-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/12/2011 05:18 PM, Patrick Litke wrote:
1) How did they gain access? I doubt that it would be possible for them
to bruteforce that password - it was 10 characters long, upper and lower
case, numbers and symbols.  So then what vulnerability did they exploit
to get in?

It does seem unlikely that they brute forced the account's password[1]. More likely they got in through a problem with your webserver configuration. Is it possible that the "nagios" user has write permission to some directory, which the webserver or nagios is allowed to execute as well? That's a common method of penetration - have nagios (or whatever webapp) write out a shellcode somewhere, and then get the webserver to execute that shellcode as a CGI. Once you're that far, use the shellcode to update nagios's $HOME/.ssh/authorized_keys file and drop in your own SSH key, so you can get a regular SSH session.

2) What else do I need to do to secure a Debian install for dedicated
online time plugged into the ebil interwebs?

There is no easy answer... It sounds to me like you have a lot of web services running (you list "full lamp stack", nagios, webmin, samba, and others), and one of those services had a hole. Since it appears they got into the nagios account, you should look at what that user runs. Is it just nagios, or does Apache run as the nagios user?

Jim

[1] I have to ask, why does the nagios user have a password? It seems to me that the password field for that account should be "*", meaning password authentication isn't possible ... If you need to do work as nagios, you can become root and use 'su'.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFNzF6K2USjQZu2vYURAj5ZAJ43gvXVk7IXAgkomYMFD1PyBP8teACgtrrC
ybjkX3jVjaoU3NvJRUpbYi8=
=RdJn
-----END PGP SIGNATURE-----

Reply via email to