rootkit?

Scot L. Harris webid at cfl.rr.com
Sun Dec 11 16:57:51 UTC 2005


On Sun, 2005-12-11 at 10:25, William Case wrote:
> On Sun, 2005-12-11 at 00:44 -0500, Scot L. Harris wrote:
> > On Sun, 2005-12-11 at 00:31, Gene Heskett wrote:
> > > A friend of mine just reported he has been rooted, and his machine was 
> > > spewing spam in the name of the colonial bank.
> > 
> > > FWIW, chkrootkit didn't find it!
> > > 
> > 
> > Did you try rkhunter?  Would be interesting to know if it could see it.
> > 
> > > Whats the general removal procedure for this, and better yet, how did 
> > > they get in?
> > 
> > Once a system has been rooted the only action to take is to rebuild the
> > system from scratch, format the drives and install clean.  Be very
> > careful of anything backed up on the system since the root kit was
> > installed.
> > 
> 
> I think I know in a general kind of way.  But, what is a rootkit?

In general a rootkit is a set of tools that unauthorized people install
on systems to hide their access and maintain access.  The intent
generally is to conceal the crackers access on the system.  This
typically done by replacing certain executables such as ps, ls, and
others so the crackers communications programs and channels can remain
hidden.  Effort is also made to clean up log files or prevent things
from being logged that would tip off the admin that someone is using the
system.  Additional back channels and/or time bombs may be left on the
system as well.  The basic idea is that once they have cracked a system
to maintain access and hide that fact.   

You can use things like tripwire and rpm to try and find all of the
modified code.  However unless you have been trained and spend a lot of
time doing forensics type work it is going to be quicker and surer to
rebuild the system from scratch and restore data from pre break in
backups.  Most admins are not trained in computer forensics.




More information about the fedora-list mailing list