CAIDA Spoofer
A CAIDA Spoofer installation has been identified to be running on the HACKSMARTERSEC(10.10.183.209) host.
PS C:\> ls 'C:\Program Files (x86)\Spoofer\'
 
 
    Directory: C:\Program Files (x86)\Spoofer
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        7/24/2020   9:31 PM          16772 CHANGES.txt
-a----        7/16/2020   7:23 PM           7537 firewall.vbs
-a----        7/24/2020   9:31 PM          82272 LICENSE.txt
-a----         7/5/2025   4:05 PM             19 qc
-a----        7/24/2020   9:31 PM           3097 README.txt
-a----        7/24/2020   9:31 PM          48776 restore.exe
-a----        7/20/2020  11:12 PM         575488 scamper.exe
-a----        6/30/2023   6:57 PM            152 shortcuts.ini
-a----        7/24/2020   9:31 PM        4315064 spoofer-cli.exe
-a----        7/24/2020   9:31 PM       16171448 spoofer-gui.exe
-a----        7/24/2020   9:31 PM        4064696 spoofer-prober.exe
-a----        7/24/2020   9:31 PM        8307640 spoofer-scheduler.exe
-a----        7/24/2020   9:31 PM            667 THANKS.txt
-a----        7/24/2020   9:31 PM         217416 uninstall.exe
 
PS C:\> ps | findstr spoofer
    205      11     1708       9276              1320   0 spoofer-schedulerIt’s installed to the C:\Program Files (x86)\Spoofer\ directory and running as the spoofer-scheduler process.
PS C:\> cat 'C:\Program Files (x86)\Spoofer\CHANGES.txt' | Select -First 10
spoofer-1.4.6 (2020-07-24) 
-------------
* Finds Spoofer control server by hostname instead of IP address
* Updated for better compatibility with Qt 5.15
* Updated for better compatibility with protobuf 3.12
* macOS: avoid use of launch services API (deprecated in OS X 10.10)
* macOS: updated binary release:
  - drop support for OS X <10.10
  - updated bundled third-party packages: openssl 1.1.1g, pcap 1.9.1, 
    protobuf 3.12.3, Qt 5.9, scamper 20200717The CHANGES.txt file reveals the version information; 1.4.6
Vulnerabilities
 Looking it up online reveals an unquoted service path vulnerability, and it has CVE identification designated to
Looking it up online reveals an unquoted service path vulnerability, and it has CVE identification designated to CVE-2021-46443, which seems to be revoked.
PS C:\> sc.exe qc spoofer-scheduler
[SC] QueryServiceConfig SUCCESS
 
SERVICE_NAME: spoofer-scheduler
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Spoofer Scheduler
        DEPENDENCIES       : tcpip
        SERVICE_START_NAME : LocalSystemChecking the spoofer-scheduler service indeed reveals that the BINARY_PATH_NAME attribute is set without any quotation mark.
PS C:\> echo blah > C:\Program.exe 
out-file : Access to the path 'C:\Program.exe' is denied. 
At line:1 char:1
+ echo blah > C:\Program.exe
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : OpenError: (:) [Out-File], UnauthorizedAccessException       
    + FullyQualifiedErrorId : FileOpenFailure,Microsoft.PowerShell.Commands.OutFileCommand The “vulnerability” is rather false-positive, as regular users on a Windows host cannot create a file at the system root directory; C:\
Permissions
PS C:\> icacls "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe BUILTIN\Users:(I)(F)
                                                     NT AUTHORITY\SYSTEM:(I)(F)
                                                     BUILTIN\Administrators:(I)(F)
                                                     APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                                                     APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
 
Successfully processed 1 files; Failed processing 0 filesHowever, checking the permissions for the binary itself reveals that the default Users group has complete control over it.
This was flagged by PrivescCheck
PS C:\> icacls "C:\Program Files (x86)\Spoofer"
C:\Program Files (x86)\Spoofer BUILTIN\Users:(OI)(CI)(F)
                               NT SERVICE\TrustedInstaller:(I)(F)
                               NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
                               NT AUTHORITY\SYSTEM:(I)(F)
                               NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
                               BUILTIN\Administrators:(I)(F)
                               BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
                               BUILTIN\Users:(I)(RX)
                               BUILTIN\Users:(I)(OI)(CI)(IO)(GR,GE)
                               CREATOR OWNER:(I)(OI)(CI)(IO)(F)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(OI)(CI)(IO)(GR,GE)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(OI)(CI)(IO)(GR,GE)
 
Successfully processed 1 files; Failed processing 0 filesSame goes for the parent directory as well.
Start/Stop Service
PS C:\> sc.exe stop spoofer-scheduler
 
SERVICE_NAME: spoofer-scheduler
        TYPE               : 10  WIN32_OWN_PROCESS
        STATE              : 3  STOP_PENDING
                                (STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
        WIN32_EXIT_CODE    : 0  (0x0)
        SERVICE_EXIT_CODE  : 0  (0x0)
        CHECKPOINT         : 0x0
        WAIT_HINT          : 0x0It would appear that the current user is able to stop/start the spoofer-scheduler service.
Privilege Escalation is possible, given that:
- anyone is able to modify the service binary
- current user is able to restart the service