Poor
Released 22 years ago. November 2002
Copyright © MegaSecurity
By Bernhard Mähr
Informations
Author | Bernhard Mähr |
Family | Poor |
Category | Remote Access |
Version | Poor |
Released Date | Nov 2002, 22 years ago. |
Additional Information
Server:
size: 10,240 bytes
Author Information / Description
Dear Ladies and Gentlemen,
I'm a software developer and have started to write programs with MS .net technology.
There is a possibility to create assemblies (=programs) on the fly without the need of a compiler.
I think this is a quite dangerous feature.
For example you can write a (useful) program and integrate a very small piece of code as backdoor.
My "proof of concept"-program runs in background and if the user visits a prepared website,
the code for the virus is extracted from the html-page, an assembly created and executed.
In the background-program are no malicious commands, it needs only a runtime version
of MS .net to be started.
The whole code for the virus is located in the website as comments.
On bigger websites and with some effort the code could be hidden better and nobody could find it.
My "proof of concept" waits for the creation of a *.htm file on drive C:
(happens surfing through the internet due the caching of IE) and extracts the virus
code from there (the page http://www.billyx.com/ProofVirus.htm contains the virus).
The virus lists all files from drive C: and deletes the file C:\ProofVirus.txt.
The creation of a virus is simple: Write the virus in C#, compile is and disassemble
it with the .net disassemble and you can write your own code into the html-page
(please notice not all commands are supported by my executable but its only a matter
of some minutes to add more).
The application is only a proof of concept but could be developed more sophisticated quite easy.
It works on the PCs i tested, I hope it also works on yours for demonstration.
I think there are 2 possible points to increase security:
- The on the fly creation of assemblies in .net is very dangerous -> protect it
- Usual documents like html, doc, bmp, jpg, ... should be scanned by the virus-scanner not
for malicious commands, I think all content not understood by the (usual) application
or disabled by the user should be filtered out. In other words the content should run
through a filter that for example only allows valid html to pass through
(I'm thinking of a technology like in webwasher but more sophisticated).
Yours
Bernhard Mähr
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.