d1763e518b8867661c3289b8239f3cae1cf96837
services/Shell.md
| ... | ... | @@ -2,7 +2,41 @@ |
| 2 | 2 | |
| 3 | 3 | Providers: |
| 4 | 4 | |
| 5 | -| Person | Hostname | Net | Description | |
|
| 6 | -|:------------- |:----------------- |:---------- |:----------- | |
|
| 7 | -| aix | entropy.aix.ovh | everything | irc:aix | |
|
| 8 | -| mortzu | shell.mortzu.dn42 | dn42 only | - | |
|
| 5 | +| Person | Hostname | Net | Description | Contact | |
|
| 6 | +|:------------- |:------------------------------------ |:---------------- |:----------- |:------------- | |
|
| 7 | +| aix | entropy.aix.ovh & entropy.aix.dn42 | clearnet & dn42 | See below | aix @ hackint | |
|
| 8 | +| mortzu | shell.mortzu.dn42 | dn42 only | - | - | |
|
| 9 | + |
|
| 10 | +## Entropy shellbox |
|
| 11 | +The Entropy shellbox runs a [Grsecurity](https://grsecurity.net/) secured kernel, along with various other hardening features such as RBAC and some sysctl tweaks. It has an internal mail system which anyone can use to contact a shell user (<user>@entropy.aix.[ovh|dn42). Additionally, it has all of the [BlackArch tools](http://www.blackarch.org/tools.html) installed and available for everyone to use. |
|
| 12 | +To further enhance security, the ownership of various SUID executables and logs has been restricted to members of certain groups, which are nicely explained by the MOTD: |
|
| 13 | +``` |
|
| 14 | + tpe: allows you to execute files not in root-owned |
|
| 15 | + directories writeable only by root |
|
| 16 | + |
|
| 17 | + nosock: cannot open any sockets |
|
| 18 | + noclisock: cannot open client sockets |
|
| 19 | + noservsock: cannot open server sockets |
|
| 20 | + |
|
| 21 | + viewproc: can see all processes on the system |
|
| 22 | + |
|
| 23 | + suid: can run `su`, `sudo`, `gpasswd` and `chage` |
|
| 24 | + usrsuid: can run `newgrp`, `chsh`, `chfn` and `at` |
|
| 25 | + |
|
| 26 | + share: can write to `/srv/share` |
|
| 27 | + |
|
| 28 | + snoop: can see users logged on to the system |
|
| 29 | + and their addresses |
|
| 30 | + |
|
| 31 | + msg: can run `wall` and `write` |
|
| 32 | + |
|
| 33 | + cron: can use the cron system |
|
| 34 | + |
|
| 35 | + volumes: can use `mount`, `umount` and `mount.nfs` |
|
| 36 | + |
|
| 37 | + audit: your activities are logged |
|
| 38 | +``` |
|
| 39 | + |
|
| 40 | +By default, users will be part of only `tpe` and `audit` groups (as well as their own) but may request to be added to other groups. |
|
| 41 | + |
|
| 42 | +Lastly, in the interests of full disclosure, here are the [details of the box](http://pastie.org/pastes/10889893/text)(Subject to change). |
|
| ... | ... | \ No newline at end of file |