[100791] in RedHat Linux List
RE: Hacked! :(
daemon@ATHENA.MIT.EDU (Soffen, Matthew)
Mon Nov 23 11:10:22 1998
From: "Soffen, Matthew" <msoffen@iso-ne.com>
To: redhat-list@redhat.com, "David E. Fox" <dfox@belvdere.vip.best.com>
Date: Mon, 23 Nov 1998 11:08:28 -0500
Resent-From: redhat-list@redhat.com
Reply-To: redhat-list@redhat.com
Here are a few suggestions to help stop access to your system.
1) Notify CERT of the intrusion.
2) Install TCP Wrappers and only allow accesses from explicit places.
Not 100 % fool proof but better than leaving the barn door open.
Basically allow access to known systems for telnet and ftp and then deny
all other domains/hosts.
3) Check the user creation log. Delete any accounts that have UID 0
*except for root of course* . Make sure you start closing down all
security holes. I would also expire all passwords and change them
(incase they did copy the password file to crack later).
4) You might also want to install a package like trip wire. This would
let you know of intrusions.
Matthew Soffen - Webmaster http://www.iso-ne.com/
ISO New England
1 Sullivan Road
Holyoke, MA 01040-2841
(413) 535 8167
==============================================
Boss - "My boss says we need some eunuch programmers."
Dilbert - "I think he means UNIX and I already know UNIX."
Boss - "Well, if the company nurse comes by, tell her I said
never mind."
- Dilbert -
==============================================
> ----------
> From: David E. Fox[SMTP:dfox@belvdere.vip.best.com]
> Sent: Friday, November 20, 1998 6:16 PM
> To: redhat-list@redhat.com
> Cc: postmaster@mech.ubc.ca; abuse@mech.ubc.ca; postmaster@ubc.ca;
> postmaster@csun.edu; abuse@csun.edu
> Subject: Hacked! :(
>
> Well, I never thought it might happen to me, but apparently over
> the last few days my system was broken into by a user in
> Canada, and also apparently from a user at csun.edu. I am also
> copying this to the abuse administrators at csun.edu and at
> mech.ubc.ca.
>
> I have syslog entries to prove it, and a ps listing that I noticed
> just a few minutes ago -- thank god I was running 'top'; otherwise
> I might not have noticed it... but there it was, a user r0x running
> a 'vi rootkit.h' command... I immediately killed the net
> connection and went digging.
>
> find / -name rootkit.h only reveals one rootkit.h file, in the
> linux source directory (Specifically: /usr/src/linux-2.0.35/arch/
> ppc/boot/compressed/.o/rootkit.h).
>
> But that's a very strange place to hide a rootkit, and it is there
> plainly for me to see.... everything is there that one would
> expect to be in a hacking kit.
>
> Relevant logs show the following:
>
>
> Nov 19 00:20:01 belvdere pam_rhosts_auth[596]: denied to
> roxana@serendip.mech.ubc.ca as anti: access not allowed
> Nov 19 00:20:03 belvdere PAM_pwdb[602]: (login) session opened for
> user anti by (uid=0)
> Nov 19 00:20:04 belvdere login[602]: LOGIN ON ttyp2 BY anti FROM
> serendip.mech.ubc.ca
> Nov 19 00:20:10 belvdere PAM_pwdb[610]: (su) session opened for user
> r0x by anti(uid=0)
> Nov 19 00:22:20 belvdere identd[623]: from: 204.244.142.155 (
> hope2a28.dial.uniserve.ca ) for: 1049, 21
> Nov 19 00:25:14 belvdere pam_rhosts_auth[643]: denied to
> root@localhost as http: access not allowed
> Nov 19 00:25:15 belvdere PAM_pwdb[645]: (login) session opened for
> user http by (uid=0)
> Nov 19 00:25:15 belvdere login[645]: LOGIN ON ttyp3 BY http FROM
> localhost
> Nov 19 00:25:20 belvdere PAM_pwdb[653]: (su) session opened for user
> www by http(uid=0)
> Nov 19 00:25:38 belvdere PAM_pwdb[653]: (su) session closed for user
> www
> Nov 19 00:25:41 belvdere PAM_pwdb[645]: (login) session closed for
> user http
> Nov 19 00:28:16 belvdere identd[672]: from: 204.244.142.155 (
> hope2a28.dial.uniserve.ca ) for: 1052, 21
> Nov 19 01:01:02 belvdere PAM_pwdb[1624]: (su) session opened for user
> news by (uid=9)
> Nov 19 01:01:14 belvdere PAM_pwdb[1624]: (su) session closed for user
> news
> Nov 19 01:01:34 belvdere PAM_pwdb[610]: (su) session closed for user
> r0x
> Nov 19 01:01:36 belvdere PAM_pwdb[602]: (login) session closed for
> user anti
>
> Nov 20 14:36:17 belvdere dip[7595]: root dial-up
> 204.156.152.2/204.156.152.2 to remote 204.156.128.1/204.156.128.1
> with CSLIP/296
> Nov 20 14:39:25 belvdere pam_rhosts_auth[7626]: denied to
> root@s057n110.csun.edu as anti: access not allowed
> Nov 20 14:39:26 belvdere PAM_pwdb[7627]: (login) session opened for
> user anti by (uid=0)
> Nov 20 14:39:26 belvdere login[7627]: LOGIN ON ttyp2 BY anti FROM
> s057n110.csun.edu
> Nov 20 14:39:29 belvdere PAM_pwdb[7635]: (su) session opened for user
> r0x by anti(uid=0)
> Nov 20 14:39:46 belvdere identd[7646]: from: 128.3.7.48 ( mh1.lbl.gov
> ) for: 10257, 25
> Nov 20 14:40:20 belvdere identd[7654]: from: 204.244.142.134 (
> hope2a7.dial.uniserve.ca ) for: 10258, 21
> Nov 20 14:46:26 belvdere dip[7595]: >>> DETACH "/sbin/ifconfig sl0
> down"
> Nov 20 14:46:26 belvdere dip[7595]: root down CSLIP link to remote
> 204.156.128.1/204.156.128.1
> Nov 20 14:46:27 belvdere dip[7595]: Total online:609s in:0 bytes 0
> pkts; out:0 bytes 0 pkts
> Nov 20 14:46:30 belvdere dip[7595]: DIP: Probably line disconnected!
> Nov 20 14:46:30 belvdere dip[7595]: DIP: tty_puts: failed to write to
> tty (Input/output error)...
> Nov 20 14:46:33 belvdere dip[7595]: DIP: Probably line disconnected!
> Nov 20 14:46:33 belvdere dip[7595]: DIP: tty_puts: failed to write to
> tty (Input/output error)...
>
> warning: `-' deprecated; use `ps ax', not `ps -ax'
> PID TTY STAT TIME COMMAND
> 7626 ? S 0:00 in.rlogind
> 7635 p2 S 0:00 su r0x
> 7636 p2 S 0:00 bash
> 7664 p2 S 0:00 vi rootkit.h
> 7627 p2 S 0:00 login -p -h s057n110.csun.edu -f anti
>
> root tty1 Nov 19 00:00
> dfox tty2 Nov 19 12:04
> dfox tty3 Nov 19 15:16
> dfox tty4 Nov 20 14:56
> dfox ttyp0 Nov 19 14:29 (:0.0)
> anti ttyp2 Nov 20 14:39 (s057n110.csun.edu) <-- the perp
>
--
PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com http://archive.redhat.com
To unsubscribe: mail redhat-list-request@redhat.com with
"unsubscribe" as the Subject.