Tilted Forum Project Discussion Community  

Go Back   Tilted Forum Project Discussion Community > Interests > Tilted Technology


 
 
LinkBack Thread Tools
Old 11-09-2005, 06:13 PM   #1 (permalink)
Addict
 
rmarshall's Avatar
 
Location: Kingston,Ontario
I feel violated!

We were hacked today at work. The systems guy opened the firewall this morning to allow a potential client in to demo some software on our system. We usually only allow access via the Cisco VPN.

At 10:12AM, somebody managed to login as one of our users. He did a wget to get a file from some computer on the web and un-tarred it to run his own programs. After about 49 minutes, he had the root password. As root, he created his own user account. He was logged in this account for about 22 minutes before the system guy noticed and started to kill the guys processes. He then changed the root password, the original users password and deleted some files before the system guy killed him and closed the port at about 11:45AM.

He managed to get back in on another port at 2:03pm while the system guy was in a meeting. I killed his shell and then we pulled the plug on the Nortel switch, effectively killing the internet for the whole office.

We had the Bell forensic guy in and I left at about 3:00pm as they brought down the Linux servers and I had nothing to do. I think they were going to find all the info they could and then scrub the disk and restore a backup.

I don't know if they could be able to find the guy with his IP address. He created a user "usher" and got a file called team2.tgz from http://usherul.0catch.com/team2.tgz . He then did a tar -xfzv team2.tgz and then he cd'd the the team2 directory he created and started running programs there. Apparently, 0catch.com is an ISP, so either usherul is the hacker's account or one of his victims.

I don't know if the guy got any of our files. There was alot of text files there with some client info. The machine is used for conversion of data to an Oracle database. The production database runs on another machine and was not touched.

It was kindof scary. He got kind of pissed when he was discovered and deleted some files on the development box and changed passwords. I don't think that's a usual way of hacking.

We'll have to find another way of running a demo, probably by using VPN.

Bummer.
rmarshall is offline  
Old 11-09-2005, 06:43 PM   #2 (permalink)
Devils Cabana Boy
 
Dilbert1234567's Avatar
 
Location: Central Coast CA
Sorry dude, that sucks. We’ve never had anything that bad happens at my work.

Have a tough root password, if it is simple some one can brute force it quickly if they can get a hold of the password hash. At my work, all accounts that have admin access have passwords longer then 10 char's, including at least 5 special char's. If you need help with ideas for passwords, let me know, I wont post any of my tricks but if you PM me, I’ll send you some ideas.
__________________
Donate Blood!

"Love is not finding the perfect person, but learning to see an imperfect person perfectly." -Sam Keen
Dilbert1234567 is offline  
Old 11-09-2005, 07:48 PM   #3 (permalink)
Insane
 
hober's Avatar
 
Wonder if the guy got in via the potential client who came in innocently? Perhaps the client was already comprimised?
hober is offline  
Old 11-09-2005, 10:10 PM   #4 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
damn... reminds me of the time we got a keylogger sent to an admin and it ended with the FBI coming in an going up everyone's ass...

sorry bro...

ALWAYS practice safe computing, not even for a few minutes should you let your guard down.
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not.
Cynthetiq is offline  
Old 11-09-2005, 11:40 PM   #5 (permalink)
Addict
 
tbh, I think that noticing the guy within 22 minutes was good.
The majority of admins wouldn't have anything set to alert them.

I know a LOT of the places I've worked haven't had it.
Security and IDS just aren't seen as valid expenditures for a lot of companies.

Pity.
WillyPete is offline  
Old 11-10-2005, 05:58 AM   #6 (permalink)
Darth Papa
 
ratbastid's Avatar
 
Location: Yonder
Quote:
Originally Posted by Cynthetiq
ALWAYS practice safe computing, not even for a few minutes should you let your guard down.
Yep. I read somewhere that an unpatched Windows box sitting bare on the Internet gets hacked and zombied in an average of 20 minutes. You should NEVER open ports unless there's an extremely good reason.

We had a similar thing happen at my company a few years back. Turned out my admin had left an old version of sshd on ALL the servers, and they ALL got thoroughly pwned. It was a total nightmare trying to deliver on the custom programming I'd sold that month--all my developer time went into rebuilding boxes, and our SLA was totally shot, which means big refunds for our customers. I didn't get paid that month because of those bastards.

EDIT: My journal entry about it is <a href="http://www.tfproject.org/tfp/journal.php?do=showentry&e=3328">HERE</a>, just so you don't feel too alone.

Last edited by ratbastid; 11-10-2005 at 06:22 AM..
ratbastid is offline  
Old 11-10-2005, 06:38 AM   #7 (permalink)
Professional Loafer
 
bendsley's Avatar
 
Location: texas
How come the client couldn't just come in over the VPN? It's easy enough to setup a user on a VPN Concentrator or Pix. How is the VPN authenticating users (LDAP/AD, PAM, local)?

Could your company not have setup an L2TP connection with the client and have him connect that way? That way he wouldn't have to install the Cisco VPN client if he didn't have it already (install requires a reboot because it makes a virtual network adapter).

If you're going to open your firewall for any reason, you want to section off what is going to be needed to a different VLAN, so as not to allow access to other machines.

I guess I don't see why your "systems guy" didn't think about some of this before just opening your firewall to the outside world. Hence, the purpose of firewalls.

Just my $0.02.
__________________
"You hear the one about the fella who died, went to the pearly gates? St. Peter let him in. Sees a guy in a suit making a closing argument. Says, "Who's that?" St. Peter says, "Oh, that's God. Thinks he's Denny Crane."
bendsley is offline  
 

Tags
feel, violated


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT -8. The time now is 11:50 PM.

Tilted Forum Project

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360