No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help
View Responses


Grex Agora41 Item 133: Cracked (again).
Entered by bdh3 on Mon Apr 29 04:27:18 UTC 2002:

A couple days ago a cracker broke into one of my systems.  Not 
because it wasn't my own fault.  In order to accomodate a microsoft
user's inability to use a secure protocol I had opened up ftp
on one of my DMZ boxes - thats what they are there for after
all (behind one firewall and in front of the main firewalls to the
rest of the real network).  The interesting thing is that this
was a redhat7.2 distribution that contained reasonably current
code.  I haven't taken a lot of time to examine the box, merely
moved it into a non-public (not NAT-ed) portion of the DMZ and put
another one in its place.  WHat I have determined so far is that 
ftp (not set up for anonymous) was attacked and sshd was overwritten
with a custom version of the cracker's.  The hacked version of
sshd listens at a high port and refuses to connect to anthing other
than a list of his/her own hosts (using a modified version of
the tcpwrapper).  Problem on this box of course is that telnet
is disabled and ssh is the only way to get in thus it was 
apparent when it happened.  For some reason the hacker cloaked 
the sshd config file (why? Instead of hard coding in own config?).
Also since the regular functionality of sshd was removed it became
apparent that something had happened (if tripwire hadn't reported
it).

The really funny thing is that these boxes are in the .nu domain
and as far as I know the PRC (where the attack originated at
a military site) is not interested an island 2500 miles southeast
of New Zealand (petrified bird shit, they have one of the highest
per capita incomes in the world believe it or not, you have to
get into the richest private oil nations such as nepal for 
higher).  Now perhaps the PRC was merely looking for out of the
way test boxes so I suppose nauru would qualify.  Or perhaps they
were simply going through US network blocks by IP and happened
upon mine in the week or so it was open?  

The real irony is that the hostname of the box is 'hongke' which
is 'hacker' in mandarin - but means 'good hacker', literally
'red guest'.  Although its public name is something boring like
host7.somting.nu  or something like that and they woulda had 
to connect to the ftp port (open less than a week) to see the
chinese name (heh, maybe they figures they was invited).

I sent email to the domain technical contact (from a different domain)
giving a few details, offering more if they were interested,
and suggesting they hire this guy/gal.  (Sort of an I know that
you know that I know kinda thingy - the chinese love those manner
of.)  WHats-her-name suggested I report it to the FBI but I figure
those guys ain't exactly worried about the PRC right about now, and
they don't like to hear about things they don't discover themselves
anyhow (or understand for that matter).


8 responses total.



#1 of 8 by gull on Mon Apr 29 12:58:54 2002:

Did the mail bounce?  I've had bad luck trying to send mail to the
administrative addresses for Chinese netblocks.  They're also common spam
sources.  It's gotten so bad that some of the spam blacklists contain
pretty much all of the Chinese netblocks, now.


#2 of 8 by jazz on Fri May 3 15:43:39 2002:

        How can you be sure the intruder was white?


#3 of 8 by bdh3 on Sat May 4 05:36:35 2002:

Huh?  I don't regard anyone that penetrates my network as
'white' unless I know them.


#4 of 8 by oval on Sat May 4 09:31:56 2002:

well you *did* call him a "cracker".



#5 of 8 by orinoco on Sun May 5 21:40:04 2002:

<rim shot>


#6 of 8 by bdh3 on Mon May 6 06:03:39 2002:

Oh.  Heh, I get it now...  actually s/he was 'yellow' as it
came from the PRC.


#7 of 8 by goose on Wed May 15 14:57:00 2002:

So, more like a Club cracker?


#8 of 8 by tsty on Wed May 22 10:50:09 2002:

heh-heh

Response not possible - You must register and login before posting.

No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss