TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The beauty of old-school backdoors

38 pointsby wgxover 9 years ago

4 comments

earlzover 9 years ago
Heh, I guess I&#x27;ll share the one backdoor that was left in some the NVG510 (AT&amp;T UVerse modem that you have no choice but to use) modem firmware. Now, you did have to solder on the board to get a serial console, but once you got that, you could quite easily get to a root shell. (by default, it was this &quot;user&quot; shell that was exposed in some non-US configurations on the network by telnet)<p>All you had to do was type &quot;magic&quot;, and then once magic mode was enabled, type &quot;!&quot; and you got dropped at the root shell.<p>A shame they patched the firmware to remove magic mode and really locked things down after I published an app to root the modem via the web interface to fix various bugs in the firmware.. App eventually got pulled for ToS violation from the Play store, and just so happens a few weeks later AT&amp;T pushed a firmware update that fixed all the exploits I knew of
评论 #10216356 未加载
peterwwillisover 9 years ago
Making a backdoor that relies on raw packets may net you benefits in terms of avoiding detection of network connections&#x2F;syscalls by system tools (netstat and the like). Writing your own micro tcp&#x2F;ip stack will also avoid having to throw libpcap into your backdoor. Of course, raw packet access is usually only reserved for root, so you&#x27;ll have to fall back on the OS&#x27;s network stack &amp; calls to get this type of tool in, but eventually it makes for a more stealthy rootkit.<p>If you get really fancy you can fuck with network protocols in general and avoid getting caught by network detection &amp; analysis. One good example is finding some traffic like DNS or ICMP that gets overlooked easily in graphs of network traffic and is already connectionless, so it&#x27;s more difficult to catch someone constantly connected via backdoor.<p>Once I saw a backdoor use ICMP to do basic communication with a CNC, and when it got the correct reply it&#x27;d use another protocol (and host) to pass data. Only even realized that was happening after another compromise was found. And of course it was totally valid traffic so it didn&#x27;t get picked up by any network sensors.
评论 #10216909 未加载
btillyover 9 years ago
My favorite was from a pen test that I heard of back in the 1990s. Most people don&#x27;t realize that Postscript is a full-featured programming language, and high end printer&#x2F;fax machines used an operating system written in Postscript. To &quot;print&quot; a document you actually executed a program that resulted in a printed document.<p>Well, &quot;print&quot; the wrong document and your printer&#x2F;fax machine just turned into a router for anyone who knows how to call up and send the right message...
geographomicsover 9 years ago
There used to be a rather negligent backdoor in some 3COM products - you could log in with username &#x27;debug&#x27; and password &#x27;synnet&#x27; to get a full admin shell with extra debugging commands. IIRC it wasn&#x27;t printed in the user manuals, but was fairly obvious from poking around in the firmware updates. Fortunately the password could be changed, so it wasn&#x27;t a completely irreparable security hole.
评论 #10216424 未加载