On Fri, 2003-12-05 at 16:39,
alandd@consultpros.com wrote:
> > what is pan2?
> > We just got hacked, and looking in the root's .bash_history, they
> > downloaded pan2 from a .ro server, and it's still running. I was just
> > wondering what that is..i can't seem to get a clear answer from google.
>
> Side question that you probably want to ignore for now: Could you tell us
> about your setup and how you think the cracker got in?
>
> I am just curious about the whole story. How are you connected to the
> net? What firewall technology you were using? Was the box at home, work,
> co-lo? What OS? How did you discover the break-in? Etc.
>
> Right now, you need to do investigations and get secure again. But, at
> some point, I'd like to learn from your experience.
>
> Alan
It was a work box, behind a DSL line and in the DMZ..my main server is
pretty hardened, and has its own firewall in front of it. The hacked box
was our web-server.
My guess is it was a rootkit, some script-kiddie tool. Honestly, i was
asking for it. It was an old Mandrake 8.0 box i set up a few years ago,
and updating rpms is a pain in the ass unless you're willing to upgrade
your whole OS. Nothing new or exciting. I _was_ planning on upgrading it
to debian...i guess that priority just shot up to #1.
I could tell cuz it was a very sloppy hack...php.ini was changed to
default, so that broke some stuff as my includes were in a non-default
location. That's what caused me to start looking into the box. The date
on that file was yesterday...and nobody here at work changed it.
/sbin/init also had a date of yesterday, too...which not only put up a
red-flag in my head, but also set off an alarm like a broken
car-alarm..that zaps passerbys and kicks them...Ya. it started off as
one of those days.
mandrake has some nice security stuff, such as medusa. It logs open
network connections and logs them...the third of december had normal
stuff (http, ftp, ssh), and today had a program called dsniff-st
(network auditing tool) listening, as well as for other anonymous
broad-cast listening programs running.
Like i said, i had a suspision with php.ini being changed, but the
biggest flag raised was a changed init...i'm also sure a kernel-module
MUST be installed, but of course, it's obfuscated.
Right now, i'm working on installing debian on a different machine, then
i'm going to take the hard-drive of the old machine and metaphorically
take it out back and shoot it. I was planning on installing snort on a
few machines, (standalone ndis, with a hdis on our main server)...so as
things install, i'm reading "Intrustion Detection with Snort"..Kozial,
sams publishing.
Instead of coding this weekend, i guess i'll be reading that instead.
As i'm reading the book, a theme keeps getting repeated...you have to
know your infrastructure. Snort isn't a silver bullet, and is only
usefull if you understand what is and isn't normal behaviour. If i was
away, a co-worker probably wouln't have bothered to know why included
files weren't there, and wouldn't become suspicious as why php.ini was a
changed date..which caused me to look /sbin/init, a very commonly
changed file in rooted boxen.