Diary of a DEFCON Delegate
Drew Williams
Co-founder, Information Security SWAT Team
AXENT Technologies
Greetings from a flood-ridden Las Vegas, where the rain is pouring like quarters in so
many slot machines. This is the third year of Black Hat and more than 650 people are in
attendance. On top of that, more than 2,500 people are expected for DEFCON 7.
People presented on a number of critical topics such as: Cryptography,
Regulating/Suggesting Parameters for Business Security, Cyber Forensics, "Competitive
Intelligence,” Putting Intrusion into IDS, Scanning: A Taxonomy of security testing, 1000 Hackers
in a Box: Failings of Security Scanners, Security Issues with IIS 4 Servers, and How Responsive are
Security Vendors to Security Problems. Dr. Mudge of L0pht made the Keynote address about
jointly developing a new shareware tool called “AntiSniff,” working with NFR’s Marcus Ranum.
In one of the security sessions, a Microsoft spokesperson responsible for
"Security@Microsoft.com" gave a party-line presentation, and then proceeded to take
questions about the security of the 25+ million lines of code in NT. As explained, "Microsoft
views BO2K as a malicious program and not as a vulnerability that's been cracked." After enough
people QA'd him from a "weeds-perspective" I posed the question, "How many security-trained,
security-conscious developers does Microsoft employ for code-level engineering?" He replied,
more than 200 security experts with a PhD in cryptography, and other various trained folks.
Doing the math with fellow attendees, we removed the technical support, QA, those two PhDs
in Cryptography, and the other scope-creep factors, and came up with a rough actual estimate
closer to five to 10 engineers who actually look at code from a security perspective.
This weekend's annual DEFCON hacker convention drew more than 2,000 computer
hackers, security experts, and federal officials from as high-ranking as the White House, who
assembled to discuss the latest trends in security exploits. One of the three-day conference
break-out sessions included a panel discussion with security officials from the Army and the
National Security Council, which afforded a room of more than 500 hackers to field questions
and commentary. Note: Never give out your e-mail address to a group of hundreds of computer
hackers—especially if you’re a White House “Security” Director!
Another session highlighted the unveiling of California-based hacker group Cult of the
Dead Cow's (cDc) newest version of "Back Orifice 2000 (BO2K). As a follow-up to last year's Back
Orifice, this new version provides NT users with the ability to operate at a "Privileged"
(Administrator) level—remotely (e.g., "RegEdit 32", remote file tree management, etc.). The
boldness from such hacker organizations as cDc-and the more prominent Boston-based L0pht
Heavy Industries, have fueled the cyber conflict between U.S. officials, software giants such as
Sun and Microsoft and hacker groups. These groups are doing a great deal of noise-making. And
most of the participants that are here--like I see every year--are punks drawn together like a frat
party gone bad. But the good news is, among the noise, there's some real value within the
ranks, and the software vendors (like Sun and Microsoft), government agencies--including some
of our own customer base--and the security vendors and our partners are starting to pay more
attention to what these groups are saying.
In the case of the BO2K program, this is an open-source architecture, which is being
hawked as a value-added tool that addresses both the productivity and security levels of any
organization that depends on the NT operating system. Anyone can download the actual code
directly from the cDc Website, and review it and its security safeties. What's different is that the
BO2K server can be easily sent as a less than 100K e-mail attachment. Once in naive users'
hands, the attachment can be opened and infect their systems without the users ever knowing
they've handed over the keys to their system to a stranger.
I expect Microsoft to look at BO2K as a high-level security risk—and they should.
Conversely, this was proclaimed by the cDc as a tool that IT administrators who are responsible
for mostly remote networks can use to help (transparently) “enable” their administrative tasks.
But hackerware is hackerware, and most of the virus groups will take a strong countermeasure
against it, as will the security vendors.
So what does BO2K have/do?
 Has Open Source Architecture. This is big news and what security companies should be
concerned. Everything else, for one argument or another, is probably something that
has already been devised--either commercially, or through share/freeware. Open
Architecture means anyone can strip out the default settings and commands and put
their own into the tool
 Supports Triple-DES encryption (yes, it's a restricted export encryption).
 Ability to plug in your own authentication/encryption "stuff."
 Enable all connections to be encrypted, including password requests, etc.
 Designed to move data through secure connections.
 Has a plug-in ("Butt Plug"), which is a small set of core BO2K source.
 Designed for NT
 Includes a PWDump-style utility for NT.
 Includes extended Registry Key editing--remotely.
 Has a smaller footprint (113k).
 Uses less than 2MB RAM.
 Looks like SMS, acts like SMS, but is risky to detect.
 Has built-in TCP & UDP connections.
 Includes session-based architecture, which enforces session sequencing on reliable
protocols.
 Has a remote desktop interface plug-in called "BO-peep," which allows the user to see
the target desktop in clear stream.
 Has a remote Registry Editor which allows the user to surf remote machines and create
values for registry keys.
 "BOSOC 32" allows packets to be reordered. cDc akin this to a "clean set of TCP
functions in a UDP setting"
Here are some other highlights:
The cDc and distant colleagues at L0pht Heavy Industries, teamed up to create a remote
file browser, which allows the user to access directory trees from remote locations for dragging
and dropping files--even through encrypted tunnels. This isn't necessarily a new utility, but it's
still interesting.
With BO2K's source code released under the GNU Public License, you can also expect to
see numerous BO2K variations. Further complicating matters: BO2K is designed to be plug-in
extensible.
How can organizations detect and locate BO2K in an NT environment? My baseline
concern is fourfold:
1. How can a vendor’s products detect BO2K?
2. How can we locate where the incursion is originating?
3. What would be the defense against our countermeasures?
4. What are the other security vendors likely going to address as they make boasts in
the media over this?
Issues like high and low entropy, weak algorithms, credential checking, and other
technotalk bounced around among the conversations. Here are some suggested approaches
(aside from looking at some of the antivirus folks for partial solutions):
1: Detection
Use IDS solutions to monitor for encrypted traffic.
Isolate the encrypted traffic and challenge its validity.
2: Location
Identify the device(s) on which the encrypted traffic originated.
Inquire as to the purpose for the encrypted traffic.
3: Countermeasure
Stop using the encryption settings in BO2K and run it "naked" –so to speak.
The last, but far from least, of your security concerns about BO2K is that this program
enables a BO2K cracker on NT systems to make any directory shareable. Adding to the dilemma
that this is an open architecture application, the resulting “spin-offs” will evolve, based on the
time, resource, knowledge base and imagination of any hacker. To say that this can mean a
security nightmare is an understatement.

More Related Content

PDF
www.ijerd.com
PPTX
News bytes Sept-2011
PDF
Comprehensive Guide On Network Security
PDF
The Future Is Blockchain Era
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
IoT Malware Detection through Threshold Random Walks
PPT
PPT FOR IDBSDDS SCHEMES
PDF
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
www.ijerd.com
News bytes Sept-2011
Comprehensive Guide On Network Security
The Future Is Blockchain Era
International Refereed Journal of Engineering and Science (IRJES)
IoT Malware Detection through Threshold Random Walks
PPT FOR IDBSDDS SCHEMES
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...

What's hot (17)

PPT
Marco Casassa Mont: Pki overview
PDF
Ce hv8 module 17 evading ids, firewalls, and honeypots
PPTX
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
PDF
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
PPTX
DOC
documentation for identity based secure distrbuted data storage schemes
PDF
Cost effective authentic and anonymous data sharing with forward security
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
Cost effective authentic and anonymous data sharing with forward security
PPTX
Defcon 18 "Hacking Electronic Door Access Controllers"
PDF
iot hacking, smartlockpick
PDF
Ijarcet vol-2-issue-7-2307-2310
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
IJSRED-V2I1P29
PDF
SSL/TLS for Mortals (Voxxed Days Luxembourg)
PPTX
Tokenization on the Node - Data Protection for Security and Compliance
PDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
Marco Casassa Mont: Pki overview
Ce hv8 module 17 evading ids, firewalls, and honeypots
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
documentation for identity based secure distrbuted data storage schemes
Cost effective authentic and anonymous data sharing with forward security
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous data sharing with forward security
Defcon 18 "Hacking Electronic Door Access Controllers"
iot hacking, smartlockpick
Ijarcet vol-2-issue-7-2307-2310
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IJSRED-V2I1P29
SSL/TLS for Mortals (Voxxed Days Luxembourg)
Tokenization on the Node - Data Protection for Security and Compliance
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
Ad

Viewers also liked (12)

PDF
Dentina en temporales 4
PDF
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
DOC
INTEGRAL HEALTH CENTER - SOLVING THE EQUATION OF CANCER (A1) (2)
PPTX
Oracle Based Testing
PPTX
MENGELOLA SISWA
PDF
C 14-dce-102-engg maths-1
PPTX
Evolucion historia medicina
PPTX
Introduction to python
PDF
Lapbook medios de transporte
PDF
Cirugia Ortognatica Completo2009 1
PPT
Colgajos y Suturas
PDF
Referencial de educacao_para_o_desenvolvimento
Dentina en temporales 4
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
INTEGRAL HEALTH CENTER - SOLVING THE EQUATION OF CANCER (A1) (2)
Oracle Based Testing
MENGELOLA SISWA
C 14-dce-102-engg maths-1
Evolucion historia medicina
Introduction to python
Lapbook medios de transporte
Cirugia Ortognatica Completo2009 1
Colgajos y Suturas
Referencial de educacao_para_o_desenvolvimento
Ad

Similar to BO2K Byline (20)

PDF
Cyber security and cyber law
PPTX
Buffer overflow attacks
PDF
Modern malware and threats
PPT
Firewalls (Distributed computing)
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PPTX
Kurt baumgartner lan_deskse2012
PPTX
Blackhat 2014 Conference and Defcon 22
PDF
Thick Application Penetration Testing: Crash Course
PPT
Trends in network security feinstein - informatica64
PPT
Safe Computing At Home And Work
PDF
Secureview 3
PDF
Ch 8: Desktop and Server OS Vulnerabilites
PDF
Security Lock Down Your Computer Like the National Security Agency (NSA)
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PDF
Talk28oct14
PPTX
Red Team Apocalypse
PPT
Allegory of the cave(1)
Cyber security and cyber law
Buffer overflow attacks
Modern malware and threats
Firewalls (Distributed computing)
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Kurt baumgartner lan_deskse2012
Blackhat 2014 Conference and Defcon 22
Thick Application Penetration Testing: Crash Course
Trends in network security feinstein - informatica64
Safe Computing At Home And Work
Secureview 3
Ch 8: Desktop and Server OS Vulnerabilites
Security Lock Down Your Computer Like the National Security Agency (NSA)
FBI & Secret Service- Business Email Compromise Workshop
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Talk28oct14
Red Team Apocalypse
Allegory of the cave(1)

More from Condition Zebra (CONZebra) (6)

PDF
AXENT-Everything-IDS
PDF
OS-Anatomy-Article
PDF
Host-Based IDS LLifecycle
PPTX
2 Day MOSTI Workshop
PDF
BYOD eBook Part 1 DREW
DOCX
Weathering the Storm of IT Security Compliance
AXENT-Everything-IDS
OS-Anatomy-Article
Host-Based IDS LLifecycle
2 Day MOSTI Workshop
BYOD eBook Part 1 DREW
Weathering the Storm of IT Security Compliance

BO2K Byline

  • 1. Diary of a DEFCON Delegate Drew Williams Co-founder, Information Security SWAT Team AXENT Technologies Greetings from a flood-ridden Las Vegas, where the rain is pouring like quarters in so many slot machines. This is the third year of Black Hat and more than 650 people are in attendance. On top of that, more than 2,500 people are expected for DEFCON 7. People presented on a number of critical topics such as: Cryptography, Regulating/Suggesting Parameters for Business Security, Cyber Forensics, "Competitive Intelligence,” Putting Intrusion into IDS, Scanning: A Taxonomy of security testing, 1000 Hackers in a Box: Failings of Security Scanners, Security Issues with IIS 4 Servers, and How Responsive are Security Vendors to Security Problems. Dr. Mudge of L0pht made the Keynote address about jointly developing a new shareware tool called “AntiSniff,” working with NFR’s Marcus Ranum. In one of the security sessions, a Microsoft spokesperson responsible for "Security@Microsoft.com" gave a party-line presentation, and then proceeded to take questions about the security of the 25+ million lines of code in NT. As explained, "Microsoft views BO2K as a malicious program and not as a vulnerability that's been cracked." After enough people QA'd him from a "weeds-perspective" I posed the question, "How many security-trained, security-conscious developers does Microsoft employ for code-level engineering?" He replied, more than 200 security experts with a PhD in cryptography, and other various trained folks. Doing the math with fellow attendees, we removed the technical support, QA, those two PhDs in Cryptography, and the other scope-creep factors, and came up with a rough actual estimate closer to five to 10 engineers who actually look at code from a security perspective. This weekend's annual DEFCON hacker convention drew more than 2,000 computer hackers, security experts, and federal officials from as high-ranking as the White House, who assembled to discuss the latest trends in security exploits. One of the three-day conference break-out sessions included a panel discussion with security officials from the Army and the National Security Council, which afforded a room of more than 500 hackers to field questions and commentary. Note: Never give out your e-mail address to a group of hundreds of computer hackers—especially if you’re a White House “Security” Director! Another session highlighted the unveiling of California-based hacker group Cult of the Dead Cow's (cDc) newest version of "Back Orifice 2000 (BO2K). As a follow-up to last year's Back Orifice, this new version provides NT users with the ability to operate at a "Privileged" (Administrator) level—remotely (e.g., "RegEdit 32", remote file tree management, etc.). The boldness from such hacker organizations as cDc-and the more prominent Boston-based L0pht Heavy Industries, have fueled the cyber conflict between U.S. officials, software giants such as Sun and Microsoft and hacker groups. These groups are doing a great deal of noise-making. And most of the participants that are here--like I see every year--are punks drawn together like a frat party gone bad. But the good news is, among the noise, there's some real value within the ranks, and the software vendors (like Sun and Microsoft), government agencies--including some of our own customer base--and the security vendors and our partners are starting to pay more attention to what these groups are saying.
  • 2. In the case of the BO2K program, this is an open-source architecture, which is being hawked as a value-added tool that addresses both the productivity and security levels of any organization that depends on the NT operating system. Anyone can download the actual code directly from the cDc Website, and review it and its security safeties. What's different is that the BO2K server can be easily sent as a less than 100K e-mail attachment. Once in naive users' hands, the attachment can be opened and infect their systems without the users ever knowing they've handed over the keys to their system to a stranger. I expect Microsoft to look at BO2K as a high-level security risk—and they should. Conversely, this was proclaimed by the cDc as a tool that IT administrators who are responsible for mostly remote networks can use to help (transparently) “enable” their administrative tasks. But hackerware is hackerware, and most of the virus groups will take a strong countermeasure against it, as will the security vendors. So what does BO2K have/do?  Has Open Source Architecture. This is big news and what security companies should be concerned. Everything else, for one argument or another, is probably something that has already been devised--either commercially, or through share/freeware. Open Architecture means anyone can strip out the default settings and commands and put their own into the tool  Supports Triple-DES encryption (yes, it's a restricted export encryption).  Ability to plug in your own authentication/encryption "stuff."  Enable all connections to be encrypted, including password requests, etc.  Designed to move data through secure connections.  Has a plug-in ("Butt Plug"), which is a small set of core BO2K source.  Designed for NT  Includes a PWDump-style utility for NT.  Includes extended Registry Key editing--remotely.  Has a smaller footprint (113k).  Uses less than 2MB RAM.  Looks like SMS, acts like SMS, but is risky to detect.  Has built-in TCP & UDP connections.  Includes session-based architecture, which enforces session sequencing on reliable protocols.  Has a remote desktop interface plug-in called "BO-peep," which allows the user to see the target desktop in clear stream.  Has a remote Registry Editor which allows the user to surf remote machines and create values for registry keys.  "BOSOC 32" allows packets to be reordered. cDc akin this to a "clean set of TCP functions in a UDP setting" Here are some other highlights: The cDc and distant colleagues at L0pht Heavy Industries, teamed up to create a remote file browser, which allows the user to access directory trees from remote locations for dragging and dropping files--even through encrypted tunnels. This isn't necessarily a new utility, but it's still interesting.
  • 3. With BO2K's source code released under the GNU Public License, you can also expect to see numerous BO2K variations. Further complicating matters: BO2K is designed to be plug-in extensible. How can organizations detect and locate BO2K in an NT environment? My baseline concern is fourfold: 1. How can a vendor’s products detect BO2K? 2. How can we locate where the incursion is originating? 3. What would be the defense against our countermeasures? 4. What are the other security vendors likely going to address as they make boasts in the media over this? Issues like high and low entropy, weak algorithms, credential checking, and other technotalk bounced around among the conversations. Here are some suggested approaches (aside from looking at some of the antivirus folks for partial solutions): 1: Detection Use IDS solutions to monitor for encrypted traffic. Isolate the encrypted traffic and challenge its validity. 2: Location Identify the device(s) on which the encrypted traffic originated. Inquire as to the purpose for the encrypted traffic. 3: Countermeasure Stop using the encryption settings in BO2K and run it "naked" –so to speak. The last, but far from least, of your security concerns about BO2K is that this program enables a BO2K cracker on NT systems to make any directory shareable. Adding to the dilemma that this is an open architecture application, the resulting “spin-offs” will evolve, based on the time, resource, knowledge base and imagination of any hacker. To say that this can mean a security nightmare is an understatement.