Massassi Forums Logo

This is the static archive of the Massassi Forums. The forums are closed indefinitely. Thanks for all the memories!

You can also download Super Old Archived Message Boards from when Massassi first started.

"View" counts are as of the day the forums were archived, and will no longer increase.

ForumsDiscussion Forum → perl people
perl people
2005-07-19, 12:15 PM #1
Okay, the server has been going whack, here is what I have been able to deduce:

Someone was able to make apache download a file called "up" from a specific domain. This file was then RUN as a non-privileged user (www-data). At that time, it wrote a file called mpb.pl to the /tmp directory and then executed it. This starts some sort of IRC server although I don't know exactly what is going on. It is attached to this post.

JonC found a vulnerability in vBulletin that allows arbitrary code to be uploaded and executed, so I have patched to the fixed version. It would be really freaking nice if Jelsoft would freaking email me when a vulnerability comes out :mad:

So anyway, if you can deduce what is going on here regarding the attached script, please let me know.
Attachment: 6216/mpb.txt (19,408 bytes)
2005-07-19, 12:17 PM #2
Norton AntiVirus has detected a virus on your computer.

Name object: C:\.... mpb[1].txt
Name virus: IRC.Backdoor.Trojan
Action: Access to the file has been denied

Damn, and I was just getting all excited seeing an attachment on these forums
■■■■■■■■
■■■■■■■■
■■■■■■■■
■■■■■■
■■■■■■■■
■■■■■■■■
■■■■■■■■
enshu
2005-07-19, 12:19 PM #3
http://www.partyradio.ca/v3/stat.pl

That one is similar.
2005-07-19, 12:32 PM #4
The script joins an IRC server and gives a virtual shell to users with certain nicknames. Pretty straightforward. I joined the channel and was banned almost immediately, so I did the fair thing and alerted the server's IRC ops about the channel. At the very least it means all of the server's he's infected so far (looks like about 8 of them) will need to be re-hacked, but it didn't look like he had permission to run a lot of commands he was trying (SIGKILL).
The UNIX security model saves the day yet again.
2005-07-19, 12:36 PM #5
This guy obviously chose the wrong server to hack.
That painting was a gift, Todd. I'm taking it with me.
2005-07-19, 12:39 PM #6
unfortunatly all 3 users in the stat.pl file are using cloaked hostmasks.
TheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWho
SaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTh
eJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSa
ysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJ
k
WhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSays
N
iTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkW
2005-07-19, 12:41 PM #7
Anyone notice some strange sigs by new(er) users or strange BB code usage lately?
2005-07-19, 12:43 PM #8
If they're not just a script kiddie (although it looks like they are) they probably used www::mechanize to post via another perl script from another hacked box.
TheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWho
SaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTh
eJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSa
ysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJ
k
WhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSays
N
iTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkW
2005-07-19, 12:50 PM #9
Quote:
Originally posted by TheJkWhoSaysNi
unfortunatly all 3 users in the stat.pl file are using cloaked hostmasks.
More unfortunately, the domain used to download the script is a Belize TLD registered by a woman in Atlanta, GA, and uses a public/free DNS server. The IRC server used to host the attack is German. The script is commented in Portuguese, which tells me it's probably of Brazilian origin.

All over the place, but I'd guess the guy in question is, in fact, from Brazil.
2005-07-19, 1:01 PM #10
Haha, Portuguese. Not good bye, just....bye bye.
2005-07-19, 1:56 PM #11
Highly off topic, but what the hell happened to our hex postcounts? It still shows up if you highlight, but there's no Hex. :(
D E A T H
2005-07-19, 1:59 PM #12
Quote:
Originally posted by Dj Yoshi
Highly off topic, but what the hell happened to our hex postcounts? It still shows up if you highlight, but there's no Hex. :(


$50 says that the patch changed replaced the file with the hexcount script hacked into it, so the code's gone.
2005-07-19, 5:00 PM #13
Brian.- Are you trying to say we all got a Virus?
Nothing to see here, move along.
2005-07-19, 5:04 PM #14
Originally posted by SF_GoldG_01:
Brian.- Are you trying to say we all got a Virus?

No.
2005-07-19, 5:04 PM #15
Originally posted by SF_GoldG_01:
Brian.- Are you trying to say we all got a Virus?


No. Someone exploted a vulneraiblity in the forum software we were using.

*cough*cough*vb sucks*cough*cough*
And when the moment is right, I'm gonna fly a kite.
2005-07-19, 5:37 PM #16
Originally posted by gbk:
No. Someone exploted a vulneraiblity in the forum software we were using.

*cough*cough*vb sucks*cough*cough*

Actually I'm starting to think it's a vuln in phpbb used at commandchamber and jkhub :( I'm having a hard time finding out where it's coming from.
2005-07-19, 5:43 PM #17
No Brian the exploit at TACC and most phpBB exploited forums is the phpBB <= 2.0.12 Change User Rights Authentication Bypass "How Dark" exploit and would not affect you at all.

Edit: Both TACC and JKHUB have invunerable(Just to HowDark, I dunno about other exploits) forums, TACC using a newer version of phpBB and JKHUB having edited files preventing the exploit from being possible.

Edit2: There is a phpBB <= 2.0.15 viewtopic.php Remote PHP Code Execution exploit that * might * have been used on JKHUB but I think it is most likely coming from an unknown vBulletin exploit.
2005-07-19, 6:01 PM #18
phpbb is at version 2.0.17 now, I've just had to update...

however none of the problems listed should have allowed them to screw with the other forums....as far as I can tell from the changelist.

as for them being "invunerable", none are, its just how hard it is to find an exploit, thankfully phpbb has quite a quick turn-around on bug updates and lets you know when updates come out.

[edit] is there a reason why the links to TACC and JKHUB are disabled/link back to massassi...??[/edit]
People of our generation should not be subjected to mornings.

Rbots
2005-07-19, 6:05 PM #19
[QUOTE=James Bond][edit] is there a reason why the links to TACC and JKHUB are disabled/link back to massassi...??[/edit][/QUOTE]Yeah, I am trying to narrow down exactly where this thing is getting in.
2005-07-19, 6:07 PM #20
Originally posted by Brian:
Yeah, I am trying to narrow down exactly where this thing is getting in.

thought as much...
People of our generation should not be subjected to mornings.

Rbots
2005-07-21, 12:48 PM #21
Is the SOTD code gone too?

Edit: the "add a link" in the links section isn't the problem, right?
SnailIracing:n(500tpostshpereline)pants
-----------------------------@%
2005-07-21, 7:47 PM #22
Originally posted by Echoman:
Is the SOTD code gone too?

Edit: the "add a link" in the links section isn't the problem, right?

The SotD should be working fine, just people aren't updating it :( The add a link script probably isn't the problem as it has gone away since I closed down commandchamber.net. I think their forums are vulnerable, I have to talk to Ryan.
2005-07-21, 8:58 PM #23
But if you click on the SOTD, the recent SOTD's are missing. :confused:
SnailIracing:n(500tpostshpereline)pants
-----------------------------@%
2005-07-21, 10:48 PM #24
Looks to me like an IRC zombie thing. Basically it connects to an IRC server, joins a channel, and lets the hacker use the computer that way. It seems like it's used mostly for remotely portscanning computers. It's probably some Brazilian hacker, there are a lot of Brazillian hacking groups. It can also be used to DCC files to and from the attacked computer. I think it can be used in a denial of service attack against other computers. Also, it looks like the attacker can get shell access. Pretty standard.
Capitalization
Commas
Periods
Question Marks
Apostrophes
Confusable Words
Plague Words

↑ Up to the top!