BugBear.B BackDoor

Discussion in 'Безопасность и Анонимность' started by Olegros911, 27 Jan 2010.

  1. Olegros911

    Olegros911 Banned

    Joined:
    7 Apr 2008
    Messages:
    135
    Likes Received:
    40
    Reputations:
    -7
    Вобщем сканя подсети впоследнее время часто наталкуюсь на порту 1080 на трой
    BugBear.B BackDoor
    Собственно говоря в нэте про его ничего "толкового" нету только что это и бекдор и кэйлогер с функциями для кражи информации

    интерисует такое как он настраюетса,куда что отправляет,в каком виде,и собственно можно ли перехватить
     
  2. crash4x4

    crash4x4 Banned

    Joined:
    28 Jan 2010
    Messages:
    11
    Likes Received:
    0
    Reputations:
    0
    BugBear.B backdoor is listening on this port.
    A cracker may connect to it to retrieve secret
    information, e.g. passwords or credit card numbers...

    The BugBear.B worm includes a key logger and can kill
    antivirus or personal firewall softwares. It propagates
    itself through email and open Windows shares.

    Solution:
    - Use an Anti-Virus package to remove it.
    - Close your Windows shares
    - See http://www.symantec.com/avcenter/venc/data/[email protected]

    Risk factor : Critical
    Copyright This script is Copyright (C) 2003 Tenable Network Security
     
  3. crash4x4

    crash4x4 Banned

    Joined:
    28 Jan 2010
    Messages:
    11
    Likes Received:
    0
    Reputations:
    0
    Classification

    Risk: –
    CVSS: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

    Port: 81
    Family: Backdoors
    Dependencies: "http_version.nasl"
    Description

    Your system seems to be infected by the Bugbear.B virus
    (its backdoor has been detected on port 81).
    Sources

    CVE: –
    OSVDB: –
    Bugtraq: –
    Plugin

    Filename: bugbear_b.nasl
    Version: 1.7
    Identification: –

    Content:
    #
    # (C) 2003 StrongHoldNet
    #
    # Licence : GPL v2
    #
    # Modifications by rd:
    # -> Try every web server, not just port 81
    #
    # UNTESTED


    include("compat.inc");

    if (description)
    {
    script_id(11707);
    script_version ("$Revision: 1.7 $");

    script_name(english:"Bugbear.B Web Backdoor Detection");

    script_set_attribute(attribute:"synopsis", value:
    "The remote host is compromised." );
    script_set_attribute(attribute:"description", value:
    "Your system seems to be infected by the Bugbear.B virus
    (its backdoor has been detected on port 81)." );
    script_set_attribute(attribute:"see_also",
    value:"http://www.f-secure.com/v-descs/bugbear_b.shtml" );
    script_set_attribute(attribute:"solution", value:
    "Use your favorite antivirus to disinfect your system.
    Standalone disinfection tools also exist :
    ftp://ftp.f-secure.com/anti-virus/tools/f-bugbr.zip" );
    script_set_attribute(attribute:"cvss_vector", value:
    "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C" );
    script_set_attribute(attribute:"plugin_publication_date", value:
    "2003/06/09");
    script_end_attributes();

    script_summary(english:"Checks for Bugbear.B web backdoor");
    script_category(ACT_GATHER_INFO);
    script_family(english:"Backdoors");
    script_copyright(english:"This script is Copyright (C) 2003-2010
    StrongHoldNet");
    script_dependencie("http_version.nasl");
    script_require_ports("Services/www", 81);
    exit(0);
    }

    include("http_func.inc");
    include("http_keepalive.inc");

    port = get_http_port(default:81);
    if(!port)exit(0);

    if(!get_port_state(port))exit(0);
    url = '/%NETHOOD%/';
    req = http_get(item:url, port:port);
    buf = http_keepalive_send_recv(port:port, data:req);
    if( buf NULL ) exit(0);
    if(ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 ", string:buf) && "Microsoft Windows
    Network" >< buf) security_hole(port);
    ==
    crash4x4.my1.ru