The Black Vault Message Forums

Discover the Truth!        

Information Technology / Computer Talk

dark side of open source software - Stoned

A forum where you can view tech and computer related articles and exchange tips and advice. Need help with a computer problem? This is the forum for you!

Postby rath » Mon Sep 07, 2009 4:38 am

07 September 2009

When rootkits are mentioned the things which come to mind are generally hackers, Trojans, even Sony BMG. Now you can add open source software to the list with the release of the first open source rootkit framework called Stoned.

A rootkit is a piece of software which, for nefarious purposes, aims to run undetected on your computer. It will hide itself from process listings and will seek to interfere with the ordinary running of your system to fulfil its own purposes.

A bootkit is a particular type of rootkit which kicks in when the computer boots and before any operating system has loaded. This can make it even more dangerous because it has full access to the system and cannot be removed by merely inspecting the operating system’s list of start-up services.

Austrian hacker Peter Kleissner has released the world’s first ever open source bootkit framework called Stoned Bootkit, named in dubious honour of an early boot sector computer virus called “Stoned.”

Stoned Bootkit aims to attack all versions of Microsoft Windows from XP through to the brand new Windows 7, including Server releases. Stoned loads before Windows starts and remains in memory, and comes with its own file system drivers, a plug-in engine and a collection of Windows “pwning” tools.

Stoned Bootkit also claims to be the first bootkit that breaks TrueCrypt encryption as well as working with traditional FAT and NTFS disk volumes.

This means with Stoned you can install any software you choose – a Trojan horse, say – onto any computer running Windows. You do not need know any passwords and it does not matter if the file system is encrypted.

Stoned was unveiled at the Blackhat USA security conference and Kleissner’s PowerPoint presentation is available online.

In a slide entitled “Who am I?” Kleissner describes himself as an independent operating system developer, a professional software engineer and malware analyst.

The source code for the Stoned Bootkit, as well as general research and technical detail, is available on its own web site. Here you can inspect how it works as well as read instructions on making your own Stoned infector Live CD – making it tragically simple to infect computers provided you can get physical access.

For those needing more help, SecurityTube has posted a video online showing a computer being infected with Stoned and then disinfected again.

Kleissner suggests this is a useful application for law enforcement officials but I suspect there may be somewhat less scrupulous individuals who will find other uses for it.

As with such open source luminaries like WireShark, a plug-in architecture permits developers world-wide to extend the range of functions Stoned can perform. The similarities end there, with WireShark being an intrusion detection system, not an intrusion enabler.
Image
rath
 
Posts: 4345
Joined: Thu Apr 09, 2009 11:54 am

Postby SigFLUP » Thu Nov 12, 2009 11:34 pm

The core of stoned has not been released, unfortunately. Some code around it has but not the entire thing. I'm willing to bet, this seeming not to be a hypervisor jail, that this can be detected by the os. I'm also willing to bet that stoned won't make it very far in the security world- it doesn't seem like a terribly novel concept. My bias against this is that, while theoretically it could break full-disk-encryption (a claim that hasn't been proven yet), it still has to put data outside and that's where I feel it would most easily be detected.

Still... kinda neat. I like the name :)

... I should add that also the author, Peter Kleissner, is only 18. That's pretty mad- totally props to him.
User avatar
SigFLUP
 
Posts: 9
Joined: Thu Nov 12, 2009 10:05 pm


Return to Information Technology / Computer Talk

cron
  • View new posts
  • View unanswered posts
  • Who is online
  • In total there is 1 user online :: 0 registered, 0 hidden and 1 guest (based on users active over the past 10 minutes)
  • Most users ever online was 292 on Mon Apr 23, 2012 3:19 pm
  • Users browsing this forum: No registered users and 1 guest