SHARE
TWEET

#ProjectVoriDazel

TeamGhostShell Jun 3rd, 2016 5,509 Never
  1.    _  _  ______          _           _   _   _            _______              _
  2.  _| || |_| ___ \        (_)         | | | | | |          (_)  _  \            | |
  3. |_  __  _| |_/ / __ ___  _  ___  ___| |_| | | | ___  _ __ _| | | |__ _ _______| |
  4.  _| || |_|  __/ '__/ _ \| |/ _ \/ __| __| | | |/ _ \| '__| | | | / _` |_  / _ \ |
  5. |_  __  _| |  | | | (_) | |  __/ (__| |_\ \_/ / (_) | |  | | |/ / (_| |/ /  __/ |
  6.   |_||_| \_|  |_|  \___/| |\___|\___|\__|\___/ \___/|_|  |_|___/ \__,_/___\___|_|
  7.                        _/ |                                                      
  8.                       |__/                                                      
  9.  
  10.  
  11.  
  12. Do you know the way to San Jose
  13. I've been away so long
  14. I may go wrong and lose my way
  15. Do you know the way to San Jose
  16. I'm going back to find some peace of mind in San Jose
  17.  
  18. L.A. is a great big freeway
  19. Put a hundred down and buy a car
  20. In a week, maybe two, they'll make you a star
  21. Weeks turn into years
  22. How quick they pass
  23. And all the stars that never were
  24. Are parking cars and pumping gas
  25.  
  26. Fame and fortune is a magnet
  27. It can pull you far away from home
  28. With a dream in your heart you're never alone
  29.  
  30. Dreams turn into dust and blow away
  31. And there you are without a friend
  32. You pack your car and ride away
  33.  
  34. I've got lots of friends in San Jose
  35. Do you know the way to San Jose?
  36.  
  37. _____________________________________________________
  38.  
  39.  
  40. For more than a few years now various people across the net have been signaling an on-going vulnerability
  41. within the new MEAN Stack system of client/routing/server. The successor of the LAMP Stack, an already infamous
  42. vulnerable platform, many thought this new one is more secure, yet it's almost the exact same as its predecessor. MySQL typically replaced by NoSQL and the main database configuration managed by MongoDB.
  43.  
  44. This project will focus solely on this poorly configured MongoDB. I'd like to mention exactly how easy it is to
  45. infiltrate within these types of networks but also how chilled sysadmins tend to be with their security measures.
  46. Or should I say, lack thereof.
  47.  
  48. In a lot of instances the owners don't bother checking for open ports on their newly configured servers, not only
  49. that but they also don't concern themselves with establishing a proper authentication process. (Just a simple
  50. username/password)
  51.  
  52. Typical open ports:
  53. 22, 53, 80, 81, 110, 137, 143 443, 465, 993, 995, 3000, 8080, 27017, 3306, 6379, 8888, 28017, 64738, 25565
  54.  
  55. This can basically lead to anyone infiltrating the network and managing their internal data without any interference. You don't even have to elevate your privileges, you just connect and have total access. You can create
  56. new databases, delete existing ones, alter data, and so much more.
  57.  
  58. I am leaking more than 36 million accounts/records of internal data from these types of networks to raise awareness
  59. about what happens when you decide not to even add a username/password as root or check for open ports, let alone encrypt the data. Each server folder has within it a plaintext file with the general info of the target, a screenshot
  60. from within my MongoDB client with me having access and of course the leaked data in raw text. There are a few million accounts with passwords and the rest is private person data or other types.
  61.  
  62.  
  63. This should serve as a cruel reminder of what happens when you don't use proper security hygiene. And don't worry if you thought this is the only vulnerability out there, guess again. The old ones remain as well.
  64.  
  65.  
  66. Download links:
  67.  
  68. http://dropcanvas.com/ukfq3
  69.  
  70. http://www.filedropper.com/mongodbcandy
  71.  
  72. http://www.filehosting.org/file/details/574555/MongoDB%20Candy.zip
  73.  
  74. Mirror: http://www.filehosting.org/file/details/574558/MongoDB%20Candy.zip
  75.  
  76. http://www.fileconvoy.com/dfl.php?id=g3187c01d53f8858a99983588530563c5b7144b9a9
  77.  
  78. http://depositfiles.com/files/73rlakth9
  79.  
  80.  
  81. Screenshots:
  82.  
  83. Basic example of root access alongside internal data:
  84.  
  85. http://imgur.com/DijMPAM
  86.  
  87. http://imgur.com/p5XEBPQ
  88.  
  89. http://imgur.com/yREPl0p
  90.  
  91.  
  92. Altered server data by an attacker with message:
  93. (This was done by other hackers, NOT me. I'm just trying to prove how widespread it is)
  94.  
  95. http://imgur.com/IYmHwZc
  96.  
  97. Another example:
  98.  
  99. http://imgur.com/WMVIprB
  100.  
  101. http://imgur.com/IXgbGki
  102.  
  103.  
  104. Deleted server(s) data, including the local schema files:
  105.  
  106. http://imgur.com/UpzKZqA
  107.  
  108. http://imgur.com/GSzSpwa
  109.  
  110. http://imgur.com/5ktG8dx
  111.  
  112. http://imgur.com/f9NfZ9A
  113.  
  114. http://imgur.com/ObsOS9v
  115.  
  116. http://imgur.com/iuCZtvB
  117.  
  118. http://imgur.com/5KIdCaj
  119.  
  120. http://imgur.com/bcp0vab
  121.  
  122.  
  123. Connection time-outs from within the server client interface when either
  124. the connection is unstable or when the number of rows is too high making
  125. the extraction bork:
  126.  
  127. http://imgur.com/HlygqZq
  128.  
  129. ___________________________________________________
  130.  
  131.  
  132. We are all ghosts living inside the shell,
  133. We are all hosts living inside this hell.
RAW Paste Data
Top