PureVPN: A bundle of WTF.

Darren Martyn
5 min readNov 14, 2017

--

Note: this was originally going on my gh-pages site, but I seem to have broken the theme there, so figured I’d try put it on Medium Dot Com. It lay in drafts for a bit and I kinda found other shit to do and never finished working on this so figure it’s time to hit publish.

So I decided I’d take a look at PureVPN quickly today, because they are a VPN provider who claim no logs, but snitch on their users to the feds with magic logs… And frankly, it was a Thursday and I am bored.

Sure, they snitched on a dude who was probably a shit human being (no one likes stalkers, to be fair) and all, but really, if you are a VPN provider and you lie about having a “No Logs” policy… You are going to get whats coming.

So after I jumped through the hoops of setting up an account there, I decided to look at the “client software” they offer. There are clients for Windows, OSX, etc, along with a DD-WRT applet. Because generally embedded things are fun, I figured I’d look at the “applet” first. I also took a quick look at the Windows client, and got lost in a maze of “what the fuck?”…

Part the First: Looking (briefly) at the DD-WRT part.

So when we go to download some nice router gubbins to make ourselves a SUPER SECURE VPN ROUTER, we see the following…

oh god no.

Oh boy. So what is this downloading? Well, its a shell script, that does some crap and downloads more shit.

PUREVPN_APPLET_URL='http://158.69.194.117'
...
PUREVPN_BRANCH='main'
ARCH=$(uname -m)
if [ -e /www/tomato.js ]; then FIRMWARE="tomato"
else FIRMWARE="ddwrt"
fi
...
PUREVPN_VERSION_URL="$PUREVPN_APPLET_URL/cgi-bin/applet-cgi.py?action=version&arch=$ARCH&firmware=$FIRMWARE&branch=$PUREVPN_BRANCH"
PUREVPN_INSTALL_URL="$PUREVPN_APPLET_URL/cgi-bin/applet-cgi.py?action=download&arch=$ARCH&firmware=$FIRMWARE&branch=$PUREVPN_BRANCH"
PUREVPN_HWCHECK_URL="$PUREVPN_APPLET_URL/cgi-bin/applet-cgi.py?action=hwcheck&arch=$ARCH&firmware=$FIRMWARE&branch=$PUREVPN_BRANCH"
...
BOOTSTRAP_ENTRY="
while ! [ -f $PUREVPN_TMP/.lock ] ; do
mkdir -p $PUREVPN_ROOT/..;
wget \"$PUREVPN_INSTALL_URL\" -q -O - | gunzip -c | tar -x -C $PUREVPN_ROOT/..;
$PUREVPN_ROOT/www/scripts/purevpn_startup.sh;
sleep 5;
done

So basically, it downloads more crap over plaintext HTTP from this webserver somewhere and installs it on your router. But what does it install?

purevpn$ ls www/
cgi-bin iframeResizer.min.js logo.png mypage2.sh purevpn_ddwrt.css purevpn.js stylesRouter.css
iframeResizer.contentWindow.min.js lang.js mypage1.sh mypage3.sh purevpn_ddwrt.js scripts template.html
purevpn$

Basically a bunch of shell scripts to add web page functionality (that all run as root, just because), that call out to something in cgi-bin…

In “cgi-bin” there exists a nice ARM binary that… Well, we ran out of time. Its written in C++, has a bunch of janky shit in it, and I just wasn’t in the mood to reverse it over the weekend after all.

TL;DR of Router Version:
- Installer is “Run this shell script from the internet over a plaintext connection”.
- Downloads and executes more shit over the internet and installs shit over the internet that way, via plaintext.
- No code signing or checking whatsoever on the shit it does download.
- Funky ARM binary that smells funny.

Part the Second: Windows WTF Wonderland.

So I chucked their Windows installer onto a Windows 7 VM I use for testing shite software. First thing I noticed while installing it was that it dropped an absolute shitload of files, and took forever to install.

Given it basically relies on OpenVPN, I decided to check out what version they ship. Its 2017, and they are shipping an OpenVPN that was built in 2015, version 2.3.8, built with OpenSSL 1.0.1p. Look these up in the CVE databases at your own pleasure for a good giggle.

alrighty then.

They create some services, so I figured I’d be a bit lazy and find an easy win here. So I checked with “PowerSploit’s PowerUp” by doing “Invoke-AllChecks”, and well, we came out with some results.

ezmode.
2ez4me

TL;DR: Use any of the following to get privesc on a box with the PureVPN client.

Invoke-ServiceAbuse -Name 'OpenVPNService'
Invoke-ServiceAbuse -Name 'sevpnclient'
Install-ServiceBinary -name 'sevpnclient'

I figured at this point, I’d just move on. BUT WAIT. THERE IS MORE!

So I had a quick look at the files it drops in “C:\Program Files (x86)\PureVPN” and spotted “Injector32.exe” and “Injector64.exe”. What the fuck are these? Well, one way to find out… We chuck them into IDA and have a quick gander. Then I realised it was written in .NET, so I broke open dnSpy, which does a better job of handling .NET than IDA.

what the everliving fuck.

What the fuck its got a DLL injector that injects something called “Split.dll” (or “Split_64.dll”) into something. I took a brief look at it, and basically, what happens is the following.

1. It takes 1 argument, which is a process to launch.
2. It launches this process, suspends it, opens its process memory, chucks in the “Split.dll”, creates a remote thread for it, and then continues execution.
3. Exits. DLL is now injected.

Effectively, if you put your “Split.dll” (for x86), or “Split_64.dll” in the same directory as “Injector$ARCH.exe” and run the injector program with a path to something to inject into, you win the game and have a DLL injected somewhere. I tested this by copying the injector to “C:\work\”, putting a meterpreter DLL as “Split.dll” into there, and running it with the path to notepad.exe as the only argument. It worked. I got a meterpreter. Sadly, the DLL injectors aren’t codesigned…

So what have we learned? PureVPN ships some awesome shit we can use for malware reasons!

I didn’t bother looking any further after this. I want to spend some time reversing the DLL it injects, but somehow I ended up having some actual work to do instead. I also want to know why its injecting crap into things…

Anyway, in conclusion: The PureVPN client software for Windows and routers is shady as fuck. On Windows, the installer unpacks to about 80mb of crap — all to run OpenVPN.

I’d usually say “just use the VPN config files manually instead of their shonky client”, but all things considered, so much smells bad here that I just recommend not using their service at all.

--

--

Darren Martyn

Full Stack Arsonist, Security Fundamentalist, Threat Choreographer.