top | item 8370660

Easy, realtime, system-wide Shellshock monitoring

91 points| kristopolous | 11 years ago |draios.com

32 comments

order
[+] frankzinger|11 years ago|reply
Has anybody looked for historical Shellshock exploit traffic (in old/backed-up logfiles)?

Though none of the exploits I have seen thus far look very obfuscatible and therefore probably would've been discovered already.

[+] noonespecial|11 years ago|reply
I have some truly old (disk) images going back to around 2003. I've looked through them and found nothing.

What freaks me out though is that these systems were vulnerable. All this time; it was right there. Its like finding out you just drove from LA to NYC with nothing but a single loose lug nut on your left front tire.

[+] LeoPanthera|11 years ago|reply
Yeah I did. I run a niche site that gets about a thousand hits a day. It has a cgi that uses bash. I've got logs going back to January, and the first (and so far only) attempted exploit is from shellshock-scan yesterday. It came after the first bash patch, which I had applied, and did not succeed.
[+] RobotCaleb|11 years ago|reply
Just so I understand fully, this doesn't block attempts, just logs them?
[+] davideschiera|11 years ago|reply
Correct. It will log time, process name/pid, and what's going to be executed.
[+] mikegioia|11 years ago|reply
This looks cool but I can't get it running on Ubuntu 14.04. I just installed sysdig but I don't have the shellshock_detect chisel :/ Is it available yet through apt?
[+] gighi|11 years ago|reply
What do you get if you run "sysdig --version"?

If you used the official Ubuntu packages, those are a few versions behind upstream (currently at 0.1.87 while we are at 0.1.89): http://packages.ubuntu.com/trusty-backports/sysdig.

What we recommend is uninstalling those ones (sysdig and sysdig-dkms) and just use the binaries that we, Draios, provide, following this: https://github.com/draios/sysdig/wiki/How-to-Install-Sysdig-...

Should be very easy, and sysdig --version should show 0.1.89

[+] kaivi|11 years ago|reply
I guess there are already worms around, exploiting this bug.

Thus, has somebody thought of exploiting and patching the attackers in response?

[+] daveloyall|11 years ago|reply
I haven't studied a worm in years, but historically it's been common practice to close the door you came in through upon entry, for exactly this reason.

Common, but by no means ubiquitous.

[+] zobzu|11 years ago|reply
well, installing a LKM, just that =p

Now sysdig aint bad per se but id like to see it mainlined or using mainline code

[+] gighi|11 years ago|reply
Fair point, even though:

- At this point sysdig is estimated to have tens of thousands of users, and we haven't gotten a kernel bug in a while, with people (us included) regularly using it a lot in production. Of course, I see the irony of mentioning this in a "shellshock" thread

- the dkms packaging should completely hide all the complexities required in maintaining a kernel module

- Part of the kernel code, if you look at the contributors, has been written/reviewed by gregkh, so we like to think the quality is "high enough"

- There might be plans at some point to try and propose a merge of the code to mainline