Register for your free account! | Forgot your password?

You last visited: Today at 19:29

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Backdoor shell

Discussion on Backdoor shell within the SRO Private Server forum part of the Silkroad Online category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Sep 2009
Posts: 93
Received Thanks: 228
Backdoor shell

Background story: my server's account DB got wiped twice (yesterday and 2 days ago). No idea how, ofc billing and SMC ports are blocked, only necessary ports are open. (Maybe the registration page was vulnerable, and they managed to SQLi.) After that, I noticed unusual activities such as PHP pages not working as intended, even after reinstalling the webserver. I noticed that someone created two administrator accounts with these usernames: ntusers, Anyonymous. But that's not everything... after I deleted those admin accounts, I believe that they tried to bruteforce the Administrator account's password. I checked Windows Event Viewer, and there was 2-3 failed logon attempts every second. WTF? After that I installed a firewall and an antivirus, and it found 2 shells (C100 and R57) in C:\XAMPP\webdav\
Anyone else's server got backdoor'd recently? I'm running XAMPP 1.7.3 with Apache 2.2.4 and PHP 5.2.2. Perhaps this version of PHP is vulnerable?
jadeyisafuckingscammer is offline  
Old 02/29/2012, 11:17   #2
 
LastThief*'s Avatar
 
elite*gold: 60
Join Date: Feb 2012
Posts: 3,942
Received Thanks: 6,474
Nah it was retarded register page
LastThief* is offline  
Thanks
1 User
Old 02/29/2012, 11:54   #3
 
ThElitEyeS's Avatar
 
elite*gold: 0
Join Date: Nov 2011
Posts: 333
Received Thanks: 186
use sqlsrv, odbc at IIS
Just download IIS php manager
its will be better than using IIS,Apache at same time...
ThElitEyeS is offline  
Old 02/29/2012, 12:06   #4
 
elite*gold: 0
Join Date: Sep 2009
Posts: 93
Received Thanks: 228
Quote:
Originally Posted by ThElitEyeS View Post
use sqlsrv, odbc at IIS
Just download IIS php manager
its will be better than using IIS,Apache at same time...
Just saying, we used a registration page that was made by you, and it's vulnerable.
jadeyisafuckingscammer is offline  
Thanks
1 User
Old 02/29/2012, 12:38   #5
 
Dr.Abdelfattah's Avatar
 
elite*gold: 7
Join Date: May 2010
Posts: 2,115
Received Thanks: 2,374
my suggest to re-install your root windows, before that take only databases backups
then after the windows installed again, setup plesk panel as the webserv manager (best control panel for windows server) that's like wamp etc etc but those are nothing if you compare them with plesk
2nd just use for now normal php script just register and change pass , and make the normal protection like open only TCP ports of gateway and downloadserver and agentserver , and run your billing on 127.0.0.1 ip and the rest ..

But you are now must do those steps cuz your server completely hacked .. (warring : never open any UDP ports even for gateway etc , )

Quote:
Originally Posted by jadeyisafuckingscammer View Post
Just saying, we used a registration page that was made by you, and it's vulnerable.
if we say yes, the problem with the web server too .

Edit :
did you use ftp on the same machine (for guild/union pic for example) ?
Dr.Abdelfattah is offline  
Old 02/29/2012, 13:07   #6
 
Schickl's Avatar
 
elite*gold: 0
Join Date: Feb 2009
Posts: 1,064
Received Thanks: 539
Quote:
Originally Posted by jadeyisafuckingscammer View Post
Just saying, we used a registration page that was made by you, and it's vulnerable.
What did you expect????
oh and even if others say that it's safe you should still check it
making a safe site isn't that hard, you just need to look at everything twice before you use it
Schickl is offline  
Thanks
1 User
Old 02/29/2012, 13:08   #7
 
ThElitEyeS's Avatar
 
elite*gold: 0
Join Date: Nov 2011
Posts: 333
Received Thanks: 186
Quote:
Originally Posted by jadeyisafuckingscammer View Post
Just saying, we used a registration page that was made by you, and it's vulnerable.
well prove it and ill fix it.
you the first one who told me this

Quote:
Originally Posted by Schickl View Post
What did you expect????
oh and even if others say that it's safe you should still check it
making a safe site isn't that hard, you just need to look at everything twice before you use it
ThElitEyeS is offline  
Old 02/29/2012, 13:46   #8
 
ahmed4ever2u's Avatar
 
elite*gold: 0
Join Date: Nov 2009
Posts: 1,515
Received Thanks: 891
OnTopic: i do have the same problem in my server. ( solution ) unknown hope you share it (after you find it)
ahmed4ever2u is offline  
Thanks
1 User
Old 02/29/2012, 17:25   #9
 
Schickl's Avatar
 
elite*gold: 0
Join Date: Feb 2009
Posts: 1,064
Received Thanks: 539
Quote:
Originally Posted by ThElitEyeS View Post
well prove it and ill fix it.
you the first one who told me this


I already told you that I'm not going to make an account on your site lol
If someone gives me the code I'll check(and I'm not the only one who could do this, so posting it here wouldn't be bad i guess)
Schickl is offline  
Old 02/29/2012, 17:53   #10
 
ThElitEyeS's Avatar
 
elite*gold: 0
Join Date: Nov 2011
Posts: 333
Received Thanks: 186
idc if you register or not.
ThElitEyeS is offline  
Old 02/29/2012, 18:42   #11
 
Mykha*'s Avatar
 
elite*gold: 275
Join Date: May 2008
Posts: 300
Received Thanks: 215
why the hell on earth do you have WebDav enabled?! go straight right now and disable it.
if you don't believe you can be backdoor-ed through it. gimme your server ip and i will also check for other vulnerabilities for you. -Mykha
Mykha* is offline  
Thanks
1 User
Old 02/29/2012, 20:21   #12
 
Schickl's Avatar
 
elite*gold: 0
Join Date: Feb 2009
Posts: 1,064
Received Thanks: 539
Well I think I found the problem
This query:
Code:
$check = odbc_exec($connect, "SELECT * FROM TB_User WHERE StrUserID = '".$user."'");
if (odbc_num_rows($check) > 0) {
   $error[] = "Account with such username already exists please chose another one";
}
is ALWAYS executed(if "go" is set, but that's nothing to care about)

Now you may think "Oh well I espaced it already"(The $user variable), BUT in mssql the escape char of
Code:
'
is NOT a
Code:
\
.
It is another
Code:
'
!!!!!

This being said it should be obvious how it's been done:
Code:
SELECT * FROM TB_User WHERE StrUserID = '\'; evil query n shit here --';
So what do we have here?
'\'; evil query n shit here --';

' <--indicates start of the string. as set in the query
\'; evil query n shit here -- <-- This is the bad part now. The backslash you can see here is the one addslashes added to the string, but sadly, this doesn't escape the following ' . now the end of the query is marked with ; (because mssql thinks the string already ended) everything after it is a NEW query. So you could enter pretty much everything there
The last part of this string is "--". It marks the left chars of the original query as a comment.


This + MSSQL 2000 allows someone to start a shell


Solution?
You can see
Code:
if (@count($error) > 0) {
[...]
} else {
[...]
}
after this query
Just put the query in the else part and change it, so it looks like this:
Code:
$check = odbc_exec($connect, "SELECT * FROM TB_User WHERE StrUserID = '".$user."'");
if (odbc_num_rows($check) > 0) {
   echo "Account with such username already exists please chose another one";
   echo "</Body></HTML>"; //finish the HTML file so there it's valid
   odbc_close($connect);   //close the connection
   die();    //Stop the script right now
}
This should prevent SQL Injection
I strongly suggest everyone who's using this site to change it asap


oh there are two more mistakes i noticed:
- If one of the fields is not set(user, password, etc) PHP will generate an error(not important, but shouldn't happen)
-The connection to the database is never closed
It should be closed, though
You can do this by adding
Code:
<?php @odbc_close($connect); ?>
After "</html>" at the bottom of the file
Schickl is offline  
Thanks
1 User
Old 02/29/2012, 20:43   #13
 
elite*gold: 115
Join Date: Oct 2007
Posts: 9,390
Received Thanks: 12,345
Don't use XAMPP with the default settings! That trick is pretty old since the Webdav-service under XAMPP uses default credentials, which I believe was something like WAMPP:XAMPP. Everyone can connect and upload their shell.
ms​ is offline  
Thanks
1 User
Old 02/29/2012, 20:47   #14
 
elite*gold: 0
Join Date: Sep 2009
Posts: 93
Received Thanks: 228
Quote:
Originally Posted by Metin2Spieler97 View Post
Don't use XAMPP with the default settings! That trick is pretty old since the Webdav-service under XAMPP uses default credentials, which I believe was something like WAMPP:XAMPP. Everyone can connect and upload their shell.
Disabled webdav now, and got a whole new website by a professional PHP developer. should be fine now.. thanks for all replies
jadeyisafuckingscammer is offline  
Old 02/29/2012, 20:53   #15
 
Mykha*'s Avatar
 
elite*gold: 275
Join Date: May 2008
Posts: 300
Received Thanks: 215
Quote:
Originally Posted by Metin2Spieler97 View Post
Don't use XAMPP with the default settings! That trick is pretty old since the Webdav-service under XAMPP uses default credentials, which I believe was something like WAMPP:XAMPP. Everyone can connect and upload their shell.
EXACTLY what i pointed it and even tho it was the problem >.<, he got it disabled now. hope everything goes fine. Gl
Mykha* is offline  
Reply


Similar Threads Similar Threads
Backdoor™ D3D 0.1
04/10/2011 - WarRock Hacks, Bots, Cheats & Exploits - 9 Replies
hai ich bin neues koder hir http://www.fotos-hochladen.net/uploads/backdoorcd 190mtfsk.jpg
Silkroad Shell Shell
01/16/2006 - Silkroad Online - 23 Replies
I've found a new Silkroad bot, but the bot is in Chinese/Korean, so we need help to translate it and get it work... Download



All times are GMT +1. The time now is 19:30.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.