(no title)
plg94 | 1 year ago
> Apparently the backdoor reverts back to regular operation if the payload is malformed or *the signature from the attacker's key doesn't verify*.
emphasis mine, note the "signature of the attacker's key". So unless that key is leaked, or someone breaks the RSA algorithm (in which case we have far bigger problems), it's impossible for someone else (researcher or third-party) to exploit this backdoor.
cryptonector|1 year ago
rmi_|1 year ago
But, just for replayability, we could "patch" the exploit with a known key and see what it does, don't we?
swid|1 year ago
Replayability means, if someone were to catch a payload in action which did use the exploit, you can’t resend the attacker’s data and have it work. It might contain something like a date or other data specific only to the context it came from. This makes a recorded attack less helpful for developing a test… since you can’t replay it.
usrusr|1 year ago
What it does: it's full RCE, remote code execution, it does whatever the attacker decides to upload. No mystery there.
chii|1 year ago
it does whatever the decrypted/signed payload tells the backdoor to execute - it's sent along with the key.
The backdoor is just that - a backdoor to let in that payload (which will have come from the attacker in the future when they're ready to use this backdoor).
superb_dev|1 year ago
Ekaros|1 year ago
It is very good backdoor to have if you at whatever time have dozens of options. See sshd running, test this you are done if it works, if not move to something else.
yencabulator|1 year ago
https://en.wikipedia.org/wiki/NOBUS
BlueFalconHD|1 year ago
denysvitali|1 year ago
Technically, we can modify the backdoor and embed our own public key - but there is no way to probe a random server on the internet and check if it's vulnerable (from a scanner perspective).
In a certain way it's a good thing - only the creator of the backdoor can access your vulnerable system...
kortilla|1 year ago
password4321|1 year ago
https://securelist.com/gauss-abnormal-distribution/36620/
cryptonector|1 year ago
yencabulator|1 year ago
This attack is unreplayable because it cryptographically ties into the SSH host key of the server.