At least its not another hlboom

Nephyrin Zey wrote:
> It can send any packet of data you tell it to, the key to the attack
> is the fact that it spams it over and over. I successfully took down a
> test server here after instructing the tool to spam the string "aaaa"
> (4141414100)
>
> - Neph
>
> On Mon, Apr 28, 2008 at 7:31 PM, Chad Austin <[EMAIL PROTECTED]> wrote:
>   
>> it sends this:
>>
>>  
>> 00508d917476000f1f550a6a080045000028000040004006b719c0a80101c0a8016500870cf000000000e556bd8d501400007bbe0000000000000000
>>
>>
>>
>>  Bobby35ny wrote:
>>  > You did the right thing Ian, no worries!!
>>  > I'm sure AL will take care of it.
>>  >
>>  > =bobby
>>  >
>>  >
>>  >
>>  > -----Original Message-----
>>  > From: [EMAIL PROTECTED]
>>  > [mailto:[EMAIL PROTECTED] On Behalf Of Ian Shaffer
>>  > Sent: Monday, April 28, 2008 10:08 PM
>>  > To: Half-Life dedicated Win32 server mailing list
>>  > Subject: Re: [hlds] Critical "Nuke Attack" Exploit within Source engine
>>  >
>>  > Well at least Alfred's been notified of the issue. He told me he's
>>  > investigating the report.
>>  >
>>  > Brian D'Arcy wrote:
>>  >
>>  >> I'm afraid that this type of attack has been around since the late 90's,
>>  >>
>>  > if
>>  >
>>  >> not earlier.
>>  >>
>>  >> It's basically pounding random UDP data (or maybe now-days more 
>> structured
>>  >> data) at raw listen ports.  The application listening does what it's
>>  >> programmed to do, parse the input and use up available resources in order
>>  >>
>>  > to
>>  >
>>  >> do so.
>>  >>
>>  >> There's not a whole lot any individual can do about this.  The only thing
>>  >>
>>  > I
>>  >
>>  >> can see resolving this, assuming it becomes a widespread problem, is 
>> valve
>>  >> updating the query/response code to ignore the random data spewed at it 
>> in
>>  >>
>>  > a
>>  >
>>  >> much more efficient manner so that the only thing which occurs is a loss
>>  >>
>>  > of
>>  >
>>  >> some available bandwidth instead of the "melt" effect you see as servers
>>  >> start to choke out.
>>  >>
>>  >> In a nutshell, it's a DDOS tool, minus the distributed part.
>>  >>
>>  >> On Mon, Apr 28, 2008 at 6:17 PM, Ian Shaffer
>>  >>
>>  > <[EMAIL PROTECTED]>
>>  >
>>  >> wrote:
>>  >>
>>  >>
>>  >>
>>  >>> I just noticed that. Pity my hastiness.
>>  >>>
>>  >>> Daron Dodd wrote:
>>  >>>
>>  >>>
>>  >>>> you already did when u told everyone the name of the program in the
>>  >>>> first email. google is a very powerful tool.
>>  >>>>
>>  >>>> On Mon, Apr 28, 2008 at 6:07 PM, Ian Shaffer
>>  >>>> <[EMAIL PROTECTED]> wrote:
>>  >>>>
>>  >>>>
>>  >>>>
>>  >>>>> My big problem here is that I do not have root access to any of my
>>  >>>>> servers. We used to have all our servers on our own dedi, but BECAUSE
>>  >>>>>
>>  >>>>>
>>  >>> of
>>  >>>
>>  >>>
>>  >>>>> these attacks, we decided to scrap the dedi and spread our servers
>>  >>>>> across different IP ranges by paying per slot in different locations.
>>  >>>>> Even though we can still be attacked, the attack is limited to one
>>  >>>>> server at a time. That server is usually our Windows 50 man ZombieMod
>>  >>>>> server in Chicago. I'm currently working with the host to see if the
>>  >>>>> attack can be detected and blocked automatically.
>>  >>>>>
>>  >>>>> I've had a couple people email me asking for this "Nuker" program, or
>>  >>>>> the link to where to download it. I've notified Alfred of the issue 
>> and
>>  >>>>> sent him the link to the program, however he recommends that I be
>>  >>>>> careful at how I present my report to the non-moderated HLDS mailing
>>  >>>>> list. Hence, I will not give this program to ANYBODY unless on 
>> Alfred's
>>  >>>>> approval.
>>  >>>>>
>>  >>>>>
>>  >>>>> Chad Austin wrote:
>>  >>>>>
>>  >>>>>
>>  >>>>>
>>  >>>>>> Post a dump of packets please, or just link to program so it can be
>>  >>>>>> analyzed.
>>  >>>>>>
>>  >>>>>> Ian Shaffer wrote:
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>> Dear Network Administrator,
>>  >>>>>>>
>>  >>>>>>> Over the past few months my servers have been brought to their knees
>>  >>>>>>> dozens of times through "nuke" style Denial of Service attacks.
>>  >>>>>>>
>>  >>>>>>>
>>  >>> Simple
>>  >>>
>>  >>>
>>  >>>>>>> put, players start teleporting around, pings gradually start
>>  >>>>>>>
>>  >>>>>>>
>>  >>> increasing
>>  >>>
>>  >>>
>>  >>>>>>> for all players and the timer slows down. After a couple minutes of
>>  >>>>>>> being attacked, you are early frozen from movement and the timer
>>  >>>>>>>
>>  >>>>>>>
>>  >>> takes a
>>  >>>
>>  >>>
>>  >>>>>>> decade to tick down, and pings are skyrocketed. Players then leave
>>  >>>>>>>
>>  >>>>>>>
>>  >>> the
>>  >>>
>>  >>>
>>  >>>>>>> server.
>>  >>>>>>>
>>  >>>>>>> Well earlier this week I "interrogated," pardon the pun, a member of
>>  >>>>>>>
>>  >>>>>>>
>>  >>> my
>>  >>>
>>  >>>
>>  >>>>>>> community who had made an exclamation that it would start to get 
>> real
>>  >>>>>>> laggy in one of our servers earlier in the day. That server, our
>>  >>>>>>>
>>  >>>>>>>
>>  >>> Zombie
>>  >>>
>>  >>>
>>  >>>>>>> Server, started getting nuked just a couple minutes after. I was
>>  >>>>>>>
>>  >>>>>>>
>>  >>> fairly
>>  >>>
>>  >>>
>>  >>>>>>> certain it was him who started the attack. In the evening, I talked
>>  >>>>>>>
>>  >>>>>>>
>>  >>> to
>>  >>>
>>  >>>
>>  >>>>>>> this guy, his alias is "ST. GEORGE," and explained to him that I
>>  >>>>>>> believed it was him who was "nuking" our servers. I acted very
>>  >>>>>>>
>>  >>>>>>>
>>  >>> sincere
>>  >>>
>>  >>>
>>  >>>>>>> when I told him that I had logged his IP address and was planning on
>>  >>>>>>> filing a formal abuse complaint to his ISP, Road Runner. He somewhat
>>  >>>>>>> panicked at hearing this, and confessed as to what he was doing.
>>  >>>>>>>
>>  >>>>>>> He sent me a link to download the same hacking tool he said he was
>>  >>>>>>> using. Hackers Assistant is the program. I scanned the program for
>>  >>>>>>>
>>  >>>>>>>
>>  >>> any
>>  >>>
>>  >>>
>>  >>>>>>> trojans or viruses it might have, it was clean. I ran it and
>>  >>>>>>>
>>  >>>>>>>
>>  >>> discovered
>>  >>>
>>  >>>
>>  >>>>>>> a feature called "Nuker." In there it prompted for a server IP
>>  >>>>>>>
>>  >>>>>>>
>>  >>> address
>>  >>>
>>  >>>
>>  >>>>>>> and port and a box to input a message. One would simply put a
>>  >>>>>>>
>>  >>>>>>>
>>  >>> server's
>>  >>>
>>  >>>
>>  >>>>>>> info in there, type some random stuff in the message box, and click
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "Nuke."
>>  >>>
>>  >>>
>>  >>>>>>> A former member of our community and admitted nuker "ST. GEORGE"
>>  >>>>>>>
>>  >>>>>>>
>>  >>> tested
>>  >>>
>>  >>>
>>  >>>>>>> the software. I was shocked. It was working, The server was being
>>  >>>>>>> attacked just as described above. I held a sense of accomplishment
>>  >>>>>>> knowing that I had found the cause of my problems. I therefore began
>>  >>>>>>> looking for a way to block this programs abilities. Now I needed to
>>  >>>>>>>
>>  >>>>>>>
>>  >>> know
>>  >>>
>>  >>>
>>  >>>>>>> what types of servers this program could attack. ST. GEORGE then
>>  >>>>>>>
>>  >>>>>>>
>>  >>> showed
>>  >>>
>>  >>>
>>  >>>>>>> off nuke attacks on dozens of popular servers in the US and UK,
>>  >>>>>>>
>>  >>>>>>>
>>  >>> highly
>>  >>>
>>  >>>
>>  >>>>>>> popular servers like 24/7 Office Noob Galore and Zombiemod |
>>  >>>>>>> XFactorGaming, and the program worked to bring down each and every
>>  >>>>>>>
>>  >>>>>>>
>>  >>> one
>>  >>>
>>  >>>
>>  >>>>>>> of them to their knees. There was only one server he was not able to
>>  >>>>>>> nuke attack, evidently the #1 CSS server in the United States,
>>  >>>>>>> CantStopGaming CS:S.
>>  >>>>>>>
>>  >>>>>>> This program affects practically every single server in CS:S. The
>>  >>>>>>> interesting part of it is that this program doesn't advise usage
>>  >>>>>>>
>>  >>>>>>>
>>  >>> towards
>>  >>>
>>  >>>
>>  >>>>>>> any particular genre of online infrastructure. ST. GEORGE tried
>>  >>>>>>>
>>  >>>>>>>
>>  >>> running
>>  >>>
>>  >>>
>>  >>>>>>> this program on CoD servers, BF2 and BF2142 servers, Halo PC 
>> servers,
>>  >>>>>>> SA:MP servers, and Quake 4 servers. It didn't work on any of those
>>  >>>>>>> games. However, it worked on the other popular Source-based game out
>>  >>>>>>> today, Team Fortress 2. Every TF2 server ST. GEORGE checked was
>>  >>>>>>> nuke-able, with the same effects felt in-game. This leads me to the
>>  >>>>>>> conclusion that there must be an exploit in the source engine
>>  >>>>>>>
>>  >>>>>>>
>>  >>> allowing
>>  >>>
>>  >>>
>>  >>>>>>> this program to nuke all servers using the source engine.
>>  >>>>>>>
>>  >>>>>>> While our server was getting attacked last time, I gathered critical
>>  >>>>>>> data. I've determined that the program does not eat up the server's
>>  >>>>>>> bandwidth. Instead, it seems to flood the server with
>>  >>>>>>>
>>  >>>>>>>
>>  >>> messages/commands,
>>  >>>
>>  >>>
>>  >>>>>>> so much that it tops out CPU usage. Below is a sample of my console
>>  >>>>>>>
>>  >>>>>>>
>>  >>> as
>>  >>>
>>  >>>
>>  >>>>>>> our server was undergoing a recent attack with the program. Midway
>>  >>>>>>> through the data, the perpetrator aborted the nuke attack. You can
>>  >>>>>>>
>>  >>>>>>>
>>  >>> see
>>  >>>
>>  >>>
>>  >>>>>>> the server recovering as the cpu usage goes down and server FPS 
>> comes
>>  >>>>>>> back to normal. This data was gathered with 8 others in-game.
>>  >>>>>>>
>>  >>>>>>> ===========================================
>>  >>>>>>>
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 96.59 16841.92 3909.91 110 4 10.00 9
>>  >>>>>>> L 04/27/2008 - 01:23:04: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 96.04 17937.41 3958.69 110 4 10.00 9
>>  >>>>>>> L 04/27/2008 - 01:23:09: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 95.54 17590.70 3970.64 110
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 100.00 17354.72 3966.19 110 4 523.25 9
>>  >>>>>>> L 04/27/2008 - 01:23:10: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ======== HERE THE ATTACK WAS ABORTED =========
>>  >>>>>>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 75.57 16933.90 4148.69 110 4 508.36 9
>>  >>>>>>> L 04/27/2008 - 01:23:11: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 75.57 16750.93 4596.00 110 4 509.13 9
>>  >>>>>>> L 04/27/2008 - 01:23:12: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 52.55 16518.30 6391.86 110 4 509.97 9
>>  >>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 40.46 16520.83 9229.05 110 4 511.77 9
>>  >>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ] rcon stats
>>  >>>>>>> CPU In Out Uptime Users FPS Players
>>  >>>>>>> 40.46 16452.49 11473.37 110 4 514.49 9
>>  >>>>>>> L 04/27/2008 - 01:23:14: rcon from "72.251.244.233:2020": command
>>  >>>>>>>
>>  >>>>>>>
>>  >>> "stats"
>>  >>>
>>  >>>
>>  >>>>>>> ============================================
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>>> I very much hope that this exploit can be stomped out. My community
>>  >>>>>>>
>>  >>>>>>>
>>  >>> has
>>  >>>
>>  >>>
>>  >>>>>>> suffered all too much to the hands of the kiddies that run these
>>  >>>>>>>
>>  >>>>>>>
>>  >>> types
>>  >>>
>>  >>>
>>  >>>>>>> of programs for their own vain pleasure. I speak for server 
>> operators
>>  >>>>>>> everywhere when I say, this issue must be fixed!
>>  >>>>>>>
>>  >>>>>>> Thank you very much for taking the time to read my post. I hope some
>>  >>>>>>> good will come out of it!
>>  >>>>>>>
>>  >>>>>>> Sincerely,
>>  >>>>>>> David "Eaglewonj" Gaipa
>>  >>>>>>>
>>  >>>>>>> _______________________________________________
>>  >>>>>>> To unsubscribe, edit your list preferences, or view the list
>>  >>>>>>>
>>  >>>>>>>
>>  >>> archives, please visit:
>>  >>>
>>  >>>
>>  >>>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>>>
>>  >>>>>> _______________________________________________
>>  >>>>>> To unsubscribe, edit your list preferences, or view the list 
>> archives,
>>  >>>>>>
>>  >>>>>>
>>  >>> please visit:
>>  >>>
>>  >>>
>>  >>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>
>>  >>>>>>
>>  >>>>> _______________________________________________
>>  >>>>> To unsubscribe, edit your list preferences, or view the list archives,
>>  >>>>>
>>  >>>>>
>>  >>> please visit:
>>  >>>
>>  >>>
>>  >>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>>>>
>>  >>>>>
>>  >>>>>
>>  >>>>>
>>  >>>> _______________________________________________
>>  >>>> To unsubscribe, edit your list preferences, or view the list archives,
>>  >>>>
>>  >>>>
>>  >>> please visit:
>>  >>>
>>  >>>
>>  >>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>>>
>>  >>>>
>>  >>>>
>>  >>>>
>>  >>> _______________________________________________
>>  >>> To unsubscribe, edit your list preferences, or view the list archives,
>>  >>> please visit:
>>  >>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>>
>>  >>>
>>  >>>
>>  >> _______________________________________________
>>  >> To unsubscribe, edit your list preferences, or view the list archives,
>>  >>
>>  > please visit:
>>  >
>>  >> http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >>
>>  >>
>>  >>
>>  >
>>  > _______________________________________________
>>  > To unsubscribe, edit your list preferences, or view the list archives,
>>  > please visit:
>>  > http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >
>>  >
>>  > _______________________________________________
>>  > To unsubscribe, edit your list preferences, or view the list archives, 
>> please visit:
>>  > http://list.valvesoftware.com/mailman/listinfo/hlds
>>  >
>>  >
>>
>>
>>  _______________________________________________
>>  To unsubscribe, edit your list preferences, or view the list archives, 
>> please visit:
>>  http://list.valvesoftware.com/mailman/listinfo/hlds
>>
>>     
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
>   


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to