질문&답변
클라우드/리눅스에 관한 질문과 답변을 주고 받는 곳입니다.
리눅스 분류

중국놈한테 당했는데요...도와주세요

작성자 정보

  • 김민주 작성
  • 작성일

컨텐츠 정보

본문

더운데 수고들 하십니다..
다름이 아니라 해킹을 당한것 같습니다
중국놈 한테요.

다행히 root 계정이 없어지거나
중요파일의 피해는 입지는 않았지만
찝찝해서 하루종일 헤메고 있습니다.

그 중국놈이 설치한 rpm 인데 무엇인지 알려주세요
아래 내용은 ./bash_history 입니다.

 

wget wget http://www.python.org/ftp/python/2.3.3/Python-2.3.3.tgz
tar xzf Python-2.3.3.tgz
ls
cd Python-2.3.3
ls
CFLAGS='-D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64' OPT="-g -O2 $CFLAGS"
CFLAGS='-D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64' OPT="-g -O2 $CFLAGS" ./configure
make && make install
cd ..
wget http://zope.org/Products/Zope/2.7.0/Zope-2.7.0.tgz
tar xvf Zope-2.7.0.tgz
tar zxvf Zope-2.7.0.tgz
cd Zope-2.7.0/
./configure --with-python=/usr/local/bin/python2.3 --prefix=/opt/Zope-2.7
make && make install
useradd zope
whereis useradd zope
/usr/sbin/useradd zope
cd /var
ls
mkdir /var/ZopeInstances/demo
ls -la
mkdir ZopeInstances/demo
su zope
/opt/Zope-2.7/bin/mkzopeinstance.py
cd /home2/kuin
;s
ls
bin/runzope
bin /runzope
whereis bin
/usr/local/bin/runzope
/usr/local/bin /runzope
whereis runzope
find / -name runzope
ls
ls -la
cd /home2/kuin/./README.txt
more /home2/kuin/./README.txt
/sbin/ifocnfig
/sbin/ifconfig
apt-get update
whereis apt-get
ps
ls
wget http://ftp.freshrpms.net/pub/freshrpms/redhat/8.0/apt/apt-0.5.5cnc6-fr0.rh80.1.i386.rpm
rpm -ivh apt-0.5.5cnc6-fr0.rh80.1.i386.rpm
uname -a
wget ftp://at.rpmfind.net/linux/redhat.com/dist/linux/updates/8.0/en/os/i386/glibc-2.3.2-4.80.8.i386.rpm
wget ftp://at.rpmfind.net/linux/redhat.com/dist/linux/updates/8.0/en/os/i686/glibc-2.3.2-4.80.8.i686.rpm
telnet localhost
ftp localhost
demsg
whereis demsg
demsg
find / demsg
find / -name demsg
uname -a
ls
wget http://ftp.freshrpms.net/pub/freshrpms/redhat/7.2/apt/apt-0.3.19cnc55-fr7.i386.rpm
rpm -ivh apt-0.3.19cnc55-fr7.i386.rpm
wget http://www.sh-linux.org/rpm-2003/RPMS/sh3/rpm-4.0.4-7x.18.2.sh3.rpm
rpm -ivh rpm-4.0.4-7x.18.2.sh3.rpm
wget http://www.sh-linux.org/rpm-2003/RPMS/sh3/popt-1.6.4-7x.18.2.sh3.rpm
rpm -ivh popt-1.6.4-7x.18.2.sh3.rpm
rpm -ivh rpm-4.0.4-7x.18.2.sh3.rpm
wget http://ftp.freshrpms.net/pub/freshrpms/redhat/7.1/apt/apt-0.5.4cnc9-fr0.1.rh71.i386.rpm
rpm -ivh apt-0.5.4cnc9-fr0.1.rh71.i386.rpm
wget ftp://linux.s390.org/pub/ThinkBlue64-7.1/RPMS/s390x/rpm-4.0.2-12.s390x.rpm
wget ftp://ftp.linuxforum.net/RPM/redhat/updates/6.2/en/os/i386/rpm-4.0.2-6x.i386.rpm
rpm -ivh rpm-4.0.2-6x.i386.rpm
ls
rm *.rpm
ls
wget http://ftp.freshrpms.net/pub/freshrpms/redhat/7.0/apt/apt-0.5.5cnc6-fr0.rh70.1.i386.rpm
rpm -ivh apt-0.5.5cnc6-fr0.rh70.1.i386.rpm

피해내용은 우선 어떤 계정폴더에 파일들이 잔든 있는데 게시판 파일입니다 외국거구요
db 생성했더군요 확인해보니 게시판인데 내용은 죄다 중국어라서
우선 db 생성계정 폴더 다 삭제했구요
root 및 접속 계정 패스 변경했구요
웹이랑,메일,db 같이 돌아가는 서버인데요
모두 정상이구요

원래 telnet은 제컴에서만 접속이 되구요

ssh는 풀어놨는데 이것도 제컴에서만 접속되게 막아놨구요
다행히 제가 접속 상태에서 들어온거 같은데
좀 봐주시고 충고줌 주세요

 

아래는 /var/log/message 파일인데요 이상한 부분이라서요

Jul  1 16:22:18 woho  7월  1 16:22:18 su(pam_unix)[23884]: session closed for user root
Jul  1 16:23:35 woho named[12242]: lame server on 'incheon.go.kr' (in 'incheon.go.kr'?): 210.220.163.20#53
Jul  1 16:23:48 woho named[12242]: lame server on 'hmail.net' (in 'hmail.NET'?): 211.32.116.134#53
Jul  1 16:24:28 woho named[12242]: lame server on 'hanbox.com' (in 'hanbox.com'?): 211.216.50.150#53
Jul  1 16:24:55 woho login(pam_unix)[31465]: authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=  user=root
Jul  1 16:24:57 woho login[31465]: FAILED LOGIN 1 FROM (null) FOR root, Authentication failure
Jul  1 16:24:57 woho login(pam_unix)[31465]: bad username []
Jul  1 16:25:00 woho login[31465]: FAILED LOGIN 2 FROM (null) FOR , Authentication failure
Jul  1 16:25:07 woho login(pam_unix)[31465]: session opened for user root by LOGIN(uid=0)
Jul  1 16:25:07 woho  -- root[31465]: ROOT LOGIN ON tty1--------------------------------------------------------> 이부분이 이상하더군요.. ip 도없고..

 


[root@woho root]# netstat -an | grep LISTEN
tcp        0      0 0.0.0.0:1025            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:48135           0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:873             0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:3306            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:110             0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:4014            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:21              0.0.0.0:*               LISTEN     
tcp        0      0 211.43.xxx.147:53       0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.1:53            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:23              0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:25              0.0.0.0:*               LISTEN     
unix  2      [ ACC ]     STREAM     LISTENING     1275   /tmp/.font-unix/fs7100
unix  2      [ ACC ]     STREAM     LISTENING     1262   /tmp/mysql.sock
[root@woho root]# lsof | grep LISTEN
아래 nobody 로 돌아가는것이 궁금합니다..
막아야할 포트가 있다면 해당 포트 는 /etc/service 파일 열어서 막으면 되는건지요?


shell       426    nobody    4u  IPv4  146067842                TCP *:1025 (LISTEN)
shell       426    nobody   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       431      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       432      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       433      root   16u  IPv4   75764380                TCP *:http (LISTEN)
shell       434    nobody    4u  IPv4  146067861                TCP *:48135 (LISTEN)
shell       434    nobody   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       440      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       441      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       442      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       443      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       444      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       445      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       446      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       447      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       448      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       449      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       450      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       451      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       452      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       453      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       454      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       455      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       456      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       457      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       458      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       459      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       460      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       461      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       462      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       463      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       464      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       465      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       466      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       467      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       468      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       469      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       470      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       473      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       474      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       475      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       476      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       477      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       479      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       480      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       481      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       482      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       483      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       484      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       485      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       486      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       487      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       488      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       489      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       490      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       491      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       492      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       493      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       494      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       495      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       496      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       497      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       498      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       499      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd       500      root   16u  IPv4   75764380                TCP *:http (LISTEN)
mysqld      656      root    3u  IPv4       1260                TCP *:mysql (LISTEN)
mysqld      678      root    3u  IPv4       1260                TCP *:mysql (LISTEN)
mysqld      679      root    3u  IPv4       1260                TCP *:mysql (LISTEN)
sendmail   9977      root    4u  IPv4  144951164                TCP *:smtp (LISTEN)
named     12239      root   11u  IPv4  146821328                TCP localhost.localdomain:domain (LISTEN)
named     12239      root   13u  IPv4  146821330                TCP woho.co.kr:domain (LISTEN)
named     12241      root   11u  IPv4  146821328                TCP localhost.localdomain:domain (LISTEN)
named     12241      root   13u  IPv4  146821330                TCP woho.co.kr:domain (LISTEN)
named     12242      root   11u  IPv4  146821328                TCP localhost.localdomain:domain (LISTEN)
named     12242      root   13u  IPv4  146821330                TCP woho.co.kr:domain (LISTEN)
named     12243      root   11u  IPv4  146821328                TCP localhost.localdomain:domain (LISTEN)
named     12243      root   13u  IPv4  146821330                TCP woho.co.kr:domain (LISTEN)
named     12244      root   11u  IPv4  146821328                TCP localhost.localdomain:domain (LISTEN)
named     12244      root   13u  IPv4  146821330                TCP woho.co.kr:domain (LISTEN)
shell     15617    nobody    4u  IPv4  146067842                TCP *:1025 (LISTEN)
shell     15617    nobody   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21324      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21325      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21326      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21327      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21328      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21329      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21330      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21331      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21332      root   16u  IPv4   75764380                TCP *:http (LISTEN)
httpd     21333      root   16u  IPv4   75764380                TCP *:http (LISTEN)
merchant_ 29180      root    3u  IPv4   82594189                TCP *:4014 (LISTEN)
shell     30420    nobody    4u  IPv4  146067842                TCP *:1025 (LISTEN)
shell     30420    nobody   16u  IPv4   75764380                TCP *:http (LISTEN)
shell     30879    nobody    4u  IPv4  146067842                TCP *:1025 (LISTEN)
shell     30879    nobody   16u  IPv4   75764380                TCP *:http (LISTEN)
xinetd    31635      root    3u  IPv4  147583675                TCP *:pop3 (LISTEN)
xinetd    31635      root    4u  IPv4  147583677                TCP *:ftp (LISTEN)
xinetd    31635      root    5u  IPv4  147583678                TCP *:rsync (LISTEN)
xinetd    31635      root    7u  IPv4  147583679                TCP *:telnet (LISTEN)
sshd      31674      root    3u  IPv4  147583791                TCP *:ssh (LISTEN)
httpd     31933      root   16u  IPv4   75764380                TCP *:http (LISTEN)
[root@woho root]#

 


[root@woho root]# find /dev -type f
/dev/MAKEDEV

 

 

 

[root@wohochkrootkit-0.34]# ./chkrootkit
ROOTDIR is `/'
Checking `amd'... not infected
Checking `basename'... not infected
Checking `biff'... not infected
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not infected
Checking `gpm'... not infected
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not found
Checking `identd'... not infected
Checking `killall'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `mail'... not infected
Checking `mingetty'... not infected
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not infected
Checking `rshd'... not infected
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `top'... not infected
Checking `telnetd'... not infected
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/perl5/5.6.0/i386-linux/.packlist /usr/lib/perl5/site_perl/5.6.0/i386-linux/auto/mod_perl/.packlist /usr/lib/perl5/site_perl/5.6.0/i386-linux/auto/DCOP/.packlist

Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... nothing detected
Checking `rexedcs'... not found
Checking `sniffer'...
eth0 is not promisc
Checking `wted'... 1 deletion(s) between Thu Jul  1 17:22:59 2004 and Thu Jul  1 17:31:33 2004
nothing deleted
Checking `z2'... user root deleted or never loged from lastlog!
user admin deleted or never loged from lastlog!

 

 

읽어주셔서 감사하구요..
지금은 이상없지만 또 들어올지도 몰라서요
부탁드립니다..

관련자료

댓글 0
등록된 댓글이 없습니다.

공지사항


뉴스광장


  • 현재 회원수 :  60,367 명
  • 현재 강좌수 :  37,037 개
  • 현재 접속자 :  244 명