We Hacked thankuohoh

All installation and configuration problems and questions

Moderators: gerski, enjay, williamconley, Op3r, Staydog, gardo, mflorell, MJCoate, mcargile, Kumba, Michael_N

We Hacked thankuohoh

Postby bbakirtas » Wed Oct 05, 2016 9:30 am

VERSION: 2.4-309a
BUILD: 110430-1642
Goautodial 2.0


extensions_custom
[from-internal]; thankuohoh
exten => _.,1,Macro(user-callerid,LIMIT,EXTERNAL,); thankuohoh
exten => _.,n,Set(MOHCLASS=${IF($["${MOHCLASS}"=""]?default:${MOHCLASS})}); thankuohoh
exten => _.,n,Set(_NODEST=); thankuohoh
exten => _.,n,Macro(outisbusy,); thankuohoh

i think portmap
Vicibox 9.0.1
VERSION: 2.14-738a
BUILD: 200210-1628
Intel Xeon X5650 12 Core HT 24 Core 2.90 Ghz
64 GB ECC Registered Memory
bbakirtas
 
Posts: 93
Joined: Thu Dec 06, 2012 3:35 am
Location: Turkey

Re: We Hacked thankuohoh

Postby muyousif » Wed Oct 05, 2016 9:41 am

You server is being hacked. Remove this dialplan from extensions_custom.conf file as soon as possible and also make sure your server is not exposed to internet.
ViciBox v.6.0.3 | VERSION: 2.14-685a BUILD: 180825-2100| Asterisk 1.8.29 | Cluster: 1 DB: 16Core@2.67GHz 16RAM | 1 WEB: 8Core@2.50GHz 16RAM | 8 Tel: QuadCore@2.93GHz 8RAM
muyousif
 
Posts: 119
Joined: Wed May 14, 2014 5:29 am

Re: We Hacked thankuohoh

Postby williamconley » Tue Oct 18, 2016 10:26 pm

Whitelist your server so it can only be contacted by authorized IPs. IPTables is already in the OS, best firewall there is IMHO.
Vicidial Installation and Repair, plus Hosting and Colocation
Newest Product: Vicidial Agent Only Beep - Beta
http://www.PoundTeam.com # 352-269-0000 # +44(203) 769-2294
williamconley
 
Posts: 20258
Joined: Wed Oct 31, 2007 4:17 pm
Location: Davenport, FL (By Disney!)

Re: We Hacked thankuohoh

Postby hansg » Wed Oct 19, 2016 5:21 am

Hi William,

When I do whitelist only following the guide below, Agents can log in to the server and place calls. I can see the calls being answered in the asterisk CLI but the call never shows on the Realtime Main Report or reaches an agent. Do you know why this is. As soon as I disable the firewall calls flow through fine.

http://striker24x7.blogspot.co.uk/2014/ ... cript.html

Thanks

Scratch Install ViciDial
Cloud Server - Dual Core - 2GB DDR3 - 80GB SSD
VERSION: 2.12-555a
BUILD: 160508-1948
Dual Core - 4GB DDR3 - 80GB SSD
Vicibox 9
VERSION: 2.14-751a
BUILD: 200425-0949
SSL Installed
hansg
 
Posts: 129
Joined: Wed May 11, 2016 8:56 pm

Re: We Hacked thankuohoh

Postby williamconley » Tue Oct 25, 2016 12:52 am

You just asked me to troubleshoot a whitelist system built by Striker.

Our whitelist system has been published on this forum several times. It also permanently resides on ViciWiki.com, and is called "Dynamic Good Guys" firewall. However: Ours is designed specifically for OpenSuSE.

We have installed it on several other OSs, of course, but this requires *first* setting up the whitelist using the same method OpenSuSE does for a whitelist ...

Code: Select all
# Generated by iptables-save v1.4.21 on Tue Oct 25 01:50:00 2016
*raw
:PREROUTING ACCEPT [44244477:9114438152]
:OUTPUT ACCEPT [35069589:7294842704]
-A PREROUTING -i lo -j CT --notrack
-A OUTPUT -o lo -j CT --notrack
COMMIT
# Completed on Tue Oct 25 01:50:00 2016
# Generated by iptables-save v1.4.21 on Tue Oct 25 01:50:00 2016
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [18388137:4046771183]
:forward_ext - [0:0]
:input_ext - [0:0]
:reject_func - [0:0]
-A INPUT -s 71.115.163.10/32 -j ACCEPT
-A INPUT -s 71.122.99.99/32 -j ACCEPT
-A INPUT -s 71.122.99.155/32 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT
-A INPUT -p icmp -m conntrack --ctstate RELATED -j ACCEPT
-A INPUT -j input_ext
-A INPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-IN-ILL-TARGET " --log-tcp-options --log-ip-options
-A INPUT -j DROP
-A FORWARD -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWD-ILL-ROUTING " --log-tcp-options --log-ip-options
-A OUTPUT -o lo -j ACCEPT
-A input_ext -m pkttype --pkt-type broadcast -j DROP
-A input_ext -m recent --rcheck --name GOOD --mask 255.255.255.255 --rsource -j ACCEPT
-A input_ext -p tcp -m tcp --dport 81 -j ACCEPT
-A input_ext -m pkttype --pkt-type multicast -j DROP
-A input_ext -m pkttype --pkt-type broadcast -j DROP
-A input_ext -p tcp -m limit --limit 3/min -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p udp -m limit --limit 3/min -m conntrack --ctstate NEW -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -j DROP
-A reject_func -p tcp -j REJECT --reject-with tcp-reset
-A reject_func -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject_func -j REJECT --reject-with icmp-proto-unreachable
COMMIT
# Completed on Tue Oct 25 01:50:00 2016

With this as a "base" our DGG firewall system can be used to manage the "GOOD" file. However, without our system all you need to do for whitelisting individual IPs is modify them as shown above (the ones with the /32 in them).

You MUST (in Striker's firewall or ours) enable ALL IPs from the carrier. This includes the "media only" IPs (which the provider should give you). If the provider does not give you all the media IPs, you can test your connections with "iftop" and get the IPs from there. And add them.
Vicidial Installation and Repair, plus Hosting and Colocation
Newest Product: Vicidial Agent Only Beep - Beta
http://www.PoundTeam.com # 352-269-0000 # +44(203) 769-2294
williamconley
 
Posts: 20258
Joined: Wed Oct 31, 2007 4:17 pm
Location: Davenport, FL (By Disney!)


Return to Support

Who is online

Users browsing this forum: Google [Bot] and 102 guests