Notices
Computer & Technology Related Post here for help and discussion of computing and related technology. Internet, TVs, phones, consoles, computers, tablets and any other gadgets.

Rooted

Thread Tools
 
Search this Thread
 
Old 06 February 2003, 11:30 AM
  #1  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

Got a big prob here. A friend with an nt4 box has been rooted. Not only have they installed Dameware remote software, like pc anywhere but they have installed an ftp server on the quiet. Hacked by some runt called Gladdi-Tribun.

Now Ive removed the remote control crap via services, deleted the ftp server (with directories for Warez, MP3 and **** (no super_si, there wasn't any - I looked ) I installed Grisoft etc for him and scanned it. No "offical" trojens etc. However in the aftermath of all this im left with two questions.

1. Firstly, his firewall is very tight indeed. All users except http have to authenticate, leading me to believe his firewall may have been busted open (FW NG) Anyone know of any exploits that would allow this type of thing ? There is no iis running

2. Secondly how do I delete the folders. they have created folders, for example com1 etc but I can't delete em. Any idea how ? Im getting "Cannot delete com1: Access is denied. Make sure the disk is not full etc etc" Ive deleted all sub dirs though, and removed all the dodgy services.

Any ideas ?

Old 06 February 2003, 11:38 AM
  #2  
David_Wallis
Scooby Regular
 
David_Wallis's Avatar
 
Join Date: Nov 2001
Location: Leeds - It was 562.4bhp@28psi on Optimax, How much closer to 600 with race fuel and a bigger turbo?
Posts: 15,239
Likes: 0
Received 1 Like on 1 Post
Post

I think I would me tempted to flatten the box and rebuild it..

Then migrate the data that you want back.

Then I would look at some IDS software.. and check antivirus is up to date.. Also run mshfnetchk.. (or whatever) Microsoft Hotfix Checker.

And Speak to Jeff Wiltshire.

David
Old 06 February 2003, 11:44 AM
  #3  
stevencotton
Scooby Regular
 
stevencotton's Avatar
 
Join Date: Jan 2001
Location: behind twin turbos
Posts: 2,710
Likes: 0
Received 1 Like on 1 Post
Post

You should bin that disk and start again from scratch really if you want to be totally sure, it's the only way.

Steve.
Old 06 February 2003, 12:18 PM
  #4  
HHxx
Scooby Regular
 
HHxx's Avatar
 
Join Date: Nov 2001
Posts: 2,576
Likes: 0
Received 0 Likes on 0 Posts
Post

Rebuild it from scratch to be on the safe side.

But if his firewall was locked down tight then it shouldn't be letting in services that are not required, e.g ports for the remote control software, ftp etc...

The firewall should be locked down for incoming and outgoing traffic and if need be tied down to ip address for certain services.

H
Old 06 February 2003, 12:25 PM
  #5  
Jeff Wiltshire
Scooby Regular
 
Jeff Wiltshire's Avatar
 
Join Date: Nov 2000
Location: 412 Wheel HP Audi RS4
Posts: 2,021
Likes: 0
Received 1 Like on 1 Post
Post

Without have a look at the rulebase it is very difficult to comment on how it happened. Chances are that there is a mis-configuration that has allowed this to happen.

I'm not aware of any Checkpoint specific exploits that would allow this to happen, it might be possible that some other machine within his enviroment has been rooted as well and this was used to attack to internal server. Typically the DMZ machines are attacked which then gives the Hacker access to the internal network. Most companies treat DMZ machines as a trusted network

I would agreee that the safest thing to do is rebuild the machine from scratch and then apply all the relevant patches.


Jeff
Old 06 February 2003, 12:47 PM
  #6  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

Thats easier said than done I think. The box runs a bespoke DB and is a mission critical box. Therefore very major and disruptive task to rebuild. I honestly dunno what to tell him to do. I know a rebuild is safest but i don' think its gonna happen.
Old 06 February 2003, 12:53 PM
  #7  
Jeff Wiltshire
Scooby Regular
 
Jeff Wiltshire's Avatar
 
Join Date: Nov 2000
Location: 412 Wheel HP Audi RS4
Posts: 2,021
Likes: 0
Received 1 Like on 1 Post
Post

You need to get someone in to look at the firewall and the security surrounding the whole system.
Old 06 February 2003, 12:55 PM
  #8  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

Rebuild!!!!

I would!!!

BB
Old 06 February 2003, 01:22 PM
  #9  
Gedi
Scooby Regular
 
Gedi's Avatar
 
Join Date: Jan 2003
Posts: 932
Likes: 0
Received 0 Likes on 0 Posts
Post

software firewalls are pretty much a waste of time when dealing with good hackers. You can go straight through them with no real problems. To protect your network you need to have a dedicated machine running the firewall with packet inspection at the least. Preferebly not a windows machine...although they can be locked down if a lot of work is put into them.

You haven't said what kinda box it was that he was running...i.e. was it for home use or something else....this would give an insight as to what kind of person would comprimise the box, and how much care you would need to take when reintroducing it to the net.

The fact that the cracker (hackers are great people )installed rem admin software and an FTP server leads me to belive that hes only a script kiddie and has not penetrated the firewall. He will have got in some other way. There are thousands of ways in without alerting the firewall. Even little things like cookies or allowing javascripts in the browser or email software can put serious holes in the box.

From the kind of attack you have described, I would assume you should be fine after removing the software and cleaning the registry....keep a close eye on outbound connections at all times though...alerting you when something accesses the net without permission.

If this was a good hacker, he would not have left these kind of trails behind. Good hackers are much more stealth. Its just a WISK (WIndows Skript Kiddie) you encountered
Old 06 February 2003, 01:29 PM
  #10  
Gedi
Scooby Regular
 
Gedi's Avatar
 
Join Date: Jan 2003
Posts: 932
Likes: 0
Received 0 Likes on 0 Posts
Post

I can give you loads of advice on securing the box/network from would be hackers...however, I can also put you intouch with a very experienced and talanted hacker/security admin too.

go to my forums here and speak to •°ºÐëvªÇhªnº°• He has about 20 years of experience on top of me
Old 06 February 2003, 02:07 PM
  #11  
Jeff Wiltshire
Scooby Regular
 
Jeff Wiltshire's Avatar
 
Join Date: Nov 2000
Location: 412 Wheel HP Audi RS4
Posts: 2,021
Likes: 0
Received 1 Like on 1 Post
Post

Gedi

You seem to have missed that this NT4 box was behind a Checkpoint FW-1 NG firewall.....
Old 06 February 2003, 02:30 PM
  #12  
Nick VR4
Scooby Regular
 
Nick VR4's Avatar
 
Join Date: Nov 2002
Posts: 164
Likes: 0
Received 0 Likes on 0 Posts
Post

Ok thinking outloud here
This might be a silly question (and sorry if it is)

If you dont have iis running why have http open on port 80
Old 06 February 2003, 02:36 PM
  #13  
akshay67
Scooby Regular
 
akshay67's Avatar
 
Join Date: Nov 2001
Posts: 2,342
Likes: 0
Received 0 Likes on 0 Posts
Post


Rebuild
patch up
harden (properly)

firewalls are useless against things like netcat which let you port through legit ports. Did you check the implied rules on CP?

Ideally, you want your server hack proof (at service level) even if the firewall was completely open - defence in depth.

Old 06 February 2003, 03:08 PM
  #14  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

The box is quite ap "prize". It is a duel 900 MHz Dell Poweredge with 1 GB mem and ~300 GB sitting on the end of a 2MB leased line.

Port 80 is open because the firewall redirects the http requests to the DMZ, on which the webserver is located. The actual machine in question sits on the internal lan.

I talked about rebuilding the box and just got an erm, well, perhaps, dunno type answer, so I will just have to lock the firewall down some more, if I can find the hole. I will try and post the rulebase later and see what you all think.

The actual firewall is NG NG feature pack 3 sitting on a hardened Win2K box, and this, from what I can see hasn't been compromised.

Regards

Stuart
Old 06 February 2003, 03:23 PM
  #15  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

He has about 20 years of experience on top of me
hahah you mean he has 20years and 1 days experience!!!

LOLMFAO

BB
Old 06 February 2003, 03:24 PM
  #16  
Badger Stuffer
Scooby Regular
 
Badger Stuffer's Avatar
 
Join Date: Jan 2003
Posts: 3,824
Likes: 0
Received 0 Likes on 0 Posts
Post

Take the URP/3 switch and swap it with a grp-32/a wibble magnet. You can then use take the URP/3 switch and use it as a toenail clipper.

Old 06 February 2003, 03:28 PM
  #17  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

IIS isn't installed. Its just I think the box had a little flaw because it was well patched etc HOWEVER I have just found iisinst.exe in the trash! dubious ! I tried to connect to it ie http://localhost etc but nothing was active, no iis related files.

This is the ftp server that was running

It would suggest that it has been a script idiot because of the poor spelling scannend instead of scanned.

220-Serv-U FTP Server v3.0 for WinSock ready...
220-
220-
220-***********************************
220- Scannend by Gladdi ®
220-***********************************
220- Server Statistics:
220-
220- [ Your Ip xx.xx.xx.xx ]
220- [ Servertime: 09:16:42 ]
220- [ Total Users: 0 total ][ Online Users: 1 ]
220- [ Downloaded: 0 kb ][ Uploaded: 0 kb ]
220- [ Average bandwith: 0.000 kb/sec ]
220- [ Current bandwith: 0.000 kb/sec ]
220- [ Server is running since: 0 Days, 1 Hours, 7 Minutes,36 Seconds ]
220- [ Space left: 27430.02 ]
220-
220-***********************************
220- hacked by Gladdi-Tribun ®
220 ***********************************
Old 06 February 2003, 03:29 PM
  #18  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

or you can get a double-refractive thermo energiser model VII and couple this with a high grade wax sealed potentiometer, and dial in some security, until your happy.
then superglue the rotary spindle in place for security

badger stuffers solution is cheaper though.

good luck

BB

or you can get the hacker to deal direct with Gedi, and he'll probably nod off after 10 seconds, thus rendering him harmless.

Old 06 February 2003, 03:37 PM
  #19  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

serously stueyb,
thats quite bad...

this script looks like it tried to install this ftp tool.

is there a green U on the taskbar/system tray??

have a look for a serv u folder and corresponding ini type file.
this may indicate where the connection came from.
ie. you have to add users to this service, and he may have twatted himself and published his ip address.
.just a thought!!

BB
Old 06 February 2003, 03:45 PM
  #20  
stevencotton
Scooby Regular
 
stevencotton's Avatar
 
Join Date: Jan 2001
Location: behind twin turbos
Posts: 2,710
Likes: 0
Received 1 Like on 1 Post
Post

I'm so glad we're all afforded the luxury of basquing in the glorious flow of intelligence from Beemerboy.
Old 06 February 2003, 03:46 PM
  #21  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

whats that in English???

hahah just lightening up the situation for him...
no malice intended!!



BB
Old 06 February 2003, 03:46 PM
  #22  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

I did look and i did find the ini files. There wasnt the sys tray icon there, but it had been installed in a hidden directory in the recycle bin on the d:\ drive

The ini files had no ip addys, just usernames and encrypted passwords. It also had a "backup" copy of ftp server called "ate".

Old 06 February 2003, 03:51 PM
  #23  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

Also, have lost the ability to do a right click properties
Old 06 February 2003, 04:00 PM
  #24  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

hold on mate, i'll make a few enquiries!!
BB
Old 06 February 2003, 04:07 PM
  #25  
beemerboy
Scooby Regular
 
beemerboy's Avatar
 
Join Date: Sep 2002
Location: Essexville
Posts: 4,391
Likes: 0
Received 0 Likes on 0 Posts
Post

stevecotton?
basquing
your mixing up the 'pursuit of relaxation' with your hobby of 'wearing your wifes hooterholders'!!!

BB

Old 06 February 2003, 04:08 PM
  #26  
ChristianR
Scooby Regular
iTrader: (1)
 
ChristianR's Avatar
 
Join Date: May 2001
Location: Europe
Posts: 6,329
Likes: 0
Received 1 Like on 1 Post
Post

Did they upload any good stuff?
Old 06 February 2003, 04:09 PM
  #27  
stevencotton
Scooby Regular
 
stevencotton's Avatar
 
Join Date: Jan 2001
Location: behind twin turbos
Posts: 2,710
Likes: 0
Received 1 Like on 1 Post
Post

I'm seriously embarassed about my poor spelling.
Old 06 February 2003, 04:13 PM
  #28  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

Still can't delete it. It says it can't find the path specified. I know the path is correct. There are some other files for instance config.log that I can see but the file system refuses to open it or even see it.
Old 06 February 2003, 04:29 PM
  #29  
Stueyb
Scooby Regular
Thread Starter
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

All the actual folders where empty so I guess it was just ready to use as such, so no gud sh*t.

Old 06 February 2003, 05:09 PM
  #30  
ChristianR
Scooby Regular
iTrader: (1)
 
ChristianR's Avatar
 
Join Date: May 2001
Location: Europe
Posts: 6,329
Likes: 0
Received 1 Like on 1 Post
Post

you should of let it run, and monitored it.

find out what ip address they are connecting as, then check the f/w logs for that ip etc..


Quick Reply: Rooted



All times are GMT +1. The time now is 11:58 AM.