![]() |
EpiRootkit
By STDBOOL
|
Once the rootkit is connected to the attack server, authentication is required by entering a password to execute commands. The password implementation uses SHA-256 hashing to avoid storing the password in clear text or hardcoding it in the source code. The password hash is compared to a reference value, and only a correct password allows access to sensitive functionalities. This approach enhances security by avoiding direct exposure of the password in code or on disk.
passwd.cfg. If this file doesn't exist, the default password is used, specifically evannounet.The default password is evannounet.
The password hash is stored in memory and can thus be directly used for verification. This is the SHA-256 hash of the default password evannounet.
When a password is provided, it's hashed then compared to the reference hash. Access is granted only if both values match.
This function allows changing the password: the new password is hashed, stored in memory and saved to the configuration file in hexadecimal form. For more information on the authentication procedure and password use during connection, see the Connection section. This section details the process of accessing the web interface, entering the password (evannounet by default), as well as the necessary steps to access the main dashboard after authentication.
For more details on password change, see the Command List section and particularly the
passwdcommand.