XML/HTTP Interface
Shot in the dark but you don't have Azureus's XML/HTTP Interface plug in running do you ?
Shot in the dark but you don't have Azureus's XML/HTTP Interface plug in running do you ?
Sunrunner said:I was surprised this morning (not the good kind of surprise mind you) with some rather malicious-looking computer activity on my system
ChrisA said:What ports were open? what was running on those ports. I see it was not ssh/rlogin/telnet but did you have port 80 (http) or FTP port(s) open. It would be easy to misconfigure eithe apache or ftp to allow a remote exploit
Why is your computer on a DMZ? What service(s) does it provide?
What non-apple software is installed? You could have a Trojan.
Sunrunner said:Other than port 80, was open because this computer was a web server, ports 123 (time), 548 & 427 (file sharing), 5297 & 5298 (iChat), 3689 (iTunes), 8770 (iPhoto), 6970 - 6980 (quicktime), and 3283 & 5900 (ARD) were open.
Sunrunner said:Other than port 80, was open because this computer was a web server, ports 123 (time), 548 & 427 (file sharing), 5297 & 5298 (iChat), 3689 (iTunes), 8770 (iPhoto), 6970 - 6980 (quicktime), and 3283 & 5900 (ARD) were open. I know 5900 was used for the OSXvnc connection, but the initial exploit that gained remote access in the first place is unknown.
Also, little snitch was running on this end, but it seems that the user just added temporary rules while in my system to allow outbound connections to happen.
On June 21, 2004 Apple announced Apple Remote Desktop 2 (released in July), which was designed to use the VNC protocol instead of Apple's original ARD protocol. This allows the ARD administration software to observe and control any computer running VNC-compatible server software (such as Windows and Unix systems) not just Macs and conversely allowing standard VNC viewing software to connect to any Mac with the ARD 2 client installed and VNC access enabled. This version also uses the TCP protocol for most functions (on ports 3283, 5900 and 5988), which is designed to be more reliable than the UDP protocol used in ARD 1. Another significant addition to ARD 2 was the Task List, that allows remote tasks to be queued and monitored, reporting their status (such as Succeeded or Failed). This release also dropped support for older versions of the Mac OS, requiring 10.2.8 or higher.
superted666 said:When i perform a lookup on this address it does have a phone number registerd, you could try call : http://samspade.org/t/lookat?a=200.181.178.192
I would suggest enabling logging on the airport as he has been fairly sloppy performing all this using vnc and your user, intelligent and if he indedd new your password then he would add another admin account to better hide himself.
Sunrunner said:3283 & 5900 (ARD) were open.
kingjr3 said:Wheres yellow when you need him?
Kuru Kuru said:I'm not sure quite what he hoped to achieve
crees! said:He's looking to steal bandwidth so he can get movies and whatever else faster.
Kuru Kuru said:
Right, but wasn't he downloading the torrents onto the computer he was hacking ... not his own? Right in front of the eyes of the said person? It just seems less than worthwhile. But I guess the problem isn't his motives, lol.
Don M. said:Not to derail this thread, but is there any kind of Mac security "how to" guide to avoid these kinds of vulnerabilities? I've learned a {SNIP}
OutThere said:If your password was weak...
Sunrunner said:The passwords I use are strong passwords (>9 digits, special symbols, numbers, capitol & lowercase and no words, all in the same pw). Also, I never use the same password on two systems or accounts. So no, I HIGHLY doubt the "got-my-password" idea.
dejo said:Why do so many keep harping about weak passwords?
yellow said:Because it's a common problem, and other people will probably read this thread and think their 6 character password that is the name of their cat is strong, because no one knows my cat's name is "fluffy".
yellow said:They are perfectly cromulent things to harp upon. Because they embiggen a user's knowledge.