PDA

View Full Version : How might this be done?



JDizzle
05-10-2006, 05:14 AM
Ok, the story is that a friend of a friend was bragging about his hacking skills, and my friend told him to prove it by doing something benign to his computer. “Hacker” then changed the prompt on the victims command line (so instead of “C:\blah blah>” it said something else).

Obviously what he did was change the PROMPT environment variable. Simple enough on your own computer but the question is how might someone accomplish such a trick over the internet?

The victim’s computer is running Windows XP SP2. He has ADSL (so he is behind a router, but no hardware firewall enabled). He was running the zonealarm firewall (which apparently didn’t pick anything up). The only other relevant program that was running was a chat program called XFire – basically a chat program for gamers.

Hacker definitely had access to victim’s IP address and was using XFire to chat with him at the time. It was done over the internet (victim and hacker live thousands of miles apart). Victim claims that hacker didn’t try to have him do anything like transfer a file or anything like that. And victim is internet savvy, not just some idiot who will click “OK” to anything.


What I need to know is how hacker managed to change an environment variable on victim’s system, what the security implications of this are (i.e. if he could do that then what else could he have done?), and, most importantly, how to prevent this sort of thing from being done again.

I realize that since I did not see it happen first-hand my information may be incomplete but any speculation on how attacks of this nature might be carried out would be very helpful to me. Or if you think that my friend is just feeding me a line of crap then I’d like to know that as well.

Thank you in advance.

Ezekiel
05-10-2006, 08:07 AM
Ok, the story is that a friend of a friend was bragging about his hacking skills, and my friend told him to prove it by doing something benign to his computer. “Hacker&#822*; then changed the prompt on the victims command line (so instead of “C:\blah blah>&#822*; it said something else).

Obviously what he did was change the PROMPT environment variable. Simple enough on your own computer but the question is how might someone accomplish such a trick over the internet?

The victim&#82*7;s computer is running Windows XP SP2. He has ADSL (so he is behind a router, but no hardware firewall enabled). He was running the zonealarm firewall (which apparently didn&#82*7;t pick anything up). The only other relevant program that was running was a chat program called XFire &#82**; basically a chat program for gamers.

Hacker definitely had access to victim&#82*7;s IP address and was using XFire to chat with him at the time. It was done over the internet (victim and hacker live thousands of miles apart). Victim claims that hacker didn&#82*7;t try to have him do anything like transfer a file or anything like that. And victim is internet savvy, not just some idiot who will click “OK&#822*; to anything.


What I need to know is how hacker managed to change an environment variable on victim&#82*7;s system, what the security implications of this are (i.e. if he could do that then what else could he have done?), and, most importantly, how to prevent this sort of thing from being done again.

I realize that since I did not see it happen first-hand my information may be incomplete but any speculation on how attacks of this nature might be carried out would be very helpful to me. Or if you think that my friend is just feeding me a line of crap then I&#82*7;d like to know that as well.

Thank you in advance.

To do this, he must have had direct access through a trojan. He probably simply opened up a new command prompt with the current directory set as whatever he changed it to, not something difficult to do programatically. On the "hacker's" computer, you probably could have seen some sort of backdoor control program up on the screen. Other than that, there is really no way to do something like you described, it requires direct access.

Or, if he knew the vistim's login password, then it could have easily been done through connecting to a telnet server running (if enabled), or using a tool similar to psexec to start cmd.exe remotely.