143 lines
8.1 KiB
Plaintext
143 lines
8.1 KiB
Plaintext
![]() |
|
||
|
/===========================================================================\
|
||
|
| PSW Presents.. |
|
||
|
| |
|
||
|
| H A C K I N G R E N E G A D E 0 7 - 1 7 |
|
||
|
| |
|
||
|
| Written by Tokyo |
|
||
|
| |
|
||
|
|---------------------------------------------------------------------------|
|
||
|
| This and other excellent files can be found at PSW HQ, the Dimensions |
|
||
|
| bulletin board in sunny Miami, Florida: (305) 383-2950 |
|
||
|
\===========================================================================/
|
||
|
|
||
|
|
||
|
The author grants you permission to reproduce, distribute, quote,
|
||
|
etcetera etcetera this document in any form you like but please keep
|
||
|
deletions, changes, mutilations, and so forth to a minimum.
|
||
|
|
||
|
|
||
|
Introduction
|
||
|
============
|
||
|
|
||
|
So you want to leech hundreds of megs of files or get back at some
|
||
|
lamer sysop who kicked you off his system? Well, if it's a Renegade 07-17
|
||
|
system, you're in luck. Since there are a good number of these systems
|
||
|
out there, it is more than likely that you have several in your local
|
||
|
calling area alone, and plenty to play with if you're willing to dial
|
||
|
LD or phreak your way to one, whatever suits your fancy.
|
||
|
The Renegade BBS software has many many holes just waiting to be
|
||
|
exploited by the hacker. Only a small number of these are discussed here but
|
||
|
with a little exploration and (perhaps) a bit of ingenuity, you should be
|
||
|
able to uncover some of the others on your own.
|
||
|
|
||
|
|
||
|
About Renegade Security
|
||
|
=======================
|
||
|
|
||
|
In the most popular setup, the user is greeted either by the
|
||
|
echomail handler or by the sysop's clever ANSI drawing. The system then
|
||
|
prompts you for a user name or number and a password. Most systems also
|
||
|
ask that you enter the last four digits of your phone number. The software
|
||
|
can be set to prompt you to enter your birthdate every N logins just as an
|
||
|
extra precaution. If you are attempting to login as the sysop (#1) or as
|
||
|
any user that has some level of sysop access, you will be prompted to enter
|
||
|
the system password which happens very typically to be identical to the
|
||
|
sysop's own password.
|
||
|
The routines which handle user login, prompting for and verifying
|
||
|
passwords, phone numbers, birthdates, etc... are located in a file called
|
||
|
RENEGADE.OVR. These routines are loaded into memory and executed as
|
||
|
needed. Happily, it is comprised of nice compiler object code -- no
|
||
|
self-modifications, encryption, and so forth. With just a couple of changes
|
||
|
to this key file, the Renegade software becomes extremely friendly to
|
||
|
hackers or, as a matter of fact, to anybody else who happens along.
|
||
|
Bundled with this file should be two programs, FIXRG and UNFIXRG.
|
||
|
These are just a couple stupid little assembly language programs I wrote
|
||
|
that NOP out a few bytes in RENEGADE.OVR. With just these few alterations,
|
||
|
however, the system will recognize any password and telephone number
|
||
|
entered at login as valid. It does NOT clear you through the occasional
|
||
|
birthdate check nor does it clear you through the sysop password prompt.
|
||
|
UNFIXRG simply replaces the original code, for use in covering up your
|
||
|
tracks once you've completed your handywork.
|
||
|
By this point, anybody with half a brain should realize that this fix
|
||
|
will only work on version 07-17 of Renegade. The good news is that this code
|
||
|
is unlikely to dramatically change in future versions of Renegade. Locating
|
||
|
the code that needs to be changed in future versions is a trivial debugging
|
||
|
exercise and should only require a couple of changes to the fix programs.
|
||
|
|
||
|
|
||
|
What To Do
|
||
|
==========
|
||
|
|
||
|
First, verify that the target system is operating version 07-17.
|
||
|
This is very easy to do as the program displays a copyright notice
|
||
|
showing the version just before transmitting the ANSI greeting.
|
||
|
Once you know that you've got a workable system you need to be
|
||
|
able to get the fix program into the system. This, of course, involves
|
||
|
having an account on the system. Either login as a new user with fake
|
||
|
information or, far more preferably, use information gleaned from hacking
|
||
|
other systems to use somebody else's account. Very very often, people
|
||
|
either reuse the same passwords or use passwords with a recognizable
|
||
|
pattern. This part generally does not present a problem.
|
||
|
On more security-conscious systems, you will not be immediately
|
||
|
greeted with a username prompt but will first have to get through the
|
||
|
"shuttle login" screen. This simply asks you to enter a BBS password or
|
||
|
a newuser password before granting you access to the main system. BBS
|
||
|
passwords are generally either well known or can be easily found. Many
|
||
|
users enter BBS passwords in the 'reference' field of their newuser
|
||
|
applications. Again, information gathered from successfully hacking other
|
||
|
systems can be extremely helpful in this regard.
|
||
|
The real trick to this specific approach is getting the fix to
|
||
|
be run on the machine with Renegade on it. There are numerous ways of going
|
||
|
about this. The best way of doing this is embedding either this specific
|
||
|
fix code or some other equivalent code into some game or utility and
|
||
|
uploading it to the system. Choose something that is likely to be run
|
||
|
on the target machine. The demonstration code enclosed in this package
|
||
|
attempts to open RENEGADE.OVR in the '\renegade', '\bbs', and '\rene'
|
||
|
directories of the drive as these are the directories where the file is
|
||
|
most likely to be found. When preparing your little trojan you may want
|
||
|
to put some more effort into the altering code, perhaps having it search
|
||
|
through every directory in the drive or ensuring that the -r attribute
|
||
|
is off.
|
||
|
You can use this in conjunction with any other holes you may be
|
||
|
aware of such as those found in those ever-popular doors or external
|
||
|
protocols. Be creative.
|
||
|
|
||
|
|
||
|
Once You're In
|
||
|
==============
|
||
|
|
||
|
|
||
|
Once the fix is implemented, you're in business. You can log in as
|
||
|
any ordinary user of the system, download files, leave obscene automessages,
|
||
|
change passwords, get personal information (perhaps for hacking other
|
||
|
systems), and so on. Keep in mind that anybody that happens to call a
|
||
|
system with an altered RENEGADE.OVR will be able to do the same thing. How
|
||
|
long do you suppose it would take somebody else to realize that all the
|
||
|
accounts have been unlocked?
|
||
|
One particularly nice feature of Renegade is that you don't need
|
||
|
sysop access to have it. All you need to be able to do is execute an
|
||
|
absolute download, '/D'. Co/remote-sysops typically do not have sysop
|
||
|
access but are still able to use this feature. What this command allows
|
||
|
you to do is download any file in any path in the system. And what files
|
||
|
are you interested in? Well, a good place to start is
|
||
|
'\renegade\renegade.dat'. This file has all of the system passwords in it.
|
||
|
Next move on to the user database, 'users.dat'. Once you have this, just
|
||
|
view it with your favorite hex editor (Norton or any one of the eight
|
||
|
million viewers out there will do). In one shot you've got all of the user
|
||
|
information at your disposal. There's no encryption or anything like that
|
||
|
and all of the text strings are in Pascal format where the first byte in
|
||
|
each sequence tells you the number of characters that follow.
|
||
|
User account information can also be viewed and altered online from
|
||
|
the sysop menu although this is considerably slower than downloading the
|
||
|
user database. If you've only got your hands on a cosysop account
|
||
|
(security level s250), just go to the system setup area and lower the
|
||
|
minimum security level settings for whatever command functions you
|
||
|
wish to perform.
|
||
|
|
||
|
Happy hacking!
|
||
|
|
||
|
****************************************************************************
|
||
|
Call the Dimensions BBS at (305) 383-2950
|
||
|
****************************************************************************
|