
Code: Select all
May 30 02:04:19 server sshd[18798]: Accepted keyboard-interactive/pam for me from 143.97.2.35 port 18248 ssh2
May 30 02:04:19 server sshd(pam_unix)[18804]: session opened for user me by (uid=0)
May 30 02:04:42 server su(pam_unix)[18818]: session opened for user root by me(uid=1000)
May 30 02:04:50 server su(pam_unix)[18818]: session closed for user root
Er, if you don't look at the logs, why even bother logging at all? Resource hog if they're not used.Karak wrote:You know, like so many others, I saw this thread and after reading it thought "hrmm... maybe I should look at my sshd logs..." and holy god! Look at this!
May 24 04:00:50 [sshd] Server listening on 0.0.0.0 port 22.
May 24 13:33:13 [sshd] Did not receive identification string from 67.102.203.251
May 24 13:46:22 [sshd] Invalid user anonymous from 67.102.203.251
<snip>
May 24 13:46:55 [sshd] Invalid user java from 67.102.203.251
and that is a very small snippet! Wow okay... time to bone up on security!
The attacker got root privileges so that machine is completely compromised. I wouldn't trust it for anything anymore. Back up your user data, reformat and reinstall. You also have to assume your account on each and every other machine you've logged on from this machine was compromised, and so on and so forth in a nice chain. Basically, reformat, reinstall, change all your passwords for any purpose (be it email accounts, webmail accounts, various sites, etc etc) from a machine you trust, use strong passwords or no passwords at all (S/Key or PKI authentication), and keep up to date with glsa-check. If the compromised machine or any of the other machines you logged into also has other users, have them do the same if possible, and at least have them change their passwords when logged in from a trusted machine.kitana_ann wrote:If it wasent for this thread I would not think for a minute that my server was in jeperdy! Here´s what I found in my log:
The creepy part is that I am not awake at that time and I dont know who´s ip that is. I checked the .bash_history for both root and user and I only see code that I have executedCode: Select all
May 30 02:04:19 server sshd[18798]: Accepted keyboard-interactive/pam for me from 143.97.2.35 port 18248 ssh2 May 30 02:04:19 server sshd(pam_unix)[18804]: session opened for user me by (uid=0) May 30 02:04:42 server su(pam_unix)[18818]: session opened for user root by me(uid=1000) May 30 02:04:50 server su(pam_unix)[18818]: session closed for user root. I am soo confused over what happend? Any ideas on where else I could check?
Code: Select all
kill -9 $$Of course you're right, I came down with a temporary case of pendejitis... I'll be looking at the log files very closely from now on.moocha wrote:Er, if you don't look at the logs, why even bother logging at all? Resource hog if they're not used.






Maybe your clocks are not correct. Either that or you have a split personality, because:kitana_ann wrote:But the wiered part is how it could have loged in in the middle of the night.
I believe this log statement means the user "me" typed "su" and entered the correct root password. Either you use really simple passwords, or you have been hacked by the guy on the other side of the mirror.kitana_ann wrote:May 30 02:04:42 server su(pam_unix)[18818]: session opened for user root by me(uid=1000)
Wrong.Freman wrote:All a firewall does if they're failing is silence your logs.



That you know ofdarker wrote:Starting from the beginning of April there have been 5517 attempts on my machine. None have gotten through.