[lug] Cracking attempts via SSH

Dan Ferris dan at ferrises.com
Thu Aug 19 16:47:33 MDT 2004


That is some new Linux worm going around.

Have some fun with it:

# useradd test
#passwd test
Enter Password for user test: <pass>
Enter Password again: <pass>

vi /etc/passwd

Change the test login shell to /usr/local/bin/test

vi /usr/local/bin/test

#!/bin/bash

echo "you are a 31337 hax0r"
exit

:wq

chmod 700 /usr/local/bin/test
chown test.test /usr/local/bin/test

:-)

Dan


Bill Thoen wrote:
> Back around July 26, I first started seeing unauthorized attempts to gain
> access to my server via ssh. The pattern was to try accessing an account
> named 'test', then 2 seconds later to try the account 'guest.' The
> originating IPs were from Korea and China (of course) Italy, Russia, and
> other european sources. Even one from the class B network I'm on.
> 
> Then starting Aug 9, a second pattern appeared. These attempts now look
> like this (from /var/log/secure):
> 
> Aug 18 09:32:27 gisnet sshd[31737]: Illegal user test from 65.37.37.15
> Aug 18 09:32:29 gisnet sshd[31739]: Illegal user guest from 65.37.37.15
> Aug 18 09:32:31 gisnet sshd[31741]: Illegal user admin from 65.37.37.15
> Aug 18 09:32:33 gisnet sshd[31743]: Illegal user admin from 65.37.37.15
> Aug 18 09:32:36 gisnet sshd[31745]: Illegal user user from 65.37.37.15
> Aug 18 09:32:46 gisnet sshd[31747]: Failed password for root from 
> 65.37.37.15 port 4496 ssh2
> Aug 18 09:32:50 gisnet sshd[31749]: Failed password for root from 
> 65.37.37.15 port 4710 ssh2
> Aug 18 09:32:55 gisnet sshd[31751]: Failed password for root from 
> 65.37.37.15 port 4809 ssh2
> Aug 18 09:32:57 gisnet sshd[31753]: Illegal user test from 65.37.37.15
> 
> So what's going on? Are script kiddies trying out something new that I
> should be concerned about? What bothers me is the three tries on 'root'.  
> I think I've got a decent password, but I don't know much about cracking,
> so I don't know what they're capable of.
> 
> Any recommendations as to what I ought to do, or is openssh 3.5p1-6 secure 
> enough?
> 
> - Bill Thoen
> 
> 
> _______________________________________________
> Web Page:  http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
> Join us on IRC: lug.boulder.co.us port=6667 channel=#colug
> 




More information about the LUG mailing list