Handler on Duty: Didier Stevens
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
Pedro Alves | 2009-10-04 18:45:22 |
We got this problem during last weekend (2003-09-14). This is head of the setup file from de file shv4.tar.gz ------------------- begin setup file ---------------------- #!/bin/bash # # shkit-v4-internal release 2002 # inspired from tk but fixed a lot of shits # and added new ones to suite our needs. # patched ./pg coz it was buggy on tkv8 # urgent release due to x2 SSHD vulnerability # SSHD patched in this version so dont try # ./x2 -t 1 victim port any more ;) # hax0r w1th th1s as much as u want # USAGE: # ./setup pass port # # SSHD backdoor: ssh -l root -p port hostname # when prompted for password enter your rootkit password # login backdoor: DISPLAY=pass ; export DISPLAY ; telnet victim # type anything at login, and type arf for pass and b00m r00t # # if u g3t cought d0nt blaim us !! # # greets to: PinT[x] , grass^, toolman, BeSo_M, mave, pujso, # TheMind & THG, fasty, CaR|, armando99, Cat|X, # NiceboyX, momo and others... # # btw at the end a BIG "FUCK U" goes to all those *.fi lahm0r # guys who were tracking us for months ... yeah we did deface # nelonen so STFU and keep your security higher next time ... # # Defines dpass=mohonizinmasuk dport=44544 # You dont need to edit anything below this basedir=`pwd` --------------------- end setup file --------------------- Other files: bin.tgz conf.tgz lib.tgz Pedro A. |
CVE # | Description |
---|