Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

ChrisA

macrumors G5
Jan 5, 2006
12,918
2,170
Redondo Beach, California
Sunrunner said:
I was surprised this morning (not the good kind of surprise mind you) with some rather malicious-looking computer activity on my system…


What ports were open? what was running on those ports. I see it was not ssh/rlogin/telnet but did you have port 80 (http) or FTP port(s) open. It would be easy to misconfigure eithe apache or ftp to allow a remote exploit
Why is your computer on a DMZ? What service(s) does it provide?

What non-apple software is installed? You could have a Trojan.
 

dosser

macrumors newbie
Mar 14, 2006
3
0
Sunrunner, have you ever considered using Snort/HenWen?
It wouldn't solve the problem but it may be of some use.
 

nrd

macrumors member
Mar 8, 2005
83
0
New Jersey
Don't a DMZ and a firewall rule each other out? I thought a DMZ allowed one computer to be outside the firewall.

Also, change your password on the machine, go into NetInfo utility and change the root password of the machine. Boot in single user mode if necessary.

Change his/her password on the torrent site. Serves him/her right.

Look into blocking more ports on your machine via the hardware firewall. Unless I missed this earlier in the thread, what does the machine do that requires it to be outside the firewall?
 

Sunrunner

macrumors 6502a
Original poster
Nov 27, 2003
600
2
ChrisA said:
What ports were open? what was running on those ports. I see it was not ssh/rlogin/telnet but did you have port 80 (http) or FTP port(s) open. It would be easy to misconfigure eithe apache or ftp to allow a remote exploit
Why is your computer on a DMZ? What service(s) does it provide?

What non-apple software is installed? You could have a Trojan.


Other than port 80, was open because this computer was a web server, ports 123 (time), 548 & 427 (file sharing), 5297 & 5298 (iChat), 3689 (iTunes), 8770 (iPhoto), 6970 - 6980 (quicktime), and 3283 & 5900 (ARD) were open. I know 5900 was used for the OSXvnc connection, but the initial exploit that gained remote access in the first place is unknown.

Also, little snitch was running on this end, but it seems that the user just added temporary rules while in my system to allow outbound connections to happen.
 

PatrickF

macrumors 6502
Feb 16, 2006
335
0
Blighty
Sunrunner said:
Other than port 80, was open because this computer was a web server, ports 123 (time), 548 & 427 (file sharing), 5297 & 5298 (iChat), 3689 (iTunes), 8770 (iPhoto), 6970 - 6980 (quicktime), and 3283 & 5900 (ARD) were open.

That sounds like a lot of open ports for a computer sitting on the Internet. I would pull out your computer from the DMZ and set your router up to only forward the ports you really need to access from the Internet.

You certainly shouldn't need to server up port 123 over the Internet and as for file sharing, do you really access these from remote locations? If so I would consider setting up a VPN.
 

snkTab

macrumors 6502a
Nov 13, 2004
580
1
Cincinnati, OH
Sunrunner said:
Other than port 80, was open because this computer was a web server, ports 123 (time), 548 & 427 (file sharing), 5297 & 5298 (iChat), 3689 (iTunes), 8770 (iPhoto), 6970 - 6980 (quicktime), and 3283 & 5900 (ARD) were open. I know 5900 was used for the OSXvnc connection, but the initial exploit that gained remote access in the first place is unknown.

Also, little snitch was running on this end, but it seems that the user just added temporary rules while in my system to allow outbound connections to happen.

ARD = Apple Remote Desktop?

Seems like the ability to use little snitch and various other programs might indicate that he could see your screen in this manner, rather than executing some type of script.
 

PatrickF

macrumors 6502
Feb 16, 2006
335
0
Blighty
From http://en.wikipedia.org/wiki/Apple_Remote_Desktop:

On June 21, 2004 Apple announced Apple Remote Desktop 2 (released in July), which was designed to use the VNC protocol instead of Apple's original ARD protocol. This allows the ARD administration software to observe and control any computer running VNC-compatible server software (such as Windows and Unix systems) not just Macs and conversely allowing standard VNC viewing software to connect to any Mac with the ARD 2 client installed and VNC access enabled. This version also uses the TCP protocol for most functions (on ports 3283, 5900 and 5988), which is designed to be more reliable than the UDP protocol used in ARD 1. Another significant addition to ARD 2 was the Task List, that allows remote tasks to be queued and monitored, reporting their status (such as Succeeded or Failed). This release also dropped support for older versions of the Mac OS, requiring 10.2.8 or higher.

Looks like ARD uses the VNC protocol then, which as people have already said could have been the point of entry. VNC isn't the most secure protocol, therefore you should ideally tunnel VNC through a VPN if you need to access it remotely over the Internet.
 

superted666

Guest
Oct 17, 2005
422
0
Intresting

When i perform a lookup on this address it does have a phone number registerd, you could try call : http://samspade.org/t/lookat?a=200.181.178.192

I would suggest enabling logging on the airport as he has been fairly sloppy performing all this using vnc and your user, intelligent and if he indedd new your password then he would add another admin account to better hide himself.
 

Sunrunner

macrumors 6502a
Original poster
Nov 27, 2003
600
2
superted666 said:
When i perform a lookup on this address it does have a phone number registerd, you could try call : http://samspade.org/t/lookat?a=200.181.178.192

I would suggest enabling logging on the airport as he has been fairly sloppy performing all this using vnc and your user, intelligent and if he indedd new your password then he would add another admin account to better hide himself.


All very good points
 

jeremy.king

macrumors 603
Jul 23, 2002
5,479
1
Holly Springs, NC
Sunrunner said:
3283 & 5900 (ARD) were open.

Why have these open if you weren't using ARD or VNC? Also, you sure you don't have either VNC or ARD setup as a LaunchDeamon - if you do, they won't start until a request is made on that port - meaning all the guy had to do was guess your password (or use an automated method)...
 

Kuru Kuru

macrumors newbie
Feb 17, 2006
25
0
/dev/null
Well there you have it, in my opinion. I've read the whole thread up to now and my single point of advice for you: close the ports for ARD/VNC, remove all traces of any VNC server program or anything related to it. Hell, close all the ports you're not using. But those ports jump out at me because they are compatible with various VNC offshoots, which give people the ability to basically just sit down at your computer if they can hack your password - or, for that matter, if your VNC access wasn't password protected, because to connect to that service you don't need your computer login/password. Only the authentication you set up for the service.
Using a computer as a web server and enabling remote visual access to it at the same time is kind of against common sense to me, but I suppose if it hadn't been brought to your attention in such a long time, you wouldn't have thought about it.
Although, I do think it would be funny to wait until he starts messing with your screen and then type something at him in textedit... lol.
Seriously though, close every port you're not using. Cannot emphasize this enough.
 

yellow

Moderator emeritus
Oct 21, 2003
16,018
6
Portland, OR
kingjr3 said:
Wheres yellow when you need him?

What? What? I'm here!

IMO, the GUIfied controls for the ipfw2 are asstastic. You should REALLY learn to use it via the command line so you can really understand what you're doing and how you're protecting yourself. That being said, it's safer (again, IMO) to use a hardware firewall on a router. It's worth the money and the security.

In order to TRUELY make sure you're free and clear of installed trojans/backdoors, you need to wipe the drive and reinstall the OS. I wouldn't trust ANYTHING on that box right now. Nor wopuld I trust my backups. You have no idea when you were compromised and when the evildoer decided to get around to using you.
Choose new usernames and GOOD PASSWORDS. Don't enable root unless you absolutely need to.


All this being said, it doesn't seem like a 'professional' job to me, since a pro would want to cover his tracks.
 

Kuru Kuru

macrumors newbie
Feb 17, 2006
25
0
/dev/null
Well put, Yellow. I didn't think to suggest that - usually I don't want to push the terminal on some people if it's not an aspect they're used to, since things could get easily messed up. But seeing as you're running a web server on that thing, Sunrunner, learning the terminal would be a Good Thing, and that's an understatement :)
And heck no, this wasn't a professional. It would be a relatively simple thing to do given a couple of scripts and basic knowledge of which ports do what. Heck, I could'a done it. Not that I did or would, of course. From what I've read, it seems like a really stupid reason to take over someone's computer... running torrents on it. I'm not sure quite what he hoped to achieve, and how he thought he wouldn't be found out once someone... oh, I don't know... looked at the screen. :p Not to mention the cookie trail. Wardriving script kiddies, I tell ya.
 

Kuru Kuru

macrumors newbie
Feb 17, 2006
25
0
/dev/null
crees! said:
He's looking to steal bandwidth so he can get movies and whatever else faster.

Right, but wasn't he downloading the torrents onto the computer he was hacking ... not his own? Right in front of the eyes of the said person? It just seems less than worthwhile. But I guess the problem isn't his motives, lol.
 

snkTab

macrumors 6502a
Nov 13, 2004
580
1
Cincinnati, OH
Kuru Kuru said:

Right, but wasn't he downloading the torrents onto the computer he was hacking ... not his own? Right in front of the eyes of the said person? It just seems less than worthwhile. But I guess the problem isn't his motives, lol.

I think the point was to slowly download the torrents on the compromised computers and then directly (fast) download it to the compromiser.

However the fact that its visual and on the screen when the person comes home and most probally quickly shut down, it is pointless. Unless he had compromised a lot of computers.
 

Abulia

macrumors 68000
Jun 22, 2004
1,786
1
Kushiel's Scion
Not to derail this thread, but is there any kind of Mac security "how to" guide to avoid these kinds of vulnerabilities? I've learned a lot by lurking in this thread.

I don't *think* my PM is open to attack (router firewall, refuse pings, only open specific ports at the router level) but, for example, I couldn't tell you if I have VNC/ARD enabled.
 

yellow

Moderator emeritus
Oct 21, 2003
16,018
6
Portland, OR
ARD is found in System Preferences -> Sharing Prefpane. I think it started appearing automatically in Panther, if you're running Jaguar, you don't have ARD installed.

As for the "how to"? I don't know of one, but that doesn't mean it doesn't exist.

Use common sense. Change your password every 6 months, and use GOOD PASSWORDS. Don't open ports that you don't need. Don't allow yourself to be socially engineered. Don't download things from sources that are not known to be reputable to yourself. Don't install things that aren't known to be reputable or from a reputable source. Look into things like Tripwire to help you manage what is installed and what is being installed/changed. Get comfortable with the command line. And above all, learn all your can. The more you know, the more protected you will be.

But ultimately remember, unplugging our computer form the internet is the safest it will be from external exploits/cracks/hacks. So don't get too down on yourself if it does happen. It happens to the best, despite best practices.
 

dosser

macrumors newbie
Mar 14, 2006
3
0
Don M. said:
Not to derail this thread, but is there any kind of Mac security "how to" guide to avoid these kinds of vulnerabilities? I've learned a {SNIP}

Don M. - I don't know if this is what you are after, but here are a few good basic security guides:
The NSA put out a security guide for Mac OSX Panther, it can be found at:
http://www.nsa.gov/snac/downloads_macX.cfm?MenuID=scg10.3.1.1

Also Corsaire's guide is worth a look:
http://www.corsaire.com/white-papers/040622-securing-mac-os-x.pdf

Macintouch have some good resources:
http://www.macintouch.com/security.html

And if you want your brain addled Rixstep seem to be the way to go:
http://www.rixstep.com/2/20060311,00.shtml

Of course there are heaps more, but they may belong, as you said, in another thread!
 

OutThere

macrumors 603
Dec 19, 2002
5,730
3
NYC
My guess would be that it's a war driver or neighbor who was looking for bandwidth. It wouldn't make sense for someone really in Brazil to download the stuff to your computer, and then from your computer to his computer in Brazil.

Here's what probably happened:

Over the course of a couple of days of internet traffic they collected your WEP password with Kismet or equivalent, and were able to join your wireless network.

Some quick probing from there could tell them that your G5 was in the DMZ, so they could drop out of your network, get on another network at home or another exposed wireless network, use a proxy to make it seem like they were from Brazil, and over the course of a few days, brute force your password.

If your password was weak, it wouldn't have taken long at all, and then they would have been able to command your computer from "Brazil" through their proxy, make it download all the stuff they wanted over your very fast internet, and then hop onto your wireless connection and download it all to their computer very quickly.


I would say you should take your computer out of the DMZ, close all the ports you don't absolutely need, set up WPA encryption, MAC Address filtering, and make your external IP address unpingable.

Brute forcing takes time, however, which would indicate that it's a neighbor, someone who can leave their computer on running an attack.

Also, the guy may have enabled root and changed the password, might want to check into that.
 

dejo

Moderator emeritus
Sep 2, 2004
15,982
452
The Centennial State
OutThere said:
If your password was weak...

Sunrunner has already stated:

Sunrunner said:
The passwords I use are strong passwords (>9 digits, special symbols, numbers, capitol & lowercase and no words, all in the same pw). Also, I never use the same password on two systems or accounts. So no, I HIGHLY doubt the "got-my-password" idea.

Why do so many keep harping about weak passwords?
 

yellow

Moderator emeritus
Oct 21, 2003
16,018
6
Portland, OR
dejo said:
Why do so many keep harping about weak passwords?

Because it's a common problem, and other people will probably read this thread and think their 6 character password that is the name of their cat is strong, because no one knows my cat's name is "fluffy".

As a parallel, having a back up solution is a common thing to harp about, and yet.. so many people don't have them..

They are perfectly cromulent things to harp upon. Because they embiggen a user's knowledge.
 

dejo

Moderator emeritus
Sep 2, 2004
15,982
452
The Centennial State
yellow said:
Because it's a common problem, and other people will probably read this thread and think their 6 character password that is the name of their cat is strong, because no one knows my cat's name is "fluffy".

Sorry, perhaps I should have worded that question: "Why do so many keep harping on Sunrunner about weak passwords?"
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.