Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org

 
CONTINUE READING
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
Volume 1, Issue 3, July 2010 www.hackinthebox.org

Chinese
Malware Factory 24
Url Shorteners
Made My Day! 68
Cover Story
Using Kojonet Open Source
Low Interaction Honeypot 4
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
Advertisement

                                                                                             Editorial                                                                   Volume 1, Issue 3, July 2010

                                                                          Dear Reader,

                                                                                             Welcome to Issue 003 of the HITB Magazine!
                                                                      We’re really super excited about the release of this issue as it
                                                                                             coincides with our first ever HITB security conference in Europe -
                                                                                             HITBSecConf2010 - Amsterdam!

                                                                                             The design team has come up with (what we feel) is an even
                                                                                             better and more refined layout and our magazine now has its own
                                              site! You’ll now find all the past and current issues of the magazine
                                                                                             for download at http://magazine.hitb.org or http://magazine.
                                          hackinthebox.org/.

                                                 Also in conjunction with our first European event, we have lined
                                                                                             up an interview with Dutch master lock picker and founder of The
                                                                                                                                                                                 Editor-in-Chief
                                                                                                                                                                                  Zarul Shahrin
                                                                                             Open Organization of Lock Pickers (TOOOL) Barry Wels.
                                                                                                                                                                               Editorial Advisor
                                                                         We hope you enjoy the issue and do stay tuned for Issue 004
                                                                                             which we’ll be releasing in October at HITBSecConf2010 -
                                                                                                                                                                         Dhillon Andrew Kannabhiran
                                                                                             Malaysia. In addition to the electronic release, we’re hoping to                  Technical Advisor
                                                                      have a very ‘limited edition’ print issue exclusively for attendees of
                                                                                             HITBSecConf2010 - Malaysia!
                                                                                                                                                                               Gynvael Coldwind
                                                                                                                                                                                    Design
                                                   Enjoy the summer and see you in October!                                            Shamik Kundu
                                                                                                                                                                                     Website
                                                                                                                                  Dhillon Andrew Kannabhiran
                                                                                                                                                                                      Bina
                                                                                                                                               Editorial Advisor      Hack in The Box – Keeping Knowledge Free
                                                                                                                                       dhillon@hackinthebox.org              http://www.hackinthebox.org
                                                                                                                                                                             http://forum.hackinthebox.org
                                                                                                                                                     http://conference.hackinthebox.org
           
           

                                                                                             Contents
                                                                                                                    information security COVER STORY         Non-Invasive Invasion
                                                                                                Using Kojonet Open Source Low            Making the Process Come to You 48
                                                                          Interaction Honeypot 4
            
                                                                                                                                                             IAT and VMT Hooking Techniques 62
                                                                                                                    A Brief Overview on Satellite Hacking 16 web Security
                                                                                                                    Malware Analysis                         URL Shorteners Made My Day! 68
                                                                              Chinese Malware Factory 24               book review
                                                                             Windows Security                         ModSecurity Handbook 76
                                                                          Reserve Objects in Windows 7 34          interview
                                                                         application Security                     Barry Wels 78
                                                                                                                    Javascript Exploits with Forced
                                                                             Timeouts 42
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security

                              Using Kojonet
                              Open Source
                              Low Interaction
                              Honeypot to
                              Develop Defensive
                              Strategies and
                              Fingerprint Post
                              Compromise
                              Attacker Behavior
                              By Justin C. Klein Keane, justin@madirish.net

                              In attempting to defend against intruders and
                              protect assets using defense in depth principle it is
                              critical to not only understand attacker motivations,
                              but also to be able to identify post-compromise
                              behavior. Utilizing data that identifies attacker
                              trends it may be possible to prevent compromises.
                              Furthermore, information about resource usage
                              and patterns may allow system administrators
                              to identify anomalous activity in order to detect
                              compromises shortly after they occur.
4 HITB Magazine I july 2010                                    july 2010 I HITB Magazine 5
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security                                                                                                                                                                                                                 information security

                         H
                                    oneypots can be used to monitor        word guessing attacks against SSH servers.         tions for deploying a honeypot. Some honey-        the overhead of configuring and deploying
                                    attacker behavior during and af-       Much like port scanning3, SSH brute force at-      pots are deployed to distract attackers from       honeypots7, tools designed to significantly
                                    ter compromise of a system set up      tacks have become a part of the background         more valuable assets and to waste attacker         streamline post compromise analysis simply
                                    for this express purpose. Although     noise of the internet. Virtually any adminis-      resources on “fake” targets. This strategy is      do not yet exist. Without adequate time and
                         we can only guess at attacker motivation,         trator running an SSH server need look no          of debatable merit as there is little chance       suitable analysts much of the value of honey-
                         through traffic analysis we are able to infer     further than their SSH server logs to find evi-    of accurately gauging the success of such a        pots is lost.
                         the types of resources that attackers consider    dence of password guessing attacks.                honeypot, especially if compromise of legiti-
                         valuable. The preponderance of log evidence                                                          mate assets goes undetected. Another use           For all of these reasons honeypots should only
                         of failed SSH attempts by unknown users im-       SSH BRUTE FORCE ATTACKS                            of the honeypot is as a type of early warning      be deployed with extreme caution and only
                         plies that SSH servers are assets to which at-    Given the preponderance of SSH brute force         system. If the honeypot detects malicious          after consultation with others within your or-
                         tackers are attempting to gain entrance.          attacks it is worthwhile to explore the motiva-    traffic from an asset within the organization      ganization to determine acceptable risk.
                                                                           tions of attackers. Unfortunately, without any     a compromise can be inferred. Where the
                         By deploying honeypots that simulate re-          data, these motivations remain a mystery. In       honeypot returns its most value, however, is       High Interaction Honeypots
                         sources we know attackers will target, name-      order to attempt to understand the goals of        when exposed to the internet in order to ob-       Traditional honeypots consist of full systems
                         ly SSH servers, we are able to catalog post       attackers, or defend against them, it becomes      serve and analyze attack traffic and attacker      that are set up and configured from the hard-
                         compromise behavior. Because certain hon-         necessary to collect concrete data about SSH       behavior independent of an organization’s          ware layer up to the application layer. Such a
                         eypots present inherent risks, utilizing soft-    brute force attacks.                               internal configuration.
                         ware based, low interaction, honeypots we
                         can mitigate risk while still providing a rich One goal of collecting data about brute force
                         target environment within which to collect attacks is to fingerprint post compromise be-
                                                                                                                              There are a number of reasons why honeypots
                                                                                                                              are difficult to deploy in this last mode. In ad-
                                                                                                                                                                                         Low interaction honeypots were
                         data about attacker activity.                  havior. We assume that the goals of attackers
                                                                        are separate and distinct from those of regular
                                                                                                                              dition to significant time requirements, there
                                                                                                                              is also inherent difficulty in setting up a sys-
                                                                                                                                                                                        developed to address many of the
                         INTRODUCTION                                   system users. Because malicious users are at-
                         Secure Shell, or SSH, is an encrypted remote tempting to utilize system resources in non-
                                                                                                                              tem that is attractive to attackers. Additionally,
                                                                                                                              such a system will likely invite damage by the
                                                                                                                                                                                           deficiencies of traditional,
                         connection mechanism common on most Li- traditional ways it may be possible to spot
                         nux and Unix operating systems. The SSH pro- this type of anomalous behavior. It may be im-
                                                                                                                              target attackers and will require a rebuild after
                                                                                                                              use. Furthermore, it is no simple task to con-
                                                                                                                                                                                           high interaction honeypots
                         tocol was defined by Ylonen and Lonvic in RFC possible to identify malicious users based on          figure an effective monitoring system that will
                         4254 of the Internet Engineering Task Force1. usernames and passwords alone, for instance            not alert an attacker to observation.              configuration provides a rich environment for
                         SSH allows users to authenticate to remote in the case that an attacker has compromised,                                                                attackers to interact with and can serve to col-
                         machines and access an interactive command or guessed, a legitimate user’s credentials.              In addition to logistical considerations, of sig- lect data about a wide variety of vulnerabilities,
                         line, or shell. Although SSH can be configured For this reason fingerprinting behavior im-           nificant concern in deploying such a honeypot attack methods, and post compromise behav-
                         to use alternate ports, the well known port 22 mediately following a successful authentica-          on the internet is the possibility for “down- ior. By providing an attacker with a realistic en-
                         is registered for SSH2. There are many meth- tion becomes important. Fingerprinting is the           stream liability”6. If such a system were to be vironment you are most likely to collect useful
                         ods available for SSH authentication in most process of identifying trends or commonali-             compromised by attacker, and then the at- intelligence. Honeypots of this style are known
                         implementations. The default method of au- ties amongst attacker behavior (consisting of             tacker were to use the system as a pivot point as “high interaction honeypots” because they
                         thentications in many distributions, however, system commands issued) that might distin-             or launching pad to attack other resources provide the widest array of response.
                         is based on username and password.             guish it from legitimate user behavior. If it is      there could be serious consequences. If the
                                                                        possible to develop a signature of malicious          honeypot were used to attack third party sys- High interaction honeypots have significant

      One goal of collecting data about
                                                                        behavior then that signature can be used to           tems then the honeypot maintainer could be downsides. Careful consideration must be
                                                                        identify compromise. This process would not           culpable in facilitating a compromise. If the given to the configuration of egress rules for

      brute force attacks is to fingerprint
                                                                        prevent attacks, but would suffice to alert ad-       honeypot were used to attack internal systems high interaction honeypots in order to mini-
                                                                        ministrators of a compromise soon after it had        then it could potentially bypass authorization mize the possibility of downstream liability.

          post compromise behavior
                                                                        taken place to minimize damage and contain            rules that prohibited connections from out- Furthermore, encrypted protocols present
                                                                        incidents. Such early identification is critical to   side hosts. Using such a pivot point whereby problems when monitoring traffic to and
                                                                        containing damage caused by intrusions and            an attacker compromised the honeypot in from a high interaction honeypot. These rea-
                         Given the ability to access many SSH servers forms an additional layer of defense, support-          order to attack other assets that might not be sons combined with the high deployment,
                         using simple usernames and passwords over ing the defense in depth principle.                        routable from the wider internet could create rebuild, and maintenance overhead make
                         a well understood protocol, it is unsurpris-                                                         significant problems.                              high interaction honeypots unattractive to
                         ing that brute force, or password guessing, HONEYPOTS                                                                                                   many organizations.
                         attacks against SSH servers have become Honeypots were first popularized by the                      Furthermore, to be of any value, a honeypot
                         common. The SSH protocol is open and well Honeynet Project4 and Lance Spitzner’s                     must be analyzed after it is compromised. Low Interaction Honeypots
                         defined. Several developer libraries and API’s Know Your Enemy5. A honeypot is a vulner-             This forensic work can often be extremely Low interaction honeypots were developed to
                         exist to implement SSH clients quickly and able, or deliberately insecurely configured               time consuming and may or may not result address many of the deficiencies of traditional,
                         easily. Many automated attacker tools allow system that is connected to the internet and             in valuable intelligence. Even though the ad- high interaction honeypots. Low interaction
                         users to easily perform point-and-click pass- carefully monitored. There are many motiva-            vent of virtualization has significantly reduced honeypots consist of software systems that

6 HITB Magazine I june 2010
                  july 2010                                                                                                                                                                                                      july 2010 I HITB Magazine 7
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security                                                                                                                                                                                                                         information security

                             simulate specific aspects of complete systems.      attacker would typically move onto a com-           attacks from the same IP address was 135                                                                        China (118)
                             Because they are implemented in software,           promised system.                                    days wherein a single IP address participated
                             low interaction honeypots present significant                                                           in over 6 distinct attacks.                                                                                     Romania (111)
                             safety improvements over high interaction           Considerations with Kojoney                                                                                                                                         US (52)
                             honeypots. Low interaction honeypots can            Because Kojoney is open source it is easily cus-    Most popular time                                                                                               Korea (27)
                             strictly monitor and limit both inbound and         tomizable11. However, the source code is also       Examining the timing of attacks based on the
                             outbound traffic. Low interaction honeypots         freely available to attackers. It is worthwhile,    time of day on a 24 hour scale in Eastern Stan-                                                                 Spain (25)
                             can restrict functionality and can more safely      therefore, to spend some time customizing           dard Time yields some interesting informa-                                                                      Italy (17)
                             contain malicious attacker activity.                the output of Kojoney in order to implement         tion. Attacks seem to be fairly evenly spaced                                                                   Germany (14)
                                                                                 any additional functionality desired as well as     throughout the day but spike around noon
                             METHODOLOGY                                         to evade detection attempts by attackers.           and late at night. The hour between noon                                                                        Brazil (14)
                             For the purposes of this study, Kojoney8,                                                               and 1 PM saw the most activity with 9,017                                                                       France (11)
                             written by Jose Antonio Coret, was used             As with all software, Kojoney is not immune         login attempts.                                                                                                 Netherlands (11)
                             as a foundation. Kojoney is an open source          from security vulnerabilities12. It is important
                             low interaction honeypot implemented in             to follow security news outlets for notification    The number of attacks over months seemed                                                                        UK (11)
                             Python. Kojoney simulates a SSH server, lis-        of any vulnerability discovered in Kojoney, or      to vary somewhat as well, with sharp spikes                                                                     Macedonia (7)
                             tening on port 22. Kojoney uses the popular         its supporting packages, and keep your in-          in the number of attacks in January 2010 and                                                                    Canada (7)
                             OpenSSL9 and Python’s Twisted Conch10 li-           stallation up to date.                              April 2010. The following table does not in-
                             braries to negotiate SSH handshakes and set                                                             clude data from October 2009 and May 2010                                                                       Russia (7)
                                                                                                                                                                                                       Figure 4. Attacker IP by Country
                             up connections.                                       Deficiencies                                      because collection during those months was                                                                      Taiwan (7)
                                                                                   Kojoney deliberately limits functionality. Al-    limited to a few days.                                 mania (a country with less than 2% of China’s            India (6)
                              Kojoney utilizes a list of usernames and pass- though the installation utilized for this study                                                                population), was the source of roughly the
                                                                                                                                       Figure 2. Distinct IP’s by Month
                              words that can be used to access the system. was heavily modified there was certain func-                                                                     same number of attacks as China. The US was
                                                                                                                                       Month and Year	Number of Login Attempts	Distinct IPs
                              This means that not all connection attempts tionality that was not simulated. The most                   November 2009     9,464                  69          the third most common place of origin, but
                              will be successful. Once a connection has noticeable of these was the inability for an                   December 2009     11,114                 76          had half the total number of distinct IP ad-
                              been established Kojoney presents attackers attacker to interact with packages that were                 January 2010      25,385                 99          dresses of China and Romania. Together, Chi-
                              with what appears to be an interactive shell. downloaded. This meant that attackers could                February 2010     18,439                 81          na, Romania, and the US accounted for nearly
                                                                                                                                       March 2010        11,515                 88
                              Commands issued by attackers are inter- download toolkits but they could not actu-                                                                            half of all the distinct IP addresses of origin
                                                                                                                                       April 2010        22,477                 137
                              preted by Kojoney and attackers are returned ally inflate compressed packages or execute                                                                      for attacks.
                              responses based on definitions from within binaries. Kojoney responds with a vague er-                 Examining the popularity of certain days for
                              the Kojoney package. The only system func- ror message if it cannot simulate functional-               attacks also provides some interesting in- It is important to note that the geographic lo-
                              tionality available to attackers is ‘wget’ or ‘curl’ ity. When attackers encounter this behavior it    sight. Apparently Sunday and Wednesday are cation of IP assignments may not necessarily
                              for fetching remote files. However, even this is common for their session to end. Because              the most popular days to launch SSH brute correspond with their physical address, nor
                              functionality is limited. Any material down- Kojoney does not simulate a full system once              force attacks. Given the global nature of the does it necessarily correspond to the nation-
                              loaded by Kojoney at the direction of attack- an attacker attempts complex interaction, it             internet and timezone differences, however, ality of the attacker. It is entirely possible that
                              ers is actually stored in a location specified by was common for attackers to terminate their          this data may not provide any real value.              attacks observed were carried out from com-
                              the Kojoney configuration. After download, sessions after encountering commands that                     Figure 3. Attacks by Weekday                         promised hosts controlled by a third party
                              the attacker is not able to interact with the do not produce desired results.                            Day of Week	Number of Login Attempts                 located at a totally different internet or geo-
                              retrieved material. This allows for the capture                                                          Sunday            20,674                             graphic location.
                              of malware, rootkits, or other material that an RESULTS                                                 Monday         11,211
                                                                                                                                      Tuesday        9,248
                                                                                   For the purposes of this study a modified                                                             Most popular usernames
                                                                                                                                      Wednesday      23,484
                                                                                   Kojoney low interaction SSH honeypot was           Thursday       18,098                              13,554 distinct usernames were attempted
                              Figure 1. Hours of Attack                            deployed on commodity hardware and con-            Friday         14,141                              over 109,121 login attemts. Usernames were
 Hits                                                                              nected to the live internet with a dedicated       Saturday       12,265                              interesting because there were many com-
10000
 9000
                                                                                   IP address. Kojoney was configured to run on      Countries                                           mon system usernames (such as root) or
 8000
                                                                                   the standard SSH port 22 with a separate in-      IP addresses are assigned to internet service       usernames associated with services, such as
 7000
                                                                                   terface configured for management. The sys-       providers in blocks that are then subdivided to     oracle, postfix, backuppc, webmail, etc. Some
 6000
                                                                                   tem was left on and running consistently over     their customers. Using these assignments it is      usernames such as jba120 could potentially
 5000
                                                                                   a period of roughly six months from October       possible to locate the country to which a spe-      have been harvested from previously compro-
 4000
                                                                                   27, 2009, to May 3, 2010. During this time        cific address is assigned. Examining the data for   mised systems or generated by brute force.
 3000
                                                                                   109,121 login attempts were observed from         country assignments of IP addresses which par-      Some usernames, such as ‘aa’ , were most cer-
 2000
                                                                                   596 distinct IP addresses. Of these distinct IP   ticipated in attacks provides some stark details.   tainly generated via brute force. Some user-
 1000
                                                                                   addresses over 70 participated in brute force                                                         names such as ‘P4ssword’, ‘Access’ and ‘denied’
   0                                                                               attacks separated by more than 24 hour time       China contained the highest number of dis-          may have resulted from misconfigured attack
 time 00 01 02 03 04 05 06   07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23    intervals. The longest span of time between       tinct IP addresses for attacks. However, Ro-        utilities. ‘Root’ was by far and away the most

8 HITB Magazine I july 2010                                                                                                                                                                                                               july 2010 I HITB Magazine 9
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security                                                                                                                                                                                                                                          information security

                           popular username, accounting for nearly half       Figure 6. Common Passwords

                                                                                                                                                    passwd (89)

                                                                                                                                                                                                                       cd (52)
                           (45,403), of all attempts, compared with the

                                                                                                                                                                                                                        exit (5
                                                                               Password                        Count

                                                                                                                                                      uptim

                                                                                                                                                                                                                           id (6 r/tmp
                           next most popular username, ‘test’, with 4,128      123456                          2361

                                                                                                                                                                                                                                                              03)
                                                                                                                                                ps (

                                                                                                                                                                                                                                cd/
                           attempts, then ‘admin’ and ‘oracle’ with over       root                            2111

                                                                                                                                                                                                                                4)
                                                                                                                                                                                                                                 1)
                                                                                                                                                           e (10

                                                                                                                                                                                                                                                             w (3
                                                                                                                                                                                                                                    va
                                                                               test                            2084                                                                                              ps

                                                                                                                                                    117
                           1,000 followed by 62 other usernames with                                                                cat                                                                               x (7

                                                                                                                                                                2)
                                                                               password                        1283                                                   ls (538)

                                                                                                                                                                 )
                           more than 100 login attempts. While many                                                                       (15                                                                         6)
                                                                               qwerty                           855                          1)

                                                                                                                                                                                                                                       (70
                           of these were common system accounts or                                                                                                                                            passw
                                                                                                                                                                                                                   d (79)

                                                                                                                                                                                                                                           )
                                                                               1234                             839
                           common names (such as ‘mike’ or ‘michael’,          123                              690
                           the 67th and 60th most common username              1q2w3e                           615              uname (179)                                                                cat/proc/cpuinfo (94)                                      ls -a (255)
                           respectively) there were some interesting           12345                            546
                                                                                                                                                                                                                                )
                                                                                                                                                                                                                      e (102
                                                                               changeme                         460                                                               cd (338)
                           stand outs. The username ‘prueba’ (Spanish          oracle                           421                [blank] (196)                                                              uptim
                           for proof ) was used 149 times (the 56th most       abc123                           376                                                                                                              8)
                                                                                                                                                                                                                              (11                                   ls (

                                                                                                                                                                                                                                           64)
                           common name) from 19 different IP address-          welcome                          369                                                                                                      et                                             224
                                                                                                                                                                                                                      wg

                                                                                                                                                                                                                                                 [blank] (
                                                                                                                                                                                                                                                                           )

                                                                                                                                                                                                                                       a (1
                           es. Surprisingly these 19 IP addresses were         admin                            337                                 w (303)          wget (308)

                                                                                                                                                                                                                                      me -
                           spread across the globe and not necessarily         1a2b3c                           315
                                                                               redhat                           314

                                                                                                                                                                                                                                    una
                           all from Spanish speaking countries. Other

                                                                                                                                                                                                                                                    187)
                                                                               master                           309
                           interesting common usernames were ‘zabbix’          ad4teiubesc26051986              295
                           (an open source network monitoring utility)         111111                           280
                           with 118 attempts, ‘amanda’ (a common Unix          1                                270                                Figure 4. Distinct Commands                                           Figure 4. Commands with Arguments
                           backup service) with 143 attempts, ‘ts’ with        p@ssw0rd                         261
                           119 attempts and ‘toor’ with 301 attempts.
                                                                              The 20 most popular passwords attempted          Most common commands                                          the contents of the virtual file ‘/proc/cpuinfo’
                               Figure 5. Top Logins                           included several common strings, as well as      181 distinct commands were recorded by the                    which contains processor identification infor-
                               Top 20 Usernames	Login Attempts                several based on keyboard layouts, such as       honeypot out of 3,062 commands issued. The                    mation, also becomes quite apparent.
                               1. root              45,403
                               2. test               4,128                    ‘1q2w3e’.                                        honeypot captured entire lines of text en-
                               3. admin              1,396                                                                     tered by attackers. Many of these lines were     Downloads
                               4. oracle             1,287                    Although not represented in the most com-        commands followed by arguments. A distinct       282 downloads were captured by the hon-
                               5. user                881                     mon passwords, particularly interesting were     command was defined as the first sequence        eypot. Interestingly the wget command was
                               6. guest               872                     passwords that seemed to have been gener-        of characters followed by a space or a car-      used 41 times to download Microsoft Win-
                               7. postgres            773
                               8. webmaster           540                     ated using permutations of the hostname          riage return. This allows us to examine the      dows XP Service Pack 3. This behavior was
                               9. mysql               538                     (See 100 Most Common Passwords).                 core commands (such as directory listing or      perhaps an attempt to test the download
                               10. nagios             536                                                                      file content listing) independent of their tar-  functionality of wget and to gauge the speed
                               11. tester             480                     Average password length                          gets. The most common distinct command           of the internet connection. Although time
                               12. ftp                456                     Over 133 distinct passwords utilized in login    was ‘ls’, issued 538 times. This was followed by did not permit a full analysis of each binary
                               13. backup             444
                               14. web                436                     attempts were greater than 19 characters         ‘cd’ with 338 execution attempts, then ‘wget’    downloaded the most popular download
                               15. administrator      384                     long. Of the rest, the average length of pass-   with 308 attempts, ‘w’ with 303 attempts,        seemed to be PsyBNC13, an open source Inte-
                               16. info               359                     words attempted was 6.78.                        ‘uname’ with 179 attempts, ‘cat’ with 151 at-    net Relay Chat (IRC) bot program. Other pop-
                               17. ftpuser            343                                                                      tempts, ‘ps’ with 117 attempts and ‘uptime’      ular downloads included other IRC bots, UDP
                               18. sales              336                     Password resets                                  with 102 attempts.                               ping flooders (presumably for use in denial of
                               19. office             331
                               20. tomcat             323                     Although not a native feature of Kojoney, our                                                     service attacks), port scanners, and SSH brute
                                                                              installation included functionality to capture   Examining the full commands issued by at- force tools.
                           Most popular passwords                             password reset attempts. In the sample pe-       tackers (the full line of input submitted to the
                           The honeypot recorded 27843 distinct pass-         riod attackers attempted to reset passwords      honeypot) reveals a slightly different picture. Sessions
                           words utilized by attackers. Of the passwords      42 times. Examining these records reveals in-    Commands such as ‘ls’ and ‘cd’ became less Sessions are defined as interactions where
                           used, the three most popular (‘123456’, ‘root’,    teresting data. None of the password resets      frequent as they are almost always used with the attacker not only attempted to gain ac-
                           and ‘test’) were used more than 2,000 times        resulted in a password of more than 8 charac-    a target, while commands such as ‘w’ which cess with usernames and passwords, but
                           a piece. The fourth most popular password,         ters with mixed case alphabetic, numeric, and    generally do not include any further switches
                           ‘password’, was used 1,283 times while the
                           remaining passwords were used less than
                                                                              special characters. 47% of the new passwords
                                                                              were alphanumeric and over 80% of the new
                                                                                                                               or arguments, percolated to the top of the
                                                                                                                               list in terms of frequency. Looking at the list                    Looking at the list of commands it is
                           1,000 times each. Of the 80 most common
                           passwords 18 were numeric only, 39 were
                                                                              passwords were longer than 8 characters (the
                                                                              longest being 33 characters long and contain-
                                                                                                                               of commands it is worth noting that certain
                                                                                                                               common commands with specific arguments                             worth noting that certain common
                           lower case alphabetic only, and 21 contained
                           numbers and lowercase letters. Only three
                                                                              ing a mix of letters and numbers). At one case
                                                                              the new password created by the attacker,
                                                                                                                               were seen quite frequently. These include ‘un-
                                                                                                                               ame -a’, the ‘-a’ being an aggregate flag that                     commands with specific arguments
                           contained punctuation or special charac-
                           ters, utilizing the period (.) or at symbol (@).
                                                                              “-www.WhiteTeam.net-” appeared to contain
                                                                              a web site address.
                                                                                                                               behaves as though several other flags were
                                                                                                                               utilized. The use of the ‘cat’ command to echo                         were seen quite frequently
10 HITB Magazine I july 2010                                                                                                                                                                                                                                 july 2010 I HITB Magazine 11
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security                                                                                                                                                                                                                      information security

                           also executed commands on the honeypot.             150 times the ‘cat’ command was used, the           root is the most common target is           be confident that legitimate users         is important to note that it is possible
                           Furthermore, sessions were delimited by             full command issued was ‘cat /proc/cpuinfo’,        likely attributable to the fact that        only required access during certain        some IP addresses to represent ag-
                           time delays of more than an hour between            which is used to display processor informa-         this account has the most power,            time ranges. Great care would need         gregation points, or rotating pools,
                           command execution. For instance, if an at-          tion. This type of command is not typical for       but also because it appears on most         to be taken with such a remediation,       for multiple users and not all traffic
                           tacker logged in, executed commands, then           a normal system user.                               Unix systems. Choosing strong pass-         however, to prevent a nightmare            originating from the identified IP ad-
                           waited for more than an hour before execut-                                                             words seems like a safe strategy for        scenario where a legitimate admin-         dresses is necessarily malicious.          •
                           ing additional commands then the interac-           Although some common commands ob-                   protecting the system accounts, but         istrator or user might be unable to
                           tion was counted as two sessions. A total of
                           248 attacker sessions were identified issuing
                                                                               served in the Kojoney session captures could
                                                                               potentially be attributed to normal users, oth-
                                                                                                                                   even more effective would be to
                                                                                                                                   prohibit interactive login over SSH
                                                                                                                                                                               respond to a crisis occurring in off
                                                                                                                                                                               hours due to login restrictions.
                                                                                                                                                                                                                           >>REFERENCES
                           a total of 3,062 commands. The average ses-         ers clearly stand out. The ‘w’ command, which       for the root account. By disabling                                                      1. Y lonen, T., Lonvick, C., Internet
                                                                                                                                                                                                                               Engineering Task Force, RFC 4254, The
                           sion lasted for 4.1 minutes during which the        is used to report on which users are logged         SSH root login, nearly half of all          Some of the greatest utility in de-             Secure Shell (SSH) Connection Protocol,
                           attacker issued 12 commands. The longest            into the system, and the ‘uptime’ command,          brute force attacks observed would          ploying a Kojoney based honeypot is             http://www.ietf.org/rfc/rfc4254.txt
                           session lasted for an hour and 10 minutes.          which reports how long the system has been          have been thwarted.                         in its ability to detect attacks from IP        (January, 2006)
                                                                               on, are not regularly used by non-system ad-                                                    ranges within an organizations net-         2. I nternet Assigned Numbers Authority
                                                                                                                                                                                                                               (IANA), Port Numbers, http://www.iana.
                           By far the most common command in any               ministrators. Similarly, the ‘uname’ command        All attacker behavior was observed          work. Based on the fact that some               org/assignments/port-numbers
                           session was the ‘w’ command, occurring in           is generally utilized to determine the kernel       on the standard SSH port 22. Running        attackers were observed attempting          3. W ikipedia, Port scanner, http://
                           74% of sessions. Wget was used in over 58%          version that is running, which could perhaps        SSH on an alternate port would al-          to download SSH brute force tools it            en.wikipedia.org/wiki/Port_scanner
                           of sessions as was uname. The uptime com-           be used to search for vulnerabilities.              most certainly cut down on the num-         is likely that compromised SSH serv-        4. T he Honeynet Project, http://www.
                                                                                                                                                                                                                               honeynet.org
                           mand was issued in 35% of sessions.                                                                     ber of attacks, although such a solu-       ers are sometimes used as SSH brute         5. L . Spitzner, Know Your Enemy. Addison-
                               Figure 7. Commands in Sessions
                                                                               Monitoring command execution on systems             tion could confuse legitimate users         force scanners. Detecting an internal           Wesley, 2002.
                               Command	Number of Sessions                      seems like a worthwhile exercise given the          and result in increased support costs.      attacker could provide extremely            6. D ownstream Liability for Attack Relay
                                                                               results of this data. Replacing the ‘w’, ‘uptime’   Brute force detection and preven-           valuable evidence in an incident de-            and Amplification. http://www.cert.org/
                               w             184                                                                                                                                                                               archive/pdf/Downstream_Liability.pdf
                               ls            155                               or even ‘wget’ command with a binary that           tion countermeasures, such as SSH           tection or response.                        7. N . Provos and T. Holz, Virtual
                               wget          146                               would log the execution of such a command           Black15, OSSEC active response, or                                                          Honeypots. Addison-Wesley, 2008.
                               uname         144                               before executing the intended target could          the use of OpenSSH’s MaxAuthTries           Examining malware or attacker               8. Coret, J., Kojoney low interaction SSH
                               cd            122                                                                                                                                                                               honeypot, http://kojoney.sourceforge.net
                               cat           105                               provide some insight into the usage of such         configuration specifications could all      toolkits downloaded to the Ko-
                                                                                                                                                                                                                           9. T he OpenSSL Project, http://www.
                               uptime         86                               utilities. Using a log file monitoring system       be worthwhile. An even more effec-          joney honeypot could also prove                 openssl.org/
                               ps             84                               such as OSSEC, system administrators could          tive solution would be to eliminate         valuable. Although a wide variety           10. T  wisted Matrix Labs Conch Project,
                               [blank]        76                               easily keep watch over such commands to             the use of username and password            of packages was not observed,                     http://twistedmatrix.com/projects/
                               passwd         67                               alert on suspicious behavior14.                     authentication altogether. Many SSH         the character of the packages that                conch
                               exit           47                                                                                                                                                                           11. Klein Keane, J., Using and Extending
                               id             44                                                                                   servers provide functionality for key       were downloaded is illustrative of                Kojoney SSH Honeypot. http://www.
                               tar            33                               Given the sophistication of the usernames           authentication. There is additional         the goals of attackers. Additionally,             madirish.net/?article=242 (May 22, 2009)
                               mkdir          21                               and passwords utilized by attackers a number        administrative overhead in imple-           developing hash fingerprints of at-         12. N  icob, [Full-disclosure] Kojoney (SSH
                               pwd            18                               of defensive strategies present themselves. It      menting key based authentication,           tacker tools or components could                  honeypot) remote DoS. Feb 24,
                               unset          16                                                                                                                                                                                 2010. http://www.securityfocus.com/
                                                                               is interesting to note the complexity of user-      and it is not as portable, but it is cer-   aid in the detection of these mate-               bid/38395
                               reboot         13
                               chmod          13                               names and passwords utilized by attackers.          tainly more secure.                         rials on other systems, which could         13. p  syBNC Homepage, http://www.
                               rm             12                               Outside of system passwords, common user-                                                       be used to detect compromises. As                 psybnc.at/
                                                                               names were not necessarily attempted with           Examining the IP source of attacker         with high interaction honeypots,            14. O  SSEC Open Source Host-based
                               ftp            12
                                                                                                                                                                                                                                 Intrusion Detection System, http://
                               ifconfig       12                               common passwords. For instance, the data            behavior shows that there are cer-          forensic analysis of this malware is              www.ossec.net
                               kill           11                               shows no attempts to log in using the user-         tain IP blocks, that if not used by         time intensive and may not provide          15. sshblack script homepage, http://www.
                               perl           11
                               history        11                               name ‘alice’, a relatively common name that         legitimate system users, could cer-         a very high return on investment.                 pettingers.org/code/sshblack.html
                               dir            10                               would appear at the beginning of a diction-         tainly be blocked to great effect.
                                                                                                                                                                                                                           Further Reading
                                                                               ary list of names, with the password ‘pass-         Locating and blocking specific IP           The actual IP addresses captured            Wolfgang, N., SSH Brute Force: Second
                           CONCLUSIONS                                         word’. From this observation, as well as the        ranges could dramatically cut down          by the Kojoney honeypot are prob-           Steps of an Attacker. http://www.cs.drexel.
                           Based on the data collected for this study          fact that the top 20 usernames attempted            on the amount of SSH brute force at-        ably of the greatest value of all the       edu/~nkw42/research/Wolfgang_
                           it is clear that attackers utilize many of the      were system accounts, we can conclude that          tacks, but again could create hassle        collected data. Because the hon-            SecondSteps.pdf (September 6, 2008)
                           same commands as legitimate system users,           attackers probably do not focus their efforts       for legitimate users and requires a         eypot was deployed on an unused
                           such as ‘ls’ and ‘cat’. The context of these com-   on breaking into user level accounts.               certain degree of administration.           and un-advertised IP address it is a
                           mands makes them distinct, however. Many                                                                                                            justifiable conclusion that all traffic
                           of the ‘ls’ commands, which are typically used      Given the breakdown of username choices             There do not appear to be strong            observed by the honeypot was de-
                           for directory listing, seemed innocuous, but        in brute force attacks it seems that system         trends in the times that attackers at-      liberate and malicious. By identify-
                           the ‘cat’ commands were typically used for          accounts are by far the most utilized. This         tempt brute force attacks. Limiting         ing these malicious IP addresses it
                           peering into the contents of system configu-        is probably because system accounts are             SSH server access to specific times         is possible to scan server logs from
                           ration files such as those that contain CPU and     standard and the attacker doesn’t have to           could cut down on the number of at-         other machines to detect malicious
                           memory information. In 94 of the more than          ennumerate or guess them. The fact that             tacks as long as administrators could       activity on other assets. Although it

12 HITB Magazine I july 2010                                                                                                                                                                                                             july 2010 I HITB Magazine 13
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security

 Username
 root
 test
                       Count
                       45403
                        4128
                               Username
                               mailtest
                               service
                                           100 Most Common Logins
                                                Count
                                                  266
                                                  263
                                                        Username
                                                        student
                                                        testing
                                                                            Count
                                                                               167
                                                                               166
                                                                                      Username
                                                                                      alex
                                                                                      usuario
                                                                                                              Count
                                                                                                                    90
                                                                                                                    90
                                                                                                                                    HITB Jobs
                                                                                                                                      it Security recruitment
 admin                  1396   fax                259   temp                   161    linux                         89
 oracle                 1287   squid              250   games                  156    mythtv                        89
 user                    881   public             242   cyrus                  153    roor                          88
 guest                   872   video              240   prueba                 149    marketing                     86
 postgres                773   print              232   amanda                 143    server                        85
 webmaster               540   http               226   teste                  141    ftpguest                      82
 mysql                   538   help               218   test1                  134    support                       81
 nagios                  536   sysadmin           216   michael                127    www-data                      76
 tester                  480   webalizer          212   upload                 120    netdump                       70
 ftp                     456   sysadm             207   ts                     119    paul                          67
 backup                  444   html               202   apache                 118    john                          67
 web                     436   printer            202   zabbix                 118    daemon                        67
 administrator           384   helpdesk           200   news                   116    uucp                          67
 info                    359   rootadmin          199   master                 103    david                         65
 ftpuser                 343   sale               199   mike                   101    users                         65
 sales                   336   nobody             198   rpm                    100    adam                          63
 office                  331   webmin             198   user1                   99    gdm                           63
 tomcat                  323   mailadmin          198   condor                  99    informix                      62
 webadmin                313   mailftp            197   prueva                  97    wwwrun                        61
 postfix                 306   mailuser           196   sshd                    96    spam                          60
 mail                    305   www                194   TeamSpeak               96    adrian                        60
 toor                    301   operator           187   test2                   94    students                      59
 testuser                268   adm                168   123456                  93    samba                         57

                                     100 Most Common Passwords
 Password              Count   Password         Count   Password            Count     Password                Count
 123456                 2361   abcd1234           218   rootroot                142   0000                         103
 root                   2111   user               217   [subdomain.domain]* 142       54321                        103
 test                   2084   passw0rd           215   guest                   141   internet                     102
 password               1283   1qaz2wsx           209   12                      140   sunos                        102
 qwerty                  855   12345678           208   [servername.subdomain]* 140   secret                       101
 1234                    839   654321             188   password123             139   123321                       101
 123                     690   linux              179   webmaster               132   manager                      100
 1q2w3e                  615   1q2w3e4r           177   mail                    129   qwertyuiop                     95
 12345                   546   pa55w0rd           176   root1234                129   root1                          94
 changeme                460   testing            175   apache                  128   [servername.subdomain.domain]* 94
 oracle                  421   root123            173   asdfgh                  127   user123                        91   !"#$%#$&%"'()&*+"',-.%(/01*23&%'*#4)&%/5%6'5/)0*2/'%7&($'/-/,.%
 abc123                  376   1234567            172   r00t                    126   server                         90   8&(4)"#.% "'% #$&% 9/):;-*(&
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security

A Brief Overview on
satellite
hacking
By Anchises Moraes Guimarães de Paula, iDefense

                                                  july 2010 I HITB Magazine 17
Url Shorteners Malware Factory 24 Chinese - Volume 1, Issue 3, July 2010 www.hackinthebox.org
information security                                                                                                                                                                                                                       information security

      As a large portion of worldwide Internet users increasingly                                                                   and telephone transmissions by using
                                                                                                                                    the transponder, a radio that receives
                                                                                                                                                                                  Exhibit 1. Unidirectional Access with Terrestrial Return (also known as Satmodem)8

        rely on satellite communication technologies to connect                                                                     a conversation at one frequency and
                                                                                                                                    then amplifies it and retransmits the

             to the Web, a number of vulnerabilities within these                                                                   signal back to Earth on another fre-
                                                                                                                                    quency that a ground-based antenna

               connections actively expose satellites to potential                                                                  may receive. A satellite normally con-
                                                                                                                                    tains 24 to 32 transponders, which are

         attacks. The implications of such a successful attack are                                                                  operating on different frequencies.4

       massive, as satellites are the only means of broadcasting                                                                    Modern communications satellites use
                                                                                                                                    a variety of orbits including geosta-

     communications in many regions around the globe and an                                                                         tionary orbits,5 Molniya orbits,6 other
                                                                                                                                    elliptical orbits and low Earth orbits

                             attacker could act from everywhere.                                                                    (LEO).7 Communications satellites
                                                                                                                                    are usually geosynchronous because
                                                                                                                                    ground-based antennas, which op-
                                                                                                                                    erators must direct toward a satellite,

                           B
                                                                                                                                    can work effectively without the need
                                     roadband Internet access via satel-       services, such as Global Positioning Systems         to track the satellite’s motion. This al-
                                     lite is available almost worldwide.       (GPSs), weather forecasts, TV transmissions          lows technicians to aim satellite antennas at     Internet, with outbound data traveling through
                                     Satellite Internet services are the       and mapping service applications based on            an orbiting satellite and leave them in a fixed   a telephone modem or a DSL connection, but it
                                     only possible method of connect-          real satellite images (such as Google Maps).         position. Each satellite occupies a particular    sends downloads via a satellite link at a speed
                           ing remote areas, the sea or countries where        “Although anything that is in orbit around           location in orbit and operates at a particular    near that of broadband Internet access. Two-
                           traditional Internet cable connections are still    Earth is technically a satellite, the term “satel-   frequency assigned by the country’s regula-       way satellite Internet service, also known as
                           not accessible. Satellite communications are        lite” typically describes a useful object placed     tor as the Federal Communications Commis-         bidirectional access or “astro-modem,” involves
                           also widely adopted as backup connection            in orbit purposely to perform some specific          sion (FCC) in the U.S. The electromagnetic        both sending and receiving data via satellite to
                           providers by several organizations and coun-        mission or task.”2 There are several satellite       spectrum usage is regulated in every coun-        a hub facility, which has a direct connection to
                           tries for those times when the terrestrial com-     types, defined by their orbits and functions:        try, so that each government has its regula-      the Internet (see Exhibit 2).
                           munications infrastructure is not available,        scientific, Earth and space observation, re-         tory agency which determines the purpose
                           damaged or overloaded. By the end of 2008,          connaissance satellites (Earth observation or        of each portion of radio frequency, according    The required equipment to access satellite
                           an estimated 842,000 US consumers relied on         communications satellites deployed for mili-         to international agreements.                     communication includes a satellite dish, a
                           satellite broadband Internet access.1               tary or intelligence applications) and com-                                                           receiver for satellites signals, which is a low-
                                                                               munications, which include TV, voice and             The satellite provider supports Internet ac- noise block (LNB) converter, a decoder, a
                           Communications satellites routinely receive         data connections. Most satellites are custom         cess and Internet applications through the satellite modem and special personal-com-
                           and rebroadcast data, television, image and         built to perform their intended functions.           provider teleport location, which connects puter software. Usually, a single device or
                           some telephone transmissions without the                                                                 to the public switched telephone network PCI card integrates the decoder and modem.
                           proper security measures, leading to frequent       Organizations and consumers have used sat-           (PSTN) and the Internet. There are three types Several software programs and online tools
                                fraud and attacks against satellite ser-       ellite communication technology as a means           of Internet via satellite access: one-way mul- are widely available.
                                     vices. Traditional fraud techniques       to connect to the Internet via broadband             ticast, unidirectional with terrestrial return
                                       and attack vectors include satel-       data connections for a long time. Internet via       and bidirectional access. One-way multicast Satellite Internet customers range from indi-
                                          lite TV hacking and the use of       satellite provides consumers with connec-            transmits IP multicast-based data, both audio vidual home users to large business sites with
                                             illicit decoding technology       tion speeds comparable or superior to digi-          and video; however, most Internet protocols several hundred users. The advantages of                            Satellites are an
                                              to hack into television sat-     tal subscriber line (DSL) and cable modems.          will not work correctly because they require this technology include a greater bandwidth                       essential part of
                                                ellite signals. In addition,   Data communication uses a similar design             a return channel. A single channel for data than other broadband technologies, nearly
                                                 satellite communications      and protocol to satellite television, known          download via a satellite link characterizes worldwide coverage, and additional sup-
                                                                                                                                                                                                                                                     our daily lives.
                                                 are easily susceptible        as Digital Video Broadcasting (DVB), a suite         unidirectional access with terrestrial return, port to television and radio services. Satellite                    Many global
                                                 to eavesdropping if not       of open standards for digital television. DVB        also known as “satmodem” or a “one-way ter- broadband service is available in areas that                            interactions
                                                properly encrypted.            standards are maintained by the DVB Project,         restrial return” satellite Internet system, and terrestrially based wired technologies (e.g.,
                                                                               an international industry consortium. Ser-           this type of satellite access uses a data uplink cable and DSL) or wireless technologies can-
                                                                                                                                                                                                                                                    rely on satellite
                                             Satellite Basics                  vices using DVB standards are available on           channel with slower speed connection tech- not operate. The disadvantages, however, are                        communications
                                          Satellites are an essential part     every continent with more than 500 million           nologies (see Exhibit 1).                        numerous: weather conditions (rain, storms                          or satellite-
                                         of our daily lives. Many global       DVB receivers deployed, including at least                                                            or solar influences) might affect satellite com-
                                      interactions rely on satellite com-      100 million satellite receivers.3 Communica-         Unidirectional access systems use traditional munications, satellites demand expensive
                                                                                                                                                                                                                                                            powered
                                    munications or satellite-powered           tions satellites relay data, television, images      dial-up or broadband technology to access the hardware and have a complex setup (install-                                services.

18 HITB Magazine I july 2010                                                                                                                                                                                                              july 2010 I HITB Magazine 19
information security                                                                                                                                                                                                                       information security

                    Exhibit 2. Bidirectional Satellite Communication9                 sign and configuration flaws in public-     radio programs based on a Linux operating            To get an anonymous Internet connection
                                                                                      ly accessible satellite communication       system, he was able to monitor Internet satel-       via the satellite broadband network, Nve
                                                                                      networks and protocols, and they are        lite transmission and to pipe its feed into his      used this local Internet access connection
                                                                                      making impressive progress.                 laptop. From there, he could analyze packets         as an uplink and the hacked satellite con-
                                                                                                                                  using standard programs such as the popular          nection as a downlink since he had the
                                                                                      In 2004, security researcher Warez-         network protocol analyzer Wireshark. Accord-         necessary means to capture all satellite
                                                                                      zman presented early studies on satel-      ing to The Register, “Laurie has also developed      traffic, including the IP response packets.
                                                                                      lite hacking at the Spanish conference      software that analyzes hundreds of channels          By figuring out the ISP satellite IP address
                                                                                      UNDERCON 0x08.15 In July 2006, Dan          to pinpoint certain types of content, includ-        range and using a satellite IP address not
                                                                                      Veeneman presented additional stud-         ing traffic based on transmission control pro-       in use, Nev established a TCP connection by
                                                                                      ies on satellite hacking at Defcon 04.16    tocol (TCP), user datagram protocol (UDP),           sending packets with the spoofed satellite
                                                                                      Recently, various security researchers      or simple mail transfer protocol (SMTP). The         network’s IP address via his local Internet
                                                                                      are leading the innovation in this area,    program offers a 3D interface that allows the        connection (a dial-up or regular broadband
                                                                                      notably, Jim Geovedi, Raditya Iryandi       user to quickly isolate e-mail transmissions,        connection) and he received the response
                                                                                      and Anthony Zboralski from the con-         Web surfing sessions or television feeds that        by sniffing the packets via the satellite in-
                                                                                      sulting company Bellua Asia Pacific;        have recently been set up.”20                        terface (see Exhibit 3).
                                                                                      Leonardo Nve Egea from the Spanish
                                                                                      information security company S21SEC;        In 2009, Leonardo Nve, a Spanish senior secu-        Such attack is virtually untraceable, once the
                                                                                      and white-hat hacker Adam Laurie, di-       rity researcher, presented his experiments on        attacker can establish his or her connection
                                                                                      rector of security research and consul-     satellite communications security at several         from anywhere in the world, due to the fact
                           ing a satellite dish takes some knowledge to        tancy at Aperture Labs Ltd.                        conferences around the world, including the          that the satellite signal is the same for every-
                           configure the satellite’s polarization and ori-                                                        Argentinean Ekoparty21 and the t2´09 Informa-        one within the satellite coverage area. That
                           entation), and the satellite providers charge       In September 2006, Geovedi and Iryandi pre-        tion Security Conference in Finland,22 as well       is, if a user based in Berlin uses a satellite
                           relatively high monthly fees. Moreover, many        sented a “Hacking a Bird in the Sky”17 talk        as the 2010 edition of BlackHat DC, among            company that provides coverage through-
                           types of applications, such as voice-over In-       about hijacking very small aperture terminal       others. His investigation is concentrated on         out Europe, a malicious user could capture
                           ternet protocol (VoIP) and videoconferenc-          (VSAT) connections at the 2006 Hack in the         malicious attacks on satmodem communica-             the downstream channel in Sicily or Paris.
                           ing, are not suitable for this type of connec-      Box security conference (HITBSecConf2006)          tions and how to get an anonymous connec-            This technique leads to several new possible
                           tion due to the high latency. Typical satellite     in Malaysia.18 They listed various hypotheti-      tion via the satellite provider’s broadband          attacks, such as domain name system (DNS)                    ... Data packets
                           telephone links have 550- 650 milliseconds of       cal attacks against satellite communication        network. Previously, satellite studies focused       spoofing, TCP hijacking and attacking generic
                           round-trip delay up to the satellite and back       systems, such as denial of service (DoS) condi-    only on feeds interception and data capture,         routing encapsulation (GRE) protocol.
                                                                                                                                                                                                                                                 transmitted most
                           down to Earth.10                                    tions (uplink or downlink jamming, overpower       since researchers were focusing on passive                                                                        of the sensitive
                                                                               uplink) and orbital positioning attacks (raging    vulnerabilities. Nve was able to run active at-      Proven insecure, satellite communications                   communication
                           Research on Hacking Satellites                      transponder spoofing, direct commanding,           tacks against the satellite clients and providers    provide almost no protection against unau-
                           Typical attacks against satellite networks in-      command replay, insertion after confirmation       using easy-to-find tools such as a satellite dish,   thorized eavesdropping since they broadcast
                                                                                                                                                                                                                                                 in plain text with
                           clude satellite television hacking (the use         but prior to execution), and gave a presenta-      an LNB, cables, support, a digital video broad-      all communications to a large area without                    no encryption.
                           of illegal reprogrammed descrambler cards           tion about how to get access to the data link      cast (DVB) system PCI card, a Satfinder
                           from legitimate satellite equipment to allow        layer. Later, at the 2008 edition of the Hack In   tool and a Linux box with the necessary                 Exhibit 3. Getting Anonymous Internet Access via Satellite Network
                           unlimited TV service without a subscription)11      The Box Security Conference, Geovedi, Iryandi      free software, such as Linuxtv, kernel
                           and hacking into satellite networks to trans-       and Zboralski gave a presentation about how        drivers for DVB PCI cards, Linuxtv ap-
                           mit unauthorized material, such as political        to compromise the satellite communication’s        plication tools and DVBsnoop (a DVB
                           propaganda.12 In March 2009, Brazilian Fed-         network layer and how to run a practical “sat-     protocol analyzer console available at
                           eral Police arrested a local group that was us-     ellite piggyjacking” attack, which exploits the    http://dvbsnoop.sourceforge.net), and
                           ing U.S. Navy satellites for unauthorized com-      satellite trust relationship on a VSAT network     the Wireshark tool for data capture.23
                           munication.13 According to WIRED, “to use           by finding a “free” (unused) frequency range
                           the satellite, pirates typically take an ordinary   inside a user-allocated frequency to transmit      Nve based his attack research on find-
                           ham radio transmitter, which operates in the        and receive data.                                  ing open Internet satellite connec-
                           144- to 148-MHZ range, and add a frequency                                                             tions by running blind scans on avail-
Radio enthusiasts          doubler cobbled from coils and a varactor di-       At the February 2009 Black Hat DC confer-          able satellite channels and hacking
                           ode.” Radio enthusiasts can buy all the hard-       ence, Adam Laurie presented how to hack            into DVB protocol. During his tests, he
can buy all the            ware near any truck stop for less than USD          into satellite transmissions using off-the-shelf   was able to capture 7,967 data pack-
hardware near              $500, while ads on specialized websites offer       components that Laurie assembled himself by        ets from typical Internet traffic in just
any truck stop             to perform the conversion for less than USD         spending just $785 US. Laurie claimed that he      10 seconds. According to his reports,
                           $100.14 To help the industry fight such inci-       has been doing satellite feed hunting19 since      data packets transmitted most of the
for less than              dents, information security researchers have        the late 1990s. By using a modified Dream-         sensitive communication in plain text
USD $500.                  been investigating the inherent security, de-       box, a German receiver for digital TV and          with no encryption.24

20 HITB Magazine I july 2010                                                                                                                                                                                                              july 2010 I HITB Magazine 21
Advertisement

                                                                                                                                                                High Security Lab: http://lhs.loria.fr
 information security

proper confidentiality controls. Various pas-
sive and active threats against insecure In-
ternet satellite communications include sniff-
                                                    >>REFERENCES
                                                    1. “State of the Satellite Industry Report.” June 2009. Satellite Industry Association.
                                                        http://www.sia.org/news_events/2009_State_of_Satellite_Industry_Report.pdf.
                                                                                                                                                                  Malware 2010
ing, DoS attacks and establishing anonymous
                                                    2. Brown, Gary. “How Satellites Work.” HowStuffWorks. http://science.howstuffworks.
connections. Hacking into satellite receivers
                                                        com/satellite1.htm. Accessed on Nov. 5, 2009.
is much easier now than it was in the past,         3. “Introduction to the DVB Project.” Mar. 23, 2010. DVB. http://www.dvb.org/
thanks to the widespread availability of Linux          technology/fact_sheets/DVB-Project_Factsheet.pdf.
tools and several online tutorials.                 4. “Satellite Technology.” Nov. 5, 2009. Satellite Broadcasting & Communications
                                                        Association (SBCA). http://www.sbca.com/receiver-network/satellite-receiver.htm.
                                                    5. Geostationary orbits (also called geosynchronous or synchronous orbits) are
Conclusion                                              orbits in which a satellite always positions itself over the same spot on Earth.
Governmental, Military organizations and                Many geostationary satellites (also known as Geostationary Earth Orbits, or GEOs)
most of the companies included within the               orbit above a band along the equator, with an altitude of about 22,223 miles.
                                                        (Brown, Gary. “How Satellites Work.” HowStuffWorks. http://science.howstuffworks.
critical infrastructure sector such as transport,
                                                        com/satellite5.htm. Accessed on Nov. 5, 2009.)
oil and energy, are using satellite communi-        6. The Molniya orbit is highly eccentric — the satellite moves in an extreme ellipse with
cations for transmitting sensitive information          the Earth close to one edge. Because the planet’s gravity accelerates it, the satellite
across their widespread operations. This in-            moves very quickly when it is close to the Earth. As it moves away, its speed slows,
                                                        so it spends more time at the top of its orbit farthest from the Earth. (Holli Riebeek.
cludes the use of satellite communication at
                                                        “Catalog of Earth Satellite Orbits / Three Classes of Orbit.” Nov. 5, 2009. NASA Earth
industrial plants operating supervisory control         Observatory. http://earthobservatory.nasa.gov/Features/OrbitsCatalog/page2.php.)
and data acquisition (SCADA) systems. The rel-      7. A satellite in low Earth orbit (LEO) circles the earth 100 to 300 miles above the
evance of satellite communication protection            Earth’s surface..(“What Is a Satellite?” Satellite Industry Association. Nov. 5,
                                                        2009. Boeing. http://www.sia.org/industry_
and the consequences of a security incident
                                                        overview/sat101.pdf.)
should enforce these organizations to deploy        8. Warezzman. “DVB: Satellite Hacking For
additional security measures to their internal          Dummies.” 2004. Undercon. http://www.
communication technologies. Companies and               undercon.org/archivo/0x08/UC0x08-DVB-
                                                        Satellite_Hacking.pdf.
organizations that use or provide satellite data
                                                    9. Based on “DVB: Satellite Hacking for
connections must be aware of how insecure               Dummies” by Warezzman source: http://
satellite connections are and aware of the pos-         www.undercon.org/archivo/0x08/UC0x08-DVB-Satellite_
sible threats in this environment. Companies            Hacking.pdf.
                                                    10. B  rown, Gary. “How Satellites Work.” HowStuffWorks.
and users must implement secure protocols to
provide data protection, such as virtual private
                                                          http://science.howstuffworks.com/satellite7.htm.
                                                          Nov. 5, 2009.
                                                                                                                                                                              5th IEEE International Conference
network (VPN) and secure sockets layer (SSL),       11. Berry, Walter. “Arrests Made in TV Satellite                                                                        on Malicious and Unwanted Software
since most traffic transmits unencrypted and               Hacking.” Jan. 25, 2009. abc News. http://abcnews.
is widely available in a large geographic area             go.com/Technology/story?id=99047.                                                                                      Nancy, France, Oct. 20-21, 2010
                                                    12. Morrill, Dan. “Hack a Satellite while it is in orbit.” April 13, 2007. Toolbox for IT. http://
under the satellite’s coverage.                           it.toolbox.com/blogs/managing-infosec/hack-a-satellite-while-it-is-in-orbit-15690.                                            http://malware10.loria.fr
                                                    13. “PF descobre equipamento capaz de fazer ‘gato’ em satélite dos EUA” (“PF discovered
About the Author                                         equipment to hook into U.S. satellite”). March 19, 2009. Jornal da Globo. (Global
                                                         Journal). http://g1.globo.com/Noticias/Tecnologia/0,,MUL1049142-6174,00-PF+DESCO
Anchises M. G. de Paula, CISSP, is an Interna-
                                                         BRE+EQUIPAMENTO+CAPAZ+DE+FAZER+GATO+EM+SATELITE+DOS+EUA.html.
                                                                                                                                                          Important dates                                Program Committee
tional Cyber Intelligence Analyst at iDefense,      14. Soares, Marcelo. “The Great Brazilian Sat-Hack Crackdown.” Apr. 20, 2009. WIRED.                 Submission: June 30th, 2010                    Anthony Arrott, Trend Micro
a VeriSign company. He has more than 15                    http://www.wired.com/politics/security/news/2009/04/fleetcom.
                                                                                                                                                          Notification: August 27th, 2010                Pierre-Marc Bureau, ESET
years of strong experience in Computer Secu-        15. Undercon home page. http://www.undercon.org/archivo.php?ucon=8. Accessed
                                                           on Nov. 5, 2009.                                                                               Final version: September 10th, 2010            Mila Dalla Preda, Verona University
rity, and previously worked as Security Officer
in Brazilian telecom companies before be-
                                                    16. DEF CON IV home page. http://www.defcon.org/html/defcon-4/defcon-4.html.                                                                        Saumya Debray, Arizona University
                                                           Accessed on Nov. 5, 2009.
coming Security Consultant for local infosec        17. Note: “Bird” is a term for satellite.                                                                                                            Thomas Engel, University of Luxembourg
                                                                                                                                                          General Program Chair
resellers and consulting companies. Anchises        18. HITBSecConf2006 home page. http://conference.hitb.org/hitbsecconf2006kl.                                                                        José M. Fernandez, Ecole Polytechnique de
holds a Computer Science Bachelor degree                   Accessed on Nov. 5, 2009.                                                                      Fernando C. Colon Osorio, WSSRL and
                                                    19. N  ote: “Feed Hunting” means looking for satellite feeds that no one is supposed to find.                                                       Montréal
from Universidade de Sao Paulo (USP) and a                                                                                                                Brandeis University
                                                    20. Goodin, Dan. “Satellite-hacking boffin sees the unseeable.” Feb. 17, 2009. The                                                                  Dr. Olivier Festor, INRIA
master degree in Marketing from ESPM. He                   Register. http://www.theregister.co.uk/2009/02/17/satellite_tv_hacking.                        Chairs of Malware 2010
                                                                                                                                                                                                         Prof. Brent Kang, North Carolina University
has also obtained various professional cer-         21. Ekoparty Security Conference home page. http://www.ekoparty.com.ar.                              Jean-Yves Marion, Nancy University
tificates including CISSP, GIAC (Cutting Edge              Accessed on Nov. 5, 2009.                                                                                                                     Prof. Felix Leder, Bonn University
                                                    22. t2´09 Information Security Conference home page. http://www.t2.fi/conference.                    Noam Rathaus, Beyond Security
Hacking Techniques) and ITIL Foundations.                                                                                                                                                                Bo Olsen, Kaspersky
                                                           Accessed on Nov. 5, 2009.                                                                      Cliff Zhou, University Central Florida
As an active member of Brazilian infosec com-       23. Nve, Leonardo. “Playing in a Satellite environment 1.2.”). Black Hat. http://                                                                   Dr. Jose Nazario, Arbor networks
munity, he was the President of ISSA Chapter               blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-                         Publicity Co-Chairs
                                                                                                                                                                                                         Dr. Phil Porras, SRI International
Brazil in 2009 and one of the founding mem-                Playing-with-SAT-1.2-wp.pdf. Accessed on May 28, 2010.                                         Jose Morales, University of Texas
                                                    24. Nve, Leonardo. “Satélite: La señal del cielo que estabas esperando (II)” (“Satellite:                                                           Fred Raynal, Sogeti
bers of Brazilian Hackerspace and Brazilian                The sign from sky that you were waiting for (II)”). Jan. 16, 2009. S21sec. http://             Daniel Reynaud, Nancy-University
                                                                                                                                                                                                         Andrew Walenstein, Lafayette University
Cloud Security Alliance chapter.  •                        blog.s21sec.com/2009/01/satlite-la-seal-del-cielo-que-estabas_16.html.                         Local Chair
                                                                                                                                                                                                         Jeff Williams, Microsoft
                                                                                                                                                          Matthieu Kaczmarek, INRIA
                                                                                                                                                                                                         Yang Xiang, Deakin University
22 HITB Magazine I july 2010
You can also read