TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Malvuln – Malware Vulnerability Research

47 点作者 tsar_nikolai超过 4 年前

5 条评论

segfaultbuserr超过 4 年前
A funny malware exploit I&#x27;ve recently seen was this one...<p><a href="https:&#x2F;&#x2F;mastodon.social&#x2F;@slipstream&#x2F;99116564964787956" rel="nofollow">https:&#x2F;&#x2F;mastodon.social&#x2F;@slipstream&#x2F;99116564964787956</a><p>&gt; So, there&#x27;s a Chinese botnet package known as &quot;Destroyer&quot; (破坏者). It, ironically, can itself be destroyed, thanks to a stack buffer overflow. I wasn&#x27;t able to get full RCE, but a jump to &quot;call ExitProcess&quot; should be enough, no? It can be triggered directly after &quot;start DDoS&quot;, for even more lulz.<p>&gt; Here&#x27;s the exploit: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;Wack0&#x2F;d0aa7f56d5d044fb918056207d2149b1" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;Wack0&#x2F;d0aa7f56d5d044fb918056207d2149...</a><p>&gt; The C2 for this shitty chinese skiddie ddos-botnet has a stack buffer overflow in the parsing of packet opcode 3. This opcode is used for sending ddos-stats, so it only works when a packet with opcode 6 (start-ddos) is sent to us.<p>&gt; Unfortunately, two addresses are written to before returning; these addresses get clobbered, and the C2 binary is compiled with an ancient compiler (VC++6 lol). No null bytes, so we can only overwrite two addressses, one of which has to be the return address... We can get eip control via SEH, but the full packet buffer is too far away on the stack for us to be able to jump to a ROP chain :(<p>&gt; So the best we can do here is return to &quot;call ExitProcess&quot;, at least there the bots are neutered enough to be absolutely useless... (there&#x27;s additional functionality in the bot, but it seems the C2 that i have has no UI to send those packets lol)<p>&gt; So, exploitation: (1) connect to C2. (2) send initial (system info) packet, this includes OS info string (we provide the string sent for &quot;unknown OS&quot; here), and CPU info (number of CPUs + CPU speed), we provide the specs of the highest-range Ryzen Threadripper here, because we can. (3) wait for packet 6 (start ddos) to be sent to us. (4) send our evil packet 3. (5) ??? (6) C2 killed :)
__jf__超过 4 年前
I like the fact that malware authors also seem to have trouble setting up a (secure) software development lifecycle. On the other hand if they were to threat model it, expoiting weaknesses in the agent does not cross a trust boundery so why bother. Imagine this would be different for their command and control infrastructure.
评论 #25777463 未加载
eugenekolo超过 4 年前
Minus the lulz, what is the point of this? It seems there&#x27;s some possibility of remotely disabling malware... and then some more possibility of malicious piggy backing on already installed malware.<p>It&#x27;s an interesting point that malware is typically poorly developed, but not sure what the point of this research is.
spzb超过 4 年前
What&#x27;s with the color scheme on that website? I have good eyesight and I&#x27;m struggling with the contrast ratio. God help anybody with vision problems.
评论 #25775991 未加载
chrisweekly超过 4 年前
Mods: typo in title
评论 #25775439 未加载