Back to the Spoofit Page
Part II: Advanced spoofing (Blind)

Appendix: Short note about rlogin
---------------------------------
I suppose you know what rlogin is, but how did I get to that 'eriu'
commandfile?
All info is found in RFC 1282, I have included 2 extracts here, these are the
two most important ones for us.
(If you want to know more about the subject, I suggest you read the RFC)
(concerning \000coder\000spoof\000vt100/9600\000")
Extract 1 from RFC 1282:
Upon connection establishment, the client sends four null-terminated
strings to the server. The first is an empty string (i.e., it
consists solely of a single zero byte), followed by three non-null
strings: the client user name, the server user name, and the terminal
type and speed. More explicitly:
<null>
client-user-name<null>
server-user-name<null>
terminal-type/speed<null>
The server returns a zero byte to indicate that it has received these
strings and is now in data transfer mode.
End extract.
(concerning "\255\255ss\000\025\000\080\000\000\000\000")
Extract 2 from RFC 1282:
The window change control sequence is 12 bytes in length, consisting
of a magic cookie (two consecutive bytes of hex FF), followed by two
bytes containing lower-case ASCII "s", then 8 bytes containing the
16-bit values for the number of character rows, the number of
characters per row, the number of pixels in the X direction, and the
number of pixels in the Y direction, in network byte order. Thus:
FF FF s s rr cc xp yp
Other flags than "ss" may be used in future for other in-band control
messages. None are currently defined.
End extract.
If you want to attack other services, I suggest you get the RFC on that
service (or any other technical source), and study it.

Brecht Claerhout:
coder@succeed.net