 +68,7 @@
t->tm_hour - gmt.tm_hour);
tz = hours * 60 + t->tm_min - gmt.tm_min;
- len = strftime(tstr, sizeof(tstr), "%e/%b/%Y:%X", t);
+ len = strftime(tstr, sizeof(tstr), "%d/%b/%Y:%X", t);
if (len < 0 || len > sizeof(tstr) - 5)
return (NULL);
@@ -145,14 +145,14 @@
if (user == NULL)
user = "-";
if (vhost == NULL)
- vhost = libnet_host_lookup(addr->daddr, Opt_dns);
+ vhost = libnet_addr2name4(addr->daddr, Opt_dns);
if (referer == NULL)
referer = "-";
if (agent == NULL)
agent = "-";
printf("%s - %s [%s] \"%s http://%s%s\" - - \"%s\" \"%s\"\n",
- libnet_host_lookup(addr->saddr, Opt_dns),
+ libnet_addr2name4(addr->saddr, Opt_dns),
user, timestamp(), req, vhost, uri, referer, agent);
}
fflush(stdout);
@@ -201,11 +201,14 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "i:nvh?V")) != -1) {
+ while ((c = getopt(argc, argv, "i:p:nvh?V")) != -1) {
switch (c) {
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
case 'n':
Opt_dns = 0;
break;
@@ -238,8 +241,24 @@
nids_register_tcp(sniff_http_client);
- warnx("listening on %s [%s]", nids_params.device,
- nids_params.pcap_filter);
+ if (nids_params.pcap_filter != NULL) {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s [%s]", nids_params.device,
+ nids_params.pcap_filter);
+ }
+ else {
+ warnx("using %s [%s]", nids_params.filename,
+ nids_params.pcap_filter);
+ }
+ }
+ else {
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+ }
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/webmitm.c dsniff-2.4/webmitm.c
--- dsniff-2.4.orig/webmitm.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/webmitm.c 2006-01-21 18:56:45.000000000 -0200
@@ -242,7 +242,7 @@
word = buf_tok(&msg, "/", 1);
vhost = buf_strdup(word);
}
- ssin.sin_addr.s_addr = libnet_name_resolve(vhost, 1);
+ ssin.sin_addr.s_addr = libnet_name2addr4(NULL, vhost, 1);
free(vhost);
if (ssin.sin_addr.s_addr == ntohl(INADDR_LOOPBACK) ||
@@ -510,7 +510,7 @@
argv += optind;
if (argc == 1) {
- if ((static_host = libnet_name_resolve(argv[0], 1)) == -1)
+ if ((static_host = libnet_name2addr4(NULL, argv[0], 1)) == -1)
usage();
}
else if (argc != 0) usage();
diff --exclude='*~' -Naur dsniff-2.4.orig/webspy.8 dsniff-2.4/webspy.8
--- dsniff-2.4.orig/webspy.8 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/webspy.8 2006-01-21 18:56:40.000000000 -0200
@@ -9,7 +9,7 @@
.na
.nf
.fi
-\fBwebspy\fR [\fB-i \fIinterface\fR] \fIhost\fR
+\fBwebspy\fR [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] \fIhost\fR
.SH DESCRIPTION
.ad
.fi
@@ -20,6 +20,8 @@
.SH OPTIONS
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
+.IP "\fB-p \fIpcapfile\fR"
+Process packets from the specified PCAP capture file instead of the network.
.IP \fIhost\fR
Specify the web client to spy on.
.SH "SEE ALSO"
diff --exclude='*~' -Naur dsniff-2.4.orig/webspy.c dsniff-2.4/webspy.c
--- dsniff-2.4.orig/webspy.c 2006-01-21 18:56:04.000000000 -0200
+++ dsniff-2.4/webspy.c 2006-01-21 18:56:45.000000000 -0200
@@ -42,7 +42,7 @@
usage(void)
{
fprintf(stderr, "Version: " VERSION "\n"
- "Usage: %s [-i interface] host\n", progname);
+ "Usage: %s [-i interface | -p pcapfile] host\n", progname);
exit(1);
}
@@ -126,7 +126,7 @@
if (auth == NULL)
auth = "";
if (vhost == NULL)
- vhost = libnet_host_lookup(addr->daddr, 0);
+ vhost = libnet_addr2name4(addr->daddr, 0);
snprintf(cmd, sizeof(cmd), "openURL(http://%s%s%s%s)",
auth, *auth ? "@" : "", vhost, uri);
@@ -184,11 +184,14 @@
extern int optind;
int c;
- while ((c = getopt(argc, argv, "i:h?V")) != -1) {
+ while ((c = getopt(argc, argv, "i:p:h?V")) != -1) {
switch (c) {
case 'i':
nids_params.device = optarg;
break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
default:
usage();
}
@@ -202,7 +205,7 @@
cmdtab[0] = cmd;
cmdtab[1] = NULL;
- if ((host = libnet_name_resolve(argv[0], 1)) == -1)
+ if ((host = libnet_name2addr4(NULL, argv[0], 1)) == -1)
errx(1, "unknown host");
if ((dpy = XOpenDisplay(NULL)) == NULL)
@@ -216,7 +219,13 @@
nids_register_tcp(sniff_http_client);
- warnx("listening on %s", nids_params.device);
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+
nids_run();
diff --exclude='*~' -Naur dsniff-2.4.orig/webspy.c.orig dsniff-2.4/webspy.c.orig
--- dsniff-2.4.orig/webspy.c.orig 1969-12-31 21:00:00.000000000 -0300
+++ dsniff-2.4/webspy.c.orig 2006-01-21 18:56:40.000000000 -0200
@@ -0,0 +1,235 @@
+/*
+ * webspy.c
+ *
+ * Sniff a user's web session, follow it real-time in our browser.
+ *
+ * Copyright (c) 1999 Dug Song <dugsong@monkey.org>
+ *
+ * $Id: webspy.c,v 1.28 2001/03/15 08:33:05 dugsong Exp $
+ */
+
+#include "config.h"
+
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <netinet/in.h>
+#include <arpa/inet.h>
+#include <netdb.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include <string.h>
+#include <err.h>
+#include <X11/Xlib.h>
+#include <libnet.h>
+#include <nids.h>
+
+#include "base64.h"
+#include "buf.h"
+#include "version.h"
+
+/* for jwz's remote.c. */
+extern int mozilla_remote_commands (Display *, Window, char **);
+char *expected_mozilla_version = "4.7";
+char *progname = "webspy";
+
+Display *dpy;
+char cmd[2048], *cmdtab[2];
+in_addr_t host;
+
+static void
+usage(void)
+{
+ fprintf(stderr, "Version: " VERSION "\n"
+ "Usage: %s [-i interface | -p pcapfile] host\n", progname);
+ exit(1);
+}
+
+static int
+is_display_uri(char *uri)
+{
+ static char *good_prefixes[] = { NULL };
+ static char *good_suffixes[] = { ".html", ".htm", "/", ".shtml",
+ ".cgi", ".asp", ".php3", ".txt",
+ ".xml", ".asc", NULL };
+ int len, slen;
+ char **pp, *p;
+
+ /* Get URI length, without QUERY_INFO */
+ if ((p = strchr(uri, '?')) != NULL) {
+ len = p - uri;
+ }
+ else len = strlen(uri);
+
+ for (pp = good_suffixes; *pp != NULL; pp++) {
+ if (len < (slen = strlen(*pp))) continue;
+ if (strncasecmp(&uri[len - slen], *pp, slen) == 0)
+ return (1);
+ }
+ for (pp = good_prefixes; *pp != NULL; pp++) {
+ if (len < (slen = strlen(*pp))) continue;
+ if (strncasecmp(uri, *pp, slen) == 0)
+ return (1);
+ }
+ return (0);
+}
+
+/*
+ XXX - we should really be sniffing (and HTML-parsing) the returned
+ pages, not just the request URLs. this is why we don't handle
+ frames, some CGIs, banner ads, etc. correctly.
+*/
+static int
+process_http_request(struct tuple4 *addr, u_char *data, int len)
+{
+ struct buf *msg, buf;
+ char *p, *req, *uri, *vhost, *auth;
+ int i;
+
+ buf_init(&buf, data, len);
+
+ while ((i = buf_index(&buf, "\r\n\r\n", 4)) >= 0) {
+ msg = buf_tok(&buf, NULL, i);
+ msg->base[msg->end] = '\0';
+ buf_skip(&buf, 4);
+
+ req = strtok(buf_ptr(msg), "\r\n");
+
+ if (strncmp(req, "GET ", 4) != 0 &&
+ strncmp(req, "POST ", 5) != 0 &&
+ strncmp(req, "CONNECT ", 8) != 0)
+ continue;
+
+ vhost = auth = NULL;
+ uri = strchr(req, ' '); *uri++ = '\0'; strtok(uri, " ");
+
+ if (strncmp(uri, "http://", 7) == 0) {
+ vhost = uri + 7;
+ uri = strchr(vhost, '/');
+ memmove(uri + 1, uri, strlen(uri));
+ }
+ if (!is_display_uri(uri))
+ continue;
+
+ while ((p = strtok(NULL, "\r\n")) != NULL) {
+ if (strncasecmp(p, "Authorization: Basic ", 21) == 0) {
+ p += 21;
+ i = base64_pton(p, p, strlen(p));
+ p[i] = '\0';
+ auth = p;
+ }
+ else if (strncasecmp(p, "Host: ", 6) == 0) {
+ vhost = p + 6;
+ }
+ }
+ if (auth == NULL)
+ auth = "";
+ if (vhost == NULL)
+ vhost = libnet_host_lookup(addr->daddr, 0);
+
+ snprintf(cmd, sizeof(cmd), "openURL(http://%s%s%s%s)",
+ auth, *auth ? "@" : "", vhost, uri);
+ fprintf(stderr, "%s\n", cmd);
+
+ mozilla_remote_commands(dpy, 0, cmdtab);
+ }
+ return (len - buf_len(&buf));
+}
+
+static void
+sniff_http_client(struct tcp_stream *ts, void **yoda)
+{
+ int i;
+
+ /* Only handle HTTP client traffic. */
+ if (ts->addr.saddr != host ||
+ (ts->addr.dest != 80 && ts->addr.dest != 3128 &&
+ ts->addr.dest != 8080))
+ return;
+
+ switch (ts->nids_state) {
+ case NIDS_JUST_EST:
+ /* Collect data. */
+ ts->server.collect = 1;
+
+ case NIDS_DATA:
+ if (ts->server.count_new != 0) {
+ i = process_http_request(&ts->addr, ts->server.data,
+ ts->server.count -
+ ts->server.offset);
+ nids_discard(ts, i);
+ }
+ break;
+
+ default:
+ if (ts->server.count != 0) {
+ process_http_request(&ts->addr, ts->server.data,
+ ts->server.count -
+ ts->server.offset);
+ }
+ break;
+ }
+}
+
+static void
+null_syslog(int type, int errnum, struct ip *iph, void *data)
+{
+}
+
+int
+main(int argc, char *argv[])
+{
+ extern char *optarg;
+ extern int optind;
+ int c;
+
+ while ((c = getopt(argc, argv, "i:p:h?V")) != -1) {
+ switch (c) {
+ case 'i':
+ nids_params.device = optarg;
+ break;
+ case 'p':
+ nids_params.filename = optarg;
+ break;
+ default:
+ usage();
+ }
+ }
+ argc -= optind;
+ argv += optind;
+
+ if (argc != 1)
+ usage();
+
+ cmdtab[0] = cmd;
+ cmdtab[1] = NULL;
+
+ if ((host = libnet_name_resolve(argv[0], 1)) == -1)
+ errx(1, "unknown host");
+
+ if ((dpy = XOpenDisplay(NULL)) == NULL)
+ errx(1, "connection to local X server failed!");
+
+ nids_params.scan_num_hosts = 0;
+ nids_params.syslog = null_syslog;
+
+ if (!nids_init())
+ errx(1, "%s", nids_errbuf);
+
+ nids_register_tcp(sniff_http_client);
+
+ if (nids_params.filename == NULL) {
+ warnx("listening on %s", nids_params.device);
+ }
+ else {
+ warnx("using %s", nids_params.filename);
+ }
+
+
+ nids_run();
+
+ /* NOTREACHED */
+
+ exit(0);
+}