>From 

http://www.robertgraham.com/pubs/firewall-seen.html

Trojan Horse (TCP). This is a commonly seen scan looking for systems
compromised by this trojan. Sub-Seven scans are becoming very frequent,
primarily due to an easy-to-use scanner built-in to the client. 

and from
http://www.infowar.com/iwftp/xforce/advise30.html

SubSeven:

There have been many versions of the SubSeven backdoor released, and
most of 
them were very buggy until version 1.7 came out. The latest version is
1.9. 
This backdoor has been called 'BackDoor-G' by Network Associates, Inc.,
when 
they discovered version 1.7. SubSeven allows remote attackers to obtain
cached 
passwords, play sounds, look at a webcam on your system, capture screenshots,
and notify you over IRC or ICQ when someone gets infected. SubSeven only 
works on Windows 95 and 98.

SubSeven is highly configurable. You can set a password, change the filename
and registry key it uses, make it use Win.ini or System.ini, and have it 
notify an ICQ number, e-mail address, or IRC channel when it is run. You
can 
also change the icon it uses, and change the port it listens on. The default
TCP port is 1243.

SubSeven has four options for starting the server -- in the Run or RunServices
registry keys in HKLM\Software\Microsoft\Windows\CurrentVersion, in the 
Win.ini file, or by a 'less known method'. The 'less known method' uses
the 
System.ini file, and adds its executable name to the 'shell=' line in
the 
'[boot]' section of the file. By default, it will make that line 
'shell=Explorer.exe mtmtask.dl', and copy mtmtask.dl to your Windows system
directory. If you look in System.ini and see anything other than 
'Explorer.exe' in your 'shell=' line, immediately remove anything other than
'Explorer.exe' and delete the extra file from C:\Windows\System.

If you connect to SubSeven's port, you will see a banner similar to:
connected. time/date: 18:05.19 - June 30, 1999, Wednesday, version: 1.7

SubSeven also listens on port 6776 for the scanning function, and this
port is
not configurable. SubSeven also keeps TCP port 6711. If you see that TCP
ports 
6711 and 6776 open when you do a 'netstat -a', then you probably have 
SubSeven. Since it is so highly configurable and difficult to detect in
the 
registry, the easiest method to remove it is to use an up-to-date virus
scanner. 
Most newer virus scanners will detect and remove SubSeven.

-- 

all found by doing a search on

sub seven attack

then

subseven 

http://www.google.com

Hope this helps you out!

d.

Administrator wrote:
> 
> Hi to all,
> 
>      Though this may sound stupid, I need to know....therefore I ask:
> 
> What is a Sub Seven Attack???    i.e.
> 
> 02/05/2000 19:12:23.272 -       Sub Seven Attack Dropped -
> Source:xxx.xxx.xxx.xxx, xxxx, WAN -     Destination:xxx.xxx.xxx.xxx, xxxx, LAN
> -        -
> 
> Any info on this or a source of such info is appreciated.
> 
> Thanks in advance,
> 
> ----------------------------------------------------------------------------
> 
> Brian K. Bunch
> Systems Administrator
> NetRamp.net
> 865-330-2520
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]

-- 
Dorian Moore is property of Kleber Design Ltd. If found please contact Kleber
by phone on +44 207 581 1362 or visit http://www.kleber.net for further details.
You really shouldn't listen to anything he says... as it may just be an opinion
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to