• general insecurity

    From Spectre@21:3/101 to Nobody on Tuesday, December 31, 2019 06:32:00
    Despite the previous efforts I've still got some issues with the BBS user, thats used to ssh to TLP. Somehow they're able to exploit the account to insert a crontab. I've subsequently taken write perms off the users home directory, and innoculated the user crontab and then locked it by removing write permissions....

    Have to say I don't quite know what the result is, but the injection is,

    # (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
    #0 0 */3 * * /dev/shm/.lwp/.rsync/a/upd>/dev/null 2>&1
    #5 8 * * 0 /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #@reboot /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #0 0 */3 * * /dev/shm/.lwp/.rsync/c/aptitude>/dev/null 2>&1

    Its rsyncing to something? and it also tries to install something? I haven't looked at these in a terminal removing the /dev/null at this point, I s'pose I should look at the files its calling. The result is a rogue ./cron task, and a load average that shoots through the roof, on the octo core its out past 18 so it uses everything it can.

    Spec


    --- SuperBBS v1.17-3 (Eval)
    * Origin: (21:3/101)
  • From Spectre@21:3/101 to Nobody on Tuesday, December 31, 2019 06:32:00
    Despite the previous efforts I've still got some issues with the BBS user, thats used to ssh to TLP. Somehow they're able to exploit the account to insert a crontab. I've subsequently taken write perms off the users home directory, and innoculated the user crontab and then locked it by removing write permissions....

    Have to say I don't quite know what the result is, but the injection is,

    # (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
    #0 0 */3 * * /dev/shm/.lwp/.rsync/a/upd>/dev/null 2>&1
    #5 8 * * 0 /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #@reboot /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #0 0 */3 * * /dev/shm/.lwp/.rsync/c/aptitude>/dev/null 2>&1

    Its rsyncing to something? and it also tries to install something? I haven't looked at these in a terminal removing the /dev/null at this point, I s'pose
    I should look at the files its calling. The result is a rogue ./cron task,
    and a load average that shoots through the roof, on the octo core its out
    past 18 so it uses everything it can.

    Spec


    --- SuperBBS v1.17-3 (Eval)
    * Origin: (21:3/101)
  • From Spectre@21:3/101 to Nobody on Tuesday, December 31, 2019 06:32:00
    Despite the previous efforts I've still got some issues with the BBS user, thats used to ssh to TLP. Somehow they're able to exploit the account to insert a crontab. I've subsequently taken write perms off the users home directory, and innoculated the user crontab and then locked it by removing write permissions....

    Have to say I don't quite know what the result is, but the injection is,

    # (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
    #0 0 */3 * * /dev/shm/.lwp/.rsync/a/upd>/dev/null 2>&1
    #5 8 * * 0 /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #@reboot /dev/shm/.lwp/.rsync/b/sync>/dev/null 2>&1
    #0 0 */3 * * /dev/shm/.lwp/.rsync/c/aptitude>/dev/null 2>&1

    Its rsyncing to something? and it also tries to install something? I haven't looked at these in a terminal removing the /dev/null at this point, I s'pose I should look at the files its calling. The result is a rogue ./cron task, and a load average that shoots through the roof, on the octo core its out past 18 so it uses everything it can.

    Spec


    --- SuperBBS v1.17-3 (Eval)
    * Origin: (21:3/101)