ANTI-BO.txt version 0.1.2
* Skip to there for quick instructions
This file is intended to:
1) Familiarize the populace with the trojan: Back Orifice
2) Enable the reader to recognize if they are infected
3) Show how to identify the pertinent files
4) Show how to delete them
5) Explain the effects BO has on your system
00 Table of Contents
What is Back Orifice?...........................................01
How does Back Orifice work?.....................................02
Finding out if you are infected.................................03*
Finding the Back Orifice files..................................04*
Deleting the files..............................................05*
01 What is Back Orifice?
Back Orifice was published by the Cult of the Dead Cow for the "benign"
purpose of making a simple and efficient client/server relationship
between two computers.
Of course, we all know it's just another trojan, but with little to no
knowledge, the average newbie hacker can take over your entire system
and make it do their bidding.
02 How does Back Orifice work?
Imagine if you will. A person, much like you or me, goes to the CDC
website and downloads bo120.zip. They unzip it, and read the readme.
They simply rename boserve.exe (the trojan) to an innocent sounding name.
Then they run BOCONFIG. This gives them the following options:
* When the trojan is run, what name to hide itself under
* What port to open
* What registry name to us
* An encryption password
* Plugin to run
* File to attach
We really only need to be concerned about the first two, but I will dis-
cuss the latter in a moment.
Once boserve.exe (or innocent sounding name) is configured (btw, the
name it can hide itself under can be any extension, so don't be looking
for exe, com, dll, and vxd only) the person will either start sending it
to people just like that, or they'll take apart legitimate zip files and
add it to the setup routine.
When you (the victim) receive the file, and are tricked into running it,
here's what happens.
1) Boserve looks at it's configuration, and extracts the full trojan
under the name it's been told to use, and places it in
C:\WINDOWS\SYSTEM (in this version, that's the default directory)
2) Edits your registry and gives itself a valid name.
3) Loads itself into memory and makes itself a lowend level program.
(Loaded on startup, but not shown in Task Manager)
4) Opens a listening port on your internet connection
Once this is done, everytime you are on the net, you are a potential
target. DO NOT think that if you are not on irc you can't be hit.
BO has a nifty addition which scans entire subnets, so if the "elite
hacker" types in the first 3 sections of an ip, he can scan all 255
people using it.
03 -- Finding out if your infected
If you skipped to this section, you are in a hurry.
1) Open a dos prompt
2) type: NETSTAT -a -n
This will list all your connections and open ports.
If you see an open UDP connection under the following criteria:
1) The port of the UDP is 31337, 666, 411 (can be others, most common)
or
2) The ip of the UDP is 0.0.0.0
You are infected.
If you cannot access netstat.exe, arp.exe, or other network identifying
programs you are probably infected and the "hacker" has melted them.
If you cannot use netstat, open FIND in Windows 95/98 and look for
windll.dll (should be in C:\WINDOWS\SYSTEM
Note that not all UDP connections with 0.0.0.0 mean you are infected,
try to find someone in #backorifice who will scan you to make sure.
(Undernet)
04 -- Identifying the files that are ruining your life.
There are several ways, the safest is to download anti-gen or something,
but in all likelyhood, downloading a helper while being attacked on the
net isn't the brightest thing in the world.
My main two methods:
1) Search for the file windll.dll in C:\WINDOWS\SYSTEM, if you find it,
use method two.
2) Open FIND again, and set the directory for C:\WINDOWS\SYSTEM
Go to Advanced, and put: bofile in the search for text box.
3) Open a dos prompt
Switch to C:\WINDOWS\SYSTEM
(CD SYSTEM)
Type: DIR /OS /P and go down until you reach the sizes that are 124k
Open the files and if you see a part that looks like this:
I/O control operation- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
Then that file is one of the ones that need to be deleted.
(Note that the above is included in many legitimate VC++ applications,
so only delete the ones that are 123-125k)
05 -- Deleting the $&@*#itch BO files
Most likely you cannot delete the files if you are running Windows, since
that would be an access violation to kill a file in use.
Restart in MS-DOS and blow away the files you've indentified.
For the ms-dos illiterate, type del /? for deletion instruction
WINDLL.DLL is a Back Orifice Library, delete it with prejudice.
Registry: Open your registry data by Start:Run and the file name is
regedit
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
Use your own discretion when deleting the values, please note that it is
not actually necessary to delete them after deleting BO. I urge you to
use a professional program.
Afterword:
This is the first version of Anti-BO.txt
I'd like to thank Vampress, for inspiring me to write this. She constantly
sends BO to IRC newbies and here's her static IP:
168.95.4.10 (Vampress/S|NBAUD)
Thanks go to beerman and sk8masta, I got more information from helping them
rid themselves of BO than anywhere else.
If you have further questions about BO and it's effects, I can usually
be found on Undernet, under the name: Xenos, Xenocide, Xenoscide
9-22-98 Xenoscide daemus@digicron.com
Last Updates: 9-21-98
9-20-98
Legal Information:
This text file is not copyrighted. It is my wish that it be freely
distributed as fast and as far as possible. As for copying and trying
to the credit; if you are that low of a human being go for it. You'll
make yourself seem stupid and ignorant when people start wondering why
my version was out first, but that is your problem. =)
If you require any help, or have further questions: email me at
daemus@digicron.com
I can usually be found in #backorifice on Undernet (bo removal channel)
People to trust: El-Jai, VVatchdog, and nuclei (make sure they are from
#backorifice, heh)