05.01.2014 Views

Weaponizing Lisp - John Kanen Flowers - Hacker Halted

Weaponizing Lisp - John Kanen Flowers - Hacker Halted

Weaponizing Lisp - John Kanen Flowers - Hacker Halted

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Weaponizing</strong> <strong>Lisp</strong><br />

<br />

<br />

<strong>Hacker</strong> <strong>Halted</strong> 2010


About Me


Question


A little about languages


IPOOFG


IPOOFG


IPOOFG


Languages


Languages


Languages


Uniqueness


SPL


Benchmarks


What I care about...


Port Scanning<br />

Finding open ports & services...


Port Scanning


Examples of Port Scanning


Perl Port Scanner


Perl Port Scanner...


Python Port Scanner


Ruby Port Scanning


<strong>Weaponizing</strong> <strong>Lisp</strong>


newLISP


newLISP


Port Scanning<br />

Checking for open ports and services...


Port Scanning<br />

Checking for open ports and services...


Explanation


Explanation


(set 'ports-found (PortScan "192.168.1.100" 1 1024))


Packet Construction<br />

Creating and sending packets...


Packet Construction


Packet Construction


Packet Construction


newLISP<br />

Packet Construction<br />

Creating and sending packets... (in newLISP)


;; TCP HEADER<br />

;; HEADER = | MAC | IP | TCP | DATA |<br />

;; -----------------------------------------<br />

;; |1234|5678|1234|5678|1234|5678|1234|5678|<br />

;; /---------------------------------------\<br />

;; |16 Source Port |16 Dest Port |<br />

;; |32 Sequence Number |<br />

;; |32 Ack Number |<br />

;; |Off |RSRV|ECN |CNTL|16 Window |<br />

;; |16 Checksum |16 Urg Pointer |<br />

;; |32 Options and Padding |<br />

;; |Data ... (variable length) |<br />

;; \---------------------------------------/<br />

; http://www.networksorcery.com/enp/protocol/tcp.htm


;; TCP HEADER<br />

;; HEADER = | MAC | IP | TCP | DATA |<br />

;; -----------------------------------------<br />

;; |1234|5678|1234|5678|1234|5678|1234|5678|<br />

;; /---------------------------------------\<br />

;; |16 Source Port |16 Dest Port |<br />

;; |32 Sequence Number |<br />

;; |32 Ack Number |<br />

;; |Off |RSRV|ECN |CNTL|16 Window |<br />

;; |16 Checksum |16 Urg Pointer |<br />

;; |32 Options and Padding |<br />

;; |Data ... (variable length) |<br />

;; \---------------------------------------/<br />

; http://www.networksorcery.com/enp/protocol/tcp.htm


;; TCP HEADER<br />

;; HEADER = | MAC | IP | TCP | DATA |<br />

;; -----------------------------------------<br />

;; |1234|5678|1234|5678|1234|5678|1234|5678|<br />

;; /---------------------------------------\<br />

;; |16 Source Port |16 Dest Port |<br />

;; |32 Sequence Number |<br />

;; |32 Ack Number |<br />

;; |Off |RSRV|ECN |CNTL|16 Window |<br />

;; |16 Checksum |16 Urg Pointer |<br />

;; |32 Options and Padding |<br />

;; |Data ... (variable length) |<br />

;; \---------------------------------------/<br />

; http://www.networksorcery.com/enp/protocol/tcp.htm


;; TCP HEADER<br />

;; HEADER = | MAC | IP | TCP | DATA |<br />

;; -----------------------------------------<br />

;; |1234|5678|1234|5678|1234|5678|1234|5678|<br />

;; /---------------------------------------\<br />

;; |16 Source Port |16 Dest Port |<br />

;; |32 Sequence Number |<br />

;; |32 Ack Number |<br />

;; |Off |RSRV|ECN |CNTL|16 Window |<br />

;; |16 Checksum |16 Urg Pointer |<br />

;; |32 Options and Padding |<br />

;; |Data ... (variable length) |<br />

;; \---------------------------------------/<br />

; http://www.networksorcery.com/enp/protocol/tcp.htm


;; UDP Packet<br />

;;<br />

;; HEADER = | MAC | IP | UDP | DATA |<br />

;; -----------------------------------------<br />

;; |1234|5678|1234|5678|1234|5678|1234|5678|<br />

;; /---------------------------------------\<br />

;; |16 Source Port |16 Dest Port |<br />

;; |16 Length |16 Checksum |<br />

;; | |<br />

;; \---------------------------------------/<br />

;<br />

; http://www.networksorcery.com/enp/protocol/udp.htm


Packet Construction


Packet Construction


Sniffing & Bonus<br />

Sniffing and performing GEO location...


Sniffing


Sniffing


Sniffing


GEO Location<br />

An example of GEO location...


GEO Location<br />

An example of GEO location...


GEO Location<br />

An example of GEO location...


GEO Location<br />

An example of GEO location...


GEO Location<br />

Another example of GEO location...


GEO Location<br />

Another example of GEO location...


GEO Location<br />

Another example of GEO location...


GEO Location<br />

Another example of GEO location...


GEO Location<br />

Another example of GEO location...


(<strong>John</strong>)<br />

<strong>Kanen</strong> <strong>Flowers</strong><br />

www.kane-box.com<br />

"<strong>Weaponizing</strong> <strong>Lisp</strong>"<br />

2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!