LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-05-2004, 05:41 PM   #16
NickBernstein
LQ Newbie
 
Registered: Mar 2004
Posts: 2

Rep: Reputation: 1
What to do.


Get the Data:
1) on a different machine, download tct and burn it to a cdrom.
2) use memdump to get a memory image. Save it to another machine.
3) Poweroff (not shutdown) the machine.
4) dd the hd, so you have a clean image of what was done to the system.

Get the machine back up:
1) Re-install, off the network. If you /have/ to install 7.2, make sure you have as up-to-date rpms as possible and get all patches from progeny etc.
2) Get the machine configured to your statisfaction.
3) Disable *ALL* services you do not use.
4) enable your local firewall (for the machine, not the net) look at what services you are going to be using, and what machines they are talking to. EG: ssh might need to be turned on, but it probably only needs to answer machines on the network & maybe a couple of other machines -- restrict it to that.
5) run nessus against the machine. http://nessus.org , http://viewpoint-security.com/nessus_talk/siframes.html
6) take a look at the vulnerability reports, and lock it down per the instructions given.
7) tie things down locally: strong filesystem permissions, chrooting, remote syslog. **REMOVING** development tools.
8) Set up tripwire, or samhain, and KEEP UP TO DATE WITH IT.

Do Forensics:
1) http://www.securityfocus.com/guest/16691
2) http://www.emergency.com/fbi-nccs.htm


Good luck,
Nick Bernstein, http://viewpoint-security.com
 
Old 03-09-2004, 10:25 AM   #17
gmasci
LQ Newbie
 
Registered: Apr 2001
Posts: 8

Rep: Reputation: 0
Get planB, its a good forensics tool

http://www.projectplanb.org/main.htm
 
Old 03-16-2004, 01:10 PM   #18
ryedunn
Member
 
Registered: Jul 2003
Location: Chicago
Distribution: Fedora, ubuntu
Posts: 459

Rep: Reputation: 30
Re: What to do.

Quote:
Originally posted by NickBernstein
4) dd the hd, so you have a clean image of what was done to the system.
What is dd?
 
Old 01-08-2005, 08:24 PM   #19
skank
LQ Newbie
 
Registered: Aug 2003
Distribution: slackware
Posts: 5

Rep: Reputation: 0
Quote:
Data dumper

Imaging a computer’s hard disk can be a lengthy process but it need not be expensive. dd (short for data dumper) is a freely available utility for UNIX systems which can make exact copies of disks suitable for forensic analysis. It is a command line tool, meaning that the dd program is run by typing a command rather than double-clicking an icon, and requires a sound knowledge of the command syntax to be used properly. Modified versions of dd intended specifically for use as a forensic utility are also available.
 
Old 01-08-2005, 09:54 PM   #20
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Rep: Reputation: 47
Quote:
Man, that has to be the dumbest hacker ever... what kind of "l33+ h@x0r" uses pico!?!?!?
what kinda l33t h@x0r has to "man iptables"
 
Old 01-10-2005, 09:34 AM   #21
predator.hawk
Member
 
Registered: Aug 2004
Location: USA
Distribution: FreeBSD-5.4-STABLE
Posts: 252

Rep: Reputation: 30
haha, the guy that got on your rig is a script kiddie at best. He apparently knows some Linux basics but nothing above that. It appears as though he setup some IRC bouncers/bots, an ircd and a few other random things. I'd personaly back up, wipe everything, reinstall, setup a complete firewall system with iptables etc etc.
 
Old 01-11-2005, 06:54 AM   #22
Haric
LQ Newbie
 
Registered: Jan 2005
Location: Kerala
Posts: 16

Rep: Reputation: 0
aa

Last edited by Haric; 01-11-2005 at 06:55 AM.
 
Old 01-11-2005, 06:56 AM   #23
Haric
LQ Newbie
 
Registered: Jan 2005
Location: Kerala
Posts: 16

Rep: Reputation: 0
Hai ...everybody.
Iam a newbie .so if my doubt is foolish plz forgive.Iddint understand anyof the comments u people have posted...Regarding the first post .How did u came come to know that ur bein hacked..Whats all that stuff u have posted.Is it a log of something..I am asking bcs my root password got automatically changed and i do access my machine thru telnet only and our server is placed in a secure host area so that nobody will manipulate it

So in nut shell my question is if my server is being hacked(as we ve telnet access) is it possible 4 me to find out who has done what at a particular time.Also is it possible to know whether some has rebboted my machine .etc .etc
 
Old 01-11-2005, 11:26 AM   #24
porous
Member
 
Registered: Oct 2003
Distribution: redhat 9
Posts: 147

Rep: Reputation: 15
hi guys ,
i was off for a long time , and this is the first post i read after a long time . it was fun :-)
 
Old 01-11-2005, 12:23 PM   #25
hanzerik
Member
 
Registered: Jan 2002
Location: Cheyenne Wyoming
Distribution: Debian/Raspbian/Mint
Posts: 717

Rep: Reputation: 32
Quote:
Originally posted by Haric
Hai ...everybody.
Iam a newbie .so if my doubt is foolish plz forgive.Iddint understand anyof the comments u people have posted...Regarding the first post .How did u came come to know that ur bein hacked..Whats all that stuff u have posted.Is it a log of something..I am asking bcs my root password got automatically changed and i do access my machine thru telnet only and our server is placed in a secure host area so that nobody will manipulate it

So in nut shell my question is if my server is being hacked(as we ve telnet access) is it possible 4 me to find out who has done what at a particular time.Also is it possible to know whether some has rebboted my machine .etc .etc
That "Stuff" is roots .bash_history file. It will show the last commands that root ran. It can be found in /root/.bash_history.

Telnet is not a very secure means of connecting to a Linux/Unix server even in a LAN. If your root password has changed and you didn't do it or none of your co-workers have changed it then it's safe to say something happened that shouldn't have. You might want to get that machine off the network while you try to figure out what happened.

Most everything gets logged to your /var/log directory. Take a look at all the log files in there to see if there are dates/times frames missing or for anything that doesn't look right. There will probably be quite a few log files in there, and if you have your logs to rotate then you'll have multiple logs that end with <logfile>.1 <logfile>.2 and so forth. The one without the ext will be the most current.
 
Old 01-12-2005, 12:39 AM   #26
Haric
LQ Newbie
 
Registered: Jan 2005
Location: Kerala
Posts: 16

Rep: Reputation: 0
Gr 8 reply thankuu very much for the information..
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Has my box been hacked? Ook Linux - Software 4 01-12-2005 10:58 PM
Newbie "thinks" his Fedora box may have been hacked linkety Linux - Security 4 08-26-2004 03:47 PM
XP Box won't connect to internet thru RH9 Box (firewall/dhcpd), it can only ping fire Rhapsodic Linux - Networking 4 07-10-2004 03:02 PM
hacked box ?? dewcansam Linux - Security 11 10-07-2002 11:21 AM
RH 7.1 box hacked miguel Linux - Security 6 05-13-2002 03:00 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:27 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration