I found a script in /tmp directory which could have been uploaded using php or 
Java.
How would they execute the code in /tmp directory? I couldn't figure it out.

Thanks




----- Original Message ----
From: Leandro Quibem Magnabosco <leandro.magnabo...@fcdl-sc.org.br>
To: Aflatoon Aflatooni <aaflato...@yahoo.com>
Cc: freebsd-questions@freebsd.org
Sent: Tuesday, September 22, 2009 8:51:05 AM
Subject: Re: FreeBSD 6.3 installation hacked

Aflatoon Aflatooni escreveu:
> My server installation of FreeBSD 6.3 is hacked and I am trying to find out 
> how they managed to get into my Apache 2.0.61. 
> This is what I see in my http error log:
> 
> [Mon Sep 21 02:00:01 2009] [notice] caught SIGTERM, shutting down
> [Mon Sep 21 02:00:14 2009] [notice] Apache/2.0.61 (FreeBSD) PHP/5.2.5 
> mod_jk/1.2.25 configured -- resuming normal operations
> wget: not found
> Can't open perl script "/tmp/shit.pl": No such file or directory
> wget: not found
> Can't open perl script "zuo.txt": No such file or directory
> curl: not found
> Can't open perl script "zuo.txt": No such file or directory
> lwp-download: not found
> Can't open perl script "zuo.txt": No such file or directory
> lynx: not found
> Can't open perl script "zuo.txt": No such file or directory
> zuo.txt                                                11 kB  56 kBps
> ...

It does not look they entered using any apache bug.
Probably you had a world writable directory and they managed to access it by 
ftp (or any other way) and sent a file containing commands to it.
Once it is there, they've 'called' the file using apache to execute whatever 
was in there (probably binding a shell to some port) in order to get access to 
the box.

--
Leandro Quibem Magnabosco.




_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to