I finished compiling my "Proof of Concept" application to allow you to test out the exploits on you OWN miners.
Just run the "minerProof.exe" file. It will scan your network, revealing all your devices into your LAN.
Each device will get it's own node in the treelist. When expanding your device, it will show you all information, included all known exploits about it!
Once you get your miner (Knc will show up as server lighttpd), expand the list to "firmware". It will list the executed exploit result.
After finding all devices, the software will scan your network to idendify if your are remotely vulnerable or not.
It will also give you solutions if a security risk has been found on your network.
This application has been tested with Knc jupiter, AntMiner's, cgminer and bfgminer, running on Windows 8.1 x64.
Application restrictions: ONLY your
OWN subnet can be scanned ! When network sniffing is detected, the application will auto shut down!
Antivirus results: Scanned with MetaScan, file is clean 39/40 antivirus scanners. I have
one false positive out of 40 with a minor AV vendor.
The file is
CLEAN !! If 39 of the biggest AV vendors show it's clean, it IS clean!
Note: The false positive is triggered by the sub that detects network sniffing and shuts the application down.AV scan result:
https://www.metascan-online.com/en/scanresult/file/d79999b0cbd74e978fc4dfee6d3bc0ef
If you don't trust the files, than simply don't download or run them.If you find an exploit on your system, then please patch up using the solutions provided, and post your exploit in this topic to prove the concept of it!!
File download URL:
https://mega.co.nz/#!FNIlSL5Q!5SVBuSNrXkT5ckXmdK7Fews0-avozcE8QcL4_acjHss | minerProofOfConcept.zip | 1.1Mb
If you have problems using the tool, please write me a PM, but dont spam this topic with questions about it.
JUST TO BE CLEARDecompiling the executable, or the DLL file will NOT give you what you are looking for.
These are only to run the network scan.
AutoIT is used to execute the actual exploit, and detect modifications, scanners, sniffers, decompilers, and virtual boxes.
If ANY of these is detected, the application will shut down, and the REAL injection script is terminated, destroyed and melted.
USE THIS TOOL FOR WHAT IS HAS BEEN DESIGNED FOR!!
This tool is a PROOF OF CONCEPT about build-in exploits in most miner hardware rigs.
If you feel the need to run it sandboxed, virtual, or with an active scanner/sniffer/decompiler/debugger, than your intentions are NOT to test your enviroment, thus the file gets destroyed.
I received a ton load of PM's about security issues, and this is the best solution to prevent idiots trying to hack someone else's miners.