10 minutes in, they tried to hack me
Ever wondered what happens to your server once it goes online? You may find it both amusing and scary.
Long story short: within 10 minutes, someone will attempt to gain root access. Whoo!
Let’s dig into it. If you have basic linux skills (bash, mostly), you should be able to follow along and replicate the same experiment on your server.
Setup
For this first experiment, I decided to keep things simple: boot up a new virtual machine in the cloud, don’t worry about DNS or anything, and log 3 things:
- port scans
- ssh connection attempts
- http connections
I booted up the machine, upgraded software, added a firewall, apache and tcpdump.
# apt update && apt upgrade
# reboot
# apt install tcpdump ufw apache2
# ufw allow ssh
# ufw allow http
# ufw enable
To war!
Or rather: To sitting idle and seeing things come our way…
Apache and sshd are collecting their own logs. All I need to do manually is log the TCP SYN packets sent to my machine with tcpdump
.
TCP SYN packets
Let’s start with the TCP SYN packets received. A SYN packet is the “hello” between machines. If my machine wants to establish a connection to yours, the first step is sending one of those SYN packets.
You can read more about the TCP handshake on wikipedia.
# tcpdump "tcp[tcpflags] & tcp-syn == tcp-syn"
10:20:13.226447 IP 79.110.62.244.55430 > <my_server>.16575: Flags [S]
10:20:15.199621 IP scan.cypex.ai.59856 > <my_server>.49169: Flags [S]
10:20:15.845191 IP 169.254.169.254.http > <my_server>.33456: Flags [S.]
10:20:17.917878 IP 79.110.62.244.55430 > <my_server>.21094: Flags [S]
10:20:18.017210 IP 207.90.244.15.23320 > <my_server>.8139: Flags [S]
10:20:21.938249 IP 185.7.214.52.42179 > <my_server>.33089: Flags [S]
10:20:25.101734 IP 146.103.45.185.55292 > <my_server>.http-alt: Flags [S]
10:20:42.397456 IP 79.110.62.242.55429 > <my_server>.13671: Flags [S]
10:20:42.961234 IP ip-112-6.4vendeta.com.55441 > <my_server>.60521: Flags [S]
10:20:54.168294 IP 205.210.31.180.62428 > <my_server>.ssh: Flags [S]
10:20:54.168360 IP <my_server>.ssh > 205.210.31.180.62428: Flags [S.]
[...]
The complete file is 2810 lines long (3 hours of logs).
Each line above represents a machine trying to connect to my server, or checking if the port is open (for example with tools like nmap).
For example, the first line indicates that the machine with IP address 79.110.62.244
tried to connect to my server on port 16575 at 10:20:13 UTC.
The second line shows a hostname for the sender, instead of an IP address: tcpdump
does a reverse DNS query for each line and tries to come up with a name for the sender, instead of just an IP address.
Finally, the last two lines are someone trying to connect to my SSH server. We will find that later in our SSH logs.
It’s a SYN!
Let’s identify who is scanning us the most. rsec
provides a handy tcpdump to json converter to help us with that.
In particular, we’re interested in the src_group
field, which is either an IP address or, when applicable, the apex domain of the hostname returned by the reverse DNS query. For example, scan.cypex.ai
becomes cypex.ai
. This helps when the same apex domain is used for multiple endpoints.
You can install rsec
with cargo
. At the time of this writing, the latest version of rsec is 0.1.1.
$ cargo install --version 0.1.1 rsec
$ rsec tcpdump < tcpdump-syn.log | jq -r '.src_group' | sort | uniq -c | sort -nr | head -n 20
242 79.110.62.242
226 79.110.62.244
210 80.94.95.176
206 79.110.62.69
99 4vendeta.com
92 googleusercontent.com
72 linodeusercontent.com
50 stretchoid.com
50 censys-scanner.com
47 web.id
39 shadowserver.org
37 bufferover.run
26 onyphe.net
23 internet-measurement.com
21 internet-research-project.net
20 ovh.ca
20 64.226.117.7
20 138.197.169.12
Now, an IP scan isn’t really an attack per se. They’re just trying to find out if I have something running on a given port. There are legitimates reasons why you would scan a host for open ports, but it’s also a means to do reconnaissance for future attacks.
Please note: reverse DNS lookup cannot be trusted. The data that appears below may be entirely wrong, for all I know.
One of the well-known names that showed up in the list (but hidden by head -n 20
) is Shodan, a search engine that is commonly used for recon prior to a vulnerability enumeration.
Shadowserver is possibly related to shadowserver.org. They are apparently funded by the UK government, and offer a public dashboard with a fair amount of data available on it.
I won’t make any conclusion here as to the legitimacy of the names we see in the list above, as I don’t have enough information about those. All I know is that I didn’t invite their scanners to a party.
SSH logs
I didn’t even have time to start tcpdump
that already something was trying to connect to my SSH server!
# journalctl -u ssh.service
Dec 21 10:14:03 <my_server> sshd[1292]: Accepted publickey for root from <my_ip> port 62192 ssh2: RSA SHA256:<redacted>
Dec 21 10:19:43 <my_server> sshd[2067]: error: kex_exchange_identification: Connection closed by remote host
Dec 21 10:19:43 <my_server> sshd[2067]: Connection closed by 117.33.249.211 port 44966
Dec 21 10:20:59 <my_server> sshd[2077]: Connection reset by 205.210.31.180 port 62428 [preauth]
Dec 21 10:28:37 <my_server> sshd[2109]: Connection closed by authenticating user root 8.217.134.158 port 36542 [preauth]
The first line here is me, connecting with my private key to the server. The rest… isn’t me.
Remember those last two lines in the tcpdump
logs? They are the SSH connection attempt by 205.210.31.180
.
Over the course of 3 hours, roughly 300 connection attempts were made:
root
was tried 42 times, the first attempt a measly 10 minutes into the life of the servera3user
is also a popular username, apparently a default login on IBM softwaredolphinscheduler
appeared 4 times. Possibly related to a Apache Dolphin Schedulerserver
,admin
,foo
and other generic names are commonISANTA
. Merry Christmas, I guess?gerald
,maxime
,gdiaz
and other names appear. Not sure what they’re linked to
You can also spot a few key exchange protocol errors, probably someone trying an old vulnerability:
Dec 21 11:17:04 <my_server> sshd[2233]: error: kex_protocol_error: type 20 seq 2 [preauth]
Dec 21 11:17:04 <my_server> sshd[2233]: error: kex_protocol_error: type 30 seq 3 [preauth]
Dec 21 11:17:06 <my_server> sshd[2233]: error: kex_protocol_error: type 20 seq 4 [preauth]
Dec 21 11:17:06 <my_server> sshd[2233]: error: kex_protocol_error: type 30 seq 5 [preauth]
Dec 21 11:17:08 <my_server> sshd[2233]: error: kex_protocol_error: type 20 seq 6 [preauth]
Dec 21 11:17:08 <my_server> sshd[2233]: error: kex_protocol_error: type 30 seq 7 [preauth]
[...]
Dec 21 12:13:17 <my_server> sshd[2673]: error: kex_exchange_identification: banner line contains invalid characters
[...]
Maybe later I’ll setup machines with a password root login, to see how long it lasts…
Apache access logs
The smallest log file is that of apache (located at /var/log/apache/access.log
).
To be honest, I expected more entries here, having monitored other websites before.
I guess the machine was too hidden for this to have a big impact.
Still, some requests were made:
# Log format:
# IP - - [timestamp] "method uri version" response_code content-size "referer" "user-agent"
78.140.21.51 - - [21/Dec/2024:11:07:24 +0000] "GET / HTTP/1.1" 200 10956 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7"
5.32.176.116 - - [21/Dec/2024:11:37:38 +0000] "GET / HTTP/1.1" 200 10956 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7"
95.214.55.74 - - [21/Dec/2024:11:57:55 +0000] "GET /cgi-bin/luci/;stok=/locale HTTP/1.1" 404 435 "-" "-"
95.214.55.79 - - [21/Dec/2024:11:59:17 +0000] "GET / HTTP/1.1" 200 3380 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
185.191.126.213 - - [21/Dec/2024:12:03:47 +0000] "GET / HTTP/1.1" 200 10956 "-" "-"
95.214.55.32 - - [21/Dec/2024:12:07:14 +0000] "GET / HTTP/1.1" 200 10956 "-" "-"
222.228.81.22 - - [21/Dec/2024:12:40:26 +0000] "GET / HTTP/1.1" 200 10956 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36"
181.49.205.58 - - [21/Dec/2024:12:48:33 +0000] "GET /admin/assets/js/views/login.js HTTP/1.0" 404 454 "-" "xfa1"
95.214.53.205 - - [21/Dec/2024:12:53:51 +0000] "GET / HTTP/1.1" 200 3380 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
203.223.44.74 - - [21/Dec/2024:13:20:09 +0000] "GET / HTTP/1.1" 200 10956 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36"
141.98.11.155 - - [21/Dec/2024:13:26:26 +0000] "GET / HTTP/1.1" 200 10956 "-" "-"
Nothing very fancy. One that seems to be looking for TP-Link wifi routers, and another for Sangoma FreePBX. Not sure what the rest of them were up to.
Conclusion
Internet is a wild place! Put a vulnerable machine online and it’ll be hacked within hours at most.
Vulnerabilities come in all shapes and forms, from out-of-date software to default logins, without forgetting bad passwords and misconfigured web servers. In fact, even up-to-date software can contain vulnerabilities, also called zero-days.
Thankfully, foundational tools like the ssh server and various http servers are well surveyed and rather safe, but you should keep your machines updated and watch your logs!