ﺖﺸﻬﺒﻳﺩﺭﺍ ﻝﻭﺍ ١٣٨٣: Cyrus Peikari, Seth Fogie: ﺎﺑ ﻩﺪﺷ ﻲﺑﺎﻳ ﻪﺸﻳﺭ Tkbot.R00T.Edition.Final
ﺖﺸﻬﺒﻳﺩﺭﺍ ﻝﻭﺍ ١٣٨٣: Cyrus Peikari, Seth Fogie: ﺎﺑ ﻩﺪﺷ ﻲﺑﺎﻳ ﻪﺸﻳﺭ Tkbot.R00T.Edition.Final
ﻫﻤـﻪ ﭼـﻴﺰ ﺑـﺎ ﺗﻤﺎﺱ ﺳﺎﺩﻩ ﻳﻚ ﻣﺸﺘﺮﻱ ﻧﮕﺮﺍﻥ ﺷﺮﻭﻉ ﺷﺪ .ﺩﻟﻬﺮﻩ ﻭ ﺷﻜﺎﻳﺖ ﻣﺸﺘﺮﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ
ﺍﻓـﺖ ﺳﺮﻋﺖ ﺍﺗﺼﺎﻝ ﺩﺳﺘﮕﺎﻩ ﺍﻭ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺩ .ﺑﺮ ﺍﺳﺎﺱ ﺍﻳﻦ ﻣﻄﻠﺐ ﺳﺎﺩﻩ ﺑﻮﺩ ﻛﻪ ﻣﻦ ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﺘﻮﺟﻪ
ﺷـﺪﻡ ﻛﻪ ﺳﺮﻭﺭ ﺍﺻﻠﻲ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻜﺮﺭﺍ ﻗﺮﺑﺎﻧﻲ ﻭﻳﺮﻭﺱﻫﺎ ﻭ ﻫﻜﺮﻫﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ .ﻫﻜﺮﻫﺎ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺁﺳﻴﺐﭘﺬﻳﺮ ،ﺗﻮﺍﻧﺴﺘﻪ ﺑﻮﺩﻧﺪ ﺑﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻦ ،IISﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺸﺘﺮﻱ ﺭﺍ ﺩﺭ
ﺍﺧﺘـﻴﺎﺭ ﮔﺮﻓﺘﻪ ﻭ ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺁﻥ ﺭﺍ ﺑﻪ ﻳﻚ ﺳﺮﻭﺭ warezﻛﻪ ﻣﻴﺰﺑﺎﻥ ﺑﻴﺶ ﺍﺯ ٣ﮔﻴﮕﺎﺑﺎﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ
ﻏﻴﺮﻣﺠﺎﺯ ﺍﺳﺖ ﺗﺒﺪﻳﻞ ﻛﻨﻨﺪ.
ﺩﺭ ﻧﺘـﻴﺠﻪ ﺁﻧﭽـﻪ ﺩﺭ ﺑﺎﻻ ﮔﻔﺘﻪ ﺷﺪ ،ﺑﻪ ﻣﺸﺘﺮﻱ ﻣﺰﺑﻮﺭ ﮔﻔﺘﻢ ﻛﻪ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺎﻳﺪ ﺑﺎ ﻧﺼﺐ ﺗﻤﺎﻡ
Service Packﻫـﺎﻱ ﺿﺮﻭﺭﻱ ،ﻓﻮﺭﺍ ﺳﺮﻭﺭ ﺭﺍ ﺗﻤﻴﺰ ﻛﺮﺩﻩ ﻭ ﺩﻭﺑﺎﺭﻩ ﺁﻥ ﺭﺍ ﺍﺯ ﺍﺑﺘﺪﺍ ﺍﺟﺮﺍ ﻛﻨﺪ .ﺑﻌﺪ ﺍﺯ ﺑﺤﺚ
ﻛـﺮﺩﻥ ﺑـﺮ ﺳـﺮ ﺗﻤﻬـﻴﺪﺍﺕ ﻣﺤﺎﻓﻈﺘـﻲ ﻣﻤﻜـﻦ ﺑـﺎ ﻣﺸﺘﺮﻱ ،ﺳﺮﻳﻌﺎ ﺑﻪ ﻛﻨﺪ ﻭ ﻛﺎﻭ ﺭﺍﻩ ﺩﻭﺭ ﻓﺎﻳﻠﻬﺎﻱ ﺳﺮﻭﺭ ﻭ
ﺟﻤـﻊﺁﻭﺭﻱ ﺩﺭ ﺣـﺪ ﻣﻘـﺪﻭﺭ ﺍﻃﻼﻋـﺎﺕ ﻣﻤﻜـﻦ ﺍﺯ ﻣﺘﺪﻫﺎ ﻭ ﺣﻘﻪﻫﺎﻳﻲ ﻛﻪ ﻫﻜﺮﻫﺎ ﺑﺮﺍﻱ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ
ﺳـﺮﻭﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺑﻮﺩﻧﺪ ،ﻧﻤﻮﺩﻡ .ﺑﻪ ﻫﺮ ﺣﺎﻝ ،ﭘﺲ ﺍﺯ ﺣﺪﻭﺩﺍ ﺩﻭ ﺳﺎﻋﺖ ﻛﻨﺪ ﻭ ﻛﺎﻭ ،ﺑﻪ ﺳﺮﻋﺖ ﻣﺘﻮﺟﻪ
ﺍﻳـﻦ ﻣﻄﻠـﺐ ﺷـﺪﻡ ﻛﻪ ﻫﻢ ﺳﺮﻭﺭ ﻭﺏ ﻭ ﻫﻢ ﺑﺮﻧﺎﻣﻪ ﺭﺧﻨﻪ ﭘﺸﺘﻲ ﻣﻦ ) ، (Back Doorﻫﺮ ﺩﻭ ﺩﻳﮕﺮ ﭘﺎﺳﺨﻲ
ﻧﻤﻲﺩﻫﻨﺪ ﻭ ﻓﻌﺎﻟﻴﺘﻲ ﻧﺪﺍﺭﻧﺪ.
ﺍﻳـﻨﺠﺎ ﺟﺎﻳـﻲ ﺍﺳـﺖ ﻛـﻪ ﺍﺯ ﺍﻳـﻦ ﻗﻀﻴﻪ ﻭﺍﻗﻌﻲ ﺑﺮﺩﺍﺷﺖ ﻣﻲﻛﻨﻴﻢ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺪﻭﻥ ﻫﻴﭽﮕﻮﻧﻪ ﺣﺮﻑ
ﺍﺿﺎﻓﻪﺍﻱ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﺗﺎ ﺩﺍﺳﺘﺎﻥ ﺭﺍ ﺍﺩﺍﻣﻪ ﺩﻫﻴﻢ.
1 www.WebSecurityMgz.com
ﺭﻭ ﺩﺭ ﺭﻭﻱ ﺍﻧﻮﺍﻉ ﻫﻜﺮ
ﺑﻄﻮﺭ ﺟﺎﻟﺒﻲ ﻋﻤﻞ ﺍﺳﻜﻦ ﭘﻮﺭﺕﻫﺎ ،ﻫﻤﺎﻥ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕﻫﺎﻱ ﺑﺎﺯ ﻗﺒﻠﻲ ﺭﺍ ﺑﻪ ﺍﺿﺎﻓﻪ ﺩﻭ ﭘﻮﺭﺕ 1297
ﻭ 65130ﻭ ﺑﺎ ﻛﺎﻫﺶ ﺩﻭ ﭘﻮﺭﺕ ) 80ﺳﺮﻭﺭ ﻭﺏ( ﻭ 99ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ncx99.exeﺍﺳﺖ ،ﺑﺎﺯﻣﻲﮔﺮﺩﺍﻧﺪ.
ﺑـﺎ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﺍﻳﻨﻜﻪ ﻫﻴﭻ ﺭﺍﻩ ﺩﻳﮕﺮﻱ ﻧﺪﺍﺷﺘﻢ ،ﺗﺼﻤﻴﻢ ﮔﺮﻓﺘﻢ ﺗﺎ ﺍﺯ ﻃﺮﻳﻖ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ Telnet
ﻭ FTPﺑـﻪ ﺍﻳـﻦ ﺩﻭ ﭘـﻮﺭﺕ ﺟﺪﻳﺪ ﻣﺘﺼﻞ ﺷﻮﻡ ﺗﺎ ﺑﺒﻴﻨﻢ ﺁﻧﻬﺎ ﭼﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﻣﻲﮔﺮﺩﺍﻧﻨﺪ .ﺑﺎ ﺷﮕﻔﺘﻲ ﺑﻪ
ﻧﻈﺮ ﻣﻲﺭﺳﻴﺪ ﻛﻪ ﺳﺮﻭﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎﺯﻫﻢ ﻗﺮﺑﺎﻧﻲ ﻫﻜﺮ ﺩﻳﮕﺮﻱ ﺷﺪﻩ ﺍﺳﺖ )ﻫﻤﺎﻧﻄﻮﺭﻱ ﻛﻪ ﺩﺭ ﺷﻜﻞ ﺷﻤﺎﺭﻩ
١ﻣـﻲﺑﻴﻨـﻴﺪ( .ﺑـﺎ ﺍﻳـﻦ ﺣـﺎﻝ ﺩﺭ ﺍﻳـﻦ ﻣﻮﺭﺩ ،ﻫﻜﺮ ﺑﻪ ﭘﺎﻙ ﻛﺮﺩﻥ ﺭﻭﺵﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻫﻜﺮﻫﺎﻱ ﺩﻳﮕﺮ ﺑﺮﺍﻱ
ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺮﻭﺭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﻮﺩ ،ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺍﺳﺖ.
ﺷﻜﻞ ١
ﺍﺗﺼﺎﻝ TelNetﺑﻪ ﭘﻮﺭﺕ 65130ﺩﺭ ﺳﺮﻭﺭ ﻫﻚ ﺷﺪﻩ
ﺑﻌـﺪ ﺍﺯ ﭼﻨﺪﻳـﻦ ﻣـﻮﺭﺩ ﺗـﻼﺵ ﺑـﺮﺍﻱ ﺣـﺪﺱ ﺯﺩﻥ ﻛﻠﻤﺎﺕ ﻋﺒﻮﺭ ﮔﻮﻧﺎﮔﻮﻥ ﻣﺘﺪﺍﻭﻝ ،ﺩﻭﺑﺎﺭﻩ ﺑﺎ ﻣﺪﻳﺮ
ﺳـﺮﻭﺭ ﺗﻤـﺎﺱ ﮔﺮﻓـﺘﻢ ﺗـﺎ ﺩﺭﺑﺎﺭﻩ ﺁﺧﺮﻳﻦ ﺍﺗﻔﺎﻗﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﻭﻱ ﺑﺎﺧﺒﺮ ﺷﻮﻡ .ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﺍﻳﻦ ﺗﻤﺎﺱ ﺍﺯ ﺍﻭ
ﺑﺮﺍﻱ ﻛﻨﺪ ﻭ ﻛﺎﻭ ﺳﺮﻭﺭ ﺩﺭ ﺳﺎﻳﺘﻲ ﻛﻪ ﺩﺳﺘﮕﺎﻩ ﺩﺭ ﺁﻧﺠﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﻮﺩ ﺍﺟﺎﺯﻩ ﺧﻮﺍﺳﺘﻢ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺮﺩﻡ
2 www.WebSecurityMgz.com
ﺭﻭ ﺩﺭ ﺭﻭﻱ ﺍﻧﻮﺍﻉ ﻫﻜﺮ
ﺗـﺎ ﺍﻃﻼﻋﺎﺗـﻲ ﺍﺯ ﺷﻨﺎﺳـﻪ ﻋـﺒﻮﺭ ) (Accountﻣﺪﻳـﺮ ﺭﺍ ﻛـﻪ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺳﺮﻭﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺳﺖ ﺩﺭ
ﺍﺧﺘﻴﺎﺭﻡ ﻗﺮﺍﺭ ﺩﻫﺪ.
ﻫﻨﮕﺎﻣـﻲ ﻛﻪ ﺑﻪ ﺳﺎﻳﺖ ﺭﺳﻴﺪﻡ ،ﻓﻮﺭﺍ ﻛﺎﺭﮔﺎﻩ ﺭﺍ ﺑﺮﭘﺎ ﻛﺮﺩﻡ .ﺍﺯ ﺁﻧﺠﺎﻳﻲ ﻛﻪ ﺳﺎﻳﺖ ﺩﺭ ﻋﻮﺽ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺷﺒﻜﻪ ﺳﻮﺋﻴﭽﻲ ،ﺍﺯ ﺷﺒﻜﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩ ﺑﺮﺍﺣﺘﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻫﻤﺮﺍﻫﻢ ﺑﻪ
ﺷﺒﻜﻪ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﻃﺮﻳﻖ ﻣﻲﺗﻮﺍﻧﺴﺘﻢ ﺩﺯﺩﻱ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﻪ ﺭﺍ ﺁﻏﺎﺯ ﻛﻨﻢ.
ﻫـﺎﺏﻫﺎ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺑﻪ ﺳﻮﻱ ﻫﻤﻪ ﭘﻮﺭﺕﻫﺎ ﻣﻨﺘﺸﺮ ﻛﺮﺩﻩ ﻭ ﺑﻪ ﻫﻤﻪ ﺍﺑﺰﺍﺭﻫﺎ ﺍﻳﻦ ﺍﺟﺎﺯﻩ ﺭﺍ ﻣﻲﺩﻫﻨﺪ ﺗﺎ
ﺧـﻮﺩ ﺗﺸـﺨﻴﺺ ﺩﻫـﻨﺪ ﻛـﻪ ﻛﺪﺍﻣﻴﻚ ﺍﺯ ﺑﺴﺘﻪﻫﺎ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ .ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ،ﺳﻮﺋﻴﭻﻫﺎ ﺑﺮ
ﺁﺩﺭﺱ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ ﻫﺮ ﺍﺑﺰﺍﺭ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﻧﻈﺎﺭﺕ ﻛﺮﺩﻩ ﻭ ﻓﻘﻂ ﺩﺭ ﺻﻮﺭﺗﻲ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﭘﻮﺭﺗﻲ
ﻣﻲﻓﺮﺳﺘﻨﺪ ﻛﻪ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﺪ ﺑﻪ ﺁﻥ ﭘﻮﺭﺕ ﺑﺮﻭﺩ .ﺍﻳﻦ ﺍﻣﺮ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺑﺮ ﺭﻭﻱ ﻳﻚ ﺷﺒﻜﻪ ﺳﻮﺋﻴﭽﻲ
ﺭﺍ ﺑﺎ ﻛﻤﻲ ﻣﺸﻜﻞ ﻭ ﭼﺎﻟﺶ ﻣﻮﺍﺟﻪ ﻣﻲﺳﺎﺯﺩ.
ﻫـﺪﻑ ﻣـﻦ ﺍﻳـﻦ ﺑﻮﺩ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻛﻨﻢ ﻭ ﺳﭙﺲ ﺩﺭ ﻣﻮﻋﺪ ﻣﻨﺎﺳﺐ ﺁﻧﻬﺎ ﺭﺍ ﺁﻧﺎﻟﻴﺰ ﻛﻨﻢ.
ﺑـﺮﺍﻱ ﺗﺴـﻬﻴﻞ ﺍﻳﻦ ﻛﺎﺭ Tcpdump ،ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻡ ﻛﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ Linuxﺑﺮ ﺭﻭﻱ ﺁﻥ ﺩﺭ ﺣﺎﻝ
ﺍﺟﺮﺍ ﺑﻮﺩ ،ﺍﺟﺮﺍ ﻛﺮﺩﻩ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩ ﺍﻃﻼﻋﺎﺕ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺑﺮ ﺭﻭﻱ ﻫﺎﺭﺩ ﺗﻈﻴﻢ ﻛﺮﺩﻡ .ﺑﺎ
ﺍﻧﺠـﺎﻡ ﺍﻳﻦ ﻛﺎﺭ ،ﺷﺮﻭﻉ ﺑﻪ ﺟﺴﺘﺠﻮ ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ،ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﻭ ﺳﺮﻭﻳﺲﻫﺎﻱ ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍ ﻭ ﺍﺟﺮﺍ
ﺷﺪﻩ ﺳﺮﻭﺭ ﻧﻤﻮﺩﻡ.
3 www.WebSecurityMgz.com
ﺭﻭ ﺩﺭ ﺭﻭﻱ ﺍﻧﻮﺍﻉ ﻫﻜﺮ
ﻣـﻦ ﺑـﺎ NetStatﻛـﻪ ﺍﻃﻼﻋﺎﺗـﻲ ﺭﺍﺟـﻊ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮ ﺧﻮﺩ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ ،ﺷﺮﻭﻉ
ﻛـﺮﺩﻡ .ﻫﻤـﺎﻥﻃـﻮﺭ ﻛـﻪ ﺩﺭ ﺷـﻜﻞ ﺷـﻤﺎﺭﻩ ٢ﻣـﻲﺑﻴﻨﻴﺪ ،ﭼﻨﺪﻳﻦ ﺍﺗﺼﺎﻝ ﻣﺸﻜﻮﻙ ﺑﺴﻴﺎﺭ ﻭﺍﺿﺢ ﺑﻮﺩﻧﺪ )ﺑﻪ
ﺍﺭﺗـﺒﺎﻃﺎﺕ ﺑـﺎ ﺳـﺮﻭﺭﻫﺎﻱ IRCﺗﻮﺟـﻪ ﻛﻨـﻴﺪ ، (.ﺳﭙﺲ ﺑﻪ ﻓﻬﺮﺳﺖ Taskﻛﻪ ﻟﻴﺴﺖ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺩﺭ ﺣﺎﻝ
ﺍﺟﺮﺍﻱ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻧﮕﺎﻫﻲ ﺍﻧﺪﺍﺧﺘﻢ .ﻣﺘﻮﺟﻪ ﻳﻚ ﺳﺮﻭﻳﺲ ﻏﻴﺮ ﻣﻌﻤﻮﻝ ﺑﺎ ﻧﺎﻡ FireDaemon
ﺷـﺪﻡ .ﺑﻌـﺪ ﺍﺯ ﺍﻧﺠـﺎﻡ ﺟﺴـﺘﺠﻮﻳﻲ ﻛـﻪ ﺩﺭ ﻫﻤـﺎﻥ ﻣﻮﻗـﻊ ﺑﻪ ﺻﻮﺭﺕ Onlineﺍﻧﺠﺎﻡ ﺩﺍﺩﻡ ﻣﺘﻮﺟﻪ ﺷﺪﻡ ﻛﻪ
FireDaemonﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻤﻜﻲ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﻫﺮ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﺍﺳﻜﺮﻳﭙﺖ )ﻣﺎﻧﻨﺪ
(Python ، Java ، Perl ، BAT/CMDﺫﺍﺗـﺎ ﻣـﺮﺑﻮﻁ ﺑﻪ Win32ﺭﺍ ﺑﻄﻮﺭ ﻣﺠﺎﺯﻱ ﻣﺎﻧﻨﺪ ﻳﻚ ﺳﺮﻭﻳﺲ
NT/2K/XPﺍﺟـﺮﺍ ﻭ ﻧﺼـﺐ ﻛﻨـﻴﺪ .ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭ ،ﺭﻭﻳﺎﻫﺎﻱ ﻳﻚ ﻫﻜﺮ ﺭﺍ ﺑﻪ ﺣﻘﻴﻘﺖ ﺗﺒﺪﻳﻞ
ﻣﻲﻛﻨﺪ .ﺑﺎ ﻧﺼﺐ ﻛﺮﺩﻥ ﻳﻚ Root Kitﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﺮﻭﻳﺲ ،ﻫﻜﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻄﻮﺭ ﺳﺎﺩﻩﺍﻱ ﺗﻀﻤﻴﻦ ﻛﻨﺪ ﻛﻪ
Root Kitﺣﺘﻲ ﺩﺭ ﺻﻮﺭﺕ Rebootﺷﺪﻥ ﺳﺮﻭﺭ ﻫﻢ ﺍﺟﺮﺍ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺷﻜﻞ ٢
ﻧﺘﺎﻳﺞ ﺑﺎﺯﮔﺸﺘﻲ NetStatﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﻫﻚ ﺷﺪﻩ.
ﺩﺭ ﻧﻬﺎﻳـﺖ ﺷـﺮﻭﻉ ﺑـﻪ ﻛﺎﻭﺵ ﺩﺭﻭﻥ ﺳﺮﻭﺭ ﻛﺮﺩﻡ ﺗﺎ ﺑﺒﻴﻨﻢ ﻣﻲﺗﻮﺍﻥ ﭼﮕﻮﻧﮕﻲ ﻭﺭﻭﺩ ﻫﻜﺮ ﺭﺍ ﺑﺪﺳﺖ
ﺁﻭﺭﺩ ﻳﺎ ﺧﻴﺮ .ﺑﺎ Logﻫﺎﻱ ﺳﺮﻭﺭ ﻭﺏ ﺷﺮﻭﻉ ﻛﺮﺩﻩ ﻭ ﻭﺭﻭﺩﻱﻫﺎﻳﻲ ﺭﺍ ﺩﺭ ﻟﻴﺴﺖ ١ﭘﻴﺪﺍ ﻛﺮﺩﻡ.
4 www.WebSecurityMgz.com
ﺭﻭ ﺩﺭ ﺭﻭﻱ ﺍﻧﻮﺍﻉ ﻫﻜﺮ
ﺑـﺎ ﺩﺭ ﻧﻈـﺮ ﮔﺮﻓﺘﻦ ﻭﺭﻭﺩﻱﻫﺎ ﺑﻪ ﺻﻮﺭﺕ ﻳﻚ ﻣﺴﻴﺮ ،ﺑﻪ ﭘﻮﺷﻪﺍﻱ ﻣﺸﺨﺺ ﺭﺳﻴﺪﻩ ﻭ ﺩﺭ ﺁﻧﺠﺎ ﺳﻪ
ﻓـﺎﻳﻞ tmp2.cmd ، tmp2ﻭ httpobdc.dllﺭﺍ ﻳﺎﻓﺘﻢ .ﺩﻭ ﻓﺎﻳﻞ ﺍﻭﻝ ﺭﺍ ﺩﺭ ﺑﺮﻧﺎﻣﻪ NotePadﺑﺎﺯ ﻛﺮﺩﻩ ﻭ
ﻓﻬﻤـﻴﺪﻡ ﻛـﻪ ﺍﺯ ﺁﻥ ﺩﻭ ،ﻳﻜـﻲ ﻓﺎﻳﻞ ﺩﺳﺘﻮﺭﺍﺕ Ftpﺑﻮﺩﻩ ﻭ ﺩﻳﮕﺮﻱ ﻳﻚ ﻓﺎﻳﻞ ﺩﺳﺘﻪﺍﻱ ) (Batchﻣﻲﺑﺎﺷﺪ ﻛﻪ
ﻓﺎﻳﻞﻫﺎﻱ tk1.exeﻭ ) httpodbc.dllﻓﺎﻳﻠﻲ ﻛﻪ ﻋﻤﻮﻣﺎ ﺗﻮﺳﻂ ﻛﺮﻡ Nimdaﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ(
ﺭﺍ downloadﻛـﺮﺩﻩ ﺍﺳـﺖ .ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻓﺎﻳﻞ ﺩﺳﺘﻮﺭﺍﺕ Ftpﺑﻪ ﺳﺮﻭﺭﻱ ﺍﺷﺎﺭﻩ ﺩﺍﺷﺘﻨﺪ ﻛﻪ ﺍﺯ ﺷﻨﺎﺳﻪﺍﻱ
ﻋﻤﻮﻣـﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩ ،ﻣﻦ ﻫﻢ ﺑﻪ ﺳﺮﻭﺭ Ftpﻛﻪ ﻫﻨﻮﺯ ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍ ﺑﻮﺩ ﻭﺍﺭﺩ ﺷﺪﻩ ﻭ ﻳﻚ ﻛﭙﻲ ﺍﺯ ﻓﺎﻳﻞ
ﺑﺮﺍﻱ ﻛﻨﺪ ﻭ ﻛﺎﻭﻫﺎﻱ ﺁﻳﻨﺪﻩ ﺧﻮﺩ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻡ.
ﺑـﺎ ﺍﺩﺍﻣـﻪ ﺟﺴﺘﺠﻮﻱ ﺧﻮﺩ ﺩﺭ ﺳﺮﻭﺭ ،ﺑﺮﺍﻳﻢ ﺍﺛﺒﺎﺕ ﺷﺪ ﻛﻪ ﻣﺸﺨﺼﺎ ﻫﻚ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﻟﻴﻞ Offline
ﺑـﻮﺩﻥ ﺳـﺮﻭﺭ ﻭﺏ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺎﺯ ﺑﻮﺩﻥ ﺩﻭ ﭘﻮﺭﺕ ﺟﺪﻳﺪ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﺭ ﺑﻮﺩﻩ ﺍﺳﺖ .ﺍﻳﻦ ﺗﺼﻮﺭ ﺑﺮ ﺍﺳﺎﺱ
ﺍﻳـﻦ ﻭﺍﻗﻌﻴـﺖ ﺷـﻜﻞ ﮔﺮﻓـﺖ ﻛـﻪ ﻋﻤﻞ Downloadﻓﺎﻳﻞ tk1.exeﺛﺎﻧﻴﻪﻫﺎﻳﻲ ﻗﺒﻞ ﺍﺯ ﺧﺎﻟﻲ ﺷﺪﻥ logﻓﺎﻳﻞ
ﺳـﺮﻭﺭ ﻭﺏ ﺭﺥ ﺩﺍﺩﻩ ﺑـﻮﺩ ،ﻫﻤﭽﻨﻴﻦ ﺳﺮﻭﺭ Ftpﻛﻪ ﺩﺭ ﺁﻥ ﻣﻮﻗﻊ ﺑﺮ ﺭﻭﻱ ﭘﻮﺭﺕ 65130ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍ ﺑﻮﺩ،
ﻳﻚ ﻋﻤﻞ " "TK DISTROﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﺍﺩ.
ﺩﺭ ﺍﻳـﻦ ﺯﻣـﺎﻥ ،ﻣـﻦ ﺁﻣـﺎﺩﻩ ﺭﻓﺘـﻦ ﺑـﻪ ﺧﺎﻧـﻪ ﺷﺪﻡ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺯ NetStatﻭ
ﺍﻃﻼﻋﺎﺕ ﺟﺪﻳﺪ ﻛﺴﺐ ﺷﺪﻩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺎﻳﻞ ﻣﺒﻬﻢ TKﺣﺪﺱ ﻣﻲﺯﺩﻡ ﻛﻪ ﺍﻳﻦ ﻋﻤﻞ ﺑﺨﺼﻮﺹ ﻫﻚ ،ﻳﻚ ﺍﺳﺐ
ﺗـﺮﻭﺍﻱ ﻣﺮﻛـــﺐ Ftp/Back Door/IRCﺍﺳـﺖ ﻛـﻪ ﻫﻤﮕـﻲ ﺩﺭ ﻳـﻚ ﻓـﺎﻳﻞ ﺩﻗﻴﻖ ) (tk1.exeﺟﻤﻊﺁﻭﺭﻱ
ﺷﺪﻩﺍﻧﺪ .ﺑﻪ ﻫﺮﺣﺎﻝ ﺍﻳﻦ ﺗﺌﻮﺭﻱ ﺑﻪ ﻧﻈﺮ ﻣﻌﺘﺒﺮ ﻣﻲﺭﺳﻴﺪ.
5 www.WebSecurityMgz.com