The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   UNIX - Newcomers (http://hintsforums.macworld.com/forumdisplay.php?f=15)
-   -   Hacked (http://hintsforums.macworld.com/showthread.php?t=28759)

hoops 09-30-2004 08:05 PM

how easy is it to disguise your IP address so to say that the intruder wasn't really at 82.79.116.77 or would it be more a case of 82.79.116.77 already being hacked and using that box as a mask to attack mine?

CAlvarez 09-30-2004 08:26 PM

Yeah, don't be hung up on the culprit being physically in Romania.

For future security, you should examine your true business needs and come up with a comprehensive security policy. This is a big part of my job--preventing just this sort of thing.

One of the basic suggestions I can offer is to consider using a VPN and disallowing all remote access that is not authenticated/tunneled by the VPN. You can have greater control with shared keys, or at least extra-tough passwords for the VPN users (different from their system passwords). It can be done pretty economically.

yellow 09-30-2004 08:26 PM

Quote:

Originally Posted by hoops
how easy is it to disguise your IP address so to say that the intruder wasn't really at 82.79.116.77 or would it be more a case of 82.79.116.77 already being hacked and using that box as a mask to attack mine?

IMO, it's more likely the latter then the former. I also wouldn't expect that box to be the first link back to the original machine either.

Off the top of my head, I cannot thing of a way to spoof an IP when connecting directly to a service like ssh. However, I'm neither a hacker/cracker, nor a trained computer forensic tech.

CAlvarez 09-30-2004 08:32 PM

Here are some of the ways...

1. Buy an account on a server in that country. Server space is cheap in most countries. Security is lax.
2. Use an anonymizing or tunneling service. Hacker groups have them for use by their members.
3. Gain access to a zombie or network of zombies. It's not that hard.
4. Crack another account, and use that to bounce your attacks from.

I was ops manager for an ISP in the past, and now do a lot of security work. You might be shocked at how easy it is for someone with ill intent to launch a semi-anonymous attack. The new legions of zombied Windows XP workstations are going to be a huge problem for everyone soon. Right now they're mostly used to send phishing spam, but I expect they will be used for much more soon.

yellow 09-30-2004 08:47 PM

Quote:

Originally Posted by CAlvarez
but I expect they will be used for much more soon.

I see DDoSes in Microsoft's future. :(

aubreyapple 09-30-2004 09:25 PM

Quote:

Originally Posted by derekhed
Hoops,

PermitRootLogin no

I also use the AllowUsers directive in my config...

On X.3.5, setting these two config options causes ssh to fail. What version of ssh and/or sshd are you using?

hoops 09-30-2004 09:49 PM

Quote:

Back to the original topic... the cracker seems to not be very um, well, elite. He uses ls -all, a syntax indicating that he has only a trivial understanding of the ls command. He doesn't cover his tracks. And most important, he jumps immediately to erasing the hard drive rather than using the computer as a mule.

Yet there is no record of failed password attempts (at least in what you've shown us). This indicates that the cracker already knew the root password before attempting to break in.

So who would fit these two attributes? A disgruntled former employee? Or a shoulder-surfing disgruntled current employee?

Trevor
Trevor eventhough the command execution is blunt and crude which could point to a person in a hurry or suffers from poor unix commands the fact that they contolled it via a potential hacked box in Romania (I am not hung up on the Romanian thing - but it did come from there) shows that they have some nouse on cracking.

trevor 09-30-2004 10:00 PM

Well, you would think that would be true, and I really wish it were. Unfortunately, due to Microsoft's incompetent "secure" programming, Windows boxes are easily susceptible to viruses and worms that open large gaping back doors that any script kiddie who can download a couple of programs can exploit. Basically, there are literally millions of pre-compromised boxes sitting on the Internet available for just anyone to take over and do anything they want with.

So, if a disgruntled employee at your workplace shoulder surfs you to get the root password, and wants to get revenge for some past tussle with you, he could easily just find some compromised Windows box to bounce off of before hitting your XServe. This would make him think nobody can trace him.

Trevor

trevor 09-30-2004 10:05 PM

Quote:

Originally Posted by derekhed
PermitRootLogin no

I also use the AllowUsers directive in my config...

Quote:

Originally Posted by aubreyapple
On X.3.5, setting these two config options causes ssh to fail. What version of ssh and/or sshd are you using?

aubreyapple, I have PermitRootLogin no set in my /etc/sshd_config file in OS X 10.3.5 without any failure of ssh or sshd. I am using the versions of ssh and sshd that ship with OS X. I don't use the AllowUsers directive, though, perhaps that is the problem in 10.3.5?

Trevor

OpenSSH_3.6.1p1+CAN-2004-0175, SSH protocols 1.5/2.0, OpenSSL 0x0090704f

aubreyapple 09-30-2004 10:23 PM

OpenSSH_3.6.1p1+CAN-2004-0175, SSH protocols 1.5/2.0, OpenSSL 0x0090704f is my installation. Wierd.

I am two security updates behind, so maybe it is in there. I do not have 2004-09-07 or the next one. Too many people reporting the latest ones
break things, I guess.

hayne 09-30-2004 10:42 PM

Quote:

Originally Posted by aubreyapple
On X.3.5, setting these two config options causes ssh to fail.

You might find out why if you put sshd into debug mode via the -d option.
Note that you will have to restart sshd after each connection when it is in this mode.

aubreyapple 09-30-2004 11:15 PM

Ok, first of all, the version of ssh I had was:
OpenSSH_3.6.1p1+CAN-2003-0693, SSH protocols 1.5/2.0, OpenSSL 0x0090702f

Updated the security updates and now my version agrees.

However, ssh out still fails with PermitRootLogin no. I do not see that
sshd is involved with this failure.

Oddly enough, ssh inbound is ok with this line in the file. It is ssh outboud which fails and sshd does not run when ssh is working outbound.

trevor 09-30-2004 11:22 PM

And is the PermitRootLogin no set in your ssh_config or your sshd_config?

Actually, perhaps this needs to be in a new thread...

Trevor

aubreyapple 10-01-2004 12:25 AM

I am blind... aha sshd_config not ssh_config. That works and has the desired effect.

derekhed 10-01-2004 03:07 AM

Nah, it doesn't sound like your IT guys to me. I'd go over there with a box of donuts sometime and see what they think of your situation. IT guys like this kind of thing. And they like donuts.

;)

Anyway, I am concerned about your new security policy.
Quote:

FYI I have reinstalled OS, changed all passwords, restored data from tape and currently disabled SSH. Also I have enabled password policies thus disabling accounts on 3 failed attempts.
So what this means is if they stumble across one of your account names, you have allowed them to create a DoS attack on that account. You may end up with more phone calls than you want from any user with a guess-able name. You can easily tell what usernames they are using by grepping them out of the logs. If you think your account names are safe, fine. Just be aware of this type of risk.

sao 10-01-2004 03:41 AM

Quote:

yellow wrote:
I would suspect the in-house angle as your first line of suspicion.
And as MervTormel once said... :)

Quote:

Originally posted by myersm1
I should point out that all of this is being done within a company firewall, where it shouldn't really matter if cleartext passwords or data are slung around.

mervTormel wrote:
au contraire! the worst, most insidious attacks are from within. it's a matter of trust, and let's face it, you can't trust anyone, especially the accounting trolls you see every day (can you say A.Andersen?)
.

derekhed 10-01-2004 03:56 AM

God I miss Merv!

Anyway, I still don't think it's an inside job. Are the IT guys good enough to fake their IP? Granted I have only been on Unix since OS X came out, but I am far from that good. I doubt someone that competent would wipe your hard drive with such poor grammar. They'd screw with you a bit first. If I this was personal and I knew a whole lot more than someone I didn't like, I'd let 'em know. :cool:

Unless you're busy pissing off more than just the IT people at your office. :rolleyes:

hoops 10-01-2004 04:34 AM

I like to think I'm pissing no one off - but I have had a couple of bad things happen recently;

got the svchost.exe worm on a Win2000 box Domino web enabled,
then a root kit installed on a RHEL WS 3 which aslo had SSH open, couldn'tget the logs on that one,

the 3 incidents happnened on separate LANS but connected by a national WAN.

all this in one month and nothing prior in 5 years.

derekhed 10-01-2004 04:40 AM

Yeah, CAlverez made note of larger scale incidents. What's a RHEL WS 3?

hoops 10-01-2004 04:47 AM

RHEL WS 3

Red Hat Enterprise Linux Workstation

(used as a accucobol based financial transaction server)


All times are GMT -5. The time now is 10:36 PM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.