Hi,
I did a keyword search for my question with no hits, so please excuse
me if I'm being redundant!
I have a Linux firewall PC between my cable modem and several Windows
98 PCs on my home LAN. I've been very happy with it but a couple of
days ago I discovered that someone was able to crack my firewall and
install password filtering software (t0rn?), among other things.
Someone has been roaming around it for a while, I guess, apparently
with root permission.
I haven't discovered how the break in was accomplished yet. I guess
that I'll try to understand HOW it happened before I reinstall Linux
from scratch.
My most immediate worry is how exposed have the Windows PCs been while
this cracking has been going on? One of the windows PCs has a directly
connected printer that is shared across the LAN with the others. I
didn't bother to password the share because I was only sharing the
printer and not any of the disk volumes on the PC. I also assumed that
ipchains would filter out any netbios packets from outside my LAN. I
didn't think about the possibility of someone trying to access a
windows PC directly from the firewall, though.
Now, having read some articles at linuxsecurity.com, I fear that
sharing the printer may have opened a loophole for the firewall cracker
to get access to the disk volumes on the PC. The first article I read
says that sharing the printer is sufficient to open the loophole. Other
info that I read at CERT only mentions unpassworded disk sharing as
dangerous.
Does anyone have any specific knowledge of the "NetBios over TCP/IP"
loophole. Would it be easy for a cracker, having gained control of my
firewall, to exploit this loophole? Is there any evidence that I can
look for that such an exploit has occurred?
Thanks in advance,
FWallNewbie
Sent via Deja.com http://www.deja.com/
Before you buy.