Berkeley CSUA MOTD:Entry 43838
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2006/7/30-8/2 [Computer/SW/Languages/Web, Computer/SW/Security] UID:43838 Activity:low
7/28    Anyone have more info on the breakins on a bunch of Cal sites?
        http://www.csua.org/u/gkg   -John
        \_ Yes.
           http://ls.berkeley.edu/lscr/news/2006-07-25-security-incident
           (The defacements were mostly one multi-homed server).  -tom
           \_ Most kernel problems require local access to exploit.
              so, if not a user account then some other insecure service
              that can be used as a starting point.  Is this the case here?
              Do you know/mind_telling_us the details? -crebbs
              Do you mind telling us the details? -crebbs
              \_ The machine is a web hosting server for L&S departments,
                 where departments can install their own PHP code.  There
                 was a security hole in user-installed PHP code that got
                 the hackers shell access, and they used a 0-day RedHat
                 kernel priv escalation bug (SYS_PRCTL) to get root.
                 It is worth noting that the bad PHP code was hand-written,
                 not some package like phpBB with security holes which you can
                 search the net for; the initial compromise seemed to have
                 a higher degree of sophistication than is usually found
                 in script kiddies.  -tom
                 \_ I doubt the hackers found the PHP hole the same day the
                    Redhat bug came out.  I'd bet a buck they had non-root
                    shell access on the machine for a long time.  I also
                    suspect they had root for a while too.  Or there was more
                    than 1 set of hackers.  Why would sophisticated hackers
                    waste a quality attack on a web page defacement?  I'd bet
                    another buck they still have access to that and several
                    other machines.
                    \_ I can pretty closely track their root access; they
                       did have it for over a week before it was discovered.
                       I am pretty certain that they no longer have root
                       access.  I agree that there are likely remaining
                       apache-level holes on the machine; it's an
                       occupational hazard of an open PHP hosting environment.
                       When is PHP going to implement taint mode, anyway?
                         -tom
                       \_ The only way to be absolutely sure is to rebuild the
                          box.  You could do a bit by bit comparison from a CD
                          on all the binaries but yech.
                          \_ Yes, I've read "Reflections on Trusting Trust."
                          \_ Yes, I've read "eflections on the Revolution in
                             France"
                              -tom
                          \_ Yes, I've read "Reflections on the Revolution in
                             France" -tom
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
Cache (1967 bytes)
www.csua.org/u/gkg -> www.zone-h.org/index.php?option=com_content&task=view&id=13932&Itemid=30&msgid=710
E-mail User Rating: / 21 Poor Best Rate Written by Marcelo Dos Santos de Almeida Friday, 28 July 2006 The war in Lebanon is now showing its consequences in the digital world and a huge number of websites has been attacked and defaced as a protest against the invasion of Lebanon by Israel. Byond Hackers Crew through a leak in the SQL Injection they entered the system and subtracted user names, passwords and e-mails from the NASA web server. After that these information had been stolen, they managed in entering the administrative area by using an administrator user ID and password , and finally they made the defacement replacing the homepage with their message... This group goes with the others that in last days carried out attacks against governmental and commercial websites both from America and Israel, whereas other blackhat groups attacked Israeli websites provoking a denial of service (DDoS) of that particular webpage. The messages conveyed by all these defacements focus on the idea that, according to the attackers, the search of terrorist is just a pretext for the war on the south of Lebanon, that actually killed a lot of innocent people . The list of the websites that have been defaced this week follows, including NASA , Berkeley University, Microsoft and US Government web pages. " that the way Written by Guest on 2006-07-28 20:00:36 Power to the People thise is the umah power and thise is the Cyber rage as useal They Kill people we Kill Server viva freedome .. DISCLAIMER: Forum postings are the opinion of the posting author alone, and should not be taken as the opinion of Zone-h. The author is entirely and solely responsible for all content that he/she uploads, posts, or otherwise transmits via the website. However, Zone-h shall have the right, but not the obligation, to delete, move, or edit any content that violates this agreement or is otherwise objectionable as determined by Zone-h in its sole discretion and without notice.
Cache (1987 bytes)
ls.berkeley.edu/lscr/news/2006-07-25-security-incident
News See also: by Tom Holub Many of you may have noticed that your web site was down for most of the afternoon of Tuesday, 7/25. A few of you also noticed that your home page had been defaced. This is apparently the result of a concerted effort by a particular group of hackers to deface web sites around the world; we're seeing evidence of various sites in Israel, India, Chile, and the Red Cross, defaced with the same message. We had been monitoring hacker activity over the past few days, but had not been able to confirm a compromise until today. Fortunately, because of our precautions we discovered the problem within a few minutes, and immediately shut down the web server (at about 2:00 PM today). We were able to restore all of these from last night's backups; any changes you made to index files on Tuesday during the day may have been lost. In addition to altering files, the intruders captured the passwords of a number of our users. We have temporarily disabled the accounts of anyone whose account was compromised; Also, if there are any other accounts where you use the same password, you should change your password on those systems, as well. After forensic examination, we were able to identify the security problem, which was related to a hole in the Linux kernel; we had installed the patch previously, but we had not rebooted the machine, so we were still vulnerable. We've located the script the hackers used to gain access to the machine, and have verified that our machine is no longer vulnerable to this exploit. However, it appears that this attack is part of a larger pattern; there are other machines on campus displaying similar problems, and we may be subject to additional attacks on our web server now that it is clean. I assure you that we will take every possible precaution to keep your sites and your data secure. we will continue monitoring for security problems, but we do not at this time anticipate further downtime or problems for your web sites.