Findings from day 2

From Gridkaschool
Jump to navigationJump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
+ ISO image mount into /mnt/isoimage was detected 
+ C file compilation was detected (root escalation) 
+ syslog was clean 
+ brute-force attack was discovered on user produser 
+ user soval was banned 
+ several jobs were restarted 
+ SSH daemon was discovered to be compromised, ssh daemon was restored 
+ skynet root kit used (info on seclists) 
+ Machines were booted under version control 
+ mtab was modified as attacks started (ISO image was mounted) 
+ executable was detected and killed (several times over) 
+ problem with creamce was detected (a+r/w) 
+ both sshd and ssh binaries were compromised (permissions and attributes were screwed up) 
+ original config was restored 
+ ssh was locked down to root and produser only 
+ user dgram logged in to the site w/pub key 
+ user produser's private key was probably ripped off 
+ exploit code was found in ~produser 
+ telnet backdoor detected 
+ ssh binaries were reinstalled 
+ privilege escalation is unclear 
+ modified executables and config files were found and fixed 
+ attack was run from produser 
+ suspect python script was found 
+ user hekate was found & banned 
+ tampering with .bashrc was detected 
+ /etc/backup.tgz was deleted 
+ "from" statements were added to /root/.ssh/authorized_keys 
+ /var/tmp/...* 
+ forecast service was not brought back up