brute force ssh attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hallo, 

there are numerous brute force ssh attacks in the web.  
I was quite curious, and for fun, I created the typical 
user accounts and set easy to guess passwords.... 

Yesterday, such a ssh login was successful for users
kevin and daikanyama.     The hackers changed the passwords 
for both logins.   They installed a certain program  
"undernet" as daikanyama and started a program called mech. 

After some minutes, I removed the network cable, killed 
all the processes of the users and disabled these users.

Then, I figured out that some programs as grep did not work. 
I rebooted the machine, but during the reboot I got 
various "segmentation faults", "illegal instructions", ....

I booted from an FC3 rescue CD, and I found out that 
various executables in /bin and /user/bin where 
manipulated (grep, egrep, gzip, rpm, mount, ...). 
I replaced these manipulated executlables by original 
files, but I forgot to replace gtbl. 

Then, the machine booted correctly.  Later when gtbl 
was called, some executables in /bin  and /user/bin 
where manipulated.  It seems to be some virus, when 
you start a manipulated executable it manipulates 
other executables.  

I managed to replace all manipulated files and the 
machine seems to work correctly. 

My question is:  They did not guess the root password, 
how did they manipulate files which are only writable 
by root???

Is anyone interested in log-files or in the programs 
which the hackers installed under daikanyama?

Best regards,  Daniel

-- 
+++ Sparen beginnt mit GMX DSL: http://www.gmx.net/de/go/dsl


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux