Back Orifice 2000: A Step Beyond Back Orifice

The launch of Back Orifice 2000 was announced at DEF CON 7th Edition in 1999. BO 2000 was originally developed by Christien Rioux (DilDog), a member of Cult of the Dead Cow. He was in the development team of L0phtCrack or LC, Windows password audit and recovery tool. In 2006, he co-founded Veracode, a Massachusetts-based application security company. He is also the Chief Scientist in Veracode.

BO 2000 is a step up over its predecessor Back Orifice, which was developed by Josh Buchbinder (Sir Dystic) and launched at DEF CON 6th Edition in 1998. It contains several advancements over its predecessor. The first and most important of them is increased scope. Back Orifice had support for only Windows 95 and Windows 98. In addition to those two, BO 2000 has support for Windows NT, Windows 2000, Windows XP, & Windows Vista. BO 2000, also known as BO2K, has a leaner structure. It includes large organizations in its scope whereas its predecessor’s scope was limited to individuals and small businesses. BO 2000 comes as a server-client duo and has a modular structure which makes it easy for users to add additional features. It also comes with a configuration utility which helps to configure the server application. It is difficult for network monitoring software solutions to detect its presence. It has real-time keystroke logging and real-time desktop viewing feature. It supports strong encryption.

BO2K faced moral and legal questions from the experts. It did not take long for it to be categorized as a malware. F-Secure Labs categorizes it as a backdoor Trojan. McAfee Inc. profiles BO 2000 as a malware of type Trojan and subtype Remote Access. It also lists a lesser known alias of BO2K, Orifice2k.srv. Symantec Corporation detects it as a Trojan Variant. Microsoft too detects it as a Trojan with alert level Severe. Most of the big names in the antivirus industry have made detailed removal guide available for BO2K. The BO2K process uses various tricks to keep running on the remote system, one of them being repeatedly changing its process ID and spawning backup processes (processes which will ensure BO2K backdoor keeps running even if one process is killed). BO2K has been used by cyber criminals extensively. Although some publications such as Windows IT Pro were a bit positive about BO2K’s corporate future, in the September 2002 issue of Security Administrator Microsoft predicted, “its default stealth mode and obviously harmful intent mean the corporate world probably won’t embrace it anytime soon.” Microsoft’s firm stand against BO2K irritated Cult of the Dead Cow and they challenged Microsoft “to voluntarily recall all copies of its Systems Management Server network software.” ZDNet was strongly against the prevailing negative sentiment around BO2K.

Despite the controversial nature of the software, there is no uncertainty regarding the fact that BO2K was an example of excellent craftsmanship in software development. The developers thought of almost everything a person might need for seamless remote administration. The last stable release of BO2K was in 2007. A lot has happened since then. It’s time for Cult of the Dead Cow to start work on a new version of BO.

Hacking of Your Car Is Possible on Android Phones

We are now living in an era of being connected to the internet or via wireless technology. From smartphones to cars, manufacturers are rushing to connect mobile phones and vehicles to perform various functions like driverless cars and so on. Meanwhile, some mobile apps are now able to summon vehicles just as we have seen in Knight Rider. With the advancement of technology comes the danger – these phones can be hacked and when hackers can launch terror or hijack vehicles with ease.

A test has been conducted on at least nine vehicles built by seven companies that are connected with Android apps and they are all vulnerable to attacks. Researchers from Kaspersky, a software security firm, confirmed that most mobile apps, which have been downloaded over a million times, do not even have basic software defence system for drivers to protect themselves in case of an attack. Hackers can root a phone or trick users into installing malicious malware code, unlock the vehicle and start the ignition key.

The Ignition Remix

As of today, researchers have refused to name specific mobile apps that they tested over the fear that their publication would help car thieves. However, they argue their studies should make the car industry take to consider car security in a serious manner.  It is time connected car application developers treat their products just like banking apps, according to Kaspersky lead researcher Viktor Chebyshev.

In the worst-case scenario, researchers have found that hacker can access to locked vehicles; vehicle thieves would require other tricks for more serious attacks, like controlling the key or maybe disabling the vehicles’ immobiliser, which is a system that prevents vehicles from being stolen. They found that Tesla’s cars which permit a car to be driven via smartphone app only is an excellent example of how hacking a mobile phone can lead to theft, even though Tesla cars were not a part of their research.

The security experts’ analyses are based on the mobile apps themselves—they only ‘hacked’ into one of the affected vehicle models in question. And, they claim that there was no need for injecting Android malware to pull off the dirty tricks thieves or terrorists can pull to cause damage. They also warned that poorly built apps that lacked proper coding are vulnerable to vehicle thieves and they highlighted a case in which hacker forums are showing interest in hacking of apps-connected vehicles. They clearly display offers to buy & sell connected vehicle app credentials including their usernames and passwords, shockingly even PIN numbers and the unique Vehicle Identification Numbers (VINs) of different vehicles. The usual rate runs into hundreds of dollars per such account. Chebyshev said that cybercriminals are preparing for such attacks and the vehicle industry should take notice of these online activities.

The Kaspersky security researchers have highlighted three techniques for exploiting Android applications they tested. (iOS is much more difficult for hackers to attack). They found that, except one app, stored the apps username, password, or both in unencrypted manner in the mobile device’s storage. And, when rooting the victim’s mobile phone —by exploiting full privileges in the phone’s OS —an expert hacker can get access to those stored account login details and send them off to his command-and-control server. Hackers could also trick vehicle owners into downloading an altered/hacked versions of car apps in order to steal login details. Alternatively, car thieves can infect mobile phones with malwares that can launch an “overlay” attack: When the car-app starts, the malware could immediately detect that it is loading and it can preempt it with some fake user interface and the steals the details and transfer the same to some remote location. A hacker may also infect the app with multiple overlays in order to spoof off any connected car app the innocent victim may load.

Time to Buckle Up

The security experts also said that they have reported their findings to several companies whose cars are highly vulnerable. However, they noted that most problems are not even security bugs, so much as a lack of proper safeguards. Encrypting the login credentials stored on a mobile device, adding two-stage authentication or maybe a fingerprint authentication, or maybe creating integrity checks in the apps could work to prevent malicious code from being injected into the apps.

This is not the first time makers of app connected cars are facing safeguards issues in their products. Toyota, Nissan,and Ford has also been vulnerable to hacking. It is also important to note that the problem is not solely confined to phones using Android system. Security expert Samy Kamkar, back in 2015, explained how he could deploy a tiny piece of hardware hidden on a vehicle to intercept login credentials from apps based on iOS like Onstar (GM), UConnect (Chrysler), mbrace (Mercedes-Benz) and Remote (BMW) — all via wirelessly. Kamkar’s hacking method also allowed him to locate a car from a remote location, unlock it, and in some cases start the ignition. In such attack, he said there won’t be “no warnings” and your car credentials would be easily stolen and reused by the hacker “without phone modifications” while comparing his attack method with the one conducted by Android hackers as suggested by security experts at Kaspersky.

As connected vehicles are gaining huge interest among buyers, researchers at Kaspersky said manufacturers must be able to lock down mobile apps that could control their products even as both ethical malware testers and criminal hackers gear up to find flows in their systems. It may be better if we can open the car door without ever triggering the car alarm, however these functionalities are just being explored, said Kaspersky lead researcher Mikhail Kuzin, adding car makers “will have to add new security features to make users lives more convenient and at the same time prevent attacks”. It’s time app makers and car makers take utmost care in security issues, and do it right.

Career in Cyber Security

Everyday millions of people get new job opportunities and millions more lose their jobs. Current word is too much competitive and to keep pace with the modern world and win the competition you need to take the right decision and choose the right career path now. In the IT industry there is a long list of job opportunities for you if you have the right skillset. You can be a software engineer, mobile application developer, web designer, sysadmin, etc. Most of the renowned companies around the world care less about academic results and more about your skill in the specific fields.  Among all IT professions Cyber Security is among the most lucrative ones.

Cyber Security was once the realm of defense and government agencies but nowadays every industry is looking for an expert Cyber Security specialist. The reason behind this is crystal clear. Today every business has their online presence in this or that way. Most of the businesses and companies are conducting their activities through internet – a thriving modern business is impossible without the help of some type of cloud infrastructure. Whether the businesses and companies are passing their data through public internet service or private extranet or intranet they are vulnerable to digital attack or data breach. Even the bank you are using for money transaction, the AMT machine you are using for withdrawing money or the POS through which you are paying bill in the superstore near your home are all passing the transaction data through network. Almost no business can exist today without the help of internet and each of them need to secure their system from any type of digital attack over the network for a sustainable business. So, all of them need people with the expertise in Cyber Security.

You maybe prompted to ask about the salary and future in Cyber Security career. I am providing some valuable information here for you. A report from CISCO says that more than one million job openings are left unfilled in the whole word where almost 200k job openings are left unfilled in U.S. alone. Cyber Security market is expected to grow $170 billion by 2020. Your salary can range from $88k to $328k depending on your skill. So, if you can make yourself a skilled person in Cyber Security you will not have to run for jobs, instead companies will run for you.

Now, the question arises, “How can I become a Cyber Security professional?” To be a Cyber Security professional you do not need to have Computer Science (CS) degree but if you have degree or background in CS it will be very helpful for your learning and your career. The learning curve is not very smooth, neither very steep. With a decent analytical ability you can excel more in this field. A lot of universities, companies and professional institutes are providing professional trainings on it. CISCO is one of the leading companies to provide professional IT courses and Cyber Security is one of their main concern. Whenever you are going to take a course on Cyber Security make sure that they are providing a certificate that is globally recognized. Compared to other IT jobs Cyber Security jobs put some more weight on professional certification. If it is hard for you to attend training physically you can take online courses. You can choose online course form Lynda, Pluralsight, Udemy, etc. So, do not wait any more if you want a bright future. Start your learning today to ensure a better tomorrow.

Back Orifice: The Controversial Remote Administration Tool

Some programs solve problems, and some create controversies. Josh Buchbinder’s Back Orifice falls in the second category. Back Orifice was designed as a remote administration tool but it ended up being classified as a malware. Back Orifice was launched at DEF CON 6th Edition on August 1, 1998. Developer Josh Buchbinder/ Sir Dystic is a member of the hacker group Cult of the Dead Cow which started in Texas, US.

The name Back Orifice is derived from Microsoft BackOffice Server, which was a server product bundle from Microsoft released in 1994 and discontinued in 2001. Back Orifice comprises two modules, one server module and one client module. The client module is used to control the server module running on a different machine. The client module is capable of performing a host of operations on the remote machine including execution of any application, keystroke logging, restarting, locking, file content viewing, file transfer in both directions (to and from the remote machine), and retrieval of screen saver password and cached passwords. It also supports screen capture, network traffic monitoring, and connection redirection. Third-party plugins can be easily added to the software. Back Orifice uses TCP & UDP protocols and runs on port 31337. Back Orifice works on local area networks and on the internet. It’s a freeware and is available for download on Cult of the Dead Cow official site. In order to install Back Orifice, first, the server application needs to be installed on the remote machine. The server application is a standalone executable file of around 122 KB. The application copies itself to the Windows system directory and adds a value carrying the server application filename to the registry. Back Orifice server module is compatible with Windows 95 & 98 but not with Windows NT.

The press release which was published from Cult of the Dead Cow during the launch mentions that the main goal of releasing the software in the public domain was to draw the attention of people to the serious security flaws of the Microsoft Windows operating system. It also criticized Microsoft for their lackluster attitude toward security. In spite of its noble motive, the software was categorized by the leading antivirus companies as a malware and it was not without reason. First, the server application deletes itself when executed. Second, the server application does not show up on the Windows task list. Third, it automatically starts every time Windows starts. Symantec Corporation explains, “the tool can be used by an unscrupulous user (e.g., the attacker) to compromise the security of a computer running Windows 95 or Windows 98, for example, to steal secret documents, destroy data, etc.” Due to its ease of use, Back Orifice was a favorite among wannabe hackers. It was used by hackers as a Trojan horse. Most antivirus solutions automatically detect and take appropriate action against Back Orifice. It can also be removed manually by running the MS-DOS command DEL C:\WINDOWS\SYSTEM\EXE~1.

Although it is arguable whether Back Orifice missed its intended goals, being accepted as a reliable remote administration tool and increasing security awareness among users, it will always be considered an important milestone in security research.