Recent from talks
Nothing was collected or created yet.
Back Orifice
View on WikipediaThis article needs additional citations for verification. (October 2016) |
| Back Orifice | |
|---|---|
| Developer | Sir Dystic (cDc) |
| Stable release | 1.20
/ August 3, 1998 |
| Operating system | Microsoft Windows 9x, UNIX-systems (client only) |
| Type | Remote administration |
| License | Freeware, (source distribution, UNIX client) |
| Website | Back Orifice Homepage |
Back Orifice (often shortened to BO) is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location.[1] The name is a play on words on Microsoft BackOffice Server software. It can also control multiple computers at the same time using imaging.
Back Orifice has a client–server architecture.[2] A small and unobtrusive server program is on one machine, which is remotely manipulated by a client program with a graphical user interface on another computer system. The two components communicate with one another using the TCP and/or UDP network protocols. In reference to the Leet phenomenon, this program commonly runs on port 31337.[3]
The program debuted at DEF CON 6 on August 1, 1998 and was the brainchild of Sir Dystic, a member of the U.S. hacker organization Cult of the Dead Cow. According to the group, its purpose was to demonstrate the lack of security in Microsoft's Windows 9x series of operating systems.
Although Back Orifice has legitimate purposes, such as remote administration, other factors make it suitable for illicit uses. The server can hide from cursory looks by users of the system. Since the server can be installed without user interaction, it can be distributed as the payload of a Trojan horse.
For those and other reasons, the antivirus industry immediately categorized the tool as malware and appended Back Orifice to their quarantine lists. Despite this fact, it was widely used by script kiddies because of its simple GUI and ease of installation.
Two sequel applications followed it, Back Orifice 2000, released in 1999, and Deep Back Orifice by French Canadian hacking group QHA.
See also
[edit]References
[edit]- ^ Richtel, Matt. "Hacker Group Says Program Can Exploit Microsoft Security Hole," The New York Times August 4, 1998. Retrieved April 24, 2007.
- ^ "Information on Back Orifice and NetBus". Symantec. Archived from the original on February 22, 1999. Retrieved 8 February 2013.
- ^ Knudsen, Kent (April 5, 2002). "Tracking the Back Orifice Trojan On a University Network". sans.org. p. 7. Archived from the original (PDF) on April 21, 2018. Retrieved April 20, 2018.
The server normally binds to UDP port 31337, but it may be configured to use another port.
External links
[edit]Back Orifice
View on GrokipediaDevelopment and History
Origins and Cult of the Dead Cow Involvement
The Cult of the Dead Cow (cDc), a pioneering hacker collective, originated in 1984 in Lubbock, Texas, initially as a forum for like-minded individuals to hone technical skills through exploratory coding and system probing, evolving by the late 1980s into a hacktivist entity dedicated to unveiling flaws in commercial software ecosystems via purpose-built tools that demonstrated inherent vulnerabilities rather than mere exploits.[6][7] This ethos stemmed from a conviction that closed-source architectures, by design, obscured accountability for security lapses, prompting cDc to prioritize open dissemination of proof-of-concept utilities to compel industry reforms.[8] Back Orifice emerged from this framework in the mid-1990s amid growing scrutiny of Microsoft Windows 95 and 98, where cDc developers discerned systemic deficiencies in remote administration protocols—arising not from isolated bugs but from the platforms' foundational reliance on unencrypted, userland-accessible networking stacks that prioritized usability over fortified access controls in proprietary environments.[9] The tool's conception targeted these causal weaknesses, enabling unauthorized oversight to underscore how Windows' architecture facilitated surreptitious control without necessitating kernel-level privileges or overt exploits, a critique rooted in dissecting the operating systems' default configurations.[4] Primary authorship fell to Sir Dystic, a core cDc member whose implementation encapsulated the group's strategy of crafting lean, demonstrative software to spotlight proprietary oversights, with development conducted covertly to evade preemptive corporate interference.[10] cDc reinforced transparency by timing major releases for the annual DEF CON conference, a venue for unfiltered security discourse, ensuring Back Orifice's unveiling aligned with this tradition of public accountability over clandestine hoarding.[6]Release and Initial Distribution
Back Orifice was announced by the Cult of the Dead Cow (cDc) on July 21, 1998, in San Francisco, with the group issuing a statement highlighting security concerns for Microsoft Windows systems on networks.[11] [2] The software made its formal debut at the DEF CON 6 conference in Las Vegas on August 1, 1998, where cDc members presented it to attendees as a tool exposing vulnerabilities in Windows networking.[11] [12] Following the DEF CON presentation, Back Orifice became freely available for download from the cDc website starting August 3, 1998, facilitating its rapid spread among hacker communities and online forums.[11] [12] Within days, over 35,000 copies were downloaded from the cDc site alone, with additional dissemination occurring through peer-to-peer sharing in underground channels.[12] The binary executable was released without accompanying source code, though it included a plugin interface for extensions.[11] cDc initially positioned Back Orifice as a remote administration tool for purposes like technical support and employee monitoring, claiming it underscored the ease of unauthorized access due to Windows' default security configurations.[11] [12] This framing sought to prompt empirical awareness of networked risks, though Microsoft countered that the tool relied on user-installed backdoors rather than inherent platform flaws.[2]Evolution to Back Orifice 2000
Back Orifice 2000 (BO2K), the successor to the original Back Orifice, was announced and released on July 10, 1999, at DEF CON 7 in Las Vegas by the Cult of the Dead Cow (cDc).[13][14] The development was led primarily by cDc member DilDog (Christien Rioux), with contributions from Sir Dystic, the originator of the initial Back Orifice.[13][15] Released as open-source software under the GNU Public License, BO2K aimed to provide enhanced remote administration capabilities for Windows systems, building directly on feedback from the original's deployment.[13] Key evolutions included an extended modular plugin architecture, enabling users to add functionalities such as encryption through plugins like CAST-256, which addressed the original Back Orifice's detectability issues stemming from its unencrypted UDP-based communications.[13][16] This plugin system allowed for customizable extensions, improving flexibility and stealth by permitting encrypted TCP or UDP connections on configurable ports (defaulting to TCP 54320 or UDP 54321).[16] While preserving the core ethos of unauthorized remote control, these changes made BO2K more adaptable for network administration or penetration testing scenarios.[13] BO2K expanded compatibility beyond the original's Windows focus by supporting client interfaces on Unix-like systems alongside Windows, facilitating cross-platform remote management of Windows servers (targeting 95/98 and NT).[13][16] The server component remained Windows-specific for installation, but the modular design and multi-connection support enhanced overall usability without altering the fundamental client-server model.[16]Technical Details
Core Functionality
Back Orifice functions as a client-server remote administration tool targeting Microsoft Windows 95 and 98 systems. The server executable, once installed and executed on the target machine, listens for incoming connections over UDP, defaulting to port 31337, allowing the client application to establish control without relying on TCP ports commonly monitored by firewalls.[17][3] This UDP-based protocol enables communication that can evade detection by network tools scanning for standard service ports, though it requires the server to be explicitly placed and run on the host, typically via social engineering or bundled with legitimate software.[2][3] Core remote control capabilities include keystroke logging to record user inputs into a file, file system manipulation such as viewing, copying, renaming, deleting, or searching files, and uploading or downloading files between client and server.[18][3] The tool supports screen capture to obtain screenshots of the remote desktop, execution of arbitrary programs or system commands, and system operations like rebooting or locking the machine.[3] If a microphone is connected, it can facilitate audio eavesdropping by streaming sound from the target.[3] These features collectively permit comprehensive monitoring and manipulation, but activation depends on the server's prior installation rather than exploiting inherent operating system flaws.[2][18]Installation Mechanisms and Server Operation
Back Orifice deploys its server component through social engineering tactics, where users are induced to execute a seemingly innocuous file, such as a game or utility, often distributed via email attachments, downloads, or physical media in 1998.[19][3] Upon execution, the installer extracts the core server executable, BOSERVER.EXE, typically placing it in the Windows system directory (e.g.,C:\Windows\System\), and configures persistence by adding registry entries under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to launch automatically on system startup.[20][21] The installer then self-deletes to minimize forensic traces, leaving the server to initialize as a hidden background process without visible indicators to the user.
In operation, BOSERVER.EXE functions as a persistent listener daemon, binding to UDP port 31337 (a reference to hacker slang for "elite") and awaiting inbound connections from authorized clients.[22][20] Absent default authentication mechanisms, access relies solely on the attacker's knowledge of the victim's IP address and port, enabling direct command-and-control once connected over TCP/IP.[1][2] The server processes incoming datagrams in a proprietary protocol, executing directives with the privileges of the installing user—often administrative if the executable was run without restrictions—while maintaining low resource usage and evading casual detection through process name obfuscation or integration with system services.[20][3] This runtime behavior persists across reboots via the registry hook, ensuring continuous availability for remote administration unless manually removed or disrupted by antivirus scanning.[21][18]
