![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Jun 2002
Location: france
Posts: 996
|
My server was hacked.. :(
They created a new user in mail group.. and installed a program called john from openwall.com locate at: ftp://dl.openwall.com:21/pvt/3d9a566...x-1.7.2.tar.gz
i detected this becouse my server was slow.. when i checked the proces was around 10 "john" top rocesses runing.. anybody know what is this program john they installed and runed on my server? i still don't know how they entered on my server.. if they created a new user then they had root access or the user can be created under other user? i've deleted the new user they created, changed the root and ftp password..what should i do next? |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Join Date: Jun 2002
Location: france
Posts: 996
|
no advice?
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Let slip the dogs of war.
Industry Role:
Join Date: Jan 2003
Location: Bermuda
Posts: 17,263
|
Being as you're location is France, maybe try doing what the Fench do best and simply surrender?
__________________
. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Confirmed User
Join Date: Apr 2005
Location: Montreal
Posts: 1,569
|
wonder in John is a brute force password cracker??? john the ripper
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 | |
Confirmed User
Industry Role:
Join Date: Aug 2006
Location: Poland
Posts: 9,228
|
Quote:
![]() ![]() ![]()
__________________
Mechanical Bunny Media Mechbunny Tube Script | Mechbunny Webcam Aggregator Script | Custom Web Development |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Join Date: May 2004
Posts: 506
|
Since you don't know how they got in you are looking at a pretty ugly situation. First I would check to see if you are running any old scripts like an outdated version of PhpBB. Often those are ways your typical script kiddie gets in.
When you do find the hole, patch it and move on. If they were in there as root, then just pony up the money for an OS reinstall and put your backup on then fix the security leak. -A |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed User
Join Date: Dec 2002
Location: gone
Posts: 2,864
|
you better contact your server admin asap !
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Join Date: Dec 2001
Location: London
Posts: 927
|
yup it's a password cracker. More info here: http://www.openwall.com/john/pro/
If I were you and you aren't experienced in server security I'd get a professional to look at your server. Pay your host to secure it. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Confirmed User
Join Date: Jun 2002
Location: france
Posts: 996
|
yeah..is john the ripper.. but since they cold create a new user i asume that they got already the password in order to create this user.. why wold they need a brute force password cracker anymore then?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Join Date: May 2002
Location: Montreal
Posts: 6,797
|
Where are you hosted and have you contacted them about this?
Ray
__________________
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 | |
rockin tha trailerpark
Industry Role:
Join Date: May 2001
Location: ~Coastal~
Posts: 23,088
|
Quote:
![]() ![]() ![]() ![]()
__________________
__________ Loadedca$h - get sum! - Revengebucks - mmm rebills! - webair (gotz sErVrz) ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 |
Industry Role:
Join Date: May 2003
Posts: 12,464
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 | |
making it rain
Industry Role:
Join Date: Oct 2003
Location: seattle
Posts: 22,072
|
Quote:
![]() The answer is, for when you patch whatever vulnerable daemon gave them shell access in the first place, they can simply login as a normal user (on a multiuser box most people won't change those passwords after a compromise) and run whatever rootshell they left planted around your system. Box is fucked, get a new one and copy your sites over. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 |
Confirmed User
Industry Role:
Join Date: May 2006
Posts: 7,436
|
try to find him, then slay him and at the end sue him
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 |
Moo Moo Cow
Join Date: Mar 2004
Location: Washington State
Posts: 14,748
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 |
Confirmed User
Industry Role:
Join Date: Aug 2002
Posts: 9,752
|
Run a root check:
To install chrootkit, SSH into server and login as root. At command prompt type: cd /root/ At command prompt type: wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz At command prompt type: tar xvzf chkrootkit.tar.gz At command prompt type: cd chkrootkit-0.47 At command prompt type: make sense To run chkrootkit At command prompt type: /root/chkrootkit-0.47/chkrootkit If you clean then remove the account on the server and start it over. Any page can be a back door so really you should start it over. |
![]() |
![]() ![]() ![]() ![]() ![]() |