You are not logged in. Login Now
 0-8          
 
Author Message
bdh3
Cracked (again). Mark Unseen   Apr 29 04:27 UTC 2002

A couple days ago a cracker broke into one of my systems.  Not 
because it wasn't my own fault.  In order to accomodate a microsoft
user's inability to use a secure protocol I had opened up ftp
on one of my DMZ boxes - thats what they are there for after
all (behind one firewall and in front of the main firewalls to the
rest of the real network).  The interesting thing is that this
was a redhat7.2 distribution that contained reasonably current
code.  I haven't taken a lot of time to examine the box, merely
moved it into a non-public (not NAT-ed) portion of the DMZ and put
another one in its place.  WHat I have determined so far is that 
ftp (not set up for anonymous) was attacked and sshd was overwritten
with a custom version of the cracker's.  The hacked version of
sshd listens at a high port and refuses to connect to anthing other
than a list of his/her own hosts (using a modified version of
the tcpwrapper).  Problem on this box of course is that telnet
is disabled and ssh is the only way to get in thus it was 
apparent when it happened.  For some reason the hacker cloaked 
the sshd config file (why? Instead of hard coding in own config?).
Also since the regular functionality of sshd was removed it became
apparent that something had happened (if tripwire hadn't reported
it).

The really funny thing is that these boxes are in the .nu domain
and as far as I know the PRC (where the attack originated at
a military site) is not interested an island 2500 miles southeast
of New Zealand (petrified bird shit, they have one of the highest
per capita incomes in the world believe it or not, you have to
get into the richest private oil nations such as nepal for 
higher).  Now perhaps the PRC was merely looking for out of the
way test boxes so I suppose nauru would qualify.  Or perhaps they
were simply going through US network blocks by IP and happened
upon mine in the week or so it was open?  

The real irony is that the hostname of the box is 'hongke' which
is 'hacker' in mandarin - but means 'good hacker', literally
'red guest'.  Although its public name is something boring like
host7.somting.nu  or something like that and they woulda had 
to connect to the ftp port (open less than a week) to see the
chinese name (heh, maybe they figures they was invited).

I sent email to the domain technical contact (from a different domain)
giving a few details, offering more if they were interested,
and suggesting they hire this guy/gal.  (Sort of an I know that
you know that I know kinda thingy - the chinese love those manner
of.)  WHats-her-name suggested I report it to the FBI but I figure
those guys ain't exactly worried about the PRC right about now, and
they don't like to hear about things they don't discover themselves
anyhow (or understand for that matter).


8 responses total.
gull
response 1 of 8: Mark Unseen   Apr 29 12:58 UTC 2002

Did the mail bounce?  I've had bad luck trying to send mail to the
administrative addresses for Chinese netblocks.  They're also common spam
sources.  It's gotten so bad that some of the spam blacklists contain
pretty much all of the Chinese netblocks, now.
jazz
response 2 of 8: Mark Unseen   May 3 15:43 UTC 2002

        How can you be sure the intruder was white?
bdh3
response 3 of 8: Mark Unseen   May 4 05:36 UTC 2002

Huh?  I don't regard anyone that penetrates my network as
'white' unless I know them.
oval
response 4 of 8: Mark Unseen   May 4 09:31 UTC 2002

well you *did* call him a "cracker".

orinoco
response 5 of 8: Mark Unseen   May 5 21:40 UTC 2002

<rim shot>
bdh3
response 6 of 8: Mark Unseen   May 6 06:03 UTC 2002

Oh.  Heh, I get it now...  actually s/he was 'yellow' as it
came from the PRC.
goose
response 7 of 8: Mark Unseen   May 15 14:57 UTC 2002

So, more like a Club cracker?
tsty
response 8 of 8: Mark Unseen   May 22 10:50 UTC 2002

heh-heh
 0-8          
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss