LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-23-2013, 05:32 PM   #1
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Rep: Reputation: Disabled
chkrootkit infected ports


hi,
my chkrootkit says Checking `bindshell'... INFECTED (PORTS: 1524 6667 31337)

what's wrong? and what can I do?

thank you

edit

I'm running portsentry and logcheck, may that be a false positive?

Last edited by metzenx; 12-23-2013 at 05:35 PM.
 
Old 12-23-2013, 05:59 PM   #2
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,623

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
Try using google on the errors and outpiut of chkrootkit
"INFECTED (PORTS: 1524 6667 31337)"

a 2009 post
http://ubuntuforums.org/showthread.php?t=1273168

a post from 2011
http://askubuntu.com/questions/25176...does-that-mean
 
Old 12-23-2013, 06:04 PM   #3
descendant_command
Senior Member
 
Registered: Mar 2012
Posts: 1,876

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
check what is running on those ports
Code:
netstat -ntulp | grep -e '1524\|6667\|31337'
 
Old 12-23-2013, 08:12 PM   #4
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
it gives me that

PC cuervo # netstat -ntulp | grep -e '1524\|6667\|31337'
tcp 0 0 0.0.0.0:31337 0.0.0.0:* LISTEN 1572/portsentry
tcp 0 0 0.0.0.0:6667 0.0.0.0:* LISTEN 1572/portsentry
tcp 0 0 0.0.0.0:1524 0.0.0.0:* LISTEN 1572/portsentry
udp 0 0 0.0.0.0:31337 0.0.0.0:* 1576/portsentry

I've been scanning my ports and don't know if I have closed them myself... don't understand
 
Old 12-23-2013, 09:11 PM   #5
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Try rkhunter and see if it also detects any rootkits. chrootkit is getting old and unmaintained.
 
Old 12-23-2013, 09:48 PM   #6
descendant_command
Senior Member
 
Registered: Mar 2012
Posts: 1,876

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
All chkrootkit does is check those ports for a listening service, as they are (were) typically used by the "nasty" it is checking for.
You have portsentry listening on them (which you have presumably set up to do so) so there is no problem.
 
1 members found this post helpful.
Old 12-24-2013, 09:02 AM   #7
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
thank you for answering

rkhunter gives me some warnings but no rootkits

the warnings are:

/usr/bin/unhide.rb [ Warning ]
Checking for backdoor ports [ Warning ]
Checking /dev for suspicious file types [ Warning ]
Checking for hidden files and directories [ Warning ]

seems kind of scary no?
 
Old 12-24-2013, 09:09 AM   #8
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
review /var/log/rkhunter.log

lsof -i :<port> and review

6667 is suspicious as an irc port, as is 31337, (but maybe not for irc activity)

If the processes are not running, the lsof on them will return nothing.
If they are running, or recently run. lsof will show you what files started/used them.

Last edited by Habitual; 12-24-2013 at 09:13 AM.
 
1 members found this post helpful.
Old 12-24-2013, 11:34 AM   #9
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Port 31337 is concerning. See:
https://en.wikipedia.org/wiki/Back_Orifice
This trojan program has a unix client, are you running it by any chance ?
 
1 members found this post helpful.
Old 12-25-2013, 09:25 AM   #10
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
Quote:
lsof -i :<port> and review
lsof returned me nothing

what about netstat -an <port> ? I would post what I got but it's a bit long... how can I check if there's something weird in there?

Quote:
This trojan program has a unix client, are you running it by any chance ?
how can I know if I'm running it?
 
Old 12-25-2013, 12:25 PM   #11
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Check 'ps -u root'.
 
1 members found this post helpful.
Old 12-25-2013, 01:55 PM   #12
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
Quote:
Check 'ps -u root'.
the only client I find is dhclient is that a UNIX one?

thx
 
Old 12-25-2013, 02:09 PM   #13
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
well, aparently it is
 
Old 12-25-2013, 02:14 PM   #14
metzenx
Member
 
Registered: Dec 2013
Location: Spain is pain!
Distribution: linux mint 17 cinnamon 32-bit
Posts: 30

Original Poster
Rep: Reputation: Disabled
if descendant is right would be nice, then my question is: is it possible that what rkhunter detects is portsentry listening to the ports or is it something else? sorry for my newbie talk :P
 
Old 12-25-2013, 02:24 PM   #15
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Yeah, you may want to check its configuration, or turn it off temporarily and if the ports are no longer used.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] chkrootkit bindshell INFECTED PORT 4369 masuch Linux - Security 5 02-28-2012 10:58 AM
chkrootkit Checking `bindshell'... INFECTED (PORTS: 600) gavin2u Linux - Security 5 10-26-2011 06:51 AM
chkrootkit found an infected port qwertyjjj Linux - Newbie 13 08-16-2009 07:58 AM
chkrootkit suckit initng infected network 8% mimithebrain Linux - Security 4 03-29-2006 09:39 AM
chkrootkit found ifconfig infected ohcarol Linux - Security 4 02-28-2005 03:57 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:15 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration