“The whole breach of Will’s server started via a password
guessing attack against SSH. We have covered this risk repeatedly
in ISC diaries. Once the bad guys were in, they ran the commands
below, and then apparently used the just installed IRC bots to
continue scanning for SSH ports on other systems.Phase#1: The bad guy tries to find out more about the box he
just broke intouptime
uname -a
w
ifconfigPhase#2: Bad guy downloads all the Linux root exploits that he
has, and just run them, hoping for a lucky break.
Anatomy of a Unix breach
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis