http://www.networkworld.com/news/2012/1 ... 63813.htmlOnce into the compromised employee machine, the attacker used a collection of tools and a sniffer to look for where valuable content might be stored in the Swiss company's network. Though he found an application server, he couldn't get into it. But the attacker did break into the network printer, a Toshiba, and went on to check for passwords. "The administration password was in the HTML code," said Gnesa. "And unfortunately, that password was also used on another machine."
Eventually the attacker made his way to documents, diagrams and other valuable intellectual property stored on a Linux file server. Although the server was well-kept in terms of security, the backup for it was not, and by using what Gnesa referred to as the phpMyAdmin 3.4.1 swekey RCEexploit, the attacker got to the remote shell on the backup server. With yet another trick, the Linux 2.6.x umount exploit, he got to the root shell and had access to every file and directory, said Gnesa.
Security researcher shares blow-by-blow account of advanced
- Egaladeist
- I am the Eg man : Coo Coo Ca Choo
- Posts: 19020
- Joined: Sun Dec 25, 2005 1:02 am
- Are you a Spammer: No
- Location: Canada
Security researcher shares blow-by-blow account of advanced
Security researcher shares blow-by-blow account of advanced persistent threat
www.thetazzone.com www.thegameszone.org