[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] CHkrootkit output
- Subject: Re: [cobalt-users] CHkrootkit output
- From: "PageKeeper Service" <host@xxxxxxxxxxxxxxxxxxxxx>
- Date: Sun Apr 18 11:14:01 2004
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
> > > > Subject: Re: [cobalt-users] CHkrootkit output
> > > >
> > > >
> > > > > >
> > > > > > I believe that machine has been hacked. Is cron doing weird
stuff?
> > > Other
> > > > > > processes like devine?
> > > > >
> > > > >
> > > > > And you conclusion is based on ??
> > > > Seeing it first hand. Some notes..
> > > > Cron will work. Tuning it off is the problem, a process called
devine
> > > > will popup usually once a day and stay running. Its nasty. Believe
it
> > can
> > > > sniff the username and pw of clients
> > > > isp logins besides the system passwords. They used a wget from the
> > server
> > > to
> > > > download it from a free isp in europe.
> > > > They entered through a script called phpnuke one time and cgi
(forgot
> > the
> > > > name) on another raq4. Other than those
> > > > notes it ran fine. It also searches files for cc numbers, email
> > addresses
> > > > and any ftp user connections from any scripts.
> > > > Once I saw that, it went offline. A reboot usually starts the ball
> > rolling
> > > > if I remember right,
> > > > then clients can be locked out of shell and ftp along with the
admin.
> > mods
> > > > to the hosts.deny and allow files.
> > > >
> > > > > Cron is fully operational and normail.
> > > > >
> > > > > No strange processess
> >
> > Google T0rn Rootkit. I think that is part of the package that was
> installed.
> > I'll try to find my notes.
>
> BTW, Can anyone share the fix to keep the below out of chkrootkits
output?
>
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/mod_perl/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/MD5/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Quota/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/XML/Parser/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Devel/Symdump/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Jcode/.packlist
> /usr/lib/perl5/5.00503/i386-linux/.packlist
>
> or with the latest MySql,
>
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/mod_perl/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/MD5/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Quota/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/XML/Parser/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Devel/Symdump/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/DBI/.packlist
>
/usr/lib/perl5/site_perl/5.005/i386-linux/auto/Msql-Mysql-modules/.packlist
> /usr/lib/perl5/site_perl/5.005/i386-linux/auto/Jcode/.packlist
> /usr/lib/perl5/5.00503/i386-linux/.packlist
>
> >
Evidence:
.--.
l$$$$l ------ [ design by j0hnny7 / zho-d0h ]----
l$$$$l .-. .-. .-.
l$$$$l .,g%T$$b%g,. .,g%T$$$T%y,. .,g%T$T%y,.l$$$l .-. l$$$l
.glS$$$$Slyl$$$$' '$$$$lg$$$T' '$$$$ll$$$$'
'$$$$l$$$l.,gdT$'l$$$l,gl$$$lp,.
l$$$$$$$$$$l$$$$ $$$$l$$$$$ '---'l$$$$ $$$$l$$$$T"~''
l$$$llll$$$lllll
'"lT$$$$Tl"l$$$$ $$$$l$$$$$ l$$$$ $$$$l$$$$Tbg.
l$$$l'"l$$$l"'
l$$$$l l$$$$. ,$$$$l$$$$$ l$$$$ $$$$l$$$l~"$Tp._l$$$l l$$$l
l$$$$l ~"$TbggdT$"~ '---' '---' `---"---' '---"---' l$$$l
l$$$$l .,. ::' there is no stopping, what can't be stopped... ''---'
`$$$$Tbg.gdT$
`--------'
-----[ version 6.66 .. 2308200 ..
torn@xxxxxxxxxxxxxxxxxxxx ]----
-| Ok a bit about the kit... Version based on lrk style trojans
-| made up from latest linux sources .. special thanks to
-| k1ttykat/j0hnny7 for this..
-| First rootkit of its kind that is all precompiled and yet allows
-| you to define a password.. password is stored in a external encrypted
-| file. The trojans using this are login/ssh/finger ..
-| This kit was designed with the main idea of being portable and quick
-| to be mainly used for mass hacking linux's, hence the precompiled bins.
-| Usage : ./t0rn <password> <ssh-port>
-| <password>
-| ----------
-| this will be the new ssh and login password
-| to use it with login u must...
-| [login]
-| * the default password is "t0rnkit"
-| bash# export DISPLAY=t0rnkit-looser
-| bash# telnet tornkit.com
-| Trying 127.0.0.1...
-| Linux 2.2.16 (tornkit.com)
-| login: torn <this can be anything>
-| Password:arf
-| bash#
-| [ssh]
-| * the defualt port is 47017
-| ssh -l t0rnkit-looser -p <ssh-port>
-| <ssh-port>
-| since this version you can now change ur ssh port as well..
-| so..
-| ssh -l <login> -p <ssh-port>
-| [finger]
-| finger password@xxxxxxxxxxx
-| this adds a simple inetd bindshell..
-| then .. telnet to host on 2555
-| <files>
-| -------
-| ok our hidden dir for this version is ... /usr/src/.puta
-| file hiding still similiar to lrk...
-| .1file <- files ... echo "filename" >> /usr/src/.puta/.1file
-| .1proc <- proc's to hide - "t0rn*" is hidden by default
-| .1addr <- lrk style address hiding from netstat...
-| <more about the files in .puta>
-| ------------------------------
-| 't0rnsb' - sauber by socked - log cleaner
-| 't0rns' - standard linux sniffer
-| 't0rnp' - snifferlog parser
-| <patching>
-| ----------
-| current patches include a very stupid wuftpd patch.. and a
-| rpm -U statd patch..
-| <Gr33tz !!@!~! oh how can we forget this>
-| -----------------------------------------
-| fly out to in no particulr order...
-| X-ORG/etC!/m0s/Blackhand/tnt/APACHE/sv3ta/Sl|der/dor/angelz/
-| Annihilat/Unkn0wn/j0hnny7/k1ttykat/_random/dR_hARDY/
-| Cvele/DR_SNK/flyahh/sensei/snake/#etcpub and everyone i forgot... innit.
-| and a special greeet goes out to mah babehh xeni !
------ [ EOF ] ------------------------------------------------------------
> > > > David Hahn
> > > > PageKeeper Service
> > > > 1512 Deborah Road #102
> > > > Rio Rancho, New Mexico 87124 US
> > > > 505-892-8723
> > > > http://www.pagekeeperservice.com