On Tuesday 21 January 2003 16:33, eliot wrote:
> Hello, I ran this plugin and received the following:
>
> However it turns out that this is a false positive because the plugin
> is looking for the string "Windows" to signal a positive.
Ack, good catch. I should probably just use a ?dir and look for the same
signatures are the unicode/directory traversal plugins.
> I modified the script to search for "Microsoft Corp." and it stopped
> reporting.
That breaks the check completly, its trying to match the output of "echo
%OS%", which is normally set to Windows_NT or similar. Attached is the
latest / updated / fixed version of the plugin, CC'ing Renaud for
inclusion.
> Hope this helps.
Thanks for reporting it ;)
-HD
#
# This script was written by H D Moore <[EMAIL PROTECTED]>
#
if(description)
{
script_id(11003);
script_version ("$Revision: 1.13 $");
name["english"] = "IIS Possible Compromise";
name["francais"] = "IIS Possible Compromise";
script_name(english:name["english"], francais:name["francais"]);
desc["english"] = "
One or more files were found on this host that
indicate a possible compromise.
Solution: Investigate the discovered files
Risk factor : High
";
script_description(english:desc["english"]);
summary["english"] = "Searches for traces of a system compromise.";
summary["francais"] = "Searches for traces of a system compromise.";
script_summary(english:summary["english"], francais:summary["francais"]);
script_category(ACT_ATTACK);
script_copyright( english:"This script is Copyright (C) 2002 Digital Defense Inc.",
francais:"Ce script est Copyright (C) 2002 Digital Defense
Inc.");
family["english"] = "Backdoors";
family["francais"] = "Backdoors";
script_family(english:family["english"], francais:family["francais"]);
script_dependencie("webmirror.nasl");
script_require_keys("www/iis");
exit(0);
}
#
# The script code starts here
#
include("http_func.inc");
function check(url, arg, pat)
{
str = http_get(item:string(url, arg), port:port);
soc = http_open_socket(port);
if(soc)
{
send(socket:soc, data:str);
r = http_recv(socket:soc);
http_close_socket(soc);
# cache files that dont exist
if(ereg(pattern:"HTTP/1\.[01] 40[34]", string:r))
{
add_cache(url:url);
return(FALSE);
}
if (ereg(string:r, pattern:pat))
{
if(debug)display("found '", pat, "' for ", url, " [", arg, "]\n");
return(TRUE);
}
} else { exit(0); }
return(FALSE);
}
function headcheck(req)
{
str = http_head(item:req, port:port);
soc = http_open_socket(port);
if(soc)
{
send(socket:soc, data:str);
r = recv_line(socket:soc, length:512);
if(ereg(pattern:"^HTTP/1\.[01] (2|502)", string:r))
{
if (debug) display("HEAD FOUND: ", req, "\n");
return(TRUE);
}
http_close_socket(soc);
} else { exit(0); }
return(FALSE);
}
function dllcheck(req)
{
str = http_get(item:req, port:port);
soc = http_open_socket(port);
if(soc)
{
send(socket:soc, data:str);
r = http_recv(socket:soc);
# cache missing dll's
if ("module could not be found" >< r) add_cache(url:req);
if ("procedure could not be found" >< r)
{
if (debug) display("DLL FOUND: ", url, "\n");
return(TRUE);
}
http_close_socket(soc);
} else { exit(0); }
return(FALSE);
}
# this exploit hijacks the socket used to make the
# web request, spawning a command shell over it, so we
# cant use the normal detection methods
function iisecheck(req)
{
str = http_get(item:req, port:port);
soc = http_open_socket(port);
if(soc)
{
send(socket:soc, data:str);
r = recv_line(socket:soc, length:1024);
if(ereg(pattern:"We Got It", string:r))
{
send(socket:soc, data:string("\r\n\r\nexit\r\n\r\n"));
http_close_socket(soc);
return(TRUE);
} else {
r2 = http_recv(socket:soc);
if ( ereg(pattern:"HTTP/1\.[01] 40[34]", string:r) ||
egrep(pattern:"module could not be found", string:r2) )
{
add_cache(url:req);
return(FALSE);
}
}
http_close_socket(soc);
}
return(FALSE);
}
#
# directory list management
#
dirs[0] = "/";
num_dirs = 0;
function initialize_dirs ()
{
_dir_idx = 0;
_dir_key = string("www/", port, "/content/directories/", _dir_idx);
_dir_val = get_kb_item(_dir_key);
while (_dir_val)
{
if(debug)display("adding discovered directory: ", _dir_key, " => ", _dir_val,
"\n");
add_dir_list(dir:_dir_val);
_dir_idx = _dir_idx + 1;
_dir_key = string("www/", port, "/content/directories/", _dir_idx);
_dir_val = get_kb_item(_dir_key);
}
return(_dir_idx);
}
function check_dir_list (dir)
{
for (CDL=0; dirs[CDL]; CDL=CDL+1)
{
if (dirs[CDL] == dir) return(1);
}
return(0);
}
function add_dir_list (dir)
{
if (check_dir_list(dir:dir) == 0)
{
dirs[num_dirs] = dir;
num_dirs = num_dirs + 1;
}
}
#
# cached url list management
#
cache[0] = 0;
num_cache = 0;
function check_cache (url)
{
for (CLI=0; cache[CLI]; CLI=CLI+1)
{
if (cache[CLI] == url) return(1);
}
return(0);
}
function add_cache (url)
{
if (check_cache(url:url) == 0)
{
cache[num_cache] = url;
num_cache = num_cache + 1;
return(1);
}
return(0);
}
#
# report management
#
reported_urls[0] = 0;
reported_urls_cnt = 0;
reported_tests[0] = 0;
report_header = "";
report_footer = "";
function reported(url)
{
found_it = 0;
for (rep_idx=0; rep_idx <reported_urls_cnt; rep_idx=rep_idx+1)
{
if (reported_urls[rep_idx] == url)
{
return(1);
}
}
reported_urls[reported_urls_cnt] = url;
reported_urls_cnt = reported_urls_cnt + 1;
}
function add_report(name, url)
{
if (! reported(url:url))
{
if (reported_tests[name])
{
# already added report section to the header
} else {
report_header = report_header + string(reports[name], "\n\n");
reported_tests[name] = 1;
}
report_footer = report_footer + string(name, " - ", url, "\n");
report = string(report_header, "\n\nDetails:\n", report_footer);
}
}
# for convenience
dblquot = raw_string(0x22);
##############
# test index #
##############
tests[0] = "cmd.exe";
tests[1] = "nc.exe";
tests[2] = "iise.exe";
tests[3] = "ftp.exe";
tests[4] = "pwdump.exe";
tests[5] = "cmd.asp";
tests[6] = "upload.asp";
tests[7] = "cmd.jsp";
tests[8] = "radmin";
tests[9] = "dtreg.exe";
tests[9] = "kill.exe";
tests[10] = "hk.exe";
tests[11] = "list.exe";
tests[12] = "newgina.dll";
tests[13] = "iiscrack.dll";
tests[14] = "vnc";
tests[15] = "pwdump2.exe";
tests[16] = "pwdump3.exe";
tests[17] = "servuftpd";
tests[18] = "info.exe";
tests[19] = "whoami.exe";
################
# method table #
################
method["cmd.exe"] = "GET";
method["nc.exe"] = "GET";
method["iiscrack.dll"] = "GET";
method["ftp.exe"] = "GET";
method["pwdump.exe"] = "GET";
method["cmd.asp"] = "GET";
method["upload.asp"] = "GET";
method["cmd.jsp"] = "GET";
method["radmin"] = "DLL";
method["dtreg.exe"] = "GET";
method["kill.exe"] = "GET";
method["hk.exe"] = "GET";
method["list.exe"] = "GET";
method["newgina.dll"] = "DLL";
method["iise.exe"] = "IISE"; # this one needs its own method
method["vnc"] = "DLL";
method["pwdump2.exe"] = "DLL";
method["pwdump3.exe"] = "DLL";
method["servuftpd"] = "DLL";
method["info.exe"] = "GET";
method["whoami.exe"] = "GET";
###################
# arguments table #
###################
args["cmd.exe"] = "?/c+dir+c:\\+/OG";
args["nc.exe"] = "?-h";
args["iiscrack.dll"] = "";
args["ftp.exe"] = "?/c+-h";
args["pwdump.exe"] = "?-h";
args["cmd.asp"] = "";
args["upload.asp"] = "";
args["cmd.jsp"] = "";
args["radmin"] = "";
args["dtreg.exe"] = "";
args["kill.exe"] = "";
args["hk.exe"] = "?boom";
args["list.exe"] = "";
args["newgina.dll"] = "";
args["iise.exe"] = "";
args["vnc"] = "";
args["pwdump2.exe"] = "";
args["pwdump3.exe"] = "";
args["servuftpd"] = "";
args["info.exe"] = "";
args["whoami.exe"] = "";
##################
# patterns table #
##################
pats["cmd.exe"] = "<DIR>";
pats["nc.exe"] = "this cruft";
pats["iiscrack.dll"] = "www.digitaloffense.net|Default MFC Web Server Extension";
pats["ftp.exe"] = "Suppresses display of remote server";
pats["pwdump.exe"] = "You must be running as user|Pwdump2 - dump|software based
on pwdump2";
pats["cmd.asp"] = ".CMD";
pats["upload.asp"] = string("type=", dblquot, "file", dblquot);
pats["cmd.jsp"] = "COMMANDLINE";
pats["radmin"] = "";
pats["dtreg.exe"] = "Syntax: DtReg";
pats["kill.exe"] = "missing pid or task name";
pats["hk.exe"] = "lsass pid";
pats["list.exe"] = "System Process";
pats["newgina.dll"] = "";
pats["iise.exe"] = "";
pats["vnc"] = "";
pats["pwdump2.exe"] = "";
pats["pwdump3.exe"] = "";
pats["servuftpd"] = "";
pats["info.exe"] = "Server Information";
pats["whoami.exe"] = "WHOAMI.*option";
##############
# file table #
##############
files["cmd.exe_0"] = "cmd.exe";
files["cmd.exe_1"] = "root.exe";
files["cmd.exe_2"] = "bin.exe";
files["cmd.exe_3"] = "shell.exe";
files["cmd.exe_4"] = "hack.exe";
files["cmd.exe_5"] = "1.exe";
files["cmd.exe_6"] = "2.exe";
files["cmd.exe_7"] = "3.exe";
files["cmd.exe_8"] = "4.exe";
files["cmd.exe_9"] = "bip.exe";
files["cmd.exe_9"] = "stromake.exe";
files["cmd.exe_10"] = "superlol.exe";
files["cmd.exe_11"] = "cmd1.exe";
files["cmd.exe_12"] = "az.exe";
files["cmd.exe_13"] = "ft.exe";
files["cmd.exe_14"] = "inuse.exe";
files["cmd.exe_15"] = "mx.exe";
files["cmd.exe_16"] = "sensepost.exe";
files["nc.exe_0"] = "nc.exe";
files["nc.exe_1"] = "ncx.exe";
files["nc.exe_2"] = "netcat.exe";
files["nc.exe_3"] = "dllhosts.exe";
files["iise.exe_0"] = "iise.dll";
files["iise.exe_1"] = "httpodbc.dll";
files["iise.exe_2"] = "idq.dll";
files["iise.exe_3"] = "httpext.dll";
files["iise.exe_4"] = "ssinc.dll";
files["iise.exe_5"] = "msw3prt.dll";
files["iise.exe_6"] = "author.dll";
files["iise.exe_7"] = "admin.dll";
files["iise.exe_8"] = "shtml.dll";
files["iise.exe_9"] = "sspifilt.dll";
files["iise.exe_10"] = "compfilt.dll";
files["iise.exe_11"] = "pwsdata.dll";
files["iise.exe_12"] = "md5filt.dll";
files["iise.exe_13"] = "fpexedll.dll";
files["iiscrack.dll_0"] = "iiscrack.dll";
files["iiscrack.dll_1"] = "httpodbc.dll";
files["iiscrack.dll_2"] = "idq.dll";
files["iiscrack.dll_3"] = "httpext.dll";
files["iiscrack.dll_4"] = "ssinc.dll";
files["iiscrack.dll_5"] = "msw3prt.dll";
files["iiscrack.dll_6"] = "author.dll";
files["iiscrack.dll_7"] = "admin.dll";
files["iiscrack.dll_8"] = "shtml.dll";
files["iiscrack.dll_9"] = "sspifilt.dll";
files["iiscrack.dll_10"] = "compfilt.dll";
files["iiscrack.dll_11"] = "pwsdata.dll";
files["iiscrack.dll_12"] = "md5filt.dll";
files["iiscrack.dll_13"] = "fpexedll.dll";
files["ftp.exe_0"] = "ftp.exe";
files["ftp.exe_1"] = "ftpx.exe";
files["ftp.exe_2"] = "1.exe";
files["ftp.exe_3"] = "2.exe";
files["ftp.exe_4"] = "3.exe";
files["ftp.exe_5"] = "4.exe";
files["pwdump.exe_0"] = "pwdump.exe";
files["pwdump.exe_1"] = "pwdump2.exe";
files["pwdump.exe_2"] = "pwdump3.exe";
files["cmd.asp_0"] = "cmdasp.asp";
files["cmd.asp_1"] = "cmd.asp";
files["cmd.asp_2"] = "shell.asp";
files["cmd.asp_3"] = "own.asp";
files["cmd.asp_4"] = "0wn.asp";
files["cmd.asp_5"] = "exec.asp";
files["upload.asp_0"] = "upload.asp";
files["upload.asp_1"] = "uploadx.asp";
files["upload.asp_2"] = "up.asp";
files["upload.asp_3"] = "file.asp";
files["upload.asp_4"] = "fx.asp";
files["cmd.jsp_0"] = "cmd.jsp";
files["cmd.jsp_1"] = "shell.jsp";
files["cmd.jsp_2"] = "own.jsp";
files["cmd.jsp_3"] = "hack.jsp";
files["cmd.jsp_4"] = "exec.jsp";
files["radmin_0"] = "admdll.dll";
files["radmin_1"] = "raddrv.dll";
files["dtreg.exe_0"] = "dtreg.exe";
files["kill.exe_0"] = "kill.exe";
files["kill.exe_1"] = "tkill.exe";
files["kill.exe_2"] = "pskill.exe";
files["hk.exe_0"] = "hk.exe";
files["list.exe_0"] = "list.exe";
files["list.exe_1"] = "tlist.exe";
files["list.exe_2"] = "plist.exe";
files["newgina.dll_0"] = "newgina.dll";
files["vnc_0"] = "vnchooks.dll";
files["vnc_1"] = "omnithread_rt.dll";
files["pwdump2.exe_0"] = "samdump.dll";
files["pwdump3.exe_0"] = "lsaext.dll";
files["servuftpd_0"] = "jasfv.dll";
files["info.exe_0"] = "info.exe";
files["whoami.exe"] = "whoami.exe";
reports["cmd.exe"] = "One or more copies of the Windows command interpreter were
found, it can be used to execute arbitrary commands on this server through the web.";
reports["nc.exe"] = "One or more copies of the 'netcat.exe' tool were found, it
can be used to either listen for or establish network connections, it includes the
ability to run an arbitrary command across that connection.";
reports["iiscrack.dll"] = "One or more copies of the 'iiscrack.dll' exploit were
found, it is used to gain SYSTEM privileges on a web server already compromised
through another method.";
reports["ftp.exe"] = "One or more copies of the Windows command line FTP utility
were found, it is often left in the web root as part of an automated attack.";
reports["pwdump.exe"] = "One or more copies of 'pwdump' were found,it is used to
dump the encrypted password hashes from a Windows server.";
reports["cmd.asp"] = "One or more copies of the 'cmd.asp' script were found,
this ASP script can be used to exectute commands over the web, on IIS 4.0 it executes
with SYSTEM privileges.";
reports["upload.asp"] = "One or more copies of the 'upload.asp' script were found,
this ASP script can be used to upload files to the server over the web, often used by
crackers when the target is firewalled.";
reports["cmd.jsp"] = "One or more copies of the 'jsp.cmd' script were found,
this JSP script can be used to execute commands over the web.";
reports["radmin"] = "One more DLL files were found which indicate the presence
of the 'Remote Administrator' tool. This tool is used to gain remote access to a
compromised server.";
reports["dtreg.exe"] = "One or more copies of the 'dtreg.exe' executable were
found, this tool is used to edit the registry, often included in batch scripts which
install a backdoor.";
reports["kill.exe"] = "One or more copies of the 'kill.exe' executable were
found, this tool is used for terminating processes, it was originally bundled with the
Windows Resource Kits and has become a favorite of crackers.";
reports["hk.exe"] = "One or more copies of the 'hk.exe' exploit were found, it
is used to gain SYSTEM privileges on a web server already compromised through another
method.";
reports["list.exe"] = "One or more copies of the 'list.exe' executable were
found, this tool is used for enumerating processes, it was originally bundled with the
Windows Resource Kits and has become a favorite of crackers.";
reports["newgina.dll"] = "One more DLL files were found which appear to be part of
the 'NewGina.dll' password logging toolkit.";
reports["iise.exe"] = "One or more copies of the server-side component of the
'iise.exe' exploit were found, it is used to gain a remote command shell with SYSTEM
privileges over the web port.";
reports["vnc"] = "One more DLL files were found which indicate the presence
of the 'VNC' remote administration utility.";
reports["pwdump2.exe"] = "One more DLL files were found which indicate the presence
of the 'pwdump2.exe' password hash dumping tool.";
reports["pwdump3.exe"] = "One more DLL files were found which indicate the presence
of the 'pwdump3.exe' password hash dumping tool.";
reports["servuftpd"] = "One more DLL files were found which indicate the presence
of the 'ServUFTPD' FTP server, commonly used by crackers to setup rogue FTP services
on compromised hosts.";
reports["info.exe"] = "One more copies of the 'info.exe' tool were found, this
CGI application provides a large amount of information about the server remotely and
is often installed by system crackers.";
reports["whoami.exe"] = "One more copies of the 'whoami.exe' tool were found, this
tool display the user account it is run by and is often installed by system crackers.";
#
# initialize the plugin
#
debug = 0;
report = "";
port = get_kb_item("Services/www");
if(!port) port = 80;
state = get_kb_item(string("Ports/tcp/", port));
if(!state) exit(0);
if(!get_port_state(port))exit(0);
initialize_dirs();
add_dir_list(dir:"/scripts");
add_dir_list(dir:"/msadc");
#
# prevent false positives
#
ValidHead = 1;
if (headcheck(req:"/CompromisedScan.dll")) ValidHead = 0;
ValidDLL = 1;
if (dllcheck(req:"/CompromisedScan.dll")) ValidDLL = 0;
#
# the main loop
#
for (x=0; tests[x]; x=x+1)
{
cur_test = tests[x];
cur_meth = method[cur_test];
cur_args = args[cur_test];
cur_pat = pats[cur_test];
if(debug) display("running test ", x, " (", cur_test, ")", " [", cur_pat, "]\n");
for (d=0; dirs[d]; d=d+1)
{
stop = 0;
for (f=0; stop == 0; f=f+1)
{
filename = files[string(cur_test, "_", f)];
if (filename)
{
if (dirs[d] == "/")
{
url = string("/", filename);
} else {
url = string(dirs[d], "/", filename);
}
if(check_cache(url:url))
{
if(debug) display("ignoring cached url ", url, "\n");
} else {
if (cur_meth == "GET")
{
if (check(url:url, arg:cur_args, pat:cur_pat))
{
add_report(name:cur_test, url:url);
add_cache(url:url);
}
}
if ((ValidHead == 1) && (cur_meth == "HEAD"))
{
if (headcheck(req:url))
{
add_report(name:cur_test, url:url);
add_cache(url:url);
}
}
if ((ValidDLL == 1) && (cur_meth == "DLL"))
{
if (dllcheck(req:url))
{
add_report(name:cur_test, url:url);
add_cache(url:url);
}
}
if (cur_meth == "IISE")
{
if (iisecheck(req:url))
{
add_report(name:cur_test, url:url);
add_cache(url:url);
}
}
}
} else {
stop = 1;
}
}
}
}
if (strlen(report)) security_hole(port:port, data:report);