Strange command histories in hacked shell server

2004-12-16 Thread Ganbold
Hi,
Sorry for cross posting.
I have with FreeBSD 5.3-stable server which serves as a public shell server.
FreeBSD public.ub.mng.net 5.3-STABLE FreeBSD 5.3-STABLE #6: Wed Nov 24 
15:55:36 ULAT 2004 [EMAIL PROTECTED]:/usr/obj/usr/src/sys/PSH  i386

It has ssh and proftp-1.2.10 daemons.
However it was hacked and I'm trying to analyze it and having some 
difficulties.

Machine is configured in such way that everyone can create an account itself.
Some user dir permissions:
...
drwxr-xr-x  2 root   wheel 512 Mar 29  2004 new
drwx--  3 tamiraad   unix  512 Apr  9  2004 tamiraad
drwxr-xr-x  6 tsgan  tsgan1024 Dec 16 17:51 tsgan
drwx--  4 tugstugi   unix  512 Dec 13 20:34 tugstugi
drwxr-xr-x  5 unix   unix  512 Dec 13 12:37 unix
...
User should log on as new with password new to create an account.
Accounting is enabled and kern.securelevel is set to 2.
Only one account 'tsgan' is in wheel group and only tsgan gan become root 
using su.

Following is the some strange output from grave-robber (coroner toolkit):
...
Dec 13 04 20:18:405 m.c -rw-rw tugstugi 
smmsp/var/spool/clientmqueue/dfiBDCIeD0001529
Dec 13 04 20:34:58  512 m.. drwx-- tugstugi unix /home/tugstugi
Dec 13 04 20:35:57  512 ..c drwx-- tugstugi unix /home/tugstugi
Dec 14 04 00:19:560 m.c -rw-rw-rw- tugstugi 
unix /home/tugstugi/.myrc

Dec 14 04 00:20:50 9665 m.. -rw-r--r-- tugstugi 
unix /home/tsgan/.tmp/known_hosts
   9665 m.c -rw-r--r-- tugstugi 
unix /home/tugstugi/.ssh/known_hosts

Dec 15 04 19:12:21 1002 m.c -rw--- tugstugi 
unix /home/tugstugi/.shrc
...
Somehow he seems like copied /home/tugstugi/.ssh/known_hosts to 
home/tsgan/.tmp/known_hosts.
I don't know why.

Following is lastcomm output:
...
sshd -F  tugstugi __ 0.16 secs Tue Dec 14 23:01
sh   -   tugstugi #C:5:0x1   0.03 secs Tue Dec 14 23:02
su   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14 23:38
...
sshd -F  tugstugi __ 0.08 secs Tue Dec 14 22:41
sh   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14 22:41
who  -   tugstugi #C:5:0x1   0.00 secs Tue Dec 14 22:52
su   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14 22:48
sh   -   tsgan#C:5:0x1   0.00 secs Tue Dec 14 22:48
ls   -   tsgan#C:5:0x1   0.00 secs Tue Dec 14 22:52
su   -   tsgan#C:5:0x1   0.02 secs Tue Dec 14 22:49
csh  -   root #C:5:0x1   0.03 secs Tue Dec 14 22:49
...
In above I think he already hijacked my account and root password so he 
used su to
become root.

sshd -F  tsgan__ 0.02 secs Tue Dec 14 00:27
sh   -   tsganttyp0  0.02 secs Tue Dec 14 00:27
cat  -   tsganttyp0  0.00 secs Tue Dec 14 00:28
su   -   tsganttyp0  0.00 secs Tue Dec 14 00:28
sleep-   tsganttyp0  0.00 secs Tue Dec 14 00:27
^^
stty -   tsganttyp0  0.00 secs Tue Dec 14 00:27
stty -   tsganttyp0  0.00 secs Tue Dec 14 00:27
^^
fortune  -   tsganttyp0  0.00 secs Tue Dec 14 00:27
...
I don't quite understand why he used sleep and stty commands in above.
My suspect is tty hijacking. Am I right? Correct me if I'm wrong.
sleep-   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
...
id   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
sleep-   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
id   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:24
cat  -   tsgan#C:5:0x2   0.00 secs Tue Dec 14 00:24
ls   -   tsgan#C:5:0x2   0.00 secs Tue Dec 14 00:24
su   -   tsgan#C:5:0x2   0.02 secs Tue Dec 14 00:23
sh   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
id   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
sleep-   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14 00:23
stty   

Re: Strange command histories in hacked shell server

2004-12-18 Thread security
You should have a script that creates a new user when people login with
'new'. Have you forbid that script from overwriting your wheel account and
re-creating root?

> Hi,
>
> Sorry for cross posting.
>
> I have with FreeBSD 5.3-stable server which serves as a public shell
> server.
>
> FreeBSD public.ub.mng.net 5.3-STABLE FreeBSD 5.3-STABLE #6: Wed Nov 24
> 15:55:36 ULAT 2004 [EMAIL PROTECTED]:/usr/obj/usr/src/sys/PSH
> i386
>
> It has ssh and proftp-1.2.10 daemons.
>
> However it was hacked and I'm trying to analyze it and having some
> difficulties.
>
> Machine is configured in such way that everyone can create an account
> itself.
> Some user dir permissions:
> ...
> drwxr-xr-x  2 root   wheel 512 Mar 29  2004 new
> drwx--  3 tamiraad   unix  512 Apr  9  2004 tamiraad
> drwxr-xr-x  6 tsgan  tsgan1024 Dec 16 17:51 tsgan
> drwx--  4 tugstugi   unix  512 Dec 13 20:34 tugstugi
> drwxr-xr-x  5 unix   unix  512 Dec 13 12:37 unix
> ...
> User should log on as new with password new to create an account.
>
> Accounting is enabled and kern.securelevel is set to 2.
> Only one account 'tsgan' is in wheel group and only tsgan gan become root
> using su.
>
> Following is the some strange output from grave-robber (coroner toolkit):
> ...
> Dec 13 04 20:18:405 m.c -rw-rw tugstugi
> smmsp/var/spool/clientmqueue/dfiBDCIeD0001529
> Dec 13 04 20:34:58  512 m.. drwx-- tugstugi unix
> /home/tugstugi
> Dec 13 04 20:35:57  512 ..c drwx-- tugstugi unix
> /home/tugstugi
> Dec 14 04 00:19:560 m.c -rw-rw-rw- tugstugi
> unix /home/tugstugi/.myrc
>
> Dec 14 04 00:20:50 9665 m.. -rw-r--r-- tugstugi
> unix /home/tsgan/.tmp/known_hosts
> 9665 m.c -rw-r--r-- tugstugi
> unix /home/tugstugi/.ssh/known_hosts
>
> Dec 15 04 19:12:21 1002 m.c -rw--- tugstugi
> unix /home/tugstugi/.shrc
> ...
> Somehow he seems like copied /home/tugstugi/.ssh/known_hosts to
> home/tsgan/.tmp/known_hosts.
> I don't know why.
>
>
> Following is lastcomm output:
> ...
> sshd -F  tugstugi __ 0.16 secs Tue Dec 14
> 23:01
> sh   -   tugstugi #C:5:0x1   0.03 secs Tue Dec 14
> 23:02
> su   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14
> 23:38
> ...
> sshd -F  tugstugi __ 0.08 secs Tue Dec 14
> 22:41
> sh   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14
> 22:41
> who  -   tugstugi #C:5:0x1   0.00 secs Tue Dec 14
> 22:52
> su   -   tugstugi #C:5:0x1   0.02 secs Tue Dec 14
> 22:48
> sh   -   tsgan#C:5:0x1   0.00 secs Tue Dec 14
> 22:48
> ls   -   tsgan#C:5:0x1   0.00 secs Tue Dec 14
> 22:52
> su   -   tsgan#C:5:0x1   0.02 secs Tue Dec 14
> 22:49
> csh  -   root #C:5:0x1   0.03 secs Tue Dec 14
> 22:49
> ...
>
> In above I think he already hijacked my account and root password so he
> used su to
> become root.
>
> sshd -F  tsgan__ 0.02 secs Tue Dec 14
> 00:27
> sh   -   tsganttyp0  0.02 secs Tue Dec 14
> 00:27
> cat  -   tsganttyp0  0.00 secs Tue Dec 14
> 00:28
> su   -   tsganttyp0  0.00 secs Tue Dec 14
> 00:28
> sleep-   tsganttyp0  0.00 secs Tue Dec 14
> 00:27
> ^^
> stty -   tsganttyp0  0.00 secs Tue Dec 14
> 00:27
> stty -   tsganttyp0  0.00 secs Tue Dec 14
> 00:27
> ^^
> fortune  -   tsganttyp0  0.00 secs Tue Dec 14
> 00:27
> ...
>
> I don't quite understand why he used sleep and stty commands in above.
> My suspect is tty hijacking. Am I right? Correct me if I'm wrong.
>
> sleep-   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> ...
> id   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> sleep-   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> stty -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> id   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> cat  -   tsgan#C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> ls   -   tsgan#C:5:0x2   0.00 secs Tue Dec 14
> 00:24
> su   -   tsgan#C:5:0x2   0.02 secs Tue Dec 14
> 00:23
> sh   -   tugstugi #C:5:0x2   0.00 secs Tue Dec 14
> 00:23