Hello Guest, if you are reading this it means you have not registered yet. Please take a second, Click here to register, and in a few simple steps you will be able to enjoy our community and use our OpenViX support section.
Results 1 to 9 of 9

Thread: Possibly Hacked box, Some Security help needed

  1. #1

    Title
    Member
    Join Date
    Dec 2015
    Posts
    40
    Thanks
    1
    Thanked 2 Times in 2 Posts

    Possibly Hacked box, Some Security help needed

    My 1 year old Xtrend ET-10000 is occasionally misbehaving.

    When it misbehaves, it's sending a Flood of outgoing traffic to an as yet undetermined destination; it looks like it's participating in a DoS attack. Small packets, very very high Packets per second. Which cripples my internet connection and no doubt isn't helping someone else's either.

    The system does have a password for ssh/telnet but access via the web interface doesn't seem to require one, so if people are able to make an inbound connection to get at the box, it still seems feasible they've pwned it somehow.


    When the box is sending a flood of traffic, mgcamd is using 100%+ CPU even though the box shouldn't be running a cam at all. I can terminate mgcamd which seems to stop the traffic but it seems to restart itself later.


    The box has IPv6 Connectivity. I have tried to find out how to disable this, but so far have not. If someone's making an inbound connection, I've a feeling it must be IPv6, as it only has an RFC1918 v4 address, with no ports or anything mapped through the router. However, it's possibly that the connection for the seeming remote control is now being initiated from the inside on a cron job or something to let 3rd party in. I don't really know.



    Help Wanted:
    I would like to know, if people can tell me:

    1. How to permanently disable IPv6 on the system. It doesn't need to be enabled. It's just a gaping security hole at the moment.
    2. Are there any known exploits or particular known previous examples of this particular pattern of abuse that people are familiar with, and can direct me to a related discussion?
    3. I probably should be reflashing the box at this point but I have never done this and don't really know how. But I'm familiar with Linux generally, and have reflashed android devices before so it isn't toooo daunting, I just need to know where to start, and if there are any special considerations to take into account when trying to clean up a system which may have been compromised.

  2. #2
    ccs's Avatar
    Title
    ViX Beta Tester
    Join Date
    Sep 2014
    Posts
    5,836
    Thanks
    554
    Thanked 1,277 Times in 1,089 Posts
    If you have port forwarding to the box set on your router, that's all they need to get in. It needs to be disabled.

    Reflashing the box will clean it up.

    The telnet command netstat -t will show you what TCP streams are in use.
    Last edited by ccs; 18-01-17 at 23:07.

  3. #3
    abu baniaz's Avatar
    Title
    Moderator
    Join Date
    Sep 2010
    Location
    East London
    Posts
    23,360
    Thanks
    6,441
    Thanked 9,160 Times in 6,235 Posts
    If you are using mgcamd, I'm guessing your configs have the logging on and you are trying connect to a non-existent IP address. This may be what is causing the Self DDOS attack. I may be wrong, so please check the L value in my_cfg.

    If you have exposed your box by opening ports to it, it may indeed be part of a botnet.

  4. #4

    Title
    Member
    Join Date
    Dec 2015
    Posts
    40
    Thanks
    1
    Thanked 2 Times in 2 Posts
    No "Open Ports" in the traditional sense (There's no way in via IPv4) - but the entire box is exposed via IPv6 so that needs to be shut down - I appreciate not many people are using IPv6 in the home so it's not something you come across often, but it's a problem, I need to be able to disable IPv6 completely.

  5. #5
    abu baniaz's Avatar
    Title
    Moderator
    Join Date
    Sep 2010
    Location
    East London
    Posts
    23,360
    Thanks
    6,441
    Thanked 9,160 Times in 6,235 Posts
    Can you upload your my_cfg please. Zip it before attaching to post.

  6. #6
    duoduo's Avatar
    Title
    Forum Supporter
    Donated Member
    Join Date
    Feb 2013
    Location
    North West Seaside
    Posts
    2,006
    Thanks
    645
    Thanked 389 Times in 309 Posts
    Where did you get your cam setup from buddy, I fear this is where your issue lies. Personally, I would definitely recommend a new flash, lots of tutorials on here too help you out.
    Vix image (usually latest) - VU Solo 4K- WD 1TB INTERNAL HDD - DVB-T Freeview, trialling IPTV options

    If my response has helped you, don't forget to hit the thanks button below. I appreciate you appreciate me

  7. #7

    Title
    Forum Supporter
    Donated Member
    Join Date
    Jan 2016
    Posts
    533
    Thanks
    2,093
    Thanked 113 Times in 103 Posts
    Can you not just uninstall mgcamd if don't need it see how it goes?

    Sent from my VF695 using Tapatalk

  8. #8

    Title
    Senior Member
    Join Date
    Aug 2015
    Posts
    234
    Thanks
    131
    Thanked 68 Times in 50 Posts
    Its your mg_cfg file causing the problem.

    open it, look for logging and change L:{03} to L:{00}

    Code:
    # Log option, summ of:
    # 00 off
    # 01 network udp log
    # 02 log to console
    # 04 file, appended ! delete it by yourself, before it eat all your hdd
    # + IP udp-port log-file-name
    L: { 00 }

  9. #9

    Title
    Member
    Join Date
    Dec 2015
    Posts
    40
    Thanks
    1
    Thanked 2 Times in 2 Posts
    Quote Originally Posted by kryton View Post
    Its your mg_cfg file causing the problem.

    open it, look for logging and change L:{03} to L:{00}

    Code:
    # Log option, summ of:
    # 00 off
    # 01 network udp log
    # 02 log to console
    # 04 file, appended ! delete it by yourself, before it eat all your hdd
    # + IP udp-port log-file-name
    L: { 00 }

    Aha, that makes a lot of sense. I've changed that now, damn thing was trying to log to an RFC1918 address not even on my network...although the router should have been smart enough not to try and actually route that out to the default route...or..hmm, probably not. Damn



    Well I'll see how it behaves after this and hopefully that will do the trick.





    I still want to know how to disable IPv6 on the box though, if anyone has any ideas.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
This website uses cookies
We use cookies to store session information to facilitate remembering your login information, to allow you to save website preferences, to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.