{"id":417,"date":"2014-01-24T00:16:36","date_gmt":"2014-01-24T05:16:36","guid":{"rendered":"http:\/\/sunapi386.ca\/wordpress\/?p=417"},"modified":"2014-02-07T03:47:02","modified_gmt":"2014-02-07T08:47:02","slug":"tcp-32764-backdoor","status":"publish","type":"post","link":"https:\/\/sunapi386.ca\/wordpress\/tcp-32764-backdoor\/","title":{"rendered":"TCP 32764 Backdoor"},"content":{"rendered":"<p style=\"text-align: center;\">XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX<br \/>\nTCP 32764 Backdoor<br \/>\nXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX<br \/>\nby Jason<br \/>\nJan. 24, 2014<br \/>\nAKA Rooting Routers for Fun<br \/>\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<\/p>\n<p>Firstly, I apologize, this is a little dated, but I think it is extremely interesting and worth sharing about. Unlike most other security related articles that just document an attack and tell the story in the past tense -this is an active, vulnerable, exploitiable backdoor.<\/p>\n<p>About a month ago, a backdoor was discovered[1] on a Linksys WAG200G router. There is a process that listens in on port 32764, and it allows free access to many hosts on the internet. No patches are available, as this is an older router that is out of maintainence. The backdoor doesn&#8217;t have any kind of authentication and allows some very dangerous commands[2], like giving access to a remote root shell, dump wifi, PPPoE creditials, and file copy! It&#8217;s unclear as to what caused this backdoor, only that the program is in thefirmware itself. This vulerability is interesting because it&#8217;s currently active and people are just figuring out how to systematically attack it[4].<br \/>\n<!--more--><br \/>\nThis important because it is a huge security concern! We wouldn&#8217;t want the whole internet to root our routers! It also makes one wonder whether they purposely put in the backdoor to conviently monitor our network traffic. Maybe it&#8217;s the NSA. Maybe FBI. Reminds you of the incident where the FBI put a backdoor in OpenBSD[6] doesn&#8217;t it?<\/p>\n<p>What&#8217;s interesting is that it&#8217;s not just the WAG200G that is affected.Numerous other devices are listening on the internet, ready to be exploited too.The backdoor is confirmed to be present in 29 other routers[3], mostly Cisco\/Linksys and Netgear. What&#8217;s dangerous is that all these routers are active on the internet! There are about 1 million IPv4s routers with this vulerability &#8211; according to a TCP 32764 port scan[2].<\/p>\n<p>Clearly, this will have a heavy impact towards consumers. How could large companies like Cisco\/Linksys, and Netgear have such large vulurabilities? Since there are about 30 router models vulerable (with more being discovered), what are the chances that this is a random bug? For consumers, there&#8217;ll be worry and decreased expectation of security and privacy from the trusted corporations.<\/p>\n<p>It&#8217;s unclear as to how this vulerability happened, in almost 30 differentrouters by different companies. We as consumers wouldn&#8217;t want this to happen,but it&#8217;s unknown as to how similar problems be might prevented in the future because the root cause of the vulurability is unknow.<br \/>\nSources<br \/>\n=======<br \/>\n[1] Eloi Vanderbeken (discoverer) exploit PDF slide.<br \/>\nDecember 30, 2013<br \/>\nhttps:\/\/github.com\/elvanderb\/TCP-32764\/blob\/master\/backdoor_description.pptx<\/p>\n<p>[2] TCP backdoor 32764 or how we could patch the Internet (or part of it ;))<br \/>\nJanuary 22, 2014<br \/>\nhttp:\/\/blog.quarkslab.com\/tcp-backdoor-32764-or-how-we-could-patch-the-internet-or-part-of-it.html<\/p>\n<p>[3] (Same as [1] but different link)<br \/>\nhttps:\/\/github.com\/elvanderb\/TCP-32764\/README.md<\/p>\n<p>[4] Automating the TCP-32764 netgear exploit &#8211; The Unsuspecting Bit<br \/>\nJanuary 23, 2014<br \/>\nhttp:\/\/unsuspectingbit.com\/howto-searching-internet-tcp-32764-netgear-exploit\/<\/p>\n<p>[5] Linksys Backdoor Port 32764 Probes On The Rise | Threatpost &#8211; English &#8211; Global &#8211; threatpost.com<br \/>\nJanuary 3, 2014<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"0P66DyarRC\"><p><a href=\"https:\/\/threatpost.com\/probes-against-linksys-backdoor-port-surging\/103410\/\">Probes Against Linksys Backdoor Port Surging<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Probes Against Linksys Backdoor Port Surging&#8221; &#8212; Threatpost - English - Global - threatpost.com\" src=\"https:\/\/threatpost.com\/probes-against-linksys-backdoor-port-surging\/103410\/embed\/#?secret=bBBr4aIQi8#?secret=0P66DyarRC\" data-secret=\"0P66DyarRC\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>[6] An FBI backdoor in OpenBSD?<br \/>\nDecember 15, 2010<br \/>\nhttp:\/\/blogs.csoonline.com\/1296\/an_fbi_backdoor_in_openbsd<\/p>\n","protected":false},"excerpt":{"rendered":"<p>XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX TCP 32764 Backdoor XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX by Jason Jan. 24, 2014 AKA Rooting Routers for Fun ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Firstly, I apologize, this is a little dated, but I think it is extremely interesting and worth sharing about. Unlike most other security related articles that just document an attack and tell the story in the past tense -this &hellip; <a href=\"https:\/\/sunapi386.ca\/wordpress\/tcp-32764-backdoor\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">TCP 32764 Backdoor<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-417","post","type-post","status-publish","format-standard","hentry","category-hack2600"],"_links":{"self":[{"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":5,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":424,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/posts\/417\/revisions\/424"}],"wp:attachment":[{"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/media?parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/categories?post=417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sunapi386.ca\/wordpress\/wp-json\/wp\/v2\/tags?post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}