Author Topic: Morris Worm Source - a good starting point  (Read 92 times)

no1uno

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 681
Morris Worm Source - a good starting point
« on: January 08, 2012, 05:44:32 AM »
The original internet worm, the Morris Worm (circa 1988) - decompiled source code is attached - could conceivably serve as a base for writing an updated version. Fix it with a online password database/directory based upon a keylogger and isp (I'd lay money on there being no more than 100-odd passwords used by the bulk of people on any isp - which would alter regionally)  and use pretty much any of the windows vulnerabilities that keep getting found (on that note has anyone utilized the various explorer hacks?). Obviously alter the code enough to get it past the major anti-virus programs and obfuscate the hell out of it.

A good use would be to delete data held under various legislation worldwide by isp's to enable their internet browsing to be monitored and the data used as evidence. In that respect, a website "could" be envisaged where users would log in to target their own data. Obviously there would be serious concerns about security in that respect, but it would be useful. Another idea would be to search out and identify the specific products/machines being used in this effort by LE and target them.
« Last Edit: January 08, 2012, 05:59:31 AM by no1uno »
"...     "A little learning is a dang'rous thing;
    Drink deep, or taste not the Pierian spring:
    There shallow draughts intoxicate the brain,
    And drinking largely sobers us again.
..."

dream0n

  • Subordinate Wasp
  • ***
  • Posts: 204
Re: Morris Worm Source - a good starting point
« Reply #1 on: January 08, 2012, 06:23:10 AM »
Thank You...
Here is the basis for a botnet to take down facebook, as in that one unofficial AnonOp

Instructing a virus -worm-  to mutate randomly and quickly, then replicate into rarely used system folders, then send to all LAN computers and servers that were connected to at that time or within 10 minutes of implantation (with a log of previously used IPs, so as to not slow your connection), The virus would need to then, execute an idle until a trigger - which would be accessing facebook - at that point as long as the connection is live, packets are sent at a medium rate compared to the average connection speed - as to not affect consumer experience.   If facebook itself gave the worm to its users, having the worm hidden in a linked image paid for within facebook's ad campaign system, it would be amazing.
--The program would always need to run in low priority, have no kernel leaks, and be constantly mutating - so that no profile can be made - other than it infecting certain programs like internet explorer. --

Don't abuse stimulants for productivity ;)
off to bigger and better things - don't worry I will visit from time to time

Dr. Tox

  • In Stasis: See You In A Few Years!
  • Subordinate Wasp
  • ***
  • Posts: 145
Re: Morris Worm Source - a good starting point
« Reply #2 on: January 08, 2012, 06:31:38 AM »
You might find this board interesting if you haven't already found it: HackBB
http://clsvtzwzdgzkjda7.onion
Alimentary, dear Watson; I had a gut feeling.

fresh1

  • conspirator
  • Dominant Queen
  • ****
  • Posts: 339
Re: Morris Worm Source - a good starting point
« Reply #3 on: January 08, 2012, 11:12:13 AM »
 8) 8)




 ;)
"Curiosity is a gift"

Sedit

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 2,099
Re: Morris Worm Source - a good starting point
« Reply #4 on: January 08, 2012, 09:17:59 PM »
Im getting an invalid archive when I attempt to open it with winzip
There once were some bees and you took all there stuff!
You pissed off the wasp now enough is enough!!!

Sedit

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 2,099
Re: Morris Worm Source - a good starting point
« Reply #5 on: January 08, 2012, 09:22:26 PM »
Obviously alter the code enough to get it past the major anti-virus programs and obfuscate the hell out of it.

I have decided that the simplest way to possibly do this would be to chop the code internally as its being copied into run alone segments and randomly implement them into the infected file. It would involve a bunch of line jumps but it could keep both the virus and the infected code intact while quite possibly staying under the radar of almost any anti virus program because the data segments would be chopped up never appear the same from one infection to the next. The line data would be chosen randomly at the time of the infection.
There once were some bees and you took all there stuff!
You pissed off the wasp now enough is enough!!!

Dr. Tox

  • In Stasis: See You In A Few Years!
  • Subordinate Wasp
  • ***
  • Posts: 145
Re: Morris Worm Source - a good starting point
« Reply #6 on: January 08, 2012, 11:15:49 PM »
Wouldn't most end user's AV heuristics pick up on that?
Alimentary, dear Watson; I had a gut feeling.

Sedit

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 2,099
Re: Morris Worm Source - a good starting point
« Reply #7 on: January 08, 2012, 11:38:26 PM »
Doubtful, that's the reason I was considering chopping up the data blocks enough so that they are not recognized as any known virus.
There once were some bees and you took all there stuff!
You pissed off the wasp now enough is enough!!!

no1uno

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 681
Re: Morris Worm Source - a good starting point
« Reply #8 on: January 09, 2012, 02:22:23 AM »
What I was looking at is that the ISP databases will be inhaling the source code of the pages whole - that means that they will be ingesting huge chunks of 'invisible' conditional comments for things like ie6. AV programs ignore them as do antispyware programs (even noscript).

Thus it is technically feasible to get the source into the machines targeted, there is a hole, it is identified, etc.

How to execute the package once it is in memory? There are different levels of conditional comments for starters and some allow for specific browsers to be targeted. JS can be used to make alterations in the runtime css, and so on. Some deeper knowledge of the machines LE would be using would be kind of helpful if they are to be targeted directly - specifically operating systems and browser(s)/bots used to scan page-source for keywords. Somewhere in there will be a trigger that can be used to identify who is calling the pagesource leading to execution.

Is a time-based id procedure feasible? We know pages will be kept for x-days and potentially called after that, which is manifestly odd behaviour - especially for 'offline' webpage shots. We can be pretty sure that the pages will be captured as static pages (regardless of how served) and archived, once again, pretty strange behaviour differentiating this from the vast majority of human users (is there any way to differentiate between various archiving projects and is there any need?), that's just for starters.

Technically, legally it should be feasible to have something that scrambles only your own personal information if it is called upon at some later date (if it were to 'accidentally' overload/harm machines that triggered it who would know, simply ensure that that is not the stated aim), which would be very similar to using a voice scrambler from a legal point of view, ie. only destroying personal information about yourself collected by another without your consent and without a warrant (that it would make shit hard even if they had a warrant is immaterial). I'd be very surprised if it were illegal to act to limit availability of personal information collected without your consent, while there is no enforceable right to privacy, it would be awfully strange if there was an enforceable right to breach it - especially without judicial authorisation.
"...     "A little learning is a dang'rous thing;
    Drink deep, or taste not the Pierian spring:
    There shallow draughts intoxicate the brain,
    And drinking largely sobers us again.
..."

Dr. Tox

  • In Stasis: See You In A Few Years!
  • Subordinate Wasp
  • ***
  • Posts: 145
Re: Morris Worm Source - a good starting point
« Reply #9 on: January 09, 2012, 05:34:16 AM »
Excellent point. This could get good.  8)
Alimentary, dear Watson; I had a gut feeling.

Sedit

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 2,099
Re: Morris Worm Source - a good starting point
« Reply #10 on: January 09, 2012, 09:21:37 PM »
I still can't open the file whats the deal? Im running the newest version of Winzip i believe. Has anyone successfully opened it and what did you use?
There once were some bees and you took all there stuff!
You pissed off the wasp now enough is enough!!!

dream0n

  • Subordinate Wasp
  • ***
  • Posts: 204
Re: Morris Worm Source - a good starting point
« Reply #11 on: January 09, 2012, 10:33:06 PM »
You cannot open it solely because it is a rar file... not a zip file ::)
off to bigger and better things - don't worry I will visit from time to time

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Morris Worm Source - a good starting point
« Reply #12 on: January 09, 2012, 11:47:58 PM »
I still can't open the file whats the deal? Im running the newest version of Winzip i believe. Has anyone successfully opened it and what did you use?

I've zipped it for you.

Thanks Wizard~Sedit
« Last Edit: January 10, 2012, 12:43:58 AM by Sedit »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."