SlideShare a Scribd company logo
1 of 18
Download to read offline
Released 18/04/2014
By Eloi Vanderbeken - Synacktiv
How Sercomm saved my Easter!
Another backdoor in my router:
when Christmas is NOT enough!
2 / 18
I don't know about you, but I love Easter!
 And with Sercomm, it's Easter every day!
3 / 18
Remember the TCP/32764 router
backdoor?
 Introduced by Sercomm
 Gives root shell, no authentication
 Dump entire configuration
 4 affected manufacturers (Cisco, Linksys,
NetGear, Diamond)
 24 router models confirmed vulnerable
 6000 vulnerable routers on the Internet
 (more info: https://github.com/elvanderb/TCP-32764 )
4 / 18
It was patched!
5 / 18
No, it can't be a *feature*!
It was a simple mistake... wasn't it?
6 / 18
Let's have a look!
 'binwalk -e' to extract the file system
 scfgmgr (the backdoor binary) is still
present...
 But it's now started with a new -l option
7 / 18
What's this -l option?
 scfgmgr now listen on a Unix domain
socket :'(
8 / 18
Wait... what?
 There is an alternate option: -f that make
scfgmgr listen on TCP
9 / 18
Let's see if it's used...
10 / 18
What's this 'ft_tool'?
 Opens a raw socket
 Wait for packets
– with ethertype = 0x8888
– coming from the Ethernet card or broadcasted
(check of the destination MAC address)
 Packet format
11 / 18
If payload == md5(''DGN1000'')...
12 / 18
And if packet type == 0x201...
system(''scfgmgr -f &'')!!!
13 / 18
So you can reactivate the
backdoor again...
 If you're on the LAN
 Or if you're an Internet provider (if you're one-
hop away, you can craft Ethernet packets)
 It's DELIBERATE
 You can also use the 0x200 packet type to ping
the router (it will respond with its MAC address)
and 0x202 to change its LAN IP address
14 / 18
I don't always patch backdoors...
15 / 18
Because a root shell is not enough...
 You can now (among other things) make
the router LEDs flash with the 33, 34 and
35th message :)
16 / 18
But where does it come from?
 The 0x8888 ethertype and packet structure
is used in an old Sercomm update tool:
http://wiki.openwrt.org/_media/toh/netgear/dg834.g.v4/nftp.c
– lazy guys, they didn't even code their new
backdoor from scratch ;)
 It may be present in other hardware but
hard to tell:
– No easy way to scan
– MD5 signature will certainly be different as it's
based on the router commercial name
17 / 18
How to detect it?
 For DGN1000, simply use the PoC from
your LAN
 For other routers, the simplest way is to:
– Use 'binwalk -e' to extract the file system
– Search for 'ft_tool' or grep -r 'scfgmgr -f'
– Use IDA to confirm
We hope you enjoyed this
presentation :)
 PoC is available here:
http://synacktiv.com/ressources/ethercomm.c

More Related Content

More from The Hacker News

Patent Troll - Big Websites Sued For Using HTTPS Encryption
Patent Troll - Big Websites Sued For Using HTTPS EncryptionPatent Troll - Big Websites Sued For Using HTTPS Encryption
Patent Troll - Big Websites Sued For Using HTTPS EncryptionThe Hacker News
 
Geo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser CacheGeo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser CacheThe Hacker News
 
FCC Net Neutrality Rules (Complete 400 Pages)
FCC Net Neutrality Rules (Complete 400 Pages)FCC Net Neutrality Rules (Complete 400 Pages)
FCC Net Neutrality Rules (Complete 400 Pages)The Hacker News
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
This Warrant Authorized FBI to Track and Infect Computers with Malware
This Warrant Authorized FBI to Track and Infect Computers with MalwareThis Warrant Authorized FBI to Track and Infect Computers with Malware
This Warrant Authorized FBI to Track and Infect Computers with MalwareThe Hacker News
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013The Hacker News
 
Blackshades Indictment by FBI
Blackshades Indictment by FBIBlackshades Indictment by FBI
Blackshades Indictment by FBIThe Hacker News
 
Blackshades, yucel indictment s1 13 cr 834 redacted
Blackshades, yucel indictment s1 13 cr  834 redactedBlackshades, yucel indictment s1 13 cr  834 redacted
Blackshades, yucel indictment s1 13 cr 834 redactedThe Hacker News
 

More from The Hacker News (9)

Facebook lawsuit
Facebook lawsuitFacebook lawsuit
Facebook lawsuit
 
Patent Troll - Big Websites Sued For Using HTTPS Encryption
Patent Troll - Big Websites Sued For Using HTTPS EncryptionPatent Troll - Big Websites Sued For Using HTTPS Encryption
Patent Troll - Big Websites Sued For Using HTTPS Encryption
 
Geo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser CacheGeo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser Cache
 
FCC Net Neutrality Rules (Complete 400 Pages)
FCC Net Neutrality Rules (Complete 400 Pages)FCC Net Neutrality Rules (Complete 400 Pages)
FCC Net Neutrality Rules (Complete 400 Pages)
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
This Warrant Authorized FBI to Track and Infect Computers with Malware
This Warrant Authorized FBI to Track and Infect Computers with MalwareThis Warrant Authorized FBI to Track and Infect Computers with Malware
This Warrant Authorized FBI to Track and Infect Computers with Malware
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013
 
Blackshades Indictment by FBI
Blackshades Indictment by FBIBlackshades Indictment by FBI
Blackshades Indictment by FBI
 
Blackshades, yucel indictment s1 13 cr 834 redacted
Blackshades, yucel indictment s1 13 cr  834 redactedBlackshades, yucel indictment s1 13 cr  834 redacted
Blackshades, yucel indictment s1 13 cr 834 redacted
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

TCP 32764 Backdoor Reactivated Again

  • 1. Released 18/04/2014 By Eloi Vanderbeken - Synacktiv How Sercomm saved my Easter! Another backdoor in my router: when Christmas is NOT enough!
  • 2. 2 / 18 I don't know about you, but I love Easter!  And with Sercomm, it's Easter every day!
  • 3. 3 / 18 Remember the TCP/32764 router backdoor?  Introduced by Sercomm  Gives root shell, no authentication  Dump entire configuration  4 affected manufacturers (Cisco, Linksys, NetGear, Diamond)  24 router models confirmed vulnerable  6000 vulnerable routers on the Internet  (more info: https://github.com/elvanderb/TCP-32764 )
  • 4. 4 / 18 It was patched!
  • 5. 5 / 18 No, it can't be a *feature*! It was a simple mistake... wasn't it?
  • 6. 6 / 18 Let's have a look!  'binwalk -e' to extract the file system  scfgmgr (the backdoor binary) is still present...  But it's now started with a new -l option
  • 7. 7 / 18 What's this -l option?  scfgmgr now listen on a Unix domain socket :'(
  • 8. 8 / 18 Wait... what?  There is an alternate option: -f that make scfgmgr listen on TCP
  • 9. 9 / 18 Let's see if it's used...
  • 10. 10 / 18 What's this 'ft_tool'?  Opens a raw socket  Wait for packets – with ethertype = 0x8888 – coming from the Ethernet card or broadcasted (check of the destination MAC address)  Packet format
  • 11. 11 / 18 If payload == md5(''DGN1000'')...
  • 12. 12 / 18 And if packet type == 0x201... system(''scfgmgr -f &'')!!!
  • 13. 13 / 18 So you can reactivate the backdoor again...  If you're on the LAN  Or if you're an Internet provider (if you're one- hop away, you can craft Ethernet packets)  It's DELIBERATE  You can also use the 0x200 packet type to ping the router (it will respond with its MAC address) and 0x202 to change its LAN IP address
  • 14. 14 / 18 I don't always patch backdoors...
  • 15. 15 / 18 Because a root shell is not enough...  You can now (among other things) make the router LEDs flash with the 33, 34 and 35th message :)
  • 16. 16 / 18 But where does it come from?  The 0x8888 ethertype and packet structure is used in an old Sercomm update tool: http://wiki.openwrt.org/_media/toh/netgear/dg834.g.v4/nftp.c – lazy guys, they didn't even code their new backdoor from scratch ;)  It may be present in other hardware but hard to tell: – No easy way to scan – MD5 signature will certainly be different as it's based on the router commercial name
  • 17. 17 / 18 How to detect it?  For DGN1000, simply use the PoC from your LAN  For other routers, the simplest way is to: – Use 'binwalk -e' to extract the file system – Search for 'ft_tool' or grep -r 'scfgmgr -f' – Use IDA to confirm
  • 18. We hope you enjoyed this presentation :)  PoC is available here: http://synacktiv.com/ressources/ethercomm.c