huawei

Jimmy Hess mysidia at gmail.com
Fri Jun 14 02:57:50 UTC 2013


On 6/13/13, Scott Helms <khelms at zcorum.com> wrote:
> Targeted how without an active C&C system?

How have you determined that there is not one?

Conceptually, the "simplest"  backdoored router,  could have a
mechanism, where crafted packets that would ordinarily be forwarded
on,  contain some "magic bit pattern" in the source address or other
parameter,   that cause the packet to bypass ACLs and be punted
directly to software.

So the simplest conceivable C&C system,  could be  "one guy"
checking if random IP addresses  they have personally decided are
interesting,  are behind a backdoored router.

By sending a crafted port 53 DNS request,   with some encrypted
material  with a digitally signed hash based on a timestamp,  the
source IP, and the destination IP being probed.

And waiting for the magicaly structured "ICMP Destination
unreachable/Admin prohibited"  error reply packet,   containing some
covert bit pattern  confirming the presence and system identification
of a backdoored unit  on the path  to the 'interesting'  remote host.

--
-JH




More information about the NANOG mailing list