Emergency Response: Analysis of Remote Software Logs

0 19
OverviewIn the process of daily operation analysis, it is rare to analyze the lo...

Overview

In the process of daily operation analysis, it is rare to analyze the logs of remote control software such as Sunflower and Todesk. Regarding these two software, the most common issues related to them in the daily operation analysis may be alerts of illegal software use, and in most cases, such software is prohibited in the internal network. Fortunately, I recently did a simple analysis of the Sunflower log, and this article will analyze the logs of these two common software. There is already an article on the platform.Todesk Log Analysis, which can be referred to by everyone, and this article also draws on the characteristics provided by this article for analysis.

Todesk

ToDesk is a multi-platform remote control software that supports cross-platform collaborative operations on mainstream operating systems such as Windows, Linux, Mac, Android, and iOS.

Emergency Response: Analysis of Remote Software Logs

By default, the Todesk log files are stored in the Logs directory at the same level as the installation directory, in versions before 4.7, there are files starting with 'service' and 'client' in the directory. The 'service' files represent the logs of being remotely controlled by others, and the 'client' files represent the logs of remotely controlling others. In versions after 4.7 including 4.7, there are no files starting with 'client' in the directory.

v4.6.2.3 Log Directory Structure VS v4.7.0.2 Log Directory Structure
image.png

v4.6 Log Analysis

The log analysis of versions before v4.7 can be referred to in this articleTodesk Log AnalysisAnalysis.

Remote control of other hosts from the local host

Search for the log behavior of this machine remotely controlling other hosts through the client log. Match the keyword 'Room createMuxRoom server'.

image.png

where user represents the code of this device, and room represents the code of the remote control device.

Match the keyword 'Upnp stop' to find the records of closed links.

image.png

Record of this machine being remotely controlled by other hosts

By matching the keyword 'tcp begin connect' in the server log, you can see the remote connection records and the IP address of the other end. The IP address with port 443 can be ignored as it is the official server address.

image.png

The log above shows the connection records of the port 20000. By reverse lookup of the address, we can confirm that it is the address of the remote host we are connected to.

image.png

Log analysis of v4.7

There are no log files starting with 'client' in the log directory of v4.7, so we directly analyze the server log.

Remote control of other hosts from the local host

Since there is no client log, the method mentioned in v4.6 does not apply in v4.7. You can match the keyword 'client recv connect request,' in the log.

image.png

myid represents the code of this device, and destid represents the code of the remote control device.

Record of this machine being remotely controlled by other hosts

The method of searching for the remote control records of this machine by other hosts in the server log is consistent with that in v4.6. Similarly, by matching the keyword 'tcp begin connect', you can see the remote connection records and the IP address of the other end. The IP address with port 443 can be ignored as it is the official server address.

image.png

The log above shows the connection records of the port 20000. By reverse lookup of the address, we can confirm that it is the address of the remote host we are connected to.

image.png

Sunflower

Sunflower remote control software is a remote control software with many years of remote control technology experience, which can remotely control mobile phones, remote desktop connections, remote boot, remote management, and provide enterprise remote office, enterprise IT operations and maintenance, technical support, and other enterprise remote solutions in various industries.

V 13.3 Log Analysis

Remote control of other hosts from the local host

For the log analysis of sunflower, it can be combined with【Sunflower Remote Control】Local Extraction of Connection Log Analysis + Phone Number ExtractionFor reference and learning. Since the opportunity to use sunflower is less in daily life, the analysis of the log of the latest version of sunflower is directly carried out.

Analysis of the control end log

image.png

The figure above shows the directory structure of the local control end log and the controlled end log files. First, analyze the local control end log files (named with sunlogin_service.+time):

Firstly, the IP information, MAC address, operating system information, and other information of the current host.

image.png

Secondly, login success:

image.png

There are also some network connection behaviors in the local control end log, such as port 443, which is mostly the resolution address of some sunflower website domain names. I did not find any valuable information in the local control end log. If you have more discoveries, you can also send me a private message.

Analysis of the controlled end log

Compared with the control end log, the controlled end log is more abundant, starting with the directory structure, as follows:

image.png

It is recommended to pay attention to files named with sunlogin_service.+time and history files. First, look at the history file, which records the time and connection method (identifier) of the remote connection. It is very important to locate the time node in the daily analysis process.

image.png

Next are files named with sunlogin_service.+time, which are also used to obtain local IP, MAC, hostname, and other information:

image.png

Directly matching 'remote ip' in the original log can see the control end's host exit IP address.

image.png

The IP address of the port 4118 is the resolution address of the sunflower-related domain name, which can be ignored. If you are not sure, you can use the IP resolution domain function of the intelligence platform for confirmation.

image.png

image.png

Summary

In the daily analysis process, it is possible to analyze and locate anomalies by combining the above features. At the same time, attention should be paid to the changes in log between different versions. The log format is not immutable. It can also be extracted by simulating various common scenarios. After all,Practice is the only criterion for testing truth.If you have a better method or idea, please send me a private message.

Reference

https://www.freebuf.com/articles/endpoint/363274.html

https://zhuanlan.zhihu.com/p/558745599?utm_id=0

你可能想看:
最后修改时间:
admin
上一篇 2025年03月28日 16:18
下一篇 2025年03月28日 16:41

评论已关闭