Our server is compromised and we would like to know which accounts sent the malicious queries from our server. I used tcpdump to get this :
our.host.net.48194 > box5596.bluehost.com.http: Flags [P.], cksum 0x0bf8 (incorrect -> 0x5061), seq 0:741, ack 1, win 229, options [nop,nop,TS val 260555861 ecr 3817788688], length 741: HTTP, length: 741
POST /xmlrpc.php HTTP/1.1
Host: www.devynamaya.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
Content-Length: 484
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Connection: close
<?xml version="1.0"?><methodCall><methodName>system.multicall</methodName><params><param><value><array><data><value><struct><member><name>methodName</name><value><string>wp.getUsersBlogs</string></value></member><member><name>params</name><value><array><data><value><array><data><value><string>admin</string></value><value><string>password123</string></value></data></array></value></data></array></value></member></struct></value></data></array></value></param></params></methodCall>[!http]
On the other hand I installed different other tools like clamav
, chrootkit
, rkhunter
...etc. And for the tcpdump packets, I use wireshark
.
The problem is that I can't seem to find the user that sent that packet, so that I can suspend their cpanel account.
Are there any tools that help track the account that is compromised? we have hundereds of users on this server and it is like looking for a needle in a haystack.
Analysing packets would just be useless if I can't know which client has a compromised website.
Thanks !