On 7/8/05, Brett Glass <[EMAIL PROTECTED]> wrote:
> Give ME a break. You're only stating the obvious: the more
> daemons are running, the more exposure.
Brett say hello to my insta-trash filter.
Get a hair cut you damn hippie
http://www.ymmv.com/gifs/brett.gif


 This particular box
> is running BIND 8, a transparent Squid proxy, and SSH. BIND
> is sandboxed and Squid is running as a nonprivileged user.
> Squid is also set not to take requests from outside.
> 
> I wasn't the one who configured it; I've been asked to
> analyze it.
> 
> --Brett
> 
> At 11:56 PM 7/6/2005, Ted Mittelstaedt wrote:
> 
http://www.ymmv.com/gifs/brett.gif
> 
> >Sure, FreeBSD 4.11 is very easy for a remote attacker to root.
> >All you need to do is let a user on it setup some convenient
> >password like the word "password" for the root user, and use
> >the same on an easy-to-remember userID
> >like "sam" or "bob", then put a DNS entry in for it like
> >"porno-pictures.example.com" and post that on a popular website
> >and it shouldn't take but a few days for it to get rooted.
> >
> >Other than that, give me a break, Brett.  If this is a router and
> >an out of the box install then there's no services turned on
> >that can be rooted.  Is it customary to run a webserver on your
> >router nowadays?
> >
> >Give us a list of services this box is running and we can give
> >you a better idea of how easy it might be to root.
> >
> >Ted
> >
> >>-----Original Message-----
> >>From: [EMAIL PROTECTED]
> >>[mailto:[EMAIL PROTECTED] Behalf Of Brett Glass
> >>Sent: Wednesday, July 06, 2005 9:42 AM
> >>To: [EMAIL PROTECTED]
> >>Subject: Has this box been hacked?
> >>
> >>
> >>A client had a network problem, and I wanted to make sure that
> >>his FreeBSD 4.11
> >>router wasn't the cause of it, so I rebooted it. I then did a
> >>"last" command
> >>and saw the following:
> >>
> >>root             ttyv0                     Tue Jul  5 12:01 -
> >>12:05  (00:04)
> >>admin            ttyp0    localhost        Tue Jul  5 11:57 -
> >>11:57  (00:00)
> >>root             ttyv0                     Tue Jul  5 11:49 -
> >>12:00  (00:11)
> >>reboot           ~                         Tue Jul  5 11:49
> >>shutdown         ~                         Tue Jul  5 11:47
> >>root             ttyv0                     Tue Jul  5 11:37 -
> >>shutdown  (00:10)
> >>reboot           ~                         Tue Jul  5 11:36
> >>shutdown         ~                         Tue Jul  5 05:36
> >>shutdown         ~                         Tue Jul  5 11:22
> >>
> >>Note the "shutdown" entry with the time 5:36 AM, which is odd
> >>because it's out of
> >>chronological order and the other logs don't show the typical
> >>debug messages
> >>at that time. Where might such an entry come from? How likely
> >>is it that the box
> >>has been rooted? Are there known exploits that might have been
> >>used to root a
> >>FreeBSD 4.11-RELEASE machine? (The only unusual activity I can
> >>see in the logs is a
> >>few attempts to log in as "root" via SSH. The attempts that
> >>were logged were
> >>not successful, but of course a skilled attacker would cover
> >>his tracks.)
> >>
> >>--Brett
> >>
> >>_______________________________________________
> >>freebsd-questions@freebsd.org mailing list
> >>http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> >>To unsubscribe, send any mail to
> >>"[EMAIL PROTECTED]"
> >>
> 
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to