A conspiracy hidden in the CCProxy agent software

Source: Internet
Author: User
The proxy server solves many problems for everyone, such as blocking hacker attacks and sharing the Internet over the LAN. In this article, we will discuss a vulnerability on the proxy server. I hope you will pay attention to it. To reveal this hidden "conspiracy" and let us know whether our proxy server has this vulnerability, We will simulate hacker attacks against this vulnerability, so that you can take appropriate security measures.

I. Agent software vulnerabilities

CCProxy has become the most popular proxy server software in China due to its ease of configuration and ease of use. It not only supports common HTTP and socks proxies, but also supports FTP and telnet agents that are not commonly used. It can also control the proxy's access permissions and set the user name and password for accessing the proxy server, which is very powerful.

This outstanding proxy software has recently exposed an overflow vulnerability that allows attackers to directly gain control over the proxy server. The CCProxy version involved in this vulnerability is currently very popular version 6.0, and all previous versions.

Software Materials
Software name: CCProxy
Software Version: 6.0
Authorization method: Shared Software
Software size: 820kb
: Http://www2.skycn.com/soft/1058.html

2. Test the CCProxy Server

To use the preceding vulnerabilities to control proxy servers, you must first determine whether the target proxy server is installed with CCProxy (figure 1 ).

Figure 1 CCProxy supports multiple Protocol proxies

Because the socks proxy service port of All proxy server software is "1080" by default, we can use it to find the proxy server and then confirm whether the server has CCProxy installed. After testing, the following detection methods are found to be more practical and reliable.

1. Scan

Use the port scanner superscan to scan for hosts with port 1080 enabled in the specified network segment. Open superscan and set the scan port range to "1080 ~" in the "all ports from" column ~ 1080 ", and then fill in the IP address segment to be scanned within the target IP address range. Click the start button to scan. Soon, you will find all hosts with port 1080 enabled in the IP address segment of the scan (figure 2 ). Select a host to check whether the CCProxy proxy is installed.

Figure 2 hosts with opened ports are marked with green hooks

2. Probe

By default, CCProxy uses "23" as the proxy port of the Telnet service and "2121" as the proxy port of the FTP service. We only need to perform information detection on these ports to find whether the target host is a CCProxy server.

Open the CMD command line window and use Telnet to connect to the target host. The command format is:
Telnet Destination IP port (for example, "Telnet 127.0.0.1 23 ")

If the target proxy server is in the password-free state of CCProxy (that is, the proxy username and password have not been set), the "CCProxy Telnet Server Ready" message appears "; if the target proxy server is in the CCProxy password status (that is, the proxy username and password have been set ), the user name will be prompted (the error message "User invalid" will be displayed after a few characters are entered "). This information is unique to the CCProxy agent software, so that you can easily determine whether CCProxy is installed on the target Proxy Server (Figure 3 ).

Figure 3 two running Modes of CCProxy

Iii. Attack the CCProxy Server

The above method is used to confirm that the target is the proxy server with CCProxy installed, then the following will begin to use the CCProxy overflow attack tool for overflow. Ccpx.exe "is an overflow attack tool that downloads ccproxyfrom the internet ". Open it in the CMD command line and you can see the HELP command:
Usage: ccproxyexp.exe [target_port]

"Target_ip" indicates the IP address of the target host, and "target_port" indicates the master port of CCProxy. The default value is "808 ".
Enter the attack command according to the parameter and prompt:
Is the Host IP address in the same network segment as the target host IP address? [Y/n] y
[+] Connection to 127.0.0.1: 808
[+] Send magic buffer...
[+] Connecting to cmd shell port...
Microsoft Windows 2000 [version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.
C: \ winnt \ System32
The overflow is successful, and the control of the proxy server is obtained (figure 4 ).

Figure 4 server control is successfully obtained after Overflow

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.