![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
We got HACKED!
Our server was hacked. We believe the hacker sniffed a plain text telnet session. No damage has been found.
We were advised to use SSH, but heard it is exploitable through a buffer overflow. We are running Linux. What software/protocol should we use to access the server? |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Get F-secure...
__________________
https://www.flow.page/savethechildren |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 | |
Confirmed User
Join Date: Jan 2001
Posts: 3,539
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Confirmed User
Join Date: Jul 2001
Location: A Free America
Posts: 2,210
|
ssh is perfectly secure. the exploit has been patched, but the exploit is largely misunderstood as well.
yes, it's a buffer overflow attack.. but it is one that requires the attacker to *already* be logged into an ssh client.. so they would have to already have a working user/pass in order to use the exploit. it is largely a problem on shared systems because the attacker can get root priveleges which he/she should not have.
__________________
<a href="http://www.adultplatinum.com/"><img src="http://www.adult.com/wmbanners/10dcash-468x60.gif"></a> |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
here's the d/l page... great program... http://www.f-secure.com/download-purchase/list.shtml
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
Confirmed User
Join Date: Jan 2001
Posts: 3,539
|
Quote:
http://www.chiark.greenend.org.uk/~sgtatham/putty/, for an SSH client and shut off telnet access to my servers completely. Have you heard of it? If so, how is it? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed User
Join Date: Aug 2002
Location: East Coast.
Posts: 2,251
|
I acutally prefer putty. I have used SecureCRT, and a few others and I find that putty suits my needs fine, and it's FREE.
I vote use putty. ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Join Date: Aug 2002
Location: East Coast.
Posts: 2,251
|
And ANY ssh client is preferable to Telnet. No matter your reservations about the exploit, remember you were just sending plain text commands to your server.
I don't even have telnet enabled on my boxes. Jake |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Confirmed User
Join Date: Feb 2002
Location: Vegas
Posts: 5,741
|
SSH is the only thing to use.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Confirmed User
Join Date: Mar 2001
Location: Baltimore
Posts: 2,082
|
Make sure you disable telnet also, don't just stop using it.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 |
Confirmed User
Join Date: Feb 2002
Location: Seattle
Posts: 1,070
|
if you are concerned that your telnet session has been sniffed, you need to also stop using FTP and switch to SFTP/FTP over SSH/SCP or something similar. SecureFX supports SFTP.
the reason being, FTP is just as insecure as telnet - it sends passwords in plaintext. if you do not stop using FTP, you might as well use telnet, too, because you're still just as fucked. now on to SSH. SSH is more secure, but there have been issues with various versions of it in the past. as is true with any software product, you need to make sure to monitor security lists and install necessary patches. sometimes your host can do this for you, sometimes you need to hire a sysadmin/security admin.
__________________
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 |
Confirmed User
Join Date: Dec 2001
Location: CrackYaMental
Posts: 4,365
|
I use ssh2
__________________
Insert Value Here. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 |
Confirmed User
Join Date: Sep 2002
Location: Vancity
Posts: 1,681
|
salsbury is correct... you gotta keep up to date on patching.
And just to clear some confusion here, any ssh client is fine, as long as you use ssh. Secure crt, f-secure, putty all use the same protocols... so use any of them, as long as you use ssh. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 | |
Confirmed User
Join Date: Feb 2002
Location: Seattle
Posts: 1,070
|
Quote:
friendly advice from a random poster. you need to either upgrade or find someone to upgrade your Apache and PHP versions. it's as likely that the intruder came in through there as it is that they came through telnet. i see ssh isn't even on the server. if your host told you that they didn't install it because of a buffer overflow bug - switch hosts. today.
__________________
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 |
Confirmed User
Join Date: Feb 2002
Posts: 100
|
Article:
http://www.wired.com/news/linux/0,1411,55172,00.html Source: http://crack.sh/hack/Slapper%20Worm.htm
__________________
There is a crack in everything. That's how the light gets in. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
I was also told to do the same with FTP, and use SCP file transfer. Does anyone here know anything about that? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#17 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#18 |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Not sure about the SCP file transfer... but F-secure also has a SSH file transfer utility that is pretty sweet...
__________________
https://www.flow.page/savethechildren |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#19 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
![]() For all of you who use Putty or F-Secure for their SSH protocol, what do you use for FTP? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#20 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#21 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#22 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#23 |
Confirmed User
Join Date: Feb 2002
Location: Seattle, WA
Posts: 1,527
|
yeah you should be using ssh instead of just normal telnet
ssh is 128bit encrpted
__________________
<a href="http://www.techiemedia.com"><img src="http://banners.techiemedia.net/techie120.gif"> |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#24 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
![]()
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#25 | |
Confirmed User
Join Date: Dec 2001
Location: CrackYaMental
Posts: 4,365
|
Quote:
The best attitude to adopt is one that assumes the intruder already has root. I think its safe to say that should he have any given user/pass he could have su within a short period. and if he can cover his tracks well, it may even seem as though he is gone. Giving you a false sense of security.
__________________
Insert Value Here. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#26 |
Confirmed User
Industry Role:
Join Date: Jan 1995
Posts: 2,417
|
And POP3 is even more insecure than either telnet or ftp because of the frequency it sends your password across the net in plaintext. You can either use an SSH tunnel or find some other way to encrypt the traffic if you're going to use POP3.
-KC |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#27 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#28 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
Thanks again for the heads up, guys... |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#29 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
![]()
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#30 |
Confirmed User
Join Date: Jan 2001
Posts: 3,539
|
Is WS_FTP secure?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#31 | |
Confirmed User
Industry Role:
Join Date: Jan 1995
Posts: 2,417
|
Quote:
-KC |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#32 |
Registered User
Join Date: Sep 2002
Location: A-town baby, Good ole PA
Posts: 56
|
The only reason I would take up jogging is so I could hear heavy breathing again. - Erma Bombeck
__________________
<CENTER><a href="http://www.matrixbucks.com/?aid=453817"><IMG src="http://www.mindgoo.com/stoob/banner103.gif"></a></CENTER> |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#33 | |
Confirmed User
Industry Role:
Join Date: Jan 1995
Posts: 2,417
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#34 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
![]()
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#35 |
Confirmed User
Join Date: Mar 2002
Location: how'd I get here?
Posts: 264
|
Hey,
You want to make sure you're using ssh2, in fact. SSH1 has crypto vulnerabilities -- they're unlikely, but possible. The goal is to make sure that no traffic to your box is using plaintext passwords. Of course, your paysite users are, but those accounts aren't important. If you implement your pop3 accounts as virtual (ie, no associated UNIX account) then you can also start treating those passwords as unimportant (worse case scenario: someone's email gets read) Another option, setup a VPN between your office and your servers and route all traffic over it. This requires a linux box in the office, but the cost of setting one up is low and the benefits are great. Don't forget you're just as likely to be sniffed on your local subnet as you are in the colo facility. Perhaps more likely, if your colo has proper subnets. As for FTP, I recommend setting up FTP over SSH2 (using SecureFX) or an SFTP client. Either method requires a special client, so you'll have to kiss WS_FTP goodbye. Is it worth it? Only if you don't want to post a GFY thread entitled "We got hacked!" Staying secure is a matter of staying current, slashdorque will have an item for almost all the vulnerabilities you'll encounter. Good luck, Buran
__________________
[this signature intentionally left blank] |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#36 |
Confirmed User
Join Date: Jun 2001
Posts: 853
|
Use cuteftp pro
sftp and ssh is supported |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#37 |
Confirmed User
Join Date: Jun 2002
Posts: 317
|
yes Pop3 is plain text passwords.
if you MUST run pop3 on your server use qmail if running linux. and set it up to use virtual accounts. that way NO system user ids are ever used and if a person captures the password big deal, it is only good for looking at mail :-) |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#38 |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Isn't it easier to use PGP than find an alternative to POP3? Any pros/cons?
__________________
https://www.flow.page/savethechildren |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#39 | |
Confirmed User
Industry Role:
Join Date: Jan 1995
Posts: 2,417
|
Quote:
Setting up virtual accounts for email boxes... or setting up a VPN... or even an ssh tunnel (which is extremely easy to do) are probably your best bets with the mail. SecureFX is a great tool for doing secureftp (it works just like the other GUI ftp clients) only it's secure. Your admin will need to do some setup on the backend, but it's worth it. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#40 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
![]()
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#41 |
So Fucking Banned
Join Date: Jan 2001
Location: http://www.thefly.net/ --- Quit your job and live off steady traffic.
Posts: 11,856
|
Damn this all sux...
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#42 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
So, your dreamweaver is secure in uploading files? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#43 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
I have no problems dumping WS FTP, I was only using the LE edition anyway, and it was bad. If anyone can confirm that the PRO version is any better, then please let me know. The makers of WS FTP sure cannot tell me the differences, so I must assume they are minimal, and thus they have given me no reason to buy it. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#44 | |
Confirmed User
Join Date: Feb 2001
Posts: 1,917
|
Quote:
My damned password was being transmitted over the net 50 times a day... this was a bomb waiting to explode; it was bound to happen. You all should think about this. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#45 | |
Confirmed User
Join Date: Jan 2001
Posts: 3,539
|
Quote:
So... to recap... 4 FTPing, use SFTP 4 TELNETing, use SSH or SSH2 anything else while it's on your mind? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#46 |
Confirmed User
Join Date: Feb 2001
Location: atlanta, GA
Posts: 6,432
|
ok i am bout to get a headache,,
my lack of server knowledge and this thread is scaring me |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#47 | |
Confirmed User
Industry Role:
Join Date: May 2002
Posts: 8,120
|
Quote:
Yes, DreamweaverMX has a SSH plugin called PUTTY that is secure. I'm not sure about the ealier versions.
__________________
https://www.flow.page/savethechildren |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#48 | |
Confirmed User
Join Date: Jan 2001
Posts: 3,539
|
Quote:
![]() The lesson here is if you are insecure, you will eventually get hacked... it is only a matter of time. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#49 |
Confirmed User
Industry Role:
Join Date: Jul 2002
Location: Inconceivable!
Posts: 899
|
PuTTy
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#50 | |
Confirmed User
Industry Role:
Join Date: Apr 2002
Posts: 231
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |