CAIDA Spoofer


A CAIDA Spoofer installation has been identified to be running on the HACKSMARTERSEC(10.10.183.209) host.

PS C:\> ls 'C:\Program Files (x86)\Spoofer\'
 
 
    Directory: C:\Program Files (x86)\Spoofer
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        7/24/2020   9:31 PM          16772 CHANGES.txt
-a----        7/16/2020   7:23 PM           7537 firewall.vbs
-a----        7/24/2020   9:31 PM          82272 LICENSE.txt
-a----         7/5/2025   4:05 PM             19 qc
-a----        7/24/2020   9:31 PM           3097 README.txt
-a----        7/24/2020   9:31 PM          48776 restore.exe
-a----        7/20/2020  11:12 PM         575488 scamper.exe
-a----        6/30/2023   6:57 PM            152 shortcuts.ini
-a----        7/24/2020   9:31 PM        4315064 spoofer-cli.exe
-a----        7/24/2020   9:31 PM       16171448 spoofer-gui.exe
-a----        7/24/2020   9:31 PM        4064696 spoofer-prober.exe
-a----        7/24/2020   9:31 PM        8307640 spoofer-scheduler.exe
-a----        7/24/2020   9:31 PM            667 THANKS.txt
-a----        7/24/2020   9:31 PM         217416 uninstall.exe
 
PS C:\> ps | findstr spoofer
    205      11     1708       9276              1320   0 spoofer-scheduler

It’s installed to the C:\Program Files (x86)\Spoofer\ directory and running as the spoofer-scheduler process.

PS C:\> cat 'C:\Program Files (x86)\Spoofer\CHANGES.txt' | Select -First 10
spoofer-1.4.6 (2020-07-24) 
-------------
* Finds Spoofer control server by hostname instead of IP address
* Updated for better compatibility with Qt 5.15
* Updated for better compatibility with protobuf 3.12
* macOS: avoid use of launch services API (deprecated in OS X 10.10)
* macOS: updated binary release:
  - drop support for OS X <10.10
  - updated bundled third-party packages: openssl 1.1.1g, pcap 1.9.1, 
    protobuf 3.12.3, Qt 5.9, scamper 20200717

The CHANGES.txt file reveals the version information; 1.4.6

Vulnerabilities


Looking it up online reveals an unquoted service path vulnerability, and it has CVE identification designated to CVE-2021-46443, which seems to be revoked.

PS C:\> sc.exe qc spoofer-scheduler
[SC] QueryServiceConfig SUCCESS
 
SERVICE_NAME: spoofer-scheduler
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Spoofer Scheduler
        DEPENDENCIES       : tcpip
        SERVICE_START_NAME : LocalSystem

Checking the spoofer-scheduler service indeed reveals that the BINARY_PATH_NAME attribute is set without any quotation mark.

PS C:\> echo blah > C:\Program.exe 
out-file : Access to the path 'C:\Program.exe' is denied. 
At line:1 char:1
+ echo blah > C:\Program.exe
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : OpenError: (:) [Out-File], UnauthorizedAccessException       
    + FullyQualifiedErrorId : FileOpenFailure,Microsoft.PowerShell.Commands.OutFileCommand 

The “vulnerability” is rather false-positive, as regular users on a Windows host cannot create a file at the system root directory; C:\

Permissions


PS C:\> icacls "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe BUILTIN\Users:(I)(F)
                                                     NT AUTHORITY\SYSTEM:(I)(F)
                                                     BUILTIN\Administrators:(I)(F)
                                                     APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                                                     APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
 
Successfully processed 1 files; Failed processing 0 files

However, checking the permissions for the binary itself reveals that the default Users group has complete control over it. This was flagged by PrivescCheck

PS C:\> icacls "C:\Program Files (x86)\Spoofer"
C:\Program Files (x86)\Spoofer BUILTIN\Users:(OI)(CI)(F)
                               NT SERVICE\TrustedInstaller:(I)(F)
                               NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
                               NT AUTHORITY\SYSTEM:(I)(F)
                               NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
                               BUILTIN\Administrators:(I)(F)
                               BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
                               BUILTIN\Users:(I)(RX)
                               BUILTIN\Users:(I)(OI)(CI)(IO)(GR,GE)
                               CREATOR OWNER:(I)(OI)(CI)(IO)(F)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(OI)(CI)(IO)(GR,GE)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(OI)(CI)(IO)(GR,GE)
 
Successfully processed 1 files; Failed processing 0 files

Same goes for the parent directory as well.

Start/Stop Service


PS C:\> sc.exe stop spoofer-scheduler
 
SERVICE_NAME: spoofer-scheduler
        TYPE               : 10  WIN32_OWN_PROCESS
        STATE              : 3  STOP_PENDING
                                (STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
        WIN32_EXIT_CODE    : 0  (0x0)
        SERVICE_EXIT_CODE  : 0  (0x0)
        CHECKPOINT         : 0x0
        WAIT_HINT          : 0x0

It would appear that the current user is able to stop/start the spoofer-scheduler service. Privilege Escalation is possible, given that:

  • anyone is able to modify the service binary
  • current user is able to restart the service