Quis custodiet custodes ? -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, 27 January, 2000 18:20 To: Robert Hillery Subject: Re: Undocumented back door Please send it to [EMAIL PROTECTED] Cheers. * Robert Hillery ([EMAIL PROTECTED]) [000127 20:40]: > Elias, > What follows is a copy of my submission to SANS GIAC re a curious open > port I had at tcp 7323 on an NT server system w/ SyGate's 3.1 NAT installed. > Greg Shipley suggested I send it to you at BugTraq, also. > > Bob Hillery, > NHCTC Pease > Cogito, ergo sum...cogito > > "FYI, I discussed a possible solution to one of Steve's examples at last > week's SNAP DC conference. Specifically, he had an indication of a > session directed to the unknown port of 7306 and was at the time unsure of > its meaning. > I had a similar problem -- and discovered the answer. I had just set up > an NT server as a multi-homed system w/ NAT (SyGate 3.1 build 553) > > and did an internal port scan to verify the setup. I was surprised by an > active listening port at 7323. > I did a telnet from another computer in the net and got (sic): > > ""SyGate 3.11 for Windows 95/98/NT build 556 > > Welcome to engine remote controller! > > For security purpose, engine remote controller can be access only from your > Local Area Network (LAN). > > > ======== Function Key ========== > > P Stop Service > > D Display Engine Status > > N To Dial ( Dial-Up Networking only ) > > F To Hang Up( Dial-Up Networking only ) > > T Display All TCP Connection(s) > > U Display All UDP Connection(s) > > > > Ready to accept command. Press one function key, or 'H' for help."" > > WOW. > I was told in my first email to Sybergen, who write SyGate, SyShield, and > Sy Access, that although it is completely undocumented this was for > "maintenance purposes only." My second email asked the what if -- any other > access route? The answer was (ahem): > > ""From: Customer Support [ mailto:sgsupport@Sybergen > > <mailto:sgsupport@Sybergen> ] > > Sent: Monday, December 20, 1999 5:21 PM > > To: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> > > Subject: RE: sg > > Port 7323 is used for telnet session for SyGate within a LAN, if someone did > use the RAS (on a SyGate client machine) and able to get the same TCP/IP > setting as other LAN computers, then telneting the server is possible and > that will post a security hole. > > Sincerely, > Customer Support > Sybergen Networks, Inc."" > > Last step was a live test. One of my students is also the SysAdmin of a > local private High School's network. He telnetted in from our classroom, > across at least 4 routers, including some public net, successfully got the > SyGate remote control screen...and proceeded to shut his own system down. > So much for remote maintenance...Many thanks to Chris R. for the test (and > his colleague who immediately reset (and closed 7323) the system that Friday > afternoon). > I've seen on the SANS list of port uses (in the FAQ) that 7306 is > associated w/ NetMonitor; a program designed for remote control of kiosks & > ATMs. My suspicion is that 7306 and others may be the "maintenance" > backdoors to this and other such programs. I suggest an occasional internal > port scan to verify system port settings. Any program that makes something > easy, well...makes things easy!" -- Elias Levy Security Focus http://www.securityfocus.com/