ago two days my eggnet gived op to unknowns users/nicks and they take my channel , i check all my shells and bots userfile and there are no added any user who can give op or take a channel . same guy who take my channel take and lot of channels (like 15-20). i wanna know how i can protect my botnet from that kinds of hackings please can anyone help me. thanks in advance
We would need some information on which version of eggdrop you are running, where you retrieved the source or binary, wether it was source or a precompiled package (binary), which scripts you are using, what type of irc-servers you have been using (which irc network if you do not know which server-platform they use).
Also, if you can find anything "odd" or strange in your logs, that information might be helpful aswell.
also check your userlist for easy to fake and/or new hostmasks (.match * 999).. might be a good idea to check your logfiles to find out what commands were issued and by whom
There is one confirmed remote exploit in 1.6.18 relating to lack of bounds-checking the sender when PRIVMSG (and other) commands are recieved. Sofar, this have required the use of bogus irc-servers, as as rfc-compliant servers do not exceed this bound. Using this exploit would require the aggressor to make your bot connect to a bogus server.
The lack of logfiles is bad news; could you check your config-file wether you have any "logfile" commands in there?
As for your scripts, I can't think of any known backdoors/issues with those.
alekleet wrote:so can anyone tell me how to make an eggdrop 100% secured ?
which scripts , servers , version n all .... i wanna have 100% secured eggdrop from hackings
The only security you're assured, is what you educate yourself to manage.
Otherwise, you might as well unplug your computer and put it in the closet.
alekleet wrote:and ... a guy whats happen the same thing to him tell me to patch my eggdrops what u think for that ?
Did he tell you which/what patches to apply? The only publically spread patch for 1.6.18-eggies is a fix for the bug I mentioned earlier. Exploiting that bug is quite difficult, as the hacker would have to use a nick!ident@host that exceeds some 320 characters or such and would have to contain the code to be injected. In essence, hacker would have to make your bot join his fake server.
that guy again take my channel and i was on the chat on the eggdrops and there is nothing. he gived about 15-20 ops and i didnt see nothing on chat. i dont know hows this possible but i`ll be happy if somebody tell me how to fix this.
Unfortunately, with this very limited information, it's literally impossible to tell wether this is a simple matter of incorrect configuration, a bugged script, or any bug within the source (known or not).
When this last takeover occured, did you check the .channel listing? I'm abit puzzled that your bot apparently does nothing when he ops other people (as you have the netbots superbitch.tcl script loaded)