Strange command histories in hacked shell server

Ganbold ganbold at micom.mng.net
Thu Dec 16 05:09:15 PST 2004


Hi,

Sorry for cross posting.

I have with FreeBSD 5.3-stable server which serves as a public shell server.

FreeBSD public.ub.mng.net 5.3-STABLE FreeBSD 5.3-STABLE #6: Wed Nov 24 
15:55:36 ULAT 2004     tsgan at public.ub.mng.net:/usr/obj/usr/src/sys/PSH  i386

It has ssh and proftp-1.2.10 daemons.

However it was hacked and I'm trying to analyze it and having some 
difficulties.

Machine is configured in such way that everyone can create an account itself.
Some user dir permissions:
...
drwxr-xr-x  2 root       wheel         512 Mar 29  2004 new
drwx------  3 tamiraad   unix          512 Apr  9  2004 tamiraad
drwxr-xr-x  6 tsgan      tsgan        1024 Dec 16 17:51 tsgan
drwx------  4 tugstugi   unix          512 Dec 13 20:34 tugstugi
drwxr-xr-x  5 unix       unix          512 Dec 13 12:37 unix
...
User should log on as new with password new to create an account.

Accounting is enabled and kern.securelevel is set to 2.
Only one account 'tsgan' is in wheel group and only tsgan gan become root 
using su.

Following is the some strange output from grave-robber (coroner toolkit):
...
Dec 13 04 20:18:40        5 m.c -rw-rw---- tugstugi 
smmsp    /var/spool/clientmqueue/dfiBDCIeD0001529
Dec 13 04 20:34:58      512 m.. drwx------ tugstugi unix     /home/tugstugi
Dec 13 04 20:35:57      512 ..c drwx------ tugstugi unix     /home/tugstugi
Dec 14 04 00:19:56        0 m.c -rw-rw-rw- tugstugi 
unix     /home/tugstugi/.myrc

Dec 14 04 00:20:50     9665 m.. -rw-r--r-- tugstugi 
unix     /home/tsgan/.tmp/known_hosts
                        9665 m.c -rw-r--r-- tugstugi 
unix     /home/tugstugi/.ssh/known_hosts

Dec 15 04 19:12:21     1002 m.c -rw------- tugstugi 
unix     /home/tugstugi/.shrc
...
Somehow he seems like copied /home/tugstugi/.ssh/known_hosts to 
home/tsgan/.tmp/known_hosts.
I don't know why.


Following is lastcomm output:
...
sshd             -F      tugstugi         __         0.16 secs Tue Dec 14 23:01
sh               -       tugstugi         #C:5:0x1   0.03 secs Tue Dec 14 23:02
su               -       tugstugi         #C:5:0x1   0.02 secs Tue Dec 14 23:38
...
sshd             -F      tugstugi         __         0.08 secs Tue Dec 14 22:41
sh               -       tugstugi         #C:5:0x1   0.02 secs Tue Dec 14 22:41
who              -       tugstugi         #C:5:0x1   0.00 secs Tue Dec 14 22:52
su               -       tugstugi         #C:5:0x1   0.02 secs Tue Dec 14 22:48
sh               -       tsgan            #C:5:0x1   0.00 secs Tue Dec 14 22:48
ls               -       tsgan            #C:5:0x1   0.00 secs Tue Dec 14 22:52
su               -       tsgan            #C:5:0x1   0.02 secs Tue Dec 14 22:49
csh              -       root             #C:5:0x1   0.03 secs Tue Dec 14 22:49
...

In above I think he already hijacked my account and root password so he 
used su to
become root.

sshd             -F      tsgan            __         0.02 secs Tue Dec 14 00:27
sh               -       tsgan            ttyp0      0.02 secs Tue Dec 14 00:27
cat              -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:28
su               -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:28
sleep            -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:27
^^^^^^
stty             -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:27
stty             -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:27
^^^^^^
fortune          -       tsgan            ttyp0      0.00 secs Tue Dec 14 00:27
...

I don't quite understand why he used sleep and stty commands in above.
My suspect is tty hijacking. Am I right? Correct me if I'm wrong.

sleep            -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
...
id               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
sleep            -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
id               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:24
cat              -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:24
ls               -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:24
su               -       tsgan            #C:5:0x2   0.02 secs Tue Dec 14 00:23
sh               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
id               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
sleep            -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
stty             -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
id               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
ls               -       tugstugi         #C:5:0x2   0.00 secs Tue Dec 14 00:23
cat              -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:23
su               -       tsgan            #C:5:0x2   0.02 secs Tue Dec 14 00:23
cat              -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:22
sleep            -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:22
stty             -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:22
stty             -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:22
fortune          -       tsgan            #C:5:0x2   0.00 secs Tue Dec 14 00:22
...
One more strange thing is "#C:5:0x2". What is this?

Again I'm suspecting that, this guy hijacked my tty and got tsgan and then 
he could log my keystroke and
get root password. Am I right?

Please give me some advice and info regarding this kind of hack.
What should I do in order to secure my shell server? I mean except 
securelevel, unneeded services etc.
Can somebody give me some hints on file and directory permissions?
Is there anybody who has similar server config and already had such issues 
and problems?
I appreciate very much if somebody will help me in this regard.

thanks in advance,

Ganbold



More information about the freebsd-security mailing list