- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- Re: How did they do this?
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 01:46 AM
12-08-2003 01:46 AM
Got RH 7.2 on Dell PE 1650 systems.
Running as a web server.
Just a short time ago I found evidence of unauthorized use. Another user acct had been created with UID=0, all of the log files had been deleted or null'ed, the wtmp file was null'ed, etc.
I had spent some time doing what I can to provide a minimum level of security. Some of the stuff I did - 1)enabled the use of the wheel group with the /etc/pam.d/su file, only members of wheel can become root 2)have the securetty setup for root logins only on console 3)the only ports open were 22 (ssh), 80 (http), 115 (sftp), & 443 (shttp), all other services were disabled from xinetd, 4)in the sshd_config file had the PermitRootLogin set to "no" 5)had the firewall config set to medium with only SSH and HTTP allowed.
With all of the above being setup and tested, how did somebody get in and create a UID=0 acct and start wreaking havoc?
Any ideas?
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 01:52 AM
12-08-2003 01:52 AM
Re: How did they do this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 01:53 AM
12-08-2003 01:53 AM
Re: How did they do this?
I can't see how this was done. The only area I would be suspicious of is the webserver itself if it runs as root, unless it was a local user. If it was a local user then there are a million ways it can be done. The best way, if you are a local user, obviously is to get root password. The majority of real attacks that mean anything in large organizations come from inside and use low tech methods to get in.
However, I would say that there is always going to be a risk, no matter what you do.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 01:54 AM
12-08-2003 01:54 AM
Re: How did they do this?
Otherwie, let's think...
J
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 02:06 AM
12-08-2003 02:06 AM
SolutionJ
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 02:15 AM
12-08-2003 02:15 AM
Re: How did they do this?
ssh is 1.3
chroot has the 3.6.1 patch applied
httpd is 1.3
kernel is 2.4.7
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 02:26 AM
12-08-2003 02:26 AM
Re: How did they do this?
They (he ?) could have sniffed your root passwd using this :
http://www.secunia.com/advisories/8823/
This to exploit ssh :
http://www.ciac.org/ciac/bulletins/m-017.shtml
This on your kernel :
http://www.securityfocus.com/bid/3447
The list would be too long to put them all...
A good way round would be to update all strategic packages to a recent version. You did great job on security, but this can't prevent structural packages flaw...
J
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 03:09 AM
12-08-2003 03:09 AM
Re: How did they do this?
Copies of the shell where it does not belong with suid set. That lets someone use root, merely by executing the shell.
Consultants commonly put such back doors in and they can be discovered.
Get tripwire working so that changes in the log files are tracked immediately.
You probably should run Bastille against the box, because it scans for vulnerabilities.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 09:06 AM
12-08-2003 09:06 AM
Re: How did they do this?
It's now an up-to-date RH8 box, so.. ;)
Beware of some binary replacements.
At this point 'rpm -Va' is your friend.
Also be aware of the command 'lsattr', and the +i flag on files (immutable - nothing can be done until flag is removed).
These are common tricks (one of which I use myself :P).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-08-2003 05:07 PM
12-08-2003 05:07 PM
Re: How did they do this?
Use good forensic analysis tools like coroner's toolkit to analyse the compromised system . Use chkrootkit tool to check your system for commonly known rootkits.
Tripwire can be used to as a file integrity checker. But for this you must have taken tripwire checksum snapshot of your system , very earlier to compare with the present stae of the system. ( after complete fresh installation ).
I suggest you to port scan this compromised host checking the suspicious lisening ports.
If it is a remote exploit ( which is lanuched against a network service ) then the shellcode is almost sure to leave a backdoor port listening for the hacker to get in to system without efforts ;-).
You should not narrow your incident analysis only on network based attacks. A authentic unpriveleged user ( malicious ofcourse ) can launch local exploits , which can give him root shell easily.
There are other services other than daemons invoked by xinetd , like rpcd , nfsd etc which are very vulnerable. These services should stopped.
regards,
U.SivaKumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-19-2005 02:52 AM
01-19-2005 02:52 AM
Re: How did they do this?
I would suspect an inside job, then start looking at the logs from other hosts from which they could have logged into this one from. (I presume you know approximately when this happened?)
They wiped their fingerprints from the house they burgled, but did they wipe their footprints from the path outside?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-19-2005 03:37 AM
01-19-2005 03:37 AM
Re: How did they do this?
I did have the PAM setup to only allow root logins to members of the wheel group. If this was an inside job, then this would have been done by a wheel group member.
Even if I gave out the root passwd to the world, if you are not a member of the wheel group you can not access the root account unless you are sitting at the console in a secure data center.
As to looking for outside footprints, there is no other access from other systems. Exception, members of the wheel group have access to the system from their local desktops but firewalls prevent access from any other server within the data center. Access to the system was gained from the outside via VPN, else you hit the URL in your web browser.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-19-2005 04:21 AM
01-19-2005 04:21 AM
Re: How did they do this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-20-2005 01:41 AM
01-20-2005 01:41 AM
Re: How did they do this?
Also, someone posted that the passwords were possibly sniffed. This isn't true if your using SSH..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-20-2005 02:03 AM
01-20-2005 02:03 AM
Re: How did they do this?
Its been over a year since this incident. I have upgraded all packages. No further incidents have occurred.
Many thanks to all the ideas. I am keeping track of each and every one of these ideas as my baseline for setting up new systems.
I must close this thread now.
Again, thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-20-2005 02:04 AM
01-20-2005 02:04 AM