LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-01-2013, 02:55 PM   #1
sureshkumar.challa
LQ Newbie
 
Registered: Nov 2012
Location: Bangalore
Distribution: Ubuntu12.04
Posts: 6

Rep: Reputation: Disabled
Security problem : My directory some one edit


Hi,

I have a problem please help.

I am using ubuntu 12.04 OS. In my system someone edit my directory file.

Is there any script for notify mail when my Directory/folder can access by any one.
 
Old 08-01-2013, 03:17 PM   #2
tronayne
Senior Member
 
Registered: Oct 2003
Location: Northeastern Michigan, where Carhartt is a Designer Label
Distribution: Slackware 32- & 64-bit Stable
Posts: 3,541

Rep: Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065
Not a script as such but you can shut off write access to your directory(ies).

If you open a terminal window, you should be logged in to your home directory, say it's /home/your_name. If you
Code:
cd ..     <this puts you in the /home directory>
ls -l
<some directory names>
drwxr-xr-x 93 your_name    users    20480 Aug  1 15:52 your_name/
<some more directory names>
If the permissions don't look like drwxr-xr-x, change them so nobody else has write access to your home diectory:
Code:
chmod 755 your_name
ls -l
and you should see the permission as above.

You may also wish to change your UMASK value; it should be
Code:
umask
0022
If it isn't (your system administrator may have set it to a different value), get back in your home directory (just type cd and hit the enter key) and edit your .profile or .bashrc file or whatever file name is used to set your environment when you log in and add a line to the bottom of that file like this:
Code:
umask 0022
That will, by default, set any new files your create to read-write for you, read for your group members and read for public (nobody but you can write to a file); it will set executable files you create to read-write-execute for you, read-execute for your group and read-execute for public but, again, nobody will be able to write to the executable file.

Other than that, consider how someone gained access to your stuff -- is your password known to others? If so, change it immediately.

Hope this helps some.

Last edited by tronayne; 08-01-2013 at 03:22 PM.
 
1 members found this post helpful.
Old 08-01-2013, 03:45 PM   #3
sureshkumar.challa
LQ Newbie
 
Registered: Nov 2012
Location: Bangalore
Distribution: Ubuntu12.04
Posts: 6

Original Poster
Rep: Reputation: Disabled
Thank you very much for this update.

Actually i have a different problem.

I was maintaining some servers. Last week it was hacked. Some one access my server and edit one directory and add some files into that directory.

So I don't want happen again like this.

So if any one access my files/directories immediatly notify through mail to me.

So can you please tell any way to solve this problem.
 
Old 08-01-2013, 04:05 PM   #4
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,685

Rep: Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972
Quote:
Originally Posted by sureshkumar.challa View Post
Thank you very much for this update.
Actually i have a different problem. I was maintaining some servers. Last week it was hacked. Some one access my server and edit one directory and add some files into that directory.

So I don't want happen again like this. So if any one access my files/directories immediatly notify through mail to me.
So can you please tell any way to solve this problem.
First, if your servers were hacked, you have MUCH bigger problems. You IMMEDIATELY need to do a VERY thorough audit of your server, check for rootkits/scripts/users, and change passwords AT A MINIMUM. After that, you need to put a decent firewall in place, and figure out how they got in.

After that, you can use inotify in a script to watch whatever you'd like, and take whatever action you'd like. This topic has been covered on this site MANY times in the past...please use the LQ Search feature to look for threads. Also, Google has many solutions as well...did you look in either place?
 
Old 08-01-2013, 04:30 PM   #5
tronayne
Senior Member
 
Registered: Oct 2003
Location: Northeastern Michigan, where Carhartt is a Designer Label
Distribution: Slackware 32- & 64-bit Stable
Posts: 3,541

Rep: Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065
In addition to what @TBOne says above, check your system logs for remote log in with ssh (that's what the bad guys usually use).

Also, look at your /etc/passwd file -- it should look a lot like this one:
Code:
cat /etc/passwd
root:x:0:0::/root:/bin/ksh
bin:x:1:1:bin:/bin:/bin/false
daemon:x:2:2:daemon:/sbin:/bin/false
adm:x:3:4:adm:/var/log:/bin/false
lp:x:4:7:lp:/var/spool/lpd:/bin/false
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/:/bin/false
news:x:9:13:news:/usr/lib/news:/bin/false
uucp:x:10:14:uucp:/var/spool/uucppublic:/bin/false
operator:x:11:0:operator:/root:/bin/bash
games:x:12:100:games:/usr/games:/bin/false
ftp:x:14:50::/home/ftp:/bin/false
smmsp:x:25:25:smmsp:/var/spool/clientmqueue:/bin/false
mysql:x:27:27:MySQL:/var/lib/mysql:/bin/false
rpc:x:32:32:RPC portmap user:/:/bin/false
sshd:x:33:33:sshd:/:/bin/false
gdm:x:42:42:GDM:/var/state/gdm:/bin/bash
oprofile:x:51:51:oprofile:/:/bin/false
apache:x:80:80:User for Apache:/srv/httpd:/bin/false
messagebus:x:81:81:User for D-BUS:/var/run/dbus:/bin/false
haldaemon:x:82:82:User for HAL:/var/run/hald:/bin/false
pop:x:90:90:POP:/:/bin/false
nobody:x:99:99:nobody:/:/bin/false
<user accounts below here>
Note that every administrative account (except root) is /bin/false: that means there's no log in on any administrative account (and there should not be any log in on any administrative account).

Look at your /etc/shadow file; it should look like this:
Code:
cat /etc/shadow 
root:encrypted root password here:0:::::
bin:*:9797:0:::::
daemon:*:9797:0:::::
adm:*:9797:0:::::
lp:*:9797:0:::::
sync:*:9797:0:::::
shutdown:*:9797:0:::::
halt:*:9797:0:::::
mail:*:9797:0:::::
news:*:9797:0:::::
uucp:*:9797:0:::::
operator:*:9797:0:::::
games:*:9797:0:::::
ftp:*:9797:0:::::
smmsp:*:9797:0:::::
mysql:*:9797:0:::::
rpc:*:9797:0:::::
sshd:*:9797:0:::::
gdm:*:9797:0:::::
oprofile:*:9797:0:::::
pop:*:9797:0:::::
apache:*:9797:0:::::
messagebus:*:9797:0:::::
haldaemon:*:9797:0:::::
nobody:*:9797:0:::::
<user accounts below here>
Note that there should be no password for any of those administrative accounts (the * in the password field is impossible to decrypt). If there are passwords on any administrative account, replace them with an asterisk (*).

Change your root password immediately -- do not use a dictionary word, use upper- and lower case letters, numbers, punctuation, good password practice.

Change your own password immediately.

Force a password change for all users.

That's a good start.

Hope this helps some.

PS: wish you'd said that in the first place -- it sounded like a user account being fiddled with by another user rather than a system breech.
 
Old 08-02-2013, 01:32 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by sureshkumar.challa View Post
So if any one access my files/directories immediatly notify through mail to me. So can you please tell any way to solve this problem.
As you've gathered from responses this is not the "problem" to focus on. Focus on mitigating the effects of the attack and solving the breach of security first.



Quote:
Originally Posted by sureshkumar.challa View Post
(..) I was maintaining some servers. Last week it was hacked. Some one access my server and edit one directory and add some files into that directory.
"Last week" is too long ago. Act now!

- Before you do anything else please first read the CERT Intruder Detection Checklist. While old it may still show you actions to perform in case you don't know what to do.
- notify users of systems under investigation they should change their keys / pass phrases and avoid using these system because they're suspected to be compromised,
- mitigate the situation by stopping non-vital services (you need SSH to get in, not Apache, MySQL, FTP or any R-services) or denying access to those services by raising the firewall,
- after stabilizing either prepare /etc, /tmp, /var/tmp, /home and /var backups for future reference and start providing new properly secured and hardened server(s) if continuity must be guaranteed or start your investigation.

We need to know a few things about the (perceived) compromised machines:
- Where are they located? (home, colocation, shared hosting, vps, cloud, etc)
- The date of the incident?
- What exact distro + release + kernel (*If you run Ubuntu 12.04 then you must be running Ubuntu 12.04.2 LTS as that's the current Long Term Support release),
- What is their purpose? (What services do they run / provide) *Note also take into account software running on top of the web server like CMSes, web logs, shopping carts, photo galleries, statistics packages and anything else including 3rd party plugins,
- What do system, daemon and firewall logs show?
- Was all software kept up to date?
- Were these machines hardened?
- What do audit (Samhain, Logwatch, etc, etc), auth (last, lastb, lastlog) and IDS data (Snort, Bro, Prelude, etc, etc if any) show?
- Exactly what files did you find, where did you find them and what was ownership / access rights and MAC times (see 'stat')?
- Have you checked user shell history files?

Please be verbose when you reply because the more nfo we have the better advice can be tailored.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Can't edit /etc/security/limits.conf mbk0asis Linux - Newbie 4 03-07-2012 02:54 AM
How to edit files in directory /etc/apt/sources.list.d/ in ubuntu 11.10 zdwc01 Linux - Newbie 3 12-06-2011 02:50 PM
[SOLVED] NIS, NFS /home directory security problem anujkaushal Linux - Security 4 09-11-2011 08:14 PM
How edit local security policy eng_mohammedmostafa Linux - Software 2 04-26-2009 09:43 AM
Cannot edit files pertaining to SSH security bourne Linux - Server 3 11-19-2007 09:23 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:35 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration