[NCLUG] I was hacked!

dobbster dobbster at frii.com
Fri Dec 29 15:08:59 MST 2000


Thanks for the feedback, Michael - I feel a bit more comfortable now.  I
have a tendency for being PARANOID, which is hopefully an asset.

> There are active exploits against these ports.  1080 is where WinGate
> (SOCKS) lives -- which IRC kiddies use to proxy IRC through. Portmapper and
> imap have both been victims of exploits in the last few months.
> Should it concern you?  Kind of.  You have already made the first step of
> watching out for your server.  (Yay!)  These scans are normally made by
> script kiddies out looking for an easy target.  If your portmapper and
> imapd are turned off, or running a non-vulnerable version or config, you
> are safe.  But I would be keep watching the logs.

imapd is off, but portmapper is on.  Still, it seems that portsentry is
blocking outsiders from hitting it.

> You have taken very good steps to protect yourself.  As far as FTP is
> concerned, you now need only watch for spoofed IPs to get through your
> wrappers (tough, unless they know which IPs to spoof) and making sure your
> users are really your users.   You are also still suceptable to sniffing,
> where someone on your subnet grabs your plain text FTP password off the
> wire, and you are back to square one.  Hopefully, there are no sniffers on
> your subnet -- hopefully, you control your subnet well enough.  (Not a
> cable modem?)

I don't believe there are any sniffers - The subnet for the main server
is colocated at FRII.  My backup (rsync) machine is on DSL, where I have
a subnet of static IPs.

> I would read the BugTRAQ advisories on it.  I'm afraid I don't have them
> handy right now, though.  I would say you have already done quite a bit to
> make it safe.  Now, just make sure you are running the latest version.
> http://www.sans.org/newlook/digests/SAC/linux.htm is a weekly summary of
> current exploits.  I strongly suggest that you subscribe to it.

Ok - Thanks, I have subscribed.  Thank you for making me aware of this!

> They may not.  As I kinda hinted above, the recent activity on the internet
> is widespread distributed scanning.  It could just be that they happened to
> scan one then scan the other in IP number order.   Here is the CERT current
> activity summary: http://www.cert.org/current/current_activity.html

I signed up for this one too.  Thanks again for the tips!  From what
you've said, perhaps I am on the right track.

Mark (dobbster at frii.com)



More information about the NCLUG mailing list