7. Scanners

 

Enough research will tend to support your theory.

 Murphy's Law of Research

This is the platform dependent part of Scanners (i). It contains three things:

All together this results in a kind of time warp. The infection methods detected here are described later on. And the list of found clean targets has already been used.

7.1. Finding executables

This is the output of find-exec.sh as described in Finding executables (i). The sample of file's output down below (at Food for segment padding) might explain how the sed part is supposed to work.

Linux distributions and Solaris have very few statically linked programs. On FreeBSD the number is much higher.

Output: out/sparc-sunos5.9/scanner/big.wc
[] /bin /sbin /usr/bin /usr/sbin /usr/lib
      15 out/sparc-sunos5.9/scanner/big.static
     928 out/sparc-sunos5.9/scanner/big.dynamic
     943 total

Output: out/sparc-sunos5.9/scanner/small.wc
[_infected] tmp/sparc-sunos5.9
       1 out/sparc-sunos5.9/scanner/small.static
       7 out/sparc-sunos5.9/scanner/small.dynamic
       8 total

7.2. Scan entry point

See Sections for the illustrative description of a dumped ELF header. The script itself is at Scan entry point (i).

Output: out/sparc-sunos5.9/scanner/entry_point/big.static
files=0015; detected=0000

Output: out/sparc-sunos5.9/scanner/entry_point/big.dynamic
files=0928; detected=0000

On a clean system there are absolutely no deviations. Now we let the script loose on all infected executables produced from the sources of this document. Only a few are detected (note the directory name e1i1). Which means there is cure against this vulnerability (see The entry point). In the following output ep means "entry point" and sot is "start of .text".

Output: out/sparc-sunos5.9/scanner/entry_point/small.static
segment_padding/e1i1/sync_infected           ep=0x45cc0    sot=0x10098   
files=0001; detected=0001

Output: out/sparc-sunos5.9/scanner/entry_point/small.dynamic
segment_padding/e1i1/csh_infected            ep=0x334b0    sot=0x17f0c   
segment_padding/e1i1/crle_infected           ep=0x18660    sot=0x1126c   
segment_padding/e1i1/strip_csh_infected      ep=0x334b0    sot=0x17f0c   
additional_cs/e1i1/crle_infected             ep=0xe300     sot=0x1126c   
additional_cs/e1i1/ldd_infected              ep=0xe400     sot=0x10df0   
additional_cs/e1i1/pvs_infected              ep=0xe5d0     sot=0x10d20   
additional_cs/e1i1/strip_crle_infected       ep=0xe300     sot=0x1126c   
files=0007; detected=0007

7.3. Scan segments

This is the output of Scan segments (i); only the last few lines of output are shown.

Output: out/sparc-sunos5.9/scanner/segment_padding/big.static
files=15; ok=15; det_page=0; det_align=0; min=0x10003; max=0x10003

Output: out/sparc-sunos5.9/scanner/segment_padding/big.dynamic
CHECK: 65536 > 65536; 0x10000 > 0x10000
CHECK: /usr/lib/ssh/sftp-server
CHECK: src/scanner/segment_padding/action.inc#17
CHECK: (delta) > (0x10000)
CHECK: 65536 > 65536; 0x10000 > 0x10000
CHECK: /usr/lib/ssh/sshd
CHECK: src/scanner/segment_padding/action.inc#17
CHECK: (delta) > (0x10000)
CHECK: 65536 > 65536; 0x10000 > 0x10000
files=928; ok=922; det_page=6; det_align=288; min=0x03a6; max=0x11fe8

On this installation at least 922 + 15 files are possible targets for Segment padding infection. So on to all infected executables created from the sources of this document. Again only the last few lines of output is shown. It's enough to see that all infected files are detected.

Output: out/sparc-sunos5.9/scanner/segment_padding/small.static
CHECK: segment_padding/e1i1/sync_infected
CHECK: src/scanner/segment_padding/action.inc#17
CHECK: (delta) > (0x10000)
CHECK: 61443 > 65536; 0xf003 > 0x10000
files=1; ok=1; det_page=0; det_align=1; min=0xf003; max=0xf003

Output: out/sparc-sunos5.9/scanner/segment_padding/small.dynamic
CHECK: 3 == 2; 0x3 == 0x2
CHECK: additional_cs/e1i1/pvs_infected
CHECK: src/one_step_closer/get_seg.inc#25
CHECK: (nr_load) == (2)
CHECK: 3 == 2; 0x3 == 0x2
CHECK: additional_cs/e1i1/strip_crle_infected
CHECK: src/one_step_closer/get_seg.inc#25
CHECK: (nr_load) == (2)
CHECK: 3 == 2; 0x3 == 0x2
files=7; ok=3; det_page=4; det_align=3; min=0xf003; max=0xfb5c

7.4. A kingdom for a shell

I want to demonstrate infection methods on a shell. The usual suspect is /bin/sh. But on some systems that particular executable is not vulnerable to Segment padding infection. A systematic search for targets starts with extraction of pure file names from the scanner logs.

Source: pre/sparc-sunos5.9/scanner/find-ok.sh
#!/usr/xpg4/bin/sh
scanner=${1:-segment_padding}
prefix=$2
for src in out/sparc-sunos5.9/scanner/$1/big.*.full
do
  /usr/xpg4/bin/sed -ne 's/ \.\.\. .* Ok$//p' \
  < ${src} > ${src%.full}.ok
done
/usr/bin/wc -l out/sparc-sunos5.9/scanner/$1/*.ok

Output: out/sparc-sunos5.9/scanner/segment_padding/find-ok
     922 out/sparc-sunos5.9/scanner/segment_padding/big.dynamic.ok
      15 out/sparc-sunos5.9/scanner/segment_padding/big.static.ok
     937 total

These lists can be searched for acceptable file names.

Source: pre/sparc-sunos5.9/scanner/find-shell.sh
#!/usr/xpg4/bin/sh
scanner="$1"
/usr/xpg4/bin/grep -h -f ./src/scanner/find-shell.lst \
	out/sparc-sunos5.9/scanner/${scanner}/*.ok
exit 0

Source: src/scanner/find-shell.lst
bin/ash\>
bin/bash\>
bin/bsh\>
bin/csh\>
bin/ksh\>
bin/nash\>
bin/sash\>
bin/sh\>
bin/tcsh\>

And the winner is …

Output: out/sparc-sunos5.9/scanner/segment_padding/find-shell
/usr/bin/csh
/usr/bin/sh
/usr/bin/bash
/usr/bin/tcsh
/sbin/sh

7.5. Food for segment padding

This is the output of Food for segment padding (i)

Output: out/sparc-sunos5.9/scanner/segment_padding/infect
/usr/bin/csh
/sbin/sync
/usr/bin/crle

To avoid any suspicion of inadequate paranoia another test with file.

Output: out/sparc-sunos5.9/scanner/segment_padding/infect.filetype
/usr/bin/csh:   ELF 32-bit MSB executable SPARC Version 1, dynamically
linked, stripped
/sbin/sync:     ELF 32-bit MSB executable SPARC Version 1, statically
linked, stripped
/usr/bin/crle:  ELF 32-bit MSB executable SPARC Version 1, dynamically
linked, stripped

7.6. Scan file size

No detected system files is a strong indication that the heuristic is working. The reverse test requires another infection method, the "File virus". Not implemented, yet. Note that the diagnostics below are issued by function target_get_seg (i), not Scan file size (i).

Output: out/sparc-sunos5.9/scanner/filesize/small.dynamic
CHECK: 3 == 2; 0x3 == 0x2
CHECK: additional_cs/e1i1/pvs_infected
CHECK: src/one_step_closer/get_seg.inc#25
CHECK: (nr_load) == (2)
CHECK: 3 == 2; 0x3 == 0x2
CHECK: additional_cs/e1i1/strip_crle_infected
CHECK: src/one_step_closer/get_seg.inc#25
CHECK: (nr_load) == (2)
CHECK: 3 == 2; 0x3 == 0x2
files=7; ok=3; detected=4