Get your server issues fixed by our experts for a price starting at just 25 USD/Hour. Click here to register and open a ticket with us now!

Author Topic: Check Server hack and exim spamming issues  (Read 1241 times)

0 Members and 1 Guest are viewing this topic.

vyshakhv

  • Newbie
  • *
  • Posts: 28
  • Karma: +0/-0
Check Server hack and exim spamming issues
« on: February 17, 2018, 02:38:20 pm »
I am hereby providing some commands to have a basic checking on a server hack issue.

This will probably help you to find out the IP which tried the malpractices in a server to get compromised.

First, we can try to find the IP which I need to monitor

1. This netstat script will list out the number of connections made by an IP
Code: [Select]
netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -n2. Now you got the IP then you check it out in

a. /var/log/messages

b. /var/log/secure

Code: [Select]

cat /var/log/messages | grep ip | awk ‘{print$5}’ | cut -d: -f1 | uniq -c |sort -n

grep “unauthorised attempt” /var/log/messages | awk ‘{print$5}’ |cut -d: -f1 | uniq -c | sort -n

grep “unauthorised attempt” /var/log/secure | awk ‘{print$5}’ |cut -d: -f1 | uniq -c | sort -n


Note :- In {print$5} value may change it can become 7, 8, 11, 12 etc …. eg:- {print$7}

EXIM COMMANDS

To view the mail queue:
Code: [Select]
exim -bp
Number of mail in queue:
Code: [Select]
exim -bpc

To open a mail:
Code: [Select]
exim -Mvh <message id>
Number of emails in the queue:
Code: [Select]
/usr/sbin/exim -bpr | grep “<” | wc -l
How many Frozen mails on the queue:
Code: [Select]
/usr/sbin/exim -bpr | grep frozen | wc -l
Deleteing Frozen Messages:
Code: [Select]
/usr/sbin/exim -bpr | grep frozen | awk {‘print $3′} | xargs exim -Mrm
To know the number of frozen mails in the mail queue, you can use the following command
Code: [Select]
exim -bpr | grep frozen | wc -l
In order to remove all frozen mails from the Exim mail queue, use the following command
Code: [Select]
exim -bpr | grep frozen | awk {‘print $3′} | xargs exim -Mrm
You can also use the command given below to delete all frozen mails
Code: [Select]
exiqgrep -z -i | xargs exim -Mrm
To flush the exim queue
Code: [Select]
exim -qff

Base64 injection scripts

We can use this script to find out PHP script
Code: [Select]
grep “authentication failure” /var/log/secure | awk ‘{ print $3}’ | cut -b7- | sort | uniq -c

find /var/www/vhosts/ -name “*.php” | xargs -I{} sed -i ‘/<?php eval(gzinflate(base64_decode(/d’ {};

How to find the spamming from home directory

The spammer may use his home directory for spamming we can use a script to locate the top scripts on your server that send out the email. Then you can search the Exim mail log for those scripts to determine if it looks like spam, and even check your Apache access logs in order to find how a spammer might be using your scripts to send out spam.
Code: [Select]
    grep cwd /var/log/exim_mainlog | grep -v /var/spool | awk -F”cwd=” ‘{print $2}’ | awk ‘{print $1}’ | sort | uniq -c | sort -n

To find suspicious IP activities

 This will list the entries for the IP Address in question ( replace ip.add.re.ss with the suspicious IP address )
Code: [Select]
find /var/log/ -exec grep “ip.add.re.ss” ‘{}’ \; -print
This script will provide you top 10 IP addresses that hit your apache access log
Code: [Select]
cat /var/log/httpd/access_log |awk ‘{print $1}’|cut -d? -f1|sort -n|uniq -c|sort -n|tail -10
This script will list the ten most accessed files on your site

 This script will Sort files and display the number of times that file was accessed
Code: [Select]
cat /var/log/httpd/access_log |awk ‘{print $7}’|cut -d? -f1|sort -n|uniq -c|sort -n| tail -10