Page 1 of 2 12 LastLast
Results 1 to 10 of 12

Thread: How much damage can a compromised user account cause?

  1. #1
    Join Date
    Feb 2012
    Beans
    3

    How much damage can a compromised user account cause?

    Suppose I create a user account for a friend without entry in sudoers. And that account gets hacked.

    What I can think off:
    - they can use outgoing internet connections, I will held responsible for any DMCA and other abuse complaints
    - they can read my /home folder if I do net set permissions not to do so
    - they can create a huge system load until the system becomes unreliable
    - they can try privilege escalation and compromise the whole system

    Let's also suppose they are unable to do privilege escalation (which is sufficiently hard on a patched system for a Jon Doe script kiddy)...

    What else? How much damage can a compromised user account cause?

    What else should I do to lock down the user account of the guest?

  2. #2
    Join Date
    May 2010
    Beans
    462
    Distro
    Ubuntu Development Release

    Re: How much damage can a compromised user account cause?

    If you are million dollar man,lamers can steal your personal data and blackmailer you. Lkewise if you are commoners and who cares.

  3. #3
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: How much damage can a compromised user account cause?

    For guests, use the guest account, it is confined by apparmor.

    As far as intruders, depends on the skill and intent of the intruder. I would not so easily dismiss privilege escalation.

    google search botnet.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

  4. #4
    Join Date
    Dec 2011
    Location
    Manchester, UK
    Beans
    356
    Distro
    Ubuntu

    Re: How much damage can a compromised user account cause?

    Well, they could do damage. It all depends I'm afraid. As far as I'm aware, a user cannot view or change the folders of an admin account, as for non-admin users, I'm not sure, I think an admin account could view a non-admin user... But I'm not sure.
    The thing is, is how to get rid of a compromised admin account. How do you get rid of one? If system allows the admins to delete accounts, a compromised account could delete all your files! But if not, you won't be able to get rid of them. That's why it is good to use a separate root password in multi-user accounts, and not just the admin password.

  5. #5
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: How much damage can a compromised user account cause?

    Quote Originally Posted by 0011235813 View Post
    Well, they could do damage. It all depends I'm afraid. As far as I'm aware, a user cannot view or change the folders of an admin account, as for non-admin users, I'm not sure, I think an admin account could view a non-admin user... But I'm not sure.
    The thing is, is how to get rid of a compromised admin account. How do you get rid of one?
    It can be difficult to impossible. If you have the skills, and can identify what has been compromised you can recover, if not re-install and restore your data from a known good backup.

    If system allows the admins to delete accounts, a compromised account could delete all your files! But if not, you won't be able to get rid of them. That's why it is good to use a separate root password in multi-user accounts, and not just the admin password.
    That last point is highly debatable. sudo has many advantages in a multiuser environment including better logging and finer grained control of root access.

    su (root password) is all or none. with sudo you can limit root access to only certain commands.

    See : http://www.gratisoft.us/sudo/sudoers.man.html

    Even Fedora, one of the longest hold outs, is offering sudo.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

  6. #6
    Join Date
    May 2009
    Location
    USA
    Beans
    Hidden!
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How much damage can a compromised user account cause?

    If it has nothing of value to the attacker, it'll be used as a zombie to perform certain tasks.

  7. #7
    Join Date
    Dec 2011
    Location
    Manchester, UK
    Beans
    356
    Distro
    Ubuntu

    Re: How much damage can a compromised user account cause?

    Quote Originally Posted by bodhi.zazen View Post
    It can be difficult to impossible. If you have the skills, and can identify what has been compromised you can recover, if not re-install and restore your data from a known good backup.



    That last point is highly debatable. sudo has many advantages in a multiuser environment including better logging and finer grained control of root access.

    su (root password) is all or none. with sudo you can limit root access to only certain commands.

    See : http://www.gratisoft.us/sudo/sudoers.man.html

    Even Fedora, one of the longest hold outs, is offering sudo.
    I think you mis-understood the post. I didn't say you should use root instead of sudo, I said you should use a separate root password, so when you type in
    Code:
    sudo apt-get install <whatever>
    instead of typing your log on password, you type in the root password. If not an admin account, sudo wouldn't even be available.

  8. #8
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: How much damage can a compromised user account cause?

    Quote Originally Posted by 0011235813 View Post
    I think you mis-understood the post. I didn't say you should use root instead of sudo, I said you should use a separate root password, so when you type in
    Code:
    sudo apt-get install <whatever>
    instead of typing your log on password, you type in the root password. If not an admin account, sudo wouldn't even be available.
    It takes a little effort to do that, you have to first set a root password (which in itself can be considered a security risk), then configure sudo.

    In addition, that adds little to security, if an account with root access is cracked, root access is not far behind, does not matter if you use sudo, su, or set a root password as you suggest. Many of the exploits to obtain root access work with all those methods (su, sudo, sudo with root pw).

    You are also assuming that the intruder obtained a shell with a password. Most (many) exploits these days use other methods.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

  9. #9
    Join Date
    Dec 2011
    Location
    Manchester, UK
    Beans
    356
    Distro
    Ubuntu

    Re: How much damage can a compromised user account cause?

    Quote Originally Posted by bodhi.zazen View Post
    It takes a little effort to do that, you have to first set a root password (which in itself can be considered a security risk), then configure sudo.

    In addition, that adds little to security, if an account with root access is cracked, root access is not far behind, does not matter if you use sudo, su, or set a root password as you suggest. Many of the exploits to obtain root access work with all those methods (su, sudo, sudo with root pw).

    You are also assuming that the intruder obtained a shell with a password. Most (many) exploits these days use other methods.
    The root password can be set at installation quite easily...

    I'm not sure I get you. If the compromised account uses a password that has been compromised, actual damage to the root folders would still require the use of the uncompromised root password...

    I don't understand- to alter root you need the root password, the compromised account's password isn't the root password, that's why I suggested separate root password in the first place. Also, if an admin account wanted to remove another admin account, the root password would be neccessary. Thus you can get rid of compromised accounts easily, and compromised accounts can't get rid of you!

  10. #10
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: How much damage can a compromised user account cause?

    Quote Originally Posted by 0011235813 View Post
    I don't understand- to alter root you need the root password, the compromised account's password isn't the root password, that's why I suggested separate root password in the first place. Also, if an admin account wanted to remove another admin account, the root password would be neccessary. Thus you can get rid of compromised accounts easily, and compromised accounts can't get rid of you!
    That sort of makes limited sense if the comprise is due to a compromised password.

    By definition, an admin account has root access, so your method in no way prevents and admin (someone with root access) from accessing another admin's account or system files.

    Usually a compromise is not a password, it is "arbitrary code" or shell access.

    See the reports here - http://www.ubuntu.com/usn

    So, now our intruder has shell access. They can do tons of damage already, without privilege escalation.

    They can then, if they so desire, try to leverage privilege escalation. They need a password, either the login (sudo), root (su), or with your method root (target_pw). So, either way, they are one password away from root access. As with shell access, many exploits (code injection) do not require determining the password. The ones that do gain the password work with all 3 (sudo, su, or target_pw).

    Your problem is that you are assuming that the only exploit or method of privilege escalation is via password compromise, and, sadly that is simply not the case.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

Page 1 of 2 12 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •