关联漏洞
描述
An ssh honeypot with the XZ backdoor. CVE-2024-3094
介绍
# xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
**TODO**: hook the backdoor and/or sshd. log rsa keys for decryption.
notes:
- https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504
- https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01
- https://github.com/hamarituc/xz-backdoor
## Warning
**PLEASE run this on a separate isolated system. Docker is configured in a way that allows a threat actor to easily escape it.
Docker is only used to get all the shared libraries working and configured.**
## Installation
Install [notify](https://github.com/projectdiscovery/notify) by projectdiscovery using the following command:
```bash
go install -v github.com/projectdiscovery/notify/cmd/notify@latest
```
Run the following command to start the honeypot:
```bash
./monitor.sh DISCORD_WEBHOOK_URL
```
e.g.
```bash
./monitor.sh https://discord.com/api/webhooks/12345678909876/aaaaaaaa
```
This will use [notify](https://github.com/projectdiscovery/notify) to send all logs to a discord webhook.
## How it works
The vulnerable version of xz (5.6.1) and the liblzma linked version of sshd from the fedora repositories are ran in the configuration that activates the backdoor. Monitoring is provided by `bpftrace`, `strace`, `tcpdump`, and the `sshd` process itself.
- `bpftrace`
- Syscall monitoring and shared library hooking.
- `strace`
- Syscall montioring for the parent `sshd` process.
- `tcpdump`
- Capturing packets.
- `sshd`
- Login events (**NOTE** This will most likely not capture the login event for a bad actor as the backdoor uses `set_log_mask` to change the logging behaviour when the attacker attempts to login)
文件快照
[4.0K] /data/pocs/058e3c8614307eb4bd067ada1f1b80cdd2c1880a
├── [4.0K] container
│ └── [ 808] run.sh
├── [ 246] docker-compose.yml
├── [ 280] Dockerfile
├── [ 18K] LICENSE
├── [ 687] monitor.sh
└── [1.7K] README.md
1 directory, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。