Once the Linux server is compromised, the detection process

Source: Internet
Author: User
Tags tomcat server

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiERm87Ie "style=" border:0px;margin:20px 0px; "alt=" 0bkierm87ie "/>

Author | Hazbund Source | Freebuf

0x00 Preface

The story is this, Lunar New Year, customer response to their server can not access, view the route, found that a ORACLE+TOMCAT server UDP traffic oversized, the bandwidth accounted for, the new Year, the customer first found the local technical staff to get a few days did not fix, and then no way to find us third day ... The Customer is God!

In fact, I have encountered this kind of attack before, at that time an IDC was paralyzed, but the horse is not in our equipment, so not too much attention ...

0x01 Find Trojan

First SSH login, top view process, find strange name of the command GEJFHZTHBP, a look on the feeling there is a problem.

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiEQIw9Dc "style=" border:0px;margin:20px 0px; "alt=" 0bkieqiw9dc "/>


View the associated file, discover the external TCP connection, do not know if it is reverse shell ...

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiENYsmnI "style=" border:0px;margin:20px 0px; "alt=" 0BKiENYsmnI "/>

650) this.width=650; "src=" http://si1.go2yd.com/get-image/0BKiEMGj1cm "style=" border:0px;margin:20px 0px; "alt=" 0bkiemgj1cm "/>

Execute command


View the file path. and view the file creation time, which matches the intrusion time.

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDs12FMm "style=" border:0px;margin:20px 0px; "alt=" 0BKIDS12FMM "/>

By the way, copy the files down to the Kali virtual machine to try the power, a few seconds results are as follows ...

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDqY183E "style=" border:0px;margin:20px 0px; "alt=" 0bkidqy183e "/>

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDtfll0C "style=" border:0px;margin:20px 0px; "alt=" 0bkidtfll0c "/>

I thought it was a foreigner, it should prove that the people are doing it ...

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDv6I2ka "style=" border:0px;margin:20px 0px; "alt=" 0bkidv6i2ka "/>

0X02 Resume Business

First kill process, the result is certainly not so simple, the process changed a name and came out

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDvvmlbU "style=" border:0px;margin:20px 0px; "alt=" 0BKiDvvmlbU "/>

In the middle of a lot of process, ps–ef |grep found that the parent process is different each time, the association process is sometimes sshd, sometimes pwd,ls, the middle of a VNC connection, and then shut down the SSH service, the same invalid, and kill a few times found that the parent process becomes 1, the level is limited, the production server, Or conservative treatment, to business-oriented bar ...

Since the invasion, the first or the firewall of the SSH map off it, after all, the server is still to use, or to write a few iptables rules it

Iptables-a Output-o lo-j ACCEPT

Allow native access to native

Iptables-a output-m State--state established-j ACCEPT

Allow unsolicited access to this server

Iptables-a output–p tcp–d

IP whitelist that allows the server to actively access

Iptables-a DROP

Refusal of external access

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDxTqU9A "style=" border:0px;margin:20px 0px; "alt=" 0bkidxtqu9a "/>

Here, the business is back to normal.

0x03 Find Reason

In fact, in the beginning I realized that the problem is SSH, but first to help people to restore business again, the Web port is only Tomcat, web vulnerabilities have been checked, what Struts2,manager page, there are some common web vulnerabilities will not exist, unless there is 0day .... Oracle doesn't even have a single ssh.

Based on this, I directly check the root account SSH log, turn and turn, finally ....

Cd/var/log Less secure

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiDymp9BA "style=" border:0px;margin:20px 0px; "alt=" 0bkidymp9ba "/>

650) this.width=650; "src=" http://si1.go2yd.com/get-image/0BKiE0GaMsq "style=" border:0px;margin:20px 0px; "alt=" 0bkie0gamsq "/>

For example, the use of Indonesian IP blasting success, and the back of the server intranet IP landed unexpectedly is a failure, asked the customer, it is understood how the end, they add equipment, to the server temporarily changed the weak password to facilitate a variety of third-party technical personnel debugging, and then estimated to forget to change back, the result of tragedy, was the bad man landed not The root password has also been changed, you can not log on ... I wonder if their boss knows ...

Keep looking at the history file and see what people are doing.

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiE1V81Wi "style=" border:0px;margin:20px 0px; "alt=" 0bkie1v81wi "/>

650) this.width=650; "src=" Http://si1.go2yd.com/get-image/0BKiEFLIabQ "style=" border:0px;margin:20px 0px; "alt=" 0BKiEFLIabQ "/>

The operation of the bad guys is basically here, he executed a lot of scripts, who knows how much he did, or recommend the customer to re-install the system it ...

0x04 PostScript

The main or own experience is shallow, Linux operation and maintenance play is not familiar, do not know how to drive out the horse completely ... Daniel, don't squirt.

Article Source: Marco Education

Official: Marco Linux operations

Technology Exchange Group: 485374463

This article is from the "Marco Linux Training" blog, so be sure to keep this source http://mageedu.blog.51cto.com/4265610/1901543

Once the Linux server is compromised, the detection process

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.