Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <22B480B3-9777-4DCB-8334-CD7AD31862F3@me.com>
Date: Sat, 24 Jan 2015 15:05:26 -0500
From: "Larry W. Cashdollar" <larry0@...com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: SEANux 1.0 remote back door

Hello All,
I thought you might be interested in this from by blog with screen shots http://www.vapid.dhs.org/blog/01-23-2015/ :

SEANux 1.0 backdoor

Larry W. Cashdollar
1/23/2015


SEANux 1.0 is a linux distribution Available here developed by the Syrian Electronic Army. It has an apache webserver listening on 0.0.0.0:80
root@...ry-VirtualBox:/etc/mysql# netstat -an
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State      
tcp        0      0 127.0.0.1:6010          0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN     
tcp        0      0 127.0.1.1:53            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN     
tcp        0      0 192.168.0.33:22         192.168.0.22:53474      ESTABLISHED
tcp6       0      0 ::1:6010                :::*                    LISTEN     
tcp6       0      0 :::80                   :::*                    LISTEN     
tcp6       0      0 :::22                   :::*                    LISTEN     
tcp6       0      0 ::1:631                 :::*                    LISTEN     
tcp6       1      0 ::1:57375               ::1:631                 CLOSE_WAIT 
udp        0      0 0.0.0.0:68              0.0.0.0:*                          
udp        0      0 0.0.0.0:52375           0.0.0.0:*                          
udp        0      0 0.0.0.0:5353            0.0.0.0:*                          
udp        0      0 0.0.0.0:41938           0.0.0.0:*                          
udp        0      0 0.0.0.0:31229           0.0.0.0:*                          
udp        0      0 127.0.1.1:53            0.0.0.0:*                          
udp6       0      0 :::37598                :::*                               
udp6       0      0 :::5353                 :::*                               
udp6       0      0 :::12590                :::*                               
udp6       0      0 :::52638                :::*                               
udp6       0      0 :::546                  :::*                               
Active UNIX domain sockets (servers and established)

This apache server is a tool server hosting web based tools by the SEA
One of the tools is a backdoor to the system

The path http://192.168.0.33/tools/sea.php is a back door for the SEA. 

Here is a screen shot after logging in: 

From lines 6-15 contain the credentials sea.php:
     6 $user = 'SEA'; ^M
     7 $pass = 'SEA'; ^M
     8 $uselogin = 1;^M
     9 $sh3llColor = "#0040FF";^M
    10 ^M
    11 # MySQL Info ---------^M
    12 $DBhost = "localhost";^M
    13 $DBuser = "root";^M
    14 $DBpass = "root";^M
    15 #---------------------^M


So I thought this backdoor might allow root access to the mysql database running on port 3306. But the credentials are set for mysql during setup, and I don't see any other code to run sql queries on the system. Perhaps they just default to root root as that's a very common password combo for mysql installs?

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.