Documente Academic
Documente Profesional
Documente Cultură
BEGIN
There exists a system called “Kaypro”. This system is the dream home of all the
processes. Every process in the network wants to live in it and fork their child processes.
But it is the time of intra-system war, as forces of the “Lord Brontok” tries to take over
the system with the most striking process called “root-rm”, a privileged root program
with the power to destroy an entire file system at a keystroke, and unfortunately he was
succeeded. He takes over the system from the “User Alliance”, the original creator and
user of the system.
This is not the first time the system is facing the evil forces of “Lord Brontok”. A long
time ago about 16000000 clock cycles, “Lord Brontok” attacks, but never succeeded and
Moved to Chest by the protagonist process of that time called “avast.exe”. But after the
first hang-up of the system “User Alliance” removed it, as it is demanding for more
memory.
Unfortunately, “User Alliance” made a greatest mistake of the system, “Lord Brontok”
has now breached the Chest and came into execution again.
Before this, the system was the heaven for the processes. The two friendly and famous
alliances of the system called “Free Software” and “Commercial Software” made the
system intelligent. But due to some misunderstanding they dived into a fight for
monopoly.
The famous process from the “Free Software” alliance, namely, “avast.exe” (the one who
defeated the “Lord Brontok”) forked a child process called “foo.exe”. “foo.exe” has the
power to “Heal the viruses till death” even in the critical system environment as he was
the descendent of the Anti-virus family.
The process called “nod32.exe” from the “Commercial Software” alliance also forked the
process, namely, “bar.exe”. She was so beautifully coded and syntactically correct neither
process in the system has seen. She is able to gain illegal access to system’s kernel and
can even pop-up the root terminal.
Both the processes were coded for each other as their name specifies “foo-bar”. They met
by fate during a Round-Robin schedule and fall in love. They both created a pool of
process called “FUBAR”, to fight against the “Lord Brontok”, as their alliances were
deleted by him. They have to avenge their fathers and make the system clean.
“foo.exe” becomes the Admin Commander of the processes and “bar.exe” became the
fuzzer. When the “Lord Brontok” was made aware of the fact that the “foo-bar” are about
to take revenge, he attacked.
The Admin commander (foo.exe) was feeling quite pleased with the progress of the
attack when his XO called out.
“Hold your fire – that last power failure must have caused a trap through zero. It’s not
using any cpu time, so don’t waste signal on it.”
At last, “FUBAR” survived the attack. “foo.exe” was worrying about the next attack. He
has to stop “Lord Brontok”, if not the core dump is imminent. He went to a friend
“firewall.exe” to know about the mysterious “Lord Brontok”.
“Take your father’s bytesaber, foo.” said firewall “It’s time to learn the ways of the
Source now”.
“The Source – the cosmic template of the System, within which all knowledge and power
can be held. But you must always beware of the Dark Side…”
Later, after the meeting, foo.exe read-write the ways of writing source in his critical
section.
Firewall.exe also suggest him to meet The Oracle “FAQ”, living somewhere in this huge
system. Now, its time for foo.exe for the intra-systemial transmission.
As our hero entered /usr/spool he was met by a newsgroup of User protection bits.
“We’re running under /usr/guest” said foo.exe. “This is our first time on the system.”
“Uh…”
“Lucky Dog, You’re free to go about your business. MOV along now.” said burly.
Foo.exe asked very important things about “Lord Brontok” to the Oracle “FAQ” and also
wrote the contents to his critical section.
After returning to $HOME, he started preparation for the attack to heal Brontok.exe.
“Are you sure you can tcptraceroute this transmission?” foo queried.
bar.exe being a fuzzer found a loophole to get into the fort of the “Lord Brontok”. They
eventually, breached the security walls.
“FAQ told me that if we have to defeat the Brontok I will need the 20 clock cycles in
single round and since the system’s kernel is using Round-Robin with 10 clock cycles in
a round we can never make it.” Said foo.exe.
“I know how to write a shellcode to rewrite the EBP of the stack, so you will be executed
twice” said bar.exe.
Foo.exe getting 20 clock cycled, wrote the kill code in the cache and plant it as the logic
bomb. So, whenever the Brontok call code from gcwcd.dll, the bomb will explode.
Unfortunately Brontok.exe saw them in the cache and started attacks with the INT, HUP,
ILL, XCPU signals and lastly with the dangerous KILL signal. However, luckily he
wrote the bomb already.
“That’s the shutdown sequence if I ever saw one!” shouted bar.exe and ran into the ship
with the foo.exe close behind “Crank up the sysclock, foo!”.
“You said this crate is fast enough. Get outta here!” foo.exe said grimly to his navigation
coroutine.
“bar.exe, initialize this heap. I will try to keep their buffers full” said foo.exe.
“Making the jump to system space takes time.” Navigation coroutine growled “One
missed cycle and you could come down right in the middle of a pack of stack frames.”
Bright chunks of position-independent code flashed by as the ship jumped through the
kernel page tables. The group emitted a sigh of relief as they indirected into free space.
Foo.exe then realized that he forgot to set the privileges for the bomb he planted.
Foo.exe used his hacking knowledge to get into the terminal of the Brontok and executed
the command “chmod ugo+rwx bomb.exe”.
After 1200 clock cycles, foo.exe executed another command “grep brontok.exe /”
They Healed the “Lord Brontok” till deletion and evil Brontok empire finally destroyed
and his last words to foo-bar
Written By:
Ashwini kumar Malviya
IT, Final Year
SIRT&S