Foiling the Finger Command / Playing With Your Fingers
by Packet Rat
The Finger command is a command that most systems on the Internet have.
It allows anyone, anywhere on the Internet to get information on anyone else on the Internet.
This has both positive and negative aspects. On the positive side it allows people to leave messages about their whereabouts, phone numbers, etc. This also happens to be the negative side.
Depending on how the system administrator configures Finger, info such as your phone number, address, full name, and what you are doing (i.e., what commands you are executing) are available to anyone (and you have no way of knowing who has been poking around).
As you may or may not know, information such as that stated above could adversely affect the Internet user. For example, with your name and phone number people could easily social engineer most college or company workers into giving out your address, Social Security Number (oh no!), and other sensitive info.
With your Social Security Number, people can cause you BIG problems (that's another article). You may ask, "What can I do?" Well, here are some solutions:
1.) Change your Finger information. On most UNIX systems users can execute the command "chfn" (change finger info) or "passwd -f". By running "chfn" or "passwd -f" you can change your name, phone number, or any other bit of finger information. Note: Some system administrators disable these commands or options for accounting reasons.
2.) Modify your .plan file. The .plan file is a file that is echoed to the screen of the person fingering you. So one thing you can do is create a .plan full of empty lines (100 or so should do). This will have the effect of scrolling your finger info off the fingerer's screen. This works if the person is using a dumb terminal, but useless if he has scrollback on his terminal. You could link your .plan file to a binary file such as /bin/sh (ln -s /bin/sh .plan). This will display garbage characters and possibly make noises (wow!) on the fingerer's system.
3.) If your UNIX system is running GNU Finger (Finger program written at MIT), you can copy the included script into a file called ".fingerrc". The file ".fingerrc" is executed and output goes to stdout. This script will:
- Keep track of how many times you were fingered.
- Let you know who fingered you, or where you were fingered from.
- Do a reverse finger on the fingerer or his site.
- Let the fingerer know that you have his info.
- Not give any of your info out (depends on how GNU Finger is set up).
#!/bin/sh # Insert your user name here UID="" # Create variable to point to file that will hold number of times fingered. COUNTFILE=$HOME/.fingered # Increase COUNTFILE by 1 expr `cat $COUNTFILE` + 1 > $COUNTFILE # Nice message echo "My privacy has been violated " `cat $COUNTFILE` "times" echo # Variable $2 detects remote or local fingerer case $2 in # Variable $1 is site of fingerer remote) echo "People from $1 sure are nosey!" # Add fingerer site name to file /tmp/.safehouse echo $1 > /tmp/.safehouse # Finger fingerer's site finger @$1 >> /tmp/.safehouse # Send mail with reverse finger info /usr/ucb/mail -s "REMOTE FINGER!" $UID < /tmp/.safehouse # Remove temp file rm /tmp/.safehouse # Put fingerer site name is list of fingerers that have fingered me echo $1 >> /tmp/.spies # Who is running finger locally at the time local) /usr/ucb/w | grep "finger" | cut -d " " -f1 > /tmp/.spy # Nicer message echo "Hey `cat /tmp/.spy`, stop poking around here!" # Time and data stamp for finger mail date > /tmp/.revfing # Reverse long finger to get fingerer's finger info. finger -l `cat /ccs/tmp/.spy` >> /tmp/.revfing # Append to mail file. /usr/ucb/mail -s "FINGERED!" $UID < /tmp/.revfing # Remove temp file rm /tmp/.revfing # Add fingerer name to list of fingerers cat /tmp/.spy >> /tmp/.spies # Remove temp file rm /tmp/.spy;; esacChange UID to your username. Also, you should change /tmp to a directory that is writable by anyone and accessible from any system on your local net. Also create the file .fingerd in your home directory with a "0" in it:
$ cat > .fingerd 0 <Control-D>The .fingerrc file and your home directory must have the read and execute permissions set so "others" have access. The .fingerd file should be writable by "others" also. This is necessary because GNU Finger is run as user "nobody".
If your system is set up so output is filtered through your .fingerrc, you can set up a series of "grep -v" pipes to filter out any info you do not want the world to see. Or you can just put "echo" by itself to display nothing. Another fun thing to do is put "finger -l <USER>" in your .fingerrc. This will have the effect of people seeing someone else's finger info instead of yours.
Note: It is possible to create a program that will kill all Finger daemon processes as soon as they are started. This is due to the fact that since your .fingerrc script is run as user "nobody", all commands in it are run as "nobody", just like the daemon Finger processes. I urge you not to try this since your local system administrator would get quite mad.
4.) There are other things you can do to stop or limit the amount of Finger info that goes out, but these require root (highest) access. As root you can do many things. Some options are:
- Disable Finger (that should work!).
- Use a "wrapper" program to limit what info the Finger daemon supplies.
- Modify the Finger source code (if available).
Code: backfinger.sh