IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Forensics

By encompassing "suspected hack", I was implying forensic analysis to determine whether or not the box actually had been compromised. And while Rick's advice is strictly true, the operational case is generally that you're dealing with a script kiddie using a prebuilt attack -- the type which chkrootkit might be able to pick up (if not from your installed system then from recovery media). As I indicated, this is sorely deserving of a [link|http://twiki.iwethey.org/|TWIT] topic.

--\r\n
Karsten M. Self [link|mailto:kmself@ix.netcom.com|kmself@ix.netcom.com]\r\n
[link|http://kmself.home.netcom.com/|http://kmself.home.netcom.com/]\r\n
What part of "gestalt" don't you understand?\r\n
[link|http://twiki.iwethey.org/twiki/bin/view/Main/|TWikIWETHEY] -- an experiment in collective intelligence. Stupidity. Whatever.\r\n
\r\n
   Keep software free.     Oppose the CBDTPA.     Kill S.2048 dead.\r\n[link|http://www.eff.org/alerts/20020322_eff_cbdtpa_alert.html|http://www.eff.org/alerts/20020322_eff_cbdtpa_alert.html]\r\n
New Re: Forensics
A reasonable approach. Finding evidence of break-in is of course more likely to be meaningful than finding no (real) evidence. I was mostly addressing the latter case, which is what we have been presented, so far. ("The password I think I used to use doesn't work" doesn't qualify as real evidence.)

I would be at least a little wary of false positives from chkrootkit scripts: If the thing gives its opinion that there's a rootkit installed, then adopt a usefully skeptical attitude, and examine the alleged rootkit for yourself. And of course don't forget that there's no reason an intruder would have to install a rootkit in the first place: Those are merely mechanisms to conceal the intruder's on-system activity, which many intruders just don't bother with in the first place.

And there's good reason to beware of false negatives, as well: You're running a system-checking script on a suspect system, and you're willing to trust the results? Really? Does the script use only executables provided with it, and none of the system's own? Do any of the executables invoke (necessarily suspect) system libraries? Did you use any (necessarily suspect) system tools to gain access to the script? And you trust that none of those system facilities would be so evil as to interfere with the system-checking script?

As I said, checking the state of a running system that you suspect of root compromise is a non-trivial problem. Throwing chkrootkit scripts at it doesn't make the obstacles go away.

Real forensics get run from altnerate boot media, never trusting (and never running) any binary, library, or configuration file on the suspect system.

Rick Moen
rick@linuxmafia.com


If you lived here, you'd be $HOME already.
     Help! - (gdaustin) - (15)
         Use the install CD - (pwhysall) - (9)
             Not quite that easy, but I think I have it fixed.... - (gdaustin) - (7)
                 Fixed... - (gdaustin) - (6)
                     Shouldn't you be fixing this at the firewall? - (pwhysall) - (2)
                         This box IS my firewall... - (gdaustin) - (1)
                             Re: This box IS my firewall... - (pwhysall)
                     If you haven't already - (orion)
                     Chasing ghosts? - (rickmoen) - (1)
                         Now I'm thinking I changed it... - (gdaustin)
             Re: Use the install CD - (gdaustin)
         Root password, rooted box - (kmself) - (4)
             Re: Root password, rooted box - (rickmoen) - (2)
                 Forensics - (kmself) - (1)
                     Re: Forensics - (rickmoen)
             Exactly what I did... - (gdaustin)

"Me Damnit!" - God
46 ms