I am trying to determine if i am hacked, here is details:
I just got a message from softlayer support: ABUSE - 66.228.xxx,xxx - HACKING/MALICIOUS ACTIVITY - IMMEDIATE ACTION REQUIRED. with some log like this:
Quote:
cat /var/log/rkhunter.log | grep Warning
[18:26:29] /usr/bin/GET [ Warning ]
[18:26:29] Warning: The command '/usr/bin/GET' has been replaced by a script: /usr/bin/GET: perl script text executable
[18:26:29] /usr/bin/groups [ Warning ]
[18:26:29] Warning: The command '/usr/bin/groups' has been replaced by a script: /usr/bin/groups: Bourne shell script text executable
[18:26:30] /usr/bin/ldd [ Warning ]
[18:26:30] Warning: The command '/usr/bin/ldd' has been replaced by a script: /usr/bin/ldd: Bourne shell script text executable
[18:26:35] /usr/bin/whatis [ Warning ]
[18:26:35] Warning: The command '/usr/bin/whatis' has been replaced by a script: /usr/bin/whatis: Bourne shell script text executable
[18:26:36] /sbin/ifdown [ Warning ]
[18:26:36] Warning: The command '/sbin/ifdown' has been replaced by a script: /sbin/ifdown: Bourne-Again shell script text executable
[18:26:36] /sbin/ifup [ Warning ]
[18:26:36] Warning: The command '/sbin/ifup' has been replaced by a script: /sbin/ifup: Bourne-Again shell script text executable
[18:27:43] Checking '/etc/xinetd.d/ftp_psa' for enabled services [ Warning ]
[18:27:44] Checking '/etc/xinetd.d/poppassd_psa' for enabled services [ Warning ]
[18:27:44] Checking '/etc/xinetd.d/smtp_psa' for enabled services [ Warning ]
[18:27:44] Checking '/etc/xinetd.d/smtps_psa' for enabled services [ Warning ]
[18:27:44] Checking for enabled xinetd services [ Warning ]
[18:27:44] Warning: Found enabled xinetd service: /etc/xinetd.d/ftp_psa
[18:27:44] Warning: Found enabled xinetd service: /etc/xinetd.d/poppassd_psa
[18:27:44] Warning: Found enabled xinetd service: /etc/xinetd.d/smtp_psa
[18:27:44] Warning: Found enabled xinetd service: /etc/xinetd.d/smtps_psa
[18:27:59] Checking for hidden files and directories [ Warning ]
[18:27:59] Warning: Hidden file found: /usr/share/man/man1/..1.gz: gzip compressed data, from Unix, max compression
I sent a server I have with a provider to have a RAM upgrade yesterday at 15:33 UTC, and ever since then I have had no access to my server.
SSH has been changed back to port 22, from a random high port. root password has changed RSA key has changed too.
I can see 3 possable reasons for this:
1) It's a different server plugged into the rack/router or a stolen IP
2) My provider "kindly" formatted and reinstalled my OS.
3) I have a compromised server, I very much doubt this as the server was offline.
I informed my provider about 18 hours ago that I had a "possable compromised server" and since then I have been given the run around as to what is happening.
For the last couple hours or so I have been trying to get them on live chat, which shows as online, but no-one answers. Thats another pet hate of mine.
I also have a couple tickets open asking for an update as they are not answering my origional ticket with updates.
Am I just being impaitent wanting a resolution to this in less than 18 hours or am I correct to complain?
I just got a letter from my dedicated host stating we had just been compromised. These servers just were set up last week! And there is nothing on them yet. The only thing I have done is modified the /etc/hosts file via SSH.
My servers are not even public yet. Can SSH'ing in from an unsecured wireless network make me vulnerable?
What do you guys think? Best way not to let this happen again?
Oh this is great :-| He's still logged in!
[root@server~]# who root pts/0 2007-06-06 07:12 (xxx) test pts/2 2007-06-06 03:08 (81.89.10.92)
I receive reports from my DC that my server is launching some hacking / malicious activity. This is the log that they provide:
Quote:
> > Aug 20 12:34:35 ensim sshd[30628]: Did not receive identification > string from MY.SERVER.IP > > Aug 20 12:44:23 ensim sshd[444]: Failed password for admin from > MY.SERVER.IP port 57896 ssh2 > > Aug 20 12:44:23 ensim sshd[444]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:26 ensim sshd[445]: Failed password for root from > MY.SERVER.IP port 58029 ssh2 > > Aug 20 12:44:26 ensim sshd[445]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:28 ensim sshd[446]: Failed password for root from > MY.SERVER.IP port 58141 ssh2 > > Aug 20 12:44:28 ensim sshd[446]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:31 ensim sshd[449]: Failed password for root from > MY.SERVER.IP port 58276 ssh2 > > Aug 20 12:44:31 ensim sshd[449]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:33 ensim sshd[450]: Failed password for root from > MY.SERVER.IP port 58421 ssh2 > > Aug 20 12:44:33 ensim sshd[450]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:36 ensim sshd[453]: Failed password for root from > MY.SERVER.IP port 58565 ssh2 > > Aug 20 12:44:36 ensim sshd[453]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:38 ensim sshd[455]: Failed password for root from > MY.SERVER.IP port 58672 ssh2 > > Aug 20 12:44:38 ensim sshd[455]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:41 ensim sshd[456]: Failed password for root from > MY.SERVER.IP port 58787 ssh2 > > Aug 20 12:44:41 ensim sshd[456]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:43 ensim sshd[457]: Failed password for root from > MY.SERVER.IP port 58961 ssh2 > > Aug 20 12:44:43 ensim sshd[457]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:46 ensim sshd[458]: Failed password for root from > MY.SERVER.IP port 59132 ssh2 > > Aug 20 12:44:46 ensim sshd[458]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:48 ensim sshd[459]: Failed password for root from > MY.SERVER.IP port 59348 ssh2 > > Aug 20 12:44:48 ensim sshd[459]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:51 ensim sshd[465]: Failed password for root from > MY.SERVER.IP port 59495 ssh2 > > Aug 20 12:44:51 ensim sshd[465]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:53 ensim sshd[466]: Failed password for admin from > MY.SERVER.IP port 59622 ssh2 > > Aug 20 12:44:53 ensim sshd[466]: Received disconnect from > MY.SERVER.IP: 11: Bye Bye > > Aug 20 12:44:56 ensim sshd[467]: Failed password for admin from > MY.SERVER.IP port 59803 ssh2 > > Aug 20 12:44:56 ensim sshd[467]: Received disconnect from > MY.SERVER.IP: 11:
one of the worst things (in hosting) has happened. I received a notice this morning from lfd (configserver) that someone had logged into my server as root and it wasn’t me.
Unfortunately I didn’t notice it until eight hours later so I have no idea (yet) what happened during that period. Thankfully I don’t have any really critical data on the system that could have been stolen.
I’m in the process of restoring from a full system backup right now. After that’s done I’m going to look to see what the differences are between the files from the backup and that on the comprised drive. I’m not sure if I’ll get anything useful from the diff but hopefully I’ll find a clue as to how they got root access.
Then of course I need to get my server back up. However, I don’t want to do this until I’ve taken some steps to identify how the individual got in and take some additional preventative steps.
Here’s what I am planning on doing:
1) Check to make sure all exposed services are patched and look at some security sites to see if there are any known vulnerabilities for these services. Anyone know which sites are good to look at?
2) Change firewall to only allow ssh access from a couple specific IP addresses.
3) Disable root ssh access so I have to login via a different account and perform sudos, etc.
4)?
I’ll also look for a good server-hardening guide to see if there are some obvious things I forgot to secure.
Do any of you find folks have any other suggestions or resources that I should check out?
So one of the sites on our box was compromised earlier today.
We've shut it down for now and contacted our sysadmin to help research the problem. Not sure if he will be able to really help much as he's only done updates and such in the past.
Any idea of quality sysadmins who might be able to investigate the box and the site?
I have been trying to troubleshoot our Windows 2003 server for weeks, but have made no lead way. The following are the steps they take to breach the server.
“They” are able to create an account. Some used usernames they have created are: sysadmin, adm, mssqladm.
It is very odd, looking in the event viewer, they just appear to create accounts out of the blue, they don’t even login or attempt to login or anything, all the sudden it says, New Account Created.
“They” then change the password of the account they just created.
Then “They” assign themselves the following group permissions, ‘Users’, and ‘Administrators’. ** SHAKING MY HEAD ** How the bloody hell do they assign themselves Administrator rights?
Then the do a few different actions depending, often times they disabled the windows firewall, and change open ports, other times they simply just logoff, other times, they have placed Trojans horses and other malware in their temporary internet folder under their use folderr.
This has been a cat and mouse game for weeks, I catch the new account, and immediately delete it, and check the firewall and enable if needed, then run a full system scan with AVG and Prevx. Sometmies AVG finds Trojans and malware, other times its clears.
I have racked my brain, checked all running processes with google, and they are seem legit. I have updated everything in windows via windows update, we are running windows 2003 server SP2. I have looked at the users and groups and everything seems secure.
Do you have guys have any idea what is going on? I have feeling something is running internally, which is allowing them to create the accounts.
Is there a tool that tracks all currently running processes, and allows you to go look at the logs to see what exactly was running at a certain time?
My server (using plesk 8.1 on windows 2003 server) has been compromised with some sort of rootkit and I'm investigating vulnerabilities. This server hosts some of my asp.net applications and I have to grant Modify Permission to IIS WP (iwam_plesk) user on Some subfolders (under Httpdocs folder for each domain). Is it a security problem? if yes, how else can I allow asp.net applications to write to, say, an Access db?
I have a few shred hosting servers I run. One of them keeps getting listed on CBL. It is very frustrating. Does anyone have an tools, tips, or tricks on finding the compromised?
So far I have confirmed that a script is using PHP to send mail out bypassing the MTA. It is faking the HELO and impersonating a well known ISP.
I used a combination of tshark and netstat. tshark can show me the HELO and EHLO. When I see the wrong entry I cross check that with netstat to see what. So Netstat only shows that it was PHP not the script path.
nohup tshark -f "port 25 and src host XX.XX.XX.XX" > /var/log/monitor/tshark-smtp.log & Then I grep for what I'm looking for:
grep -i "HELO" /var/log/monitor/tshark-smtp.log
Is there a way to get Netstat to show the script path or complete command that is establishing the connection? Currently these scripts are eating up memory to a point that other process or getting killed off.
I also tried to force all mail through the MTA, but When I enable SMTP_BLOCK in my firewall config I get and error:
*WARNING* Cannot use SMTP_BLOCK on this VPS as the Monolithic kernel does not support the iptables module ipt_owner - SMTP_BLOCK disabled.
If there is a better way I'm game. Maybe some IDS that can tell me more of what is going on with the server?
I have read many helpful feedbacks regarding choosing a reliable web host. Most of the concerns are centered around costs. However, I am more particular about the relative security of my website in addition to other perks such as space, speed and bandwidth. I rate my concerns on a 1-10 scale:
Security 9/10 Bandwidth 7.5/10 Disk space 6/10 E-mails, backups, etc: 8/10 Cost: 7/10
Ok...posting this here to hopefully get someone's attention at gnax.net.
I've written their abuse@gnax.net and engineer@gnax.net multiple times and even called into their support line and spoke with Stephen (or Steven). No one there seems to care.
They have a group of Vietnamese hackers on their network that are launching attacks from several of their servers. They also have a google phising site on one of the servers.
Spoke with Stephen at Gnax support and his answer was that it wasn't his job and I needed to send a e-mail to abuse. After telling him that I'd done that multiple times he basically said oh well that he didn't know what to do.
Seems like the admins of gnax.net are either very irresponsible, stupid or just ignorant.
Here are the URL's.
[url]
[url]
Just replace the 1's with t's and you can see for yourself. The fwooshnet.com attempts to download a trojan to your system so if you don't know what your doing don't visit either URL.
I just received a fairly scary WHMCS notice, you can view the details here:
<<please don't paste the file names, there are accounts that may have these on them>>
What are your thoughts on the entire situation? Personally, I'm a tad fearful (luckily, I hadn't upgraded to the next version yet as I was letting the other users play beta-testers) given the fact that there wasn't any versioning / modification 'notification' system in place on their end.
I'm fearing further updates. In essence, my concern is that the WHMCS development team isn't entirely certain how they were backdoored or to what scale they were backdoored.
Are their own billing systems & servers hosted in the same environment, were our billing details also released? etc. I want to know the scale of the attack.
I've been trying to fight off a hacker's attack for the past 24 hours. Chronologically, this is how the events evolved:
- Yesterday, I tried SSH-ing into my server as usual and I got an error saying that the host's key was not recognized, which made a bit suspicious
- I tried logging into my VPS' PowerPanel, but my root password did not work, which I found disturbing. I reached out to support and they reset the password
- I ignored Putty's warning and SSH-ed into the server and was greeted by this, which I've never seen before:
Code: Last login: Wed Mar 14 2007 14:13:35 -0500 No mail. This made even more conscious and I started actively searching for indicators of a breach.
- The following processes were running, and I did not recognize them:
Code: named 15756 0.0 0.4 36088 2256 ? S Mar14 0:00 /usr/sbin/named -u named -t /var/named/chroot
dmorg 26360 0.0 0.1 2264 872 pts/2 T 20:40 0:00 sh -c (cd /usr/share/man && (echo ".ll 14.2i"; echo ".pl 1100i"; /usr/bin/gunzip -c '/usr/share dmorg 26361 0.0 0.1 2264 512 pts/2 T 20:40 0:00 sh -c (cd /usr/share/man && (echo ".ll 14.2i"; echo ".pl 1100i"; /usr/bin/gunzip -c '/usr/share - Then I found a user called 'pma' in the /home directory, which I had never created. I could not find any suspicious files in the user's directory
- I finally spotted the point of breach in /var/log/messages:
Code: Mar 15 15:05:25 xxxxxxxxx passwd(pam_unix)[28121]: password changed for root Mar 15 15:06:34 xxxxxxxxx su(pam_unix)[30182]: session opened for user news by (uid=0) Mar 15 15:07:16 xxxxxxxxx su(pam_unix)[30182]: session closed for user news Mar 15 15:22:04 xxxxxxxxx sshd[20118]: Listener created on port 22. Mar 15 15:22:04 xxxxxxxxx sshd[20119]: Daemon is running. Mar 15 15:28:01 xxxxxxxxx su(pam_unix)[32568]: session opened for user pma by (uid=0) Mar 15 15:28:45 xxxxxxxxx su(pam_unix)[32568]: session closed for user pma Somehow they had gotten in as root and then opened sessions for news and pma.
- This morning I finally found where the hacker's files are hiding. He had created a new user overnight and a directory in there called "...". The folder contains various files:
Code: [root@xxxxxxxxx root]# cd "..." [root@xxxxxxxxx ...]# ls -al total 420 drwxr-xr-x 2 1004 1004 1024 Dec 17 08:57 . drwxr-x--- 8 root root 1024 Mar 16 15:48 .. -rwxr-xr-x 1 1004 1004 141817 Sep 3 2001 init -rw-r--r-- 1 1004 1004 113482 Mar 15 15:09 log -rw------- 1 1004 1004 640 Feb 18 05:34 messages -rw-r--r-- 1 1004 1004 664 Feb 27 01:12 muhrc -rwxr-xr-x 1 1004 1004 165596 Nov 2 2004 pico -rw------- 1 1004 1004 5 Mar 15 15:09 pid [root@xxxxxxxxx ...]# - Here's what's in the log file:
Code: [root@xxxxxxxxx ...]# less log
[Thu 08 May 08:03:27] + ---------- NEW SESSION ---------- [Thu 08 May 08:03:27] + muh version 2.05d - starting log... [Thu 08 May 08:03:27] + listening on port 6667. [Thu 08 May 08:03:27] + muh's nick is 'StefanG'. [Thu 08 May 08:03:27] + trying server 'geneva.ch.eu.undernet.org' on port 6667... [Thu 08 May 08:03:28] + tcp-connection to 'geneva.ch.eu.undernet.org' established! [Thu 08 May 08:03:29] + connected to 'Geneva.CH.EU.Undernet.org'. [Thu 08 May 08:03:30] + caught client from 'pcp02588223pcs.shlb1201.mi.comcast.net'. [Thu 08 May 08:03:45] + authorization successful! [Thu 08 May 08:03:45] + reintroducing channels...
[Thu 08 May 08:07:54] + ---------- NEW SESSION ---------- [Thu 08 May 08:07:54] + muh version 2.05d - starting log... [Thu 08 May 08:07:54] + listening on port 6667. [Thu 08 May 08:07:54] + muh's nick is 'StefanG'. [Thu 08 May 08:07:54] + trying server 'eu.undernet.org' on port 6667... [Thu 08 May 08:07:55] + tcp-connection to 'eu.undernet.org' established! [Thu 08 May 08:08:05] + connected to 'Diemen.NL.EU.Undernet.org'. [Thu 08 May 08:08:05] + caught client from 'pcp02588223pcs.shlb1201.mi.comcast.net'. [Thu 08 May 08:08:05] + authorization successful! [Thu 08 May 08:08:05] + reintroducing channels... There is a whole lot of these in that log file, and the timestamps look odd. I am not sure what all this is.
- This is where I am at right now. Can you guys help figure this thing out? How did they get in? What sort of vulnerability are they using? How can I patch things up?
- Here is my server info:
Code: [root@xxxxxxxxx ...]# uname -a Linux xxxxxxxxx.org 2.6.9-023stab033.9-enterprise #1 SMP Tue Dec 5 14:40:57 MSK 2006 i686 athlon i386 GNU/Linux
[root@xxxxxxxxx httpd]# vmstat 5 5 procs -----------memory---------- ---swap-- -----io---- --system-- ----cpu---- r b swpd free buff cache si so bi bo in cs us sy id wa 1 0 0 390688 0 0 0 0 0 0 0 8365 1 0 99 0 0 0 0 390524 0 0 0 0 0 0 0 0 0 0 100 0 0 0 0 390524 0 0 0 0 0 0 0 0 0 0 100 0 0 0 0 390528 0 0 0 0 0 0 0 0 0 0 100 0 0 0 0 390528 0 0 0 0 0 0 0 0 0 0 100 0
- I have Apache & MySQL & PHP running. I host 3 websites. They run Simple Machines Forum 1.1.2, phpMyAdmin, phpcollab, awstats and that's about it.
[mysqld] datadir=/var/lib/mysql socket=/var/lib/mysql/mysql.sock # Default to using old password format for compatibility with mysql 3.x # clients (those using the mysqlclient10 compatibility package). old_passwords=1
I have Plesk 11.5 (service provider mode) on a Windows 2008 server IIS7.Most of my sites are developed in .asp and therefore i use a custom 500-100.asp error page that check s the IP of the visitor then displays either a friendly error, or if its my IP a full error of what has happened (it also emails me the error). This allows me to debug pages easily whilst developing and to keep an eye on anyone trying SQL Injection hacks on my sites (as the error and email also have session variables and IP address).I dont have root access to the server as it is a Webfusion dedicated server.I have following the Plesk documentation -
1) Switch on custom errors for the subscription 2) Look in virtual directories and navigate to error documents 3) Find the error in question (500:100) and change it to point at either a file or URL
FILE - I had the data centre add in the 500-100.asp error page in to the virtual template so that my page is available in the list of virtual files - this didn't work but that maybe because its not a static page??
URL - when i add the path it says its incorrect, if i add a fully qualified address, it accepts it but it doesn't work.give me a specific example of the URL that can be entered relative to the root as the format in the documentation isn't accepted. The last step is to restart IIS which is also an issue as i cant seem to do this from the Plesk panel..It is as if it isn't catching the 500:100 error, and only catching the general 500 error??
I am currently running Google Analytics/Urchin 5 (v5.7.02), on a server, the server has started to act up, (on its last legs etc) and now I am trying to transfer the Urchin Software to a new server, where it would work effectively.
However upon installing the urchin software on the new server and running it (localhost:9999), I am presented with An Action Items Page, and these following choices
This is the scenario, domain.com are setup on server1, however server2 also has the same profile of domain.com as we use ns3 and ns4 using domain.com. This works fine with the nameserver setup on server2.
However I encounter problems as the emails from server2 won't reach server1 as there are duplicate profile on server2.
My question is how do I setup the DNS in cpanel/whm from server2 so the emails from server2 will reach server1?
I just want to use a server for file sharing, it will have nginx and that's it. I'm looking at centos, or freebsd, but I been using centos forever now and I'm not sure how to use freebsd, should I just stay with centos?
Do I tell my hosting provider to just install the OS and give me ssh action and that's it? Don't install any control panels or any other stuff? I want one domain and one subdomain on it though and ftp action.
I'm wondering whether it is possible to perform a full server migration to a new Plesk server with the same hostname or will Plesk give an error about the hostname being the same?
The new server would not be accessible by hostname (only via IP) until DNS and glue records were changed after the migration.
I've been developing a small 2D MMORPG lately. I bought a VPS to run the server on a few days ago and sadly it doesn't work so well. Sometimes the loads go pretty high (afaik not caused by me) and MySQL freezes, causing the server to just wait for MySQL to unlock, hanging all the players around on the map. Not a good thing.
Anyway, the game is very small scale, and I'm not planning to have more than maybe 30-50 players online. It does not suck up much CPU, I had ~10 guys online and loads stayed down at 0.00 on the VPS box.
Problem with getting a dedicated is our very low budget. As I'm still underage and living at home hammering my pc and don't have any real incomes, we're talking numbers like $ 30 - $ 50 USD per month - it's really hard to find for that price in Europe.
Requirements: Monthly payment, $ 30 - $ 50 / month, no setup (or very small setup, like $ 20) 10Mbit/s or faster connection, 100GB traffic should do 500MHz CPU is all cool 512MB or more RAM 5GB diskspace is enough Has to be in Europe due to ping times (< 100ms) Linux, Debian 4.0 prefered
If anyone knows where I could get something like this for a low price, $ 30 to $ 50 USD, it'd be great.