On Sat, May 2, 2009 at 11:03 AM, Holden Hao <[email protected]> wrote:
>
> So the application mkdir in the system is the real one but it is not
> the one that is being executed but a "function" called from the kernel
> itself?

yup :-> the flow goes like this...

1. userland's mkdir calling mkdir system call
2. hacker's system call hook called... do something and after that
either return back to number 1 or go to number 3
3. original system call hook called.

> So the hacker installed his own kernel.

yup.. to be exact.. installed his own kernel extension on the fly thru
/dev/kmem...

> It is a
> sophisticated hack.  A thorough security audit is a must.

expect more sophisticated hack.. this one is im not sure if the hacker
is a stupid one or not as he let himself identified thru giving an
error when a numeric file name or directory name was given...

expect a sophisticated one where it doesnt touch any files in the
system... because the hole was already identified.. what the hacker is
going to do is to infect the system thru that hole... if the system is
rebooted and the injected code is gone... the hacker is going to
infect it again...

another flexibility with this technique that i can see is that...the
first phase of an injected code is just an executioner of the real
commands (second phase) waiting from its master externally thru port
knocking technique using udp protocol... since udp is unreliable
protocol.. the hacker doesnt need a real source ip... therefore he can
spoof the source ip address so that he will not be traceable... the
commands are the payload of udp packets... you wont see any his port
listening in your system as he take over the network driver to watch
for his own packets using the port knocking technique.... the
executioner construct the commands that it receives and execute it...
after the execution.. destroy the commands.. and waiting again from
his master... commands can be encrypted using PKI to be more
sophisticated... and the executioner can morph from one place to
another place in the system so that it wont traceable...

>> http://www.theregister.co.uk/2009/03/24/persistent_bios_rootkits/
>
> Very interesting and scary!

just always prepare for your bios firmware file and reprogram the bios
before you reinstall the server... with a UPS of course :->

it recalls me something during my college days when i was still a
student... we got infected by the first computer virus for pc called
cBrain... it is a boot virus... intentionally infected my disk so that
i can study the code... cBrain virus is a pretty simple virus... put
the initial code in the boot sector and load the rest of its code in
the data area reference with a bad cluster marked in the fat area...
the problem with cBrain was that it puts a bad cluster in the fat area
even the data area is good to use.. with this.. using a disk editor..
you can easily identified if your disk was infected or not without
using a virus scanner...

what i did.. i wrote my own improved and stealth boot virus.. instead
of marking a bad cluster and putting the code in there... i put my
code outside the standard track of a disk.. for example for 5 1/4
disk... the number of tracks is 40... i reformated track 41 and put my
code in there.. same also with 3 1/2 disk..  number of tracks is 80
and reformated track 81 and put my code in there... for hard disk... i
put it in a reserve sectors... track 0, head 0, from sector 1 to N
where sector 0 is the mbr..

it was a friendly virus ...it wont harm and slow down your system...as
you wont notice that you were infected... it was pretty optimize as
the code fits only to one sector (512 bytes) using assembly language..

later on.. i was thinking to make a hybrid one.. a combination of boot
and file virus.. studying the programmable bios if i can put my code
in there... but during at that time you cannot... we even made a
laughing stock to those students claiming he will make a cmos virus
without knowing it first if it can be done or not...i dont have any
books or materials regarding to this programable bios... what i did at
that time was to trace the ROM code which was very painful because one
mistake...your debugger will hang and you have to start from the start
again...

the hybrid virus didnt materialize (as it was supposed to  be the
first hybrid virus) because our computer laboratory head (while i was
a computer laboratory student assistant at that time) adviced me to
use your talent in a productive way... but of course to be
productive... during at that time 80386 was the newest processor... i
already created a program how to crack a cmos password :->

now there is a space in the programmable bios... we will see their
creativity and prepare for the defense....

fooler.
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to