LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-23-2003, 09:19 AM   #1
freelinuxcpp
Member
 
Registered: Jul 2003
Posts: 129

Rep: Reputation: 15
Angry my cisco got hacked !


hello everybody
here is my big problem :
i m an admin of a box that has a NAT server behind a router ( cisco ) i have 2addresse in the net server public and private one
the probleme is , that the admin of the router has descovred that someone has loged into his box ( cisco ) using the public addresse of the NAT server , i thought it's someone that have a private one and beeing masqueraded , well i cheked all today's connections ( i have a script that do the ipchains -L -M work ) , the probleme is there is no connection to the router over t he port 23 ; not one at all , this means the attacker wasen't one of my clients ( because i m the admin of the NAT machine) , thus i thought about beeing spoofed , someone got the IP of my nat server and used it to login the router , i even thought my box was compromized , i installed chkrooutkit , but it doesn't dtetected anything suspect i did this :
grep -r xxx.xxx.xxx.xxx /var/log/ ( where xxx.. = ROUTER IP) but nothing much this connexion isn't loged , PLEASE can someone help me , because the boss thiks i m the attacker since it's my machine , here is a worst stuff i had today !
thnx from theadvence and sorry for the bad english
 
Old 12-23-2003, 11:36 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
In case of doubt, regard the box as compromised, and act on it.

1. Since the Cisco is involved, please tell us:
- how long ago this incident happened,
- what the exact "evidence" was,
- if the admin took precautions and steps towards recovery and what they where,
- if adjacent boxen, subnets are (to be) investigated.


2. How you handle compromise detection and recovery of your NAT box depends on if the box is critical wrt business or not.
In any case you should:
- officially alert upper mgmnt, local IT dept, Security Officer or Incident Response Team (where available) of a suspected incident. If they are available, let them handle the process and do not access the box,
- let upper mgmnt alert customers or upstream ISP's (where applicable),
- ask assistance from experienced admins if available.


3. Your next step is to isolate the box from the network to remove the risk of it being part of the compromise. Before you do so, please tell us in detail about the box, it's services, accounts, upgrades, hardening measures etc etc. Please provide any details, anomalies you found in authentication, login, user, system or daemon config, resource or log files (and if you're responsable for investigating subnets behind the NAT too).

Last edited by unSpawn; 12-23-2003 at 11:38 AM.
 
Old 12-23-2003, 11:46 AM   #3
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
It would also help to know if there were any modifications made to the Cisco router(?)'s routing table, ACLs, etc... anything different can tip you to where the attack came from.

By the way, this shows why it's generally dangerous to allow IP connectivity for administration of network devices. It's much better (if you can afford it) to use a terminal server connected to the other devices with serial cables (then lock down the terminal server like crazy with IDS, security kernel patches, etc).
 
Old 12-23-2003, 11:53 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
//Moderator OT note: Chort, you familiar with CREED? The Cisco evidence disk?
 
Old 12-30-2003, 10:25 AM   #5
freelinuxcpp
Member
 
Registered: Jul 2003
Posts: 129

Original Poster
Rep: Reputation: 15
well first of all thanx for the reply ! this helped me so much .
after a long time of investigation i found that my box wasn't involved anymore , well let's say it was just used as gateway to acces the router , somebody of our staff ( which has a private ip) was sniffing the router and making a grep on each packet going to port 23 ( telnet ) he gor the pass that way , after that he loged in but he hasent all privilages ( i m notreally a cisco guru but they said: there is an other pass to get the root's ) that privilages since i m not teh router admin , i just gives the admin an advice : TO USE SSH rather then the insecure telnet , hope they will listen to me , thanx again for ur advices , now i m doing some research to set up a so secure machine from scratch ! ( hope a good luck for me )
over .

Last edited by freelinuxcpp; 12-31-2003 at 04:17 AM.
 
Old 12-31-2003, 03:53 AM   #6
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Quote:
Originally posted by unSpawn
//Moderator OT note: Chort, you familiar with CREED? The Cisco evidence disk?
Nope, never heard of it. That sounds like it would be very useful, though. Cisco sure has had a lot of remotely exploitable vulns recently
 
Old 01-01-2004, 04:54 AM   #7
ugge
Senior Member
 
Registered: Dec 2000
Location: Gothenburg, SWEDEN
Distribution: OpenSUSE 10.3
Posts: 1,028

Rep: Reputation: 45
As far as I know Cisco doesn't support SSH.
Your right. Cisco has two mode, unprivileged and privileged mode.
In unprivileged mode you can run some show commands and some information but to do any configuration you will have to enter privileged mode, which should require a password.
 
Old 01-01-2004, 10:58 PM   #8
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Some Cisco products do support ssh, I just forget which. It might only be their management devices, though.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Have I been hacked? PAB Linux - Security 3 04-18-2005 06:21 PM
Might have been hacked robintw Linux - Security 18 01-09-2005 04:10 PM
Have I been hacked? af_dave Linux - Security 3 07-14-2004 02:02 PM
being hacked? smallfish Linux - Newbie 19 09-20-2003 05:28 PM
Connect to Cisco VPN w/o Cisco VPN Client gboutwel Linux - Networking 4 02-07-2003 12:46 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:51 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration