30 Aug 2000 20:47:06 -0000 From: [email protected] FakeGINA, the integrated Trojan -------------------------------------------------------------------------------- DETAILS FakeGINA intercepts the communication between Winlogon and the normal GINA (Windows NT authentication layer), and while doing this it captures all successful logins (domain, username, password) and writes them to a text file. How do I use this tool? Download the zip file and extract the DLL. Copy it to the system32 directory (on most systems c:\winnt\system32). Next start regedt32 and go to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon". Look for a value called "GinaDLL". If this value exists and contains something else than "msgina" or "msgina.dll", please do not continue the installation process. If the value doesn't exist, create "GinaDLL" as a "REG_SZ" and set it to "fakegina.dll". If it does exist and is "msgina" or "msgina.dll", then change it to "fakegina.dll". The next time the system is rebooted, FakeGINA will start to capture passwords into the text file "passlist.txt", which will be located in the system32 directory. I already have to be an Administrator to install FakeGINA, so what is it useful for? FakeGINA shows at least one very important thing - one should never use the same password on more than one system. If one system is compromised, the attacker might use something like FakeGINA to capture all the passwords, and then use them against other systems. ADDITIONAL INFORMATION To download the tool, go here. The tool has been provided by Arne Vidstrom. ======================================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.