daw1012345 / liblzma_backdoor_dyn_analysis

A simple C program with stubs, allowing one to dynamically debug the backdoor included in liblzma

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

liblzma_backdoor_dynamic_analysis

Description

The purpose of this repo is to simplify the dynamic analysis of the liblzma backdoor. It imitates the environment that the backdoor is expecting during compilation and linking. The backdoor successfully executes (GOT entry for _cpuid gets overwritten and stage 1 runs). However, ssh-specific stubs are missing, meaning that the backdoor will fail to hook SSH functions.

Instructions

  1. Download the backdoor file and extract it. It can be found here ($ wget https://www.openwall.com/lists/oss-security/2024/03/29/4/2 -O backdoor.gz && gzip -d backdoor.o.gz)
  2. Build it with the build.sh file. ($ bash build.sh)
  3. Analyze run the resulting file in a debugger. ($ gdb backdoored_file)

IMPORTANT INFORMATION

I have not verified that this works. I don't recommend running this on your machine (although it is believed that the backdoor only targets openssh). I provide no guarantees or warranty. I am not responsible if this breaks something!

About

A simple C program with stubs, allowing one to dynamically debug the backdoor included in liblzma


Languages

Language:C 96.0%Language:Shell 4.0%