해킹인지 봐주세요.
작성자 정보
- 홍석범 작성
- 작성일
컨텐츠 정보
- 2,127 조회
- 0 추천
- 목록
본문
안녕하십니까? 홍석범입니다.
/dev/shm내 파일들이 nobody로 생성된 것으로 보아 웹응용프로그램의 취약성을 이용한 웹해킹이라 할 수 있습니다. 혹 php.ini에서 allow_url_fopen = On 으로 되어 있지는 않은지 확인하시고 특히 제로보드를 사용중이라면 반드시 최신 버전으로 패치하셔야 합니다.
아래 결과만으로는 단순 웹해킹이므로 시스템 재설치는 필요없습니다.
감사합니다.
조현 님의 글
아래 리스트는 chkrootkit을 실행한 리스트입니다.
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not infected
Checking `gpm'... not infected
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not tested
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not infected
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not infected
Checking `rshd'... not infected
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not infected
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'...
/dev/shm/mech.tgz
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/perl5/5.8.0/i386-linux-thread-multi/.packlist
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for LOC rootkit... nothing found
Searching for Romanian rootkit... nothing found
Searching for HKRK rootkit... nothing found
Searching for Suckit rootkit... nothing found
Searching for Volc rootkit... nothing found
Searching for Gold2 rootkit... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for AjaKit rootkit default files and dirs... nothing found
Searching for zaRwT rootkit default files and dirs... nothing found
Searching for Madalin rootkit default files... nothing found
Searching for Fu rootkit default files... nothing found
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for common ssh-scanners default files... nothing found
Searching for suspect PHP files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... warning, got bogus tcp line.
not infected
Checking `lkm'... find: /proc/30111: 그런 파일이나 디렉토리가 없음
chkproc: nothing detected
chkdirs: nothing detected
Checking `rexedcs'... not found
Checking `sniffer'... eth0: not promisc and no PF_PACKET sockets
Checking `w55808'... not infected
Checking `wted'... chkwtmp: nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... chklastlog: nothing deleted
Checking `chkutmp'... chkutmp: nothing deleted
위의 붉은 색 부분에 해킹이 의심되어서 /dev/shm 디랙토리에 있는 파일을 확인해 보았습니다.
[root@www shm]# ls -al
합계 3404
drwxrwxrwt 4 root root 200 3월 22 21:32 .
drwxr-xr-x 5 nobody nobody 360 3월 22 07:00 .,.
drwxr-xr-x 20 root root 118784 3월 20 22:09 ..
drwxr-xr-x 3 nobody nobody 440 3월 24 10:49 .n
-rw-r--r-- 1 nobody nobody 870460 12월 27 13:13 ircstealth.tgz
-rw-r--r-- 1 nobody nobody 260368 3월 22 04:04 mech.tgz
-rwxr-xr-x 1 nobody nobody 553666 3월 22 21:32 owned
-rw-r--r-- 1 nobody nobody 553666 2월 12 13:13 owned.1
-rw-r--r-- 1 nobody nobody 553666 2월 12 13:13 owned.2
-rw-r--r-- 1 nobody nobody 553666 2월 12 13:13 owned.3
[root@www shm]#
먼저번에도 해킹이 들어와서 3일정도 새벽에 약3시간 동안 많은 양이 데이터 빠져나갔습니다.
호스팅업체에서 제공하는 이더넷패킷분석화면을 보고 짐작하고 찾아봤습니다.
그런데 똑같은 문제가 또 발생하네요. 어제(일) 새벽에 2시부터 8시까지 많은 양이 데이터가 또 다운로드 되었습니다.
어떻게 해면 좋을까요?
관련자료
-
이전
-
다음