Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Legend Perl IRC Bot Remote Code Execution #6322

Merged
merged 2 commits into from Dec 10, 2015
Merged

Add Legend Perl IRC Bot Remote Code Execution #6322

merged 2 commits into from Dec 10, 2015

Conversation

shipcod3
Copy link
Contributor

@shipcod3 shipcod3 commented Dec 7, 2015

This module exploits a remote command execution on the Legend Perl IRC Bot () . This bot has been used as a payload in the Shellshock spam last October 2014. This particular bot has functionalities like NMAP scanning, TCP, HTTP, SQL, and UDP flooding, the ability to remove system logs, and ability to gain root, and VNC scanning. Kevin Stevens, a Senior Threat Researcher at Damballa has uploaded this script to VirusTotal with a md5 of 11a9f1589472efa719827079c3d13f76.

image

References

Notes:

  • The bot answers only based on the servername and nickname in the IRC message which is configured on the perl script thus you need to be an operator on the IRC network to spoof it and in order to exploit this bot or have at least the same ip to the config.
  • Legend Bot in Action on Metasploitable 2's IRC Server:
    image
  • Legend IRC Bot Sample Script: https://github.com/shipcod3/IRC-Bot-Hunters/blob/master/malicious_samples/legend.txt

@wvu
Copy link
Contributor

wvu commented Dec 7, 2015

Guess I'll take this one, too, lol.

@wvu wvu self-assigned this Dec 7, 2015
@shipcod3
Copy link
Contributor Author

shipcod3 commented Dec 7, 2015

@wvu-r7 haha okay lol 👍

wvu added a commit to wvu/metasploit-framework that referenced this pull request Dec 10, 2015
@wvu wvu merged commit b36834f into rapid7:master Dec 10, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants