A recent popular method of gaining root access to some networked machines
involved exploitation of the NXT record buffer overflow in BIND; it became
so popular in later March that CERT put out a new advisory on the problem
which had been the subject of an advisory last year.   This issue is why
RedHat 6.2 now uses a non-privileged user to run BIND.   I watched several
DNS servers for different domains get hit on the same day, and each time
the intruder  started installing one of the DDoS systems.

- rick warner -

On Fri, 19 May 2000, Burke, Thomas G. wrote:

> I'm not sure, but the 60400 port may be the Trin00 stuff...  I got hacked
> with that one, & I never did find the daemon that was running...  It looked
> a liitle to me like the script is set up to run periodically, maybe by cron
> - so check your cron.hourly, etc for something that'll run things that
> shouldn't be there...  I finally found a new copy of netcat in my /usr/bin
> directory, & removed it...
> 
> I'm still not sure how the guy broke into my machine, but however he did it,
> it was pretty transparent to me.  The only reason I realized he had done it
> was because the lazy goof didn't bother to change the scripts to point at
> what was _really_ my outgoing interface, causing my firewall to catch it &
> spew tons o' logs...
> 
> Good luck...  Maybe you can put port 60400 & the others specifically into
> hosts.deny
> ie: 60400:ALL
> 
> 
> > -----Original Message-----
> > From:       Brad [SMTP:[EMAIL PROTECTED]]
> > Sent:       Sunday, May 14, 2000 9:07 PM
> > To: [EMAIL PROTECTED]
> > Subject:    there's a hacker!
> > 
> > Dear all,
> > I am a newbie as a administrator of company's workstations.
> > Now I find(use "netstat") someone use Scorpio(one of workstaions) as a 
> > tcp proxy server at port 60400, but I don't know how to stop 
> > it.I used the "ps" command, it displayed as follows:
> >      UID   PID  PPID  C    STIME TTY      TIME CMD
> >     root     0     0  0   Jul 02 ?        0:09 sched
> >     root     1     0  0   Jul 02 ?        1:33 /etc/init -
> >     root     2     0  0   Jul 02 ?        0:57 pageout
> >     root     3     0  0   Jul 02 ?       1213:20 fsflush
> >     root   268   233  0   Jul 02 ?        1:15 /usr/openwin/bin/Xsun :0
> > -nobannd
> >     root   135     1  0   Jul 02 ?        0:24 /usr/sbin/inetd -s
> >     root   264     1  0   Jul 02 ?        0:00 /usr/lib/saf/sac -t 300
> >     root   115     1  0   Jul 02 ?        0:11 /usr/sbin/rpcbind
> >     root   107     1  0   Jul 02 ?        2:57 /usr/sbin/in.routed -q
> >     root   117     1  0   Jul 02 ?        0:00 /usr/sbin/keyserv
> >     root   207   196  0   Jul 02 ?        0:00 lpNet
> >     root   125     1  0   Jul 02 ?        0:00 /usr/sbin/kerbd
> >     root   123     1  0   Jul 02 ?        0:02 /usr/lib/netsvc/yp/ypbind
> > -broadt
> >   daemon   138     1  0   Jul 02 ?        0:00 /usr/lib/nfs/statd
> >     root   140     1  0   Jul 02 ?        0:00 /usr/lib/nfs/lockd
> >     root   163     1  0   Jul 02 ?        0:00 /usr/lib/autofs/automountd
> >     root   167     1  0   Jul 02 ?        0:01 /usr/sbin/syslogd
> >     root   186     1  0   Jul 02 ?        1:23 /usr/sbin/nscd
> >     root   220     1  0   Jul 02 ?        0:00 /usr/sbin/vold
> >     root   180     1  0   Jul 02 ?        0:47 /usr/sbin/cron
> >     root   196     1  0   Jul 02 ?        0:00 /usr/lib/lpsched
> >     root   265     1  0   Jul 02 console  0:00 /usr/lib/saf/ttymon -g -h
> > -p sco
> >     root 18358   135  0   Dec 04 ?        0:00 in.telnetd
> >     root   211     1  0   Jul 02 ?        0:04 /usr/lib/utmpd
> >     root   233     1  0   Jul 02 ?        0:40 /usr/dt/bin/dtlogin
> >     root   261     1  0   Jul 02 ?        0:00 /usr/lib/nfs/mountd
> >     root   259     1  0   Jul 02 ?        0:29 /usr/lib/nfs/nfsd -a 16
> >     root   267   264  0   Jul 02 ?        0:01 /usr/lib/saf/ttymon
> >     root  8642  8629  0   Jan 21 ?        0:30 dtgreet -display :0
> >     root  8629   233  0   Jan 21 ?        0:00 /usr/dt/bin/dtlogin
> >   nobody  7925   135  0   Nov 30 ?        0:00 fs
> >   regine 18360 18358  0   Dec 04 pts/5    0:00 -csh
> >     root  8602   135  0   Jan 21 ?        0:00 rpc.ttdbserverd
> >     root 17993   135  0                   0:00 <defunct>
> >     root 18764     1  0   Aug 30 ?        0:02 /usr/lib/sendmail -bd -q15m
> >     root  8631     1  0   Jan 21 ?        0:00 /usr/openwin/bin/fbconsole
> > -d :0
> >    oscar 13463     1  0   Mar 21 ?        0:04 ftp mew.tcs
> >     root  7439  7419  0 08:42:13 pts/7    0:00 /usr/bin/ps -ef
> >     root  7417   135  0 08:12:59 ?        0:00 in.telnetd
> >    ccchu  4607     1  0   Mar 15 ?        0:00 fs
> >     guest  7419  7417  0 08:13:00 pts/7    0:00 -csh
> >     guest  7092     1  0 19:26:45 ?        2:18 sim.v2
> > 
> > Does anybody knows how I can find the hacker ps,and stop
> > it? 
> > thanks a lot.
> > Brad
> > 
> > --------------------------------------------------------------------------
> > Brad Chun
> > [EMAIL PROTECTED]
> > "The best way to escape from your problem is to solve it." 
> > --------------------------------------------------------------------------
> > 
> > 
> > -- 
> > To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> > as the Subject.
> 
> 
> -- 
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 
> 


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to