I recently wrote a script that runs croned and port scans all of our servers daily. It saves the output and diffs it compared to the previous days and emails me as new ports open up.
I think this will be a good way to detect new services and potential malware infection, but what about machines that are already infected?
To fix that I wrote in a function that parses the output for known malware ports. The only problem is that I cant find a definitive list of known malware ports. Does anyone know of such a resource?
I have recently been updating my Windows Forensics First Responder script and have noticed a number of servers reporting the following when using Sysinternals/Microsoft’s listdlls.exe.
*** Loaded C:\WINNT\system32\KERNEL32.dll differs from file image:
*** File timestamp: Wed Apr 18 12:25:36 2007
*** Loaded image timestamp: Wed Apr 18 12:25:37 2007
*** 0x77e40000 0x102000 5.02.3790.4062 C:\WINNT\system32\KERNEL32.dll
Now I can think of lots of malicious reasons why this would be. In fact I recently wrote on one of these reasons. But I cant think of any legitimate reasons.
I’m not one to jump to conclusions without having evaluated all possibilities but my research is turning up almost nothing.
Can anyone think of a legitimate reason why windows would load kernel32.dll and then something alter it as its going into memory?
For some reason people keep buying Dells.
I remember a couple of years ago all the small form factor optiplex’s I had suffered from a bad cap on the motherboard. Eventually all of them just die.
My whole team at work have the same model workstation and the PSU went on each of them, one by one.
I have a service tag – the “serial number” unique to each computer – and type it into their site looking for drivers. You would think, being that this tag is unique, that they could look up your computer and give you your network card drivers, your video driver etc. NO! Instead they give you the choice to download every driver for every chipset that was ever used on that given model. Why do I have this service tag?! Why don’t I just type in the model?! Its the same results!
After all that people still buy these pieces of crap. They never even question why that is.
A roadside traffic sign in Austin, Texas was hacked into so that it displayed a message warning passing motorists of zombies ahead. Police are investigating the incident, and if they are caught, the perpetrators could face misdemeanor road sign tampering charges. The vandals broke a lock on the sign and then managed to gain access to the computer that controls its readout because it was using a default password. They also changed the password, so city employees had to wait for the manufacturer to reset the password before the sign could be changed. A city spokesperson acknowledged that while “the sign’s content was humorous, … the act of changing it wasn’t.”
I have an issue of 2600 magazine from about 5 years ago that contains that default password. I had always thought it would be funny if did something like this. They even changed the default password. How perfect.
DISCLAIMER: I do no endorse the “hacking” of morons who don’t change default passwords.