Lucene search

K
nessusThis script is Copyright (C) 2000-2016 Julio Cesar HernandezWINSATAN.NASL
HistoryJan 04, 2000 - 12:00 a.m.

WinSATAN Backdoor Detection

2000-01-0400:00:00
This script is Copyright (C) 2000-2016 Julio Cesar Hernandez
www.tenable.com
36

WinSATAN is installed. This backdoor allows anyone to partially take control of the remote system. An attacker may use it to steal your password or prevent your system from working properly.

#
# This script was written by Julio Cesar Hernandez <[email protected]>
#
# See the Nessus Scripts License for details
#
# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: domain no longer exists)
#      Added link to the Bugtraq message archive

include("compat.inc");

if(description)
{
 script_id(10316);
#  script_cve_id("CVE-MAP-NOMATCH");
 script_version ("$Revision: 1.24 $");
 
 script_name(english:"WinSATAN Backdoor Detection");
  script_set_attribute(
    attribute:"synopsis",
    value:"A backdoor is installed on the remote Windows host."
  );
  script_set_attribute(
    attribute:"description",
    value:
"WinSATAN is installed.  This backdoor allows anyone to partially take
control of the remote system.  An attacker may use it to steal your
password or prevent your system from working properly."
  );
  script_set_attribute(
    attribute:"solution",
    value:
'Use regedit and find \'RegisterServiceBackUp\' in 
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run
The value\'s data is the path of the file.  If you are infected by
WinSATAN, then the registry value is named \'fs-backup.exe\'.'
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/01/04");
 script_cvs_date("$Date: 2016/05/26 16:22:51 $");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes(); 
 
 summary["english"] = "Checks for the presence of WinSATAN";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 
 script_copyright(english:"This script is Copyright (C) 2000-2016 Julio Cesar Hernandez");
 family["english"] = "Backdoors";
 script_family(english:family["english"]);
 script_dependencie("find_service1.nasl");
 script_require_ports(999);
 exit(0);
}

#
# The script code starts here
#
include('ftp_func.inc');

if (! get_port_state(999)) exit(0, "TCP port 999 is closed.");

soc = open_sock_tcp(999);
if (! soc) exit(1, "Cannot connect to TCP port 999.");

if(ftp_authenticate(socket:soc, user:"uyhw6377w", pass:"bhw32qw"))
  security_hole(999);
close(soc);