ubuntu 10.10 sshd contains “YOU WANNA SMOKE A SPLIFF” and pot leaf ascii art. Does this mean I’ve been hacked?

compare grep usr/sbin/sshd /var/lib/dpkg/info/openssh-server.md5sums to md5sum /usr/sbin/sshd. When they come up with different md5sums, you are no longer using the packaged version. If they are the same, it doesn’t mean anything definitive, since anyone who is able to modify your sshd binary obviously has privileges to alter the md5sum recorded in /var/lib/dpkg/info. The next step … Read more

Should I report hacking attempts?

While the answer can depend greatly on the agency you are attempting to inform, I believe that in general you should. In fact, since monitoring and responding to the abuse mailbox for our organization is one of my primary job duties, I can positively say, ‘Yes Please!’. I had this same conversation with members of … Read more

is this a hack attempt?

0) Yes. At the very least, it’s a systematic probe against your site trying to discover if it’s vulnerable. 1) Other than making sure that your code is clean, there’s not a lot you can do but run your own tests against your host to make sure it’s safe. Google Skipfish is one of the … Read more

Can a virtual machine (VM) “hack” another VM running on the same physical machine?

Of course it is possible to exploit another VM running on the same hardware, given a working exploit. Additionally, one can exist. Your question cites some recent work showing one. I’m not going to share any specific exploits or PoC here, but I’ll gladly say how they can be made. The exploits that are used … Read more

Stop China from connecting to my Google Compute Engine server

Firewalls have two main choices when receiving unwanted connection attempts. REJECT – send a response saying the port/service/etc is closed or unavailable DROP – don’t respond and just drop the packets The words REJECT/DROP aren’t standard or used across all firewalls but the difference between the concepts behind the two possible actions will be there. … Read more

SSH server zero-day exploit – Suggestions to protect ourselves

Comment from Damien Miller (OpenSSH developer): http://lwn.net/Articles/340483/ In particular, I spent some time analysing a packet trace that he provided, but it seems to consist of simple brute-force attacks. So, I’m not pursuaded that an 0day exists at all. The only evidence so far are some anonymous rumours and unverifiable intrusion transcripts.