SlideShare a Scribd company logo
http://www.infobyte.com.ar
Francisco Amato
evilgrade, "You have pending upgrades..."
http://www.infobyte.com.ar
Introduction
Topics
Client side explotation
Update process
Poor implementation of update processes
Attack vectors
evilgrade framework presentation
http://www.infobyte.com.ar
Introduction
Client side explotation
Searching the Weakest Link
Bypassing the fortress walls
This technique allows for example transform a user
terminal in a “proxy” to access the internal network
of a company
http://www.infobyte.com.ar
General application’s update process
How does it works?
Update process are either manual or
automatic.
The process requests a special file in the
master server for example update.application.
com/info.xml
The file has the internal information of the
available updates.
It’s installed automatic or ask if you like to
install the new update.
http://www.infobyte.com.ar
What’s the problem?
http://www.infobyte.com.ar
Is there any problem?
Trust
A lot of application don’t verify the updates
contents.
They blindly trust without verification of the
master update server.
http://www.infobyte.com.ar
evilgrade
Tool Information
evilgrade is modular framework that allow us to
take advantage of poor update implementations by
injecting fake updates.
It’s a opensource project
It’s developed in Perl
http://www.infobyte.com.ar
evilgrade
How does it work?
It works with modules, each module implements
the structure needed to emulate a false update of
specific application.
evilgrade needs the manipulation of the victims’s
dns traffic
http://www.infobyte.com.ar
evilgrade
Normal update process
1. App1 start the update process
2. Consult to the dns server host update.app1.com
3. DNS server replies 200.1.1.1
4. App gets the file lastupdate.xml from update.app1.
com
5. App analyzes the update file and detect a new
update
6. App1 downloads and execute the update http:
//update.app1.com/update.exe
http://www.infobyte.com.ar
evilgrade
Attack example
1. App1 starts the update process
2. Consult to the dns server host update.app1.com
3. The attacker modifies the DNS traffic and
returns other ip address, controlled by the attacker.
4. App1 get the file controlled by the attacker http:
//update.app1.com/lastupdate.xml
5. App1 processes the file and detect a new
update
6. App1 downloads and execute the backdoor http:
//update.app1.com/backdoor.exe
http://www.infobyte.com.ar
Attack vectors?
Possibilities:
Internal scenery:
Internal DNS access.
- ARP spoofing.
DNS Cache Poisoning.
External scenery:
Internal DNS access.
- DNS Cache Poisoning.
http://www.infobyte.com.ar
ARP spoofing
Description
Layer 2 traffic re-routing (MITM)
http://www.infobyte.com.ar
DNS Request
Description
http://www.infobyte.com.ar
DNS Cache poisoning
Attack
http://www.infobyte.com.ar
DNS Cache poisoning
Nothing is easy
Taking care of:
TTL.
Cache.
Legitimizes response.
Needed information:
- Source.
ID 16 bits (65535 possibilities).
http://www.infobyte.com.ar
Internal scenery
Sample Topology
http://www.infobyte.com.ar
External scenery
Sample Topology
http://www.infobyte.com.ar
evilgrade
No, it’s not. ☹
The idea of the framework is the centralization
and explotation of different update
implementations all together in one tool.
Is this new?
http://www.infobyte.com.ar
evilgrade
What are the supported OS?
The framework is multiplatform, it only depends of
having the rigth payload for the platform to exploit.
http://www.infobyte.com.ar
evilgrade
What can I do with it?
This attack vector allows the injection of fake
updates to remotely access a target system.
http://www.infobyte.com.ar
evilgrade
Console:
It works similar to a IOS console:
-show <object>: Used to show different
information.
-conf <object>: Enter to the configure mode.
-set <option> “value”: Configures different
options.
-start: Webserver starts.
-stop: Webserver stops.
-status: Webserver status.
http://www.infobyte.com.ar
evilgrade
Modules:
.
http://www.infobyte.com.ar
evilgrade
Request:
It’s an object’s collection.
Each object it’s a possible HTTP request inside the
virtualhost configured for the module.
http://www.infobyte.com.ar
evilgrade
Request:
Each object has:
<req> - requeried URL (regex friendly).
<type> : [ file | string | agent | install ]
<method> : [GET|POST|TEST|””]
<bin> : [1|””] If is it a binary file.
<string> : String request’s response
<parse> : [1|””] If this file or string need be parsed
<file> : The path of the request’s response
http://www.infobyte.com.ar
evilgrade
Options:
.
http://www.infobyte.com.ar
evilgrade
Agent:
Agent is the fake update to be injected in the
victims’s computer.
http://www.infobyte.com.ar
evilgrade
Implemented modules:
- Java plugin
- Winzip
- Winamp
MacOS
- OpenOffices
- iTunes
- linkedin toolbar
- DAP (download accelerator)
- notepad++
- speedbit
http://www.infobyte.com.ar
Lab
Time for the demo.
Cool!
http://www.infobyte.com.ar
evilgrade
A more secure approach
Update server running under https, certificate
control.
Digital signatures, verify the update with a
public key
http://www.infobyte.com.ar
References
More Info
http://www.secureworks.com/research/articles/dns-cache-
poisoning/#update
http://www.trusteer.com/docs/bind9dns.html
http://www.trusteer.com/docs/bind8dns.html
http://en.wikipedia.org/wiki/ARP_spoofing
http://www.trusteer.com/docs/microsoftdns.html
http://www.infobyte.com.ar
Questions!
???
http://www.infobyte.com.ar
Thanks!
Contact
blog.infobyte.com.ar
Francisco Amato – famato@infobyte.com.ar

More Related Content

PDF
Evilgrade Defcon 18 2010
PDF
Metasploitation part-1 (murtuja)
PPTX
Surfing with Sharks KS ED TECH 2012
PDF
Hacking school computers for fun profit and better grades short
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
PPTX
Anirban webappsecusa2014
PDF
Scaling Web 2.0 Malware Infection
Evilgrade Defcon 18 2010
Metasploitation part-1 (murtuja)
Surfing with Sharks KS ED TECH 2012
Hacking school computers for fun profit and better grades short
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Anirban webappsecusa2014
Scaling Web 2.0 Malware Infection

Similar to Evilgrade you have pending upgrade....pdf (20)

PDF
TRISC 2010 - Grapevine , Texas
PPTX
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
PDF
Malware threats in our cyber infrastructure
PDF
Hack Attack! An Introduction to Penetration Testing
PDF
Understand study
PPTX
Men in the Server Meet the Man in the Browser
PDF
Dan Guido SOURCE Boston 2011
PPTX
cyber attacks in May , breaches in May
PDF
Watchtowers of the Internet - Source Boston 2012
PDF
Modern malware and threats
PDF
Richard wartell malware is hard. let's go shopping!!
PDF
24 33 -_metasploit
PDF
Faraday Blackhat 2011 Arsenal
PPTX
Finalppt metasploit
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PDF
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
PPTX
How i'm going to own your organization v2
PDF
Palestra Jeferson Propheta - Wanna Cry more
PDF
How to Stop Man in the Browser Attacks
PPT
TRISC 2010 - Grapevine , Texas
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
Malware threats in our cyber infrastructure
Hack Attack! An Introduction to Penetration Testing
Understand study
Men in the Server Meet the Man in the Browser
Dan Guido SOURCE Boston 2011
cyber attacks in May , breaches in May
Watchtowers of the Internet - Source Boston 2012
Modern malware and threats
Richard wartell malware is hard. let's go shopping!!
24 33 -_metasploit
Faraday Blackhat 2011 Arsenal
Finalppt metasploit
Malware and Anti-Malware Seminar by Benny Czarny
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
How i'm going to own your organization v2
Palestra Jeferson Propheta - Wanna Cry more
How to Stop Man in the Browser Attacks
Ad

More from divyanshya03 (12)

PPT
Internet of Things.ppt. B.
PPTX
REVAMPING CRICKET. V v OPERATIONS .pptx
PPTX
Nestle digital marketing strategy DMCPresentation.pptx
PDF
DMC PPT.pdf uhftuyrhhsuyrydhdhu isuehdjd ek
PPTX
my ppt crm1 customer relation management
PPTX
Coffee Recipes Newsletter to Celebrate International Coffee Day by Slidesgo.pptx
PPTX
my ppt crm1.pptx service blueprinting and crm
PPTX
Customer-Relationship-Management-CRM-Systems-Enhancing-Customer-Service[1].pptx
PPTX
my ppt crm1.pptx service blueprient of crm
PPTX
Greenback_presentation[1] o&m Advertising company
PPTX
Greenback presentation deign of prisentation uncomplete
PPTX
oral communication introduction to oral communication
Internet of Things.ppt. B.
REVAMPING CRICKET. V v OPERATIONS .pptx
Nestle digital marketing strategy DMCPresentation.pptx
DMC PPT.pdf uhftuyrhhsuyrydhdhu isuehdjd ek
my ppt crm1 customer relation management
Coffee Recipes Newsletter to Celebrate International Coffee Day by Slidesgo.pptx
my ppt crm1.pptx service blueprinting and crm
Customer-Relationship-Management-CRM-Systems-Enhancing-Customer-Service[1].pptx
my ppt crm1.pptx service blueprient of crm
Greenback_presentation[1] o&m Advertising company
Greenback presentation deign of prisentation uncomplete
oral communication introduction to oral communication
Ad

Recently uploaded (20)

PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Technical Architecture - Chainsys dataZap
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
How to Get Business Funding for Small Business Fast
PPTX
operations management : demand supply ch
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PPTX
basic introduction to research chapter 1.pptx
PPTX
Project Management_ SMART Projects Class.pptx
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Booking.com The Global AI Sentiment Report 2025
Tata consultancy services case study shri Sharda college, basrur
Technical Architecture - Chainsys dataZap
Daniels 2024 Inclusive, Sustainable Development
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
How to Get Business Funding for Small Business Fast
operations management : demand supply ch
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Keppel_Proposed Divestment of M1 Limited
Blood Collected straight from the donor into a blood bag and mixed with an an...
Charisse Litchman: A Maverick Making Neurological Care More Accessible
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
basic introduction to research chapter 1.pptx
Project Management_ SMART Projects Class.pptx
Astra-Investor- business Presentation (1).pptx
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf

Evilgrade you have pending upgrade....pdf