Category Programs

Execute Trojan exe before every executable

Someone asked me about a virus on a machine that altered the registry to execute itself every time another executable was opened. I explained that this was relatively trivial to do and thought I should back it up with some source code. First piece is how do we tell windows to launch an exe before […]

Linux Stealthy Backdoor using portknocking technique Wrote this program back in 2004 and had posted it using a pseudonym. I cleaned it up a tiny bit, and it is fully functional. The backdoor puts the interface in promiscuous mode and does not open a listen()ing socket until it sees 5 packets on port 5000 within a 60 second period. At […]

Win32 tcp connect() skeleton Very simple example of using winsock to connect to a chosen port. Grabbed most of the source from gandalf’s whois.c, so thank you gandalf. Sends the 3rd command line argument over the socket, prints the data received and then quits. Test it by telneting to an smtp server on port 25 and sending ‘helo […]

Brute Force AIM Password Perl Script – from Aimsniff Authentication Dump

Here’s the perl script to brute force the aim password using the challenge code and response hash from Aimsniff. It is very surprising how fast it is, especially considering it’s just using an interpreted language. Best thing would be to use a dictionary creator and go to town. Benchmark it by putting your password at […]

Aimsniff v0.2 – includes authentication dump

Source Code Here Fixed up some of the code so that we get less garble on certain packets. We still see that sometimes and it appears that it’s either retrans or fragmented packets, need to do some more debugging to find out. Newest feature is dumping the authentication challenge and response hash. Both of these […]

Aimsniff v0.1

Source Code Here Here’s a simple console Aim Sniffer I had written a while ago. Great for getting familiar with libpcap. The output is not necessarily pretty but great for those impromptu sniffing sessions. If you look at the source code I hardly commented this code at all which is a shame because the OSCAR […]

Pacman version 0.2 release Changed output Added -Q for advanced options Added -r repeat option Added -f fragment value option Added -c control flag option Added -v for verbose output Added -w window size option Added -k tcp checksum value Added -q sequence number Added -a ack value

Pacman version 0.1 release Here’s the first release of a small program I wanted to write for various reasons including testing of firewall ACL’s. I’m sure there are other similar programs like this out there but I wanted one that I had intimate knowledge of so that I could expand it to fit my needs and I had […]