LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-01-2010, 05:44 PM   #1
mar0der
LQ Newbie
 
Registered: Oct 2010
Posts: 1

Rep: Reputation: 0
Need help with chkrootkit output


I am new in linux security. I run chkrootkit and i got this output
Code:
ROOTDIR is `/'
Checking `amd'...                                           not found
Checking `basename'...                                      not infected
Checking `biff'...                                          not found
Checking `chfn'...                                          not infected
Checking `chsh'...                                          not infected
Checking `cron'...                                          not infected
Checking `crontab'...                                       not infected
Checking `date'...                                          not infected
Checking `du'...                                            not infected
Checking `dirname'...                                       not infected
Checking `echo'...                                          not infected
Checking `egrep'...                                         not infected
Checking `env'...                                           not infected
Checking `find'...                                          not infected
Checking `fingerd'...                                       not found
Checking `gpm'...                                           not found
Checking `grep'...                                          not infected
Checking `hdparm'...                                        not found
Checking `su'...                                            not infected
Checking `ifconfig'...                                      INFECTED
Checking `inetd'...                                         not infected
Checking `inetdconf'...                                     not infected
Checking `identd'...                                        not found
Checking `init'...                                          not infected
Checking `killall'...                                       not infected
Checking `ldsopreload'...                                   not infected
Checking `login'...                                         not infected
Checking `ls'...                                            not infected
Checking `lsof'...                                          not found
Checking `mail'...                                          not infected
Checking `mingetty'...                                      not found
Checking `netstat'...                                       INFECTED
Checking `named'...                                         not infected
Checking `passwd'...                                        not infected
Checking `pidof'...                                         not infected
Checking `pop2'...                                          not found
Checking `pop3'...                                          not found
Checking `ps'...                                            not infected
Checking `pstree'...                                        INFECTED
Checking `rpcinfo'...                                       not infected
Checking `rlogind'...                                       not found
Checking `rshd'...                                          not found
Checking `slogin'...                                        not infected
Checking `sendmail'...                                      not infected
Checking `sshd'...                                          not infected
Checking `syslogd'...                                       not tested
Checking `tar'...                                           not infected
Checking `tcpd'...                                          not infected
Checking `tcpdump'...                                       not infected
Checking `top'...                                           INFECTED
Checking `telnetd'...                                       not found
Checking `timed'...                                         not found
Checking `traceroute'...                                    not infected
Checking `vdir'...                                          not infected
Checking `w'...                                             not infected
Checking `write'...                                         not infected
Checking `aliens'...                                        no suspect files
Searching for sniffer's logs, it may take a while...        nothing found
Searching for HiDrootkit's default dir...                   nothing found
Searching for t0rn's default files and dirs...              nothing found
Searching for t0rn's v8 defaults...                         Possible t0rn v8 (or variation) rootkit installed
Searching for Lion Worm default files and dirs...           nothing found
Searching for RSHA's default files and dir...               nothing found
Searching for RH-Sharpe's default files...                  nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/jvm/.java-gcj.jinfo /usr/lib/jvm/.java-6-sun.jinfo /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/profiler3/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/visualvm/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/platform10/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/.systemPrefs /lib/init/rw/.mdadm /lib/init/rw/.ramfs
/lib/init/rw/.mdadm
Searching for LPD Worm files and dirs...                    nothing found
Searching for Ramen Worm files and dirs...                  nothing found
Searching for Maniac files and dirs...                      nothing found
Searching for RK17 files and dirs...                        nothing found
Searching for Ducoci rootkit...                             nothing found
Searching for Adore Worm...                                 nothing found
Searching for ShitC Worm...                                 nothing found
Searching for Omega Worm...                                 nothing found
Searching for Sadmind/IIS Worm...                           nothing found
Searching for MonKit...                                     nothing found
Searching for Showtee...                                    Warning: Possible Showtee Rootkit installed
Searching for OpticKit...                                   nothing found
Searching for T.R.K...                                      nothing found
Searching for Mithra...                                     nothing found
Searching for LOC rootkit...                                nothing found
Searching for Romanian rootkit...                            /usr/include/file.h /usr/include/proc.h
Searching for Suckit rootkit...                             nothing found
Searching for Volc rootkit...                               nothing found
Searching for Gold2 rootkit...                              nothing found
Searching for TC2 Worm default files and dirs...            nothing found
Searching for Anonoying rootkit default files and dirs...   nothing found
Searching for ZK rootkit default files and dirs...          nothing found
Searching for ShKit rootkit default files and dirs...       nothing found
Searching for AjaKit rootkit default files and dirs...      nothing found
Searching for zaRwT rootkit default files and dirs...       nothing found
Searching for Madalin rootkit default files...              nothing found
Searching for Fu rootkit default files...                   nothing found
Searching for ESRK rootkit default files...                 nothing found
Searching for rootedoor...                                  nothing found
Searching for ENYELKM rootkit default files...              nothing found
Searching for common ssh-scanners default files...          nothing found
Searching for anomalies in shell history files...           nothing found
Checking `asp'...                                           not infected
Checking `bindshell'...                                     INFECTED (PORTS:  465)
Checking `lkm'...                                           You have    20 process hidden for readdir command
You have    22 process hidden for ps command
chkproc: Warning: Possible LKM Trojan installed
chkdirs: nothing detected
Checking `rexedcs'...                                       not found
Checking `sniffer'...                                       lo: not promisc and no packet sniffer sockets
eth0: not promisc and no packet sniffer sockets
eth0:1: not promisc and no packet sniffer sockets
eth0:2: not promisc and no packet sniffer sockets
eth0:3: not promisc and no packet sniffer sockets
eth0:4: not promisc and no packet sniffer sockets
eth0:5: not promisc and no packet sniffer sockets
eth0:6: not promisc and no packet sniffer sockets
eth0:7: not promisc and no packet sniffer sockets
eth0:8: not promisc and no packet sniffer sockets
eth0:9: not promisc and no packet sniffer sockets
eth0:10: not promisc and no packet sniffer sockets
eth0:11: not promisc and no packet sniffer sockets
eth0:12: not promisc and no packet sniffer sockets
eth0:13: not promisc and no packet sniffer sockets
eth0:14: not promisc and no packet sniffer sockets
eth0:15: not promisc and no packet sniffer sockets
tap0: not promisc and no packet sniffer sockets
Checking `w55808'...                                        not infected
Checking `wted'...                                          chkwtmp: nothing deleted
Checking `scalper'...                                       not infected
Checking `slapper'...                                       not infected
Checking `z2'...                                            chklastlog: nothing deleted
This Infected looks bad to me. Do i have to be worried?
Any help is appreciated!
Thank you

Last edited by unSpawn; 10-02-2010 at 03:16 AM. Reason: //Add BB code tags for enhanced readability
 
Old 10-02-2010, 03:59 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Welcome to LQ. Please note tool output should be accompanied by the version of Chkrootkit you're running, general information about the machine like distribution, release, network placement, preferably an indication of location (physical access vs colo), services it provides, any previous signs of anomalous behaviour (if any), and what you have done after reading the Chkrootkit output. Basically any factual information that helps us help you.

Before you start please:
- read the CERT Intruder Detection Checklist,
- disregard any replies telling you "don't worry" only,
- do not delete anything, and
- do not install anything.


Quote:
Originally Posted by mar0der View Post
Code:
Checking `ifconfig'...                                      INFECTED
Checking `netstat'...                                       INFECTED
Checking `pstree'...                                        INFECTED
Checking `top'...                                           INFECTED
Searching for t0rn's v8 defaults...                         Possible t0rn v8 (or variation) rootkit installed
These four are part of a list of system utilities that were commonly targeted by traditional rootkits to enable hiding of processes and such. To verify there are a few things you should do:
- if you trust your machines package management then verify the state of packages and package contents using the available package management tools else download the packages these binaries are in to another machine and compare hashes from there (do not use ,
- verify Chkrootkit output using it's debug mode or common tools like 'strings' and 'egrep': like 'strings -an4 /path/to/binary|egrep ${STRINGS}'. The STRINGS values you find by grepping the chkrootkit script. For 'netstat find the string NETSTAT_I_L= and use it's value, for 'ps' find PS_I_L=, 'top' needs TOP_INFECTED_LABEL= and for 'pstree' see PSTREE_INFECTED_LABEL=.
- The "Possible t0rn v8" points to existence of a file named "libproc.a" which you should be able to find using 'find / -type f -name libproc.a -ls.
* If you do not trust the machine then if it is local to you start your investigation by booting a Live CD like HELIX or KNOPPIX.


Quote:
Originally Posted by mar0der View Post
Code:
Searching for suspicious files and dirs, it may take a while...
/usr/lib/jvm/.java-gcj.jinfo /usr/lib/jvm/.java-6-sun.jinfo /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/profiler3/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/visualvm/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/lib/visualvm/platform10/.lastModified /usr/lib/jvm/java-6-sun-1.6.0.20/.systemPrefs /lib/init/rw/.mdadm /lib/init/rw/.ramfs
/lib/init/rw/.mdadm
By name only these are possibly false positives. Please see the Chkrootkit FAQ.


Quote:
Originally Posted by mar0der View Post
Code:
Searching for Showtee...                                    Warning: Possible Showtee Rootkit installed
According to Chkrootkit Showtee comprises of these files you can search for using 'find': /usr/lib/.egcs /usr/lib/.wormie /usr/lib/.kinetic /usr/lib/liblog.o /usr/include/addr.h /usr/include/cron.h /usr/include/file.h /usr/include/proc.h /usr/include/syslogs.h /usr/include/chk.h.


Quote:
Originally Posted by mar0der View Post
Code:
Searching for Romanian rootkit...                            /usr/include/file.h /usr/include/proc.h
According to Chkrootkit the Romanian rootkit comprises of these files you can search for using 'find': /usr/include/file.h /usr/include/proc.h /usr/include/addr.h /usr/include/syslogs.h. In addition find out which package the /usr/include/file.h and /usr/include/proc.h file belong to and verify their contents to get an indication of false positives.


Quote:
Originally Posted by mar0der View Post
Code:
Checking `bindshell'...                                     INFECTED (PORTS:  465)
If you 'getent services 465' you should find that port TCP/465 is assigned by IANA to the SMTPS service. Even without using 'netstat' or 'lsof' you should know if your machine provides secure SMTP access.


Quote:
Originally Posted by mar0der View Post
Code:
Checking `lkm'...                                           You have    20 process hidden for readdir command
You have    22 process hidden for ps command
chkproc: Warning: Possible LKM Trojan installed
Tracking short-lived processes are a known problem with any tool relying on 'ps' and possibly result in false positives. Please see the Chkrootkit FAQ.

Keep us informed, post your findings and please be as verbose as possible.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Understanding chkrootkit run output ahartman Linux - Security 1 07-05-2009 03:53 AM
advice on chkrootkit -q output itaadmiraltyps Linux - Security 2 05-31-2006 11:02 PM
chkrootkit ? jmanjeff Linux - Security 2 05-31-2005 11:15 PM
help me to understand the output of chkrootkit ddaas Linux - Security 2 04-19-2005 02:28 AM
Output of chkrootkit Toadman Linux - Security 2 08-14-2003 09:22 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:22 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration