lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200211290700.gAT70Vbt053259@mailserver2.hushmail.com>
From: es at hush.com (es@...h.com)
Subject: [ElectronicSouls] - Wingate Scanner

-----BEGIN PGP SIGNED MESSAGE-----

Dear List,

rhino9 members once taught us the importance of wingates in hacking.  We
have designed this wingate scanning tool to help you find open wingates
on your internal network, so that you can better secure it.  Please use
this tool wisely and for the greater good of all mankind.

# cat ESwr.c
/* (C) vux <vux@....bg> [ElectronicSouls]
 *
 * PROPERTY OF THE ELECTRONICSOULS CREW !
 * DO NOT DISTRIBUTE !
 *
 * wingate & cisco router scanner. it scans from list where u put ips..
 * example: ./ESwr ips.txt
 */


#include <stdio.h>
#include <stdlib.h>
#include <signal.h>
#include <netdb.h>
#include <netinet/in.h>
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>

#define CHILD 20
#define ERROR -1
#define TIME 6

pid_t wait(int *status);
int sock;
char buffer[1024];
void usage(char *progname);
void scan(char *i);

int serv(char *host);
unsigned long int res(char *p);

void usage(char *s)
{
        printf("usage: %s ipfile\n", progname);
        exit(ERROR);
}

int main(int argc, char **argv)
{
        printf("\n");
        if (argc != 2)
                usage(argv[0]);
        printf("--scanning..\n");
        scan(argv[1]);

}

void scan(char *i)
{

int childs = 0;

        FILE *iff;
        char buf[512];
        if((iff = fopen(i, "r")) == NULL)
                return;
        while(fgets(buf, 512, iff) != NULL)
        {
                buf[strlen(buf) - 1] = 0;

        if(childs >= CHILD) wait(NULL);
        switch (fork()) {
            default:
                    childs++;
                    break;
            case 0:
                    serv(buf);
                    childs--;
                    exit(0);
            case -1:
                    perror("fork");
                    exit(-1);
        }
        fclose(iff);
}

void timeout() {
        close(sock);
}

int serv(char *host)
{

    FILE *etog; char line[1024];
    int found=0;

        struct sockaddr_in target;

        target.sin_addr.s_addr = res(host);
        target.sin_family = AF_INET;
        target.sin_port = htons(23);

        sock=socket(AF_INET, SOCK_STREAM, 0);
        if (sock < 0)
        {
                printf("--can't create socket\n");
                exit(-1);
        }

    signal(SIGALRM, timeout);
    alarm(TIME);

        if (!connect(sock, (struct sockaddr *) &target, sizeof(target)))
        {
                recv(sock, buffer, sizeof(buffer), 0);

        if(buffer[strlen(buffer) - 1] == '\n')
            buffer[strlen(buffer) - 1] = '\0';
        if(strstr(buffer, ">")) {
        snprintf(line, sizeof(line), "%s - Wingate Detected\n", host);
        found++;
        }
        if(strstr(buffer, "Password")) {
        snprintf(line, sizeof(line), "%s - Possible Cisco Router\n",
host);
        found++;
        }

        if(found) {
        fprintf(stderr, line);
        etog = fopen("result.log", "aw+");
        fprintf(etog, line);
        fclose(etog);
        }
        }
        close(sock);
        exit(0);
}

unsigned long int res(char *p)
{
        struct hostent *h;
        unsigned long int rv;

        h=gethostbyname(p);
        if(h!=NULL)
        memcpy(&rv, h->h_addr, h->h_length);

        else
                rv=inet_addr(p);

        return rv;

#

The Electronic Souls Crew
[ElectronicSouls] (c) 2002

"If you are not for us, you are against us, whitehat."

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlMEARECABMFAj3nEJ0MHGVzQGh1c2guY29tAAoJEN5nGqhGcjltPCEAniLlUQ3yYpAz
1VYlRtZwV4Z3K39KAJ4xFMSNWEZqSqwHobSoOS9YKeihmQ==
=ISY6
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ