It can send any packet of data you tell it to, the key to the attack is the fact that it spams it over and over. I successfully took down a test server here after instructing the tool to spam the string "aaaa" (4141414100)
- Neph On Mon, Apr 28, 2008 at 7:31 PM, Chad Austin <[EMAIL PROTECTED]> wrote: > it sends this: > > > 00508d917476000f1f550a6a080045000028000040004006b719c0a80101c0a8016500870cf000000000e556bd8d501400007bbe0000000000000000 > > > > Bobby35ny wrote: > > You did the right thing Ian, no worries!! > > I'm sure AL will take care of it. > > > > =bobby > > > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Ian Shaffer > > Sent: Monday, April 28, 2008 10:08 PM > > To: Half-Life dedicated Win32 server mailing list > > Subject: Re: [hlds] Critical "Nuke Attack" Exploit within Source engine > > > > Well at least Alfred's been notified of the issue. He told me he's > > investigating the report. > > > > Brian D'Arcy wrote: > > > >> I'm afraid that this type of attack has been around since the late 90's, > >> > > if > > > >> not earlier. > >> > >> It's basically pounding random UDP data (or maybe now-days more structured > >> data) at raw listen ports. The application listening does what it's > >> programmed to do, parse the input and use up available resources in order > >> > > to > > > >> do so. > >> > >> There's not a whole lot any individual can do about this. The only thing > >> > > I > > > >> can see resolving this, assuming it becomes a widespread problem, is valve > >> updating the query/response code to ignore the random data spewed at it in > >> > > a > > > >> much more efficient manner so that the only thing which occurs is a loss > >> > > of > > > >> some available bandwidth instead of the "melt" effect you see as servers > >> start to choke out. > >> > >> In a nutshell, it's a DDOS tool, minus the distributed part. > >> > >> On Mon, Apr 28, 2008 at 6:17 PM, Ian Shaffer > >> > > <[EMAIL PROTECTED]> > > > >> wrote: > >> > >> > >> > >>> I just noticed that. Pity my hastiness. > >>> > >>> Daron Dodd wrote: > >>> > >>> > >>>> you already did when u told everyone the name of the program in the > >>>> first email. google is a very powerful tool. > >>>> > >>>> On Mon, Apr 28, 2008 at 6:07 PM, Ian Shaffer > >>>> <[EMAIL PROTECTED]> wrote: > >>>> > >>>> > >>>> > >>>>> My big problem here is that I do not have root access to any of my > >>>>> servers. We used to have all our servers on our own dedi, but BECAUSE > >>>>> > >>>>> > >>> of > >>> > >>> > >>>>> these attacks, we decided to scrap the dedi and spread our servers > >>>>> across different IP ranges by paying per slot in different locations. > >>>>> Even though we can still be attacked, the attack is limited to one > >>>>> server at a time. That server is usually our Windows 50 man ZombieMod > >>>>> server in Chicago. I'm currently working with the host to see if the > >>>>> attack can be detected and blocked automatically. > >>>>> > >>>>> I've had a couple people email me asking for this "Nuker" program, or > >>>>> the link to where to download it. I've notified Alfred of the issue and > >>>>> sent him the link to the program, however he recommends that I be > >>>>> careful at how I present my report to the non-moderated HLDS mailing > >>>>> list. Hence, I will not give this program to ANYBODY unless on Alfred's > >>>>> approval. > >>>>> > >>>>> > >>>>> Chad Austin wrote: > >>>>> > >>>>> > >>>>> > >>>>>> Post a dump of packets please, or just link to program so it can be > >>>>>> analyzed. > >>>>>> > >>>>>> Ian Shaffer wrote: > >>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>>>> Dear Network Administrator, > >>>>>>> > >>>>>>> Over the past few months my servers have been brought to their knees > >>>>>>> dozens of times through "nuke" style Denial of Service attacks. > >>>>>>> > >>>>>>> > >>> Simple > >>> > >>> > >>>>>>> put, players start teleporting around, pings gradually start > >>>>>>> > >>>>>>> > >>> increasing > >>> > >>> > >>>>>>> for all players and the timer slows down. After a couple minutes of > >>>>>>> being attacked, you are early frozen from movement and the timer > >>>>>>> > >>>>>>> > >>> takes a > >>> > >>> > >>>>>>> decade to tick down, and pings are skyrocketed. Players then leave > >>>>>>> > >>>>>>> > >>> the > >>> > >>> > >>>>>>> server. > >>>>>>> > >>>>>>> Well earlier this week I "interrogated," pardon the pun, a member of > >>>>>>> > >>>>>>> > >>> my > >>> > >>> > >>>>>>> community who had made an exclamation that it would start to get real > >>>>>>> laggy in one of our servers earlier in the day. That server, our > >>>>>>> > >>>>>>> > >>> Zombie > >>> > >>> > >>>>>>> Server, started getting nuked just a couple minutes after. I was > >>>>>>> > >>>>>>> > >>> fairly > >>> > >>> > >>>>>>> certain it was him who started the attack. In the evening, I talked > >>>>>>> > >>>>>>> > >>> to > >>> > >>> > >>>>>>> this guy, his alias is "ST. GEORGE," and explained to him that I > >>>>>>> believed it was him who was "nuking" our servers. I acted very > >>>>>>> > >>>>>>> > >>> sincere > >>> > >>> > >>>>>>> when I told him that I had logged his IP address and was planning on > >>>>>>> filing a formal abuse complaint to his ISP, Road Runner. He somewhat > >>>>>>> panicked at hearing this, and confessed as to what he was doing. > >>>>>>> > >>>>>>> He sent me a link to download the same hacking tool he said he was > >>>>>>> using. Hackers Assistant is the program. I scanned the program for > >>>>>>> > >>>>>>> > >>> any > >>> > >>> > >>>>>>> trojans or viruses it might have, it was clean. I ran it and > >>>>>>> > >>>>>>> > >>> discovered > >>> > >>> > >>>>>>> a feature called "Nuker." In there it prompted for a server IP > >>>>>>> > >>>>>>> > >>> address > >>> > >>> > >>>>>>> and port and a box to input a message. One would simply put a > >>>>>>> > >>>>>>> > >>> server's > >>> > >>> > >>>>>>> info in there, type some random stuff in the message box, and click > >>>>>>> > >>>>>>> > >>> "Nuke." > >>> > >>> > >>>>>>> A former member of our community and admitted nuker "ST. GEORGE" > >>>>>>> > >>>>>>> > >>> tested > >>> > >>> > >>>>>>> the software. I was shocked. It was working, The server was being > >>>>>>> attacked just as described above. I held a sense of accomplishment > >>>>>>> knowing that I had found the cause of my problems. I therefore began > >>>>>>> looking for a way to block this programs abilities. Now I needed to > >>>>>>> > >>>>>>> > >>> know > >>> > >>> > >>>>>>> what types of servers this program could attack. ST. GEORGE then > >>>>>>> > >>>>>>> > >>> showed > >>> > >>> > >>>>>>> off nuke attacks on dozens of popular servers in the US and UK, > >>>>>>> > >>>>>>> > >>> highly > >>> > >>> > >>>>>>> popular servers like 24/7 Office Noob Galore and Zombiemod | > >>>>>>> XFactorGaming, and the program worked to bring down each and every > >>>>>>> > >>>>>>> > >>> one > >>> > >>> > >>>>>>> of them to their knees. There was only one server he was not able to > >>>>>>> nuke attack, evidently the #1 CSS server in the United States, > >>>>>>> CantStopGaming CS:S. > >>>>>>> > >>>>>>> This program affects practically every single server in CS:S. The > >>>>>>> interesting part of it is that this program doesn't advise usage > >>>>>>> > >>>>>>> > >>> towards > >>> > >>> > >>>>>>> any particular genre of online infrastructure. ST. GEORGE tried > >>>>>>> > >>>>>>> > >>> running > >>> > >>> > >>>>>>> this program on CoD servers, BF2 and BF2142 servers, Halo PC servers, > >>>>>>> SA:MP servers, and Quake 4 servers. It didn't work on any of those > >>>>>>> games. However, it worked on the other popular Source-based game out > >>>>>>> today, Team Fortress 2. Every TF2 server ST. GEORGE checked was > >>>>>>> nuke-able, with the same effects felt in-game. This leads me to the > >>>>>>> conclusion that there must be an exploit in the source engine > >>>>>>> > >>>>>>> > >>> allowing > >>> > >>> > >>>>>>> this program to nuke all servers using the source engine. > >>>>>>> > >>>>>>> While our server was getting attacked last time, I gathered critical > >>>>>>> data. I've determined that the program does not eat up the server's > >>>>>>> bandwidth. Instead, it seems to flood the server with > >>>>>>> > >>>>>>> > >>> messages/commands, > >>> > >>> > >>>>>>> so much that it tops out CPU usage. Below is a sample of my console > >>>>>>> > >>>>>>> > >>> as > >>> > >>> > >>>>>>> our server was undergoing a recent attack with the program. Midway > >>>>>>> through the data, the perpetrator aborted the nuke attack. You can > >>>>>>> > >>>>>>> > >>> see > >>> > >>> > >>>>>>> the server recovering as the cpu usage goes down and server FPS comes > >>>>>>> back to normal. This data was gathered with 8 others in-game. > >>>>>>> > >>>>>>> =========================================== > >>>>>>> > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 96.59 16841.92 3909.91 110 4 10.00 9 > >>>>>>> L 04/27/2008 - 01:23:04: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 96.04 17937.41 3958.69 110 4 10.00 9 > >>>>>>> L 04/27/2008 - 01:23:09: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 95.54 17590.70 3970.64 110 > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 100.00 17354.72 3966.19 110 4 523.25 9 > >>>>>>> L 04/27/2008 - 01:23:10: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ======== HERE THE ATTACK WAS ABORTED ========= > >>>>>>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 75.57 16933.90 4148.69 110 4 508.36 9 > >>>>>>> L 04/27/2008 - 01:23:11: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 75.57 16750.93 4596.00 110 4 509.13 9 > >>>>>>> L 04/27/2008 - 01:23:12: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 52.55 16518.30 6391.86 110 4 509.97 9 > >>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 40.46 16520.83 9229.05 110 4 511.77 9 > >>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ] rcon stats > >>>>>>> CPU In Out Uptime Users FPS Players > >>>>>>> 40.46 16452.49 11473.37 110 4 514.49 9 > >>>>>>> L 04/27/2008 - 01:23:14: rcon from "72.251.244.233:2020": command > >>>>>>> > >>>>>>> > >>> "stats" > >>> > >>> > >>>>>>> ============================================ > >>>>>>> > >>>>>>> > >>>>>>> I very much hope that this exploit can be stomped out. My community > >>>>>>> > >>>>>>> > >>> has > >>> > >>> > >>>>>>> suffered all too much to the hands of the kiddies that run these > >>>>>>> > >>>>>>> > >>> types > >>> > >>> > >>>>>>> of programs for their own vain pleasure. I speak for server operators > >>>>>>> everywhere when I say, this issue must be fixed! > >>>>>>> > >>>>>>> Thank you very much for taking the time to read my post. I hope some > >>>>>>> good will come out of it! > >>>>>>> > >>>>>>> Sincerely, > >>>>>>> David "Eaglewonj" Gaipa > >>>>>>> > >>>>>>> _______________________________________________ > >>>>>>> To unsubscribe, edit your list preferences, or view the list > >>>>>>> > >>>>>>> > >>> archives, please visit: > >>> > >>> > >>>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> _______________________________________________ > >>>>>> To unsubscribe, edit your list preferences, or view the list archives, > >>>>>> > >>>>>> > >>> please visit: > >>> > >>> > >>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds > >>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>> _______________________________________________ > >>>>> To unsubscribe, edit your list preferences, or view the list archives, > >>>>> > >>>>> > >>> please visit: > >>> > >>> > >>>>> http://list.valvesoftware.com/mailman/listinfo/hlds > >>>>> > >>>>> > >>>>> > >>>>> > >>>> _______________________________________________ > >>>> To unsubscribe, edit your list preferences, or view the list archives, > >>>> > >>>> > >>> please visit: > >>> > >>> > >>>> http://list.valvesoftware.com/mailman/listinfo/hlds > >>>> > >>>> > >>>> > >>>> > >>> _______________________________________________ > >>> To unsubscribe, edit your list preferences, or view the list archives, > >>> please visit: > >>> http://list.valvesoftware.com/mailman/listinfo/hlds > >>> > >>> > >>> > >> _______________________________________________ > >> To unsubscribe, edit your list preferences, or view the list archives, > >> > > please visit: > > > >> http://list.valvesoftware.com/mailman/listinfo/hlds > >> > >> > >> > > > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list archives, > > please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds > > > > > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds > > > > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

