LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-25-2010, 09:54 AM   #31
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,877
Blog Entries: 42

Rep: Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105

Hi,

Quote:
Originally Posted by Josh000 View Post
Hi. Sorry for the delay in my reply.

My reply will not be as in depth as it normally would be, because I recently damaged my laptop and am in costa rica, and the computers are kind of a pain to use. If you are interested though I can give you links after I get my laptop fixed.

Now, you are right, fixing problems starts with determining the cause, as with anything.

I have not checked d1vers system, and the reason I am sure the cause is limited to the browser is because I am familiar with how these attacks tend to operate. I will expand on that later.

If I wanted to be sure there was no malicious software running on the machine, I would do the following things:

1. Boot with a live cd and run chrootkit and similar software. There is little point in running it from the system you suspect to be compromised.
2. From the system you suspect to be compromised, carefully check what processes are running and what network connections are outgoing. You can use tools like lsof, ntop and netstat. I would also use tcpdump to examine outgoing traffic, and setup a firewall rule with verbose logging.
3. You would also have to check for application specific bugs or exploits. If this were a targetted attack rather than an automated attack, then someone may have gotten local access to the machine or something and changed a configuration setting or enabled remote access or such, that would not necessarily show as malicious.

The above would be a starting point, to start determining the problem. Of course, the above would not show most browser based attacks, as they do not rely on installing locally running software to the machine.
I never stated that running a 'rootkit' check would weed out the original attack or methods of attack. If you or anyone else wants to prepare a system that is clean from the get go then the methods are well documented.

Quote:
Originally Posted by Josh000 View Post
Now, why am I sure the browser is most likely the catylist for the attack? For the last few years, attacks have moved away from targetting specific OS vulnerabilities or relying on user stupidity.

This is partly because OS's have gotten more secure, by implementing things like executable space protection and basic MAC, and also by enforcing better security practices such as strongly discouraging using the administrator/root account for everyday use.
Yes, one outlook for potential problems do align with browsing sessions. But most of the security risks have been for the basic browser application or related macro functionality not just poor user management skill(s) or practices.


Quote:
Originally Posted by Josh000 View Post
Indeed, the malware "industry" has moved towards a profit model as opposed to the infamy model it was closer to in the 90's and early 2000's. These days, it is more of a goal to silently install software, typically a botnet client, which will not hamper performance or disrupt the user, but will allow the users idle cpu time and network resources to be harnessed.

Given the horrible horrible insecurity of adobe reader and flash (which are responsible for the majority of web exploits these days) the browser is an attractive target.

What I just described is more to do with how malware is installed via browsers these days, which I still don't believe to be d1vers problem.

Looking at the symptoms, only his password for a single account was compromised. There was no other strange behaviour, and no reason to suspect a rootkit had been installed (also because a rootkit is quite a bit more precise, and generally not considered malware of the type that would steal a password). Given that the majority of exploits are adobe product based, or directly browser related (XSS, phishing etc), as well as Linux not being a target for an automated attack(a targetted attack sure, but not an automated attack), then I am reasonably sure that his browser was the catylist.
Strange behavior? To be 'rootkit'ed by a knowledgeable and crafty user doesn't nor even possibly means that one's system will behave in a strange manner. Typically the violator will do everything to prevent causing problems that are visible but cause minor changes that should be transparent to the owner. Keyboard shadowing??

Quote:
Originally Posted by Josh000 View Post

Given that it is entirely possible to craft an email or an banner ad that can result in his gmail session being stolen, and that there is a miniscule amount of automated malware that targets linux, it clearly makes more sense that the browser was the catylist. It is the significantly simpler andliklier explanation.

If his browser, adobe products and such were all up to date, and there were no funky addons installed, and since there is no talk of any exploits affecting firefox 3.6.3 in the wild since its release, the only other explanation in my mind becomes something the user did. perhaps logging in to his acocunt on an untrustworthy computer at school or an internet cafe, perhaps using a chat client to use gtalk that gave away his info, etc, pissed off girlfriend etc...any number of possibilities really.

What i would actually suggest if d1ver is still reading this is to contact google directly. Out of all the webmail providers they have the best customer support and will actually get back to you regarding this, and may be able to tell you if your account was accessed from somewhere strange.

Sorry for grammar/spelling....costa rican keyboard....
I do agree with the above but things can occur from the simplest action(s)

NewEgg has a nice portable keyboard at a reasonable price for the next trip.

I do hope the trip is OK for you!

 
Old 05-25-2010, 10:25 AM   #32
Josh000
Member
 
Registered: Aug 2009
Distribution: Slackware 13 64bit
Posts: 534

Rep: Reputation: 35
onebuck, I don't mean to be offensive but I can't understand the relevance of your reply.

It does not contradict or compliment any of what I wrote, and I can't see how it is related at all.

I gave a specific answer to the question unspawn asked, and you seem to be replying with generic advice and practices? Sorry if I have missed something....I just don't see how it makes sense with what I wrote.

It does seem to me that you are not overly familiar with the different types of attacks and their methods. I would suggest first to familiarise yourself with the difference beteen targetted and distrubuted attacks, and then to see why for distrubted attacks why it is next to impossible that a linux machine will be a target.

My trip is good so far, thanks

Last edited by Josh000; 05-25-2010 at 10:27 AM.
 
Old 05-25-2010, 04:05 PM   #33
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,877
Blog Entries: 42

Rep: Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105Reputation: 3105
Hi,

Quote:
Originally Posted by Josh000 View Post
onebuck, I don't mean to be offensive but I can't understand the relevance of your reply.

It does not contradict or compliment any of what I wrote, and I can't see how it is related at all.

I gave a specific answer to the question unspawn asked, and you seem to be replying with generic advice and practices? Sorry if I have missed something....I just don't see how it makes sense with what I wrote.

It does seem to me that you are not overly familiar with the different types of attacks and their methods. I would suggest first to familiarise yourself with the difference beteen targetted and distrubuted attacks, and then to see why for distrubted attacks why it is next to impossible that a linux machine will be a target.

My trip is good so far, thanks
I don't take offense to the reply. My reply was augmented to each quote section, maybe the Costa Rica servers mangled your information.

My background is in systems and I feel my understanding is thorough therefore the opinions along with the presented information is valid. As for varied attacks you can be open to whenever not vigilant along with full awareness of the protection(s) schemes and how to compliment with available tools then we should care to present our methods of protection to those unaware.

As for your implication about lack of knowledge on DOS, Trojans or any form of attack is not valid. If you want to continue with the head in the sand attitude then 'so be it'. I will continue to convey to individuals that they should protect themselves either on a GNU/Linux system, OSX or even M$. If you think people cannot be phished, tricked into introduction or violation within the system or even at the software package level then you my friend don't know what is happening around you. Why do you think people are signing PM, hash coding packages or just plain security methods for personal exchanges? Be it for software, mail or whatever, sign it! Verify it! Protect it! One should be aware of the pitfalls around them. Be it for a browser, application or whatever the user should investigate all options available to protect.

Just to say 'It can't happen on GNU/Linux system' is just setting someone up for potential problems overall. Sure the typical script kiddie is going after the M$ market. But there are people who want your bandwidth, some want your $$ while others are just down right ornery.

We are not talking about CyberWar here but individual practices and methodology of how person(s) can have problems by not protecting things properly. Yes, GNU/Linux systems can be hacked, cracked or corrupted by someone else other than the rightful owner. And to say that the system will have unknown characteristics or act different is just a untruth.

My systems are protected and I do follow good netiquette while on 'MY' systems. I don't access my systems via remote other than via Known protected access. Most typical M$ users still feel secure with having virus protection of some form and don't realize the potential still exists to have future problems. Simple protection schemes along with good netiquette habits will prevent most things from occurring but not all.

As for the 'Browser' statements, I'll agree that most usage is via a browse session for typical users therefore the potential problems can arise from those same sessions. But I will add that a lot of people don't take the time to check software for installation to be valid. Be it for M$ or GNU/Linux. Assume? Closed source can be broken and used to cause problems for unsuspecting users. Open Source can be hacked just as easy if the user doesn't check the validity then they to could have a problem. So check or make the assumption that the software is valid thus gambling whether or not something will happen.

Quote:
excerpt http://linux.softpedia.com/progChang...log-20864.html
What's new in Mozilla Firefox 3.6.3:
ˇ Firefox 3.6.3 fixes a critical security issue that could potentially allow remote code execution (see bug 555109).
So this was a software fix. Potential problem? Yes, to a user that was not aware thus failing to update to the new 3.6.3 a remote code execution may occur on their system. This was blanket across OS not OS specific. So fonts that were to be updated could in effect pass code to cause execution on a system. If that code happened to be for a GNU/Linux system then it could create a security risk. Sure a big 'if' but a potential problem for those unaware.

 
Old 05-25-2010, 04:29 PM   #34
Josh000
Member
 
Registered: Aug 2009
Distribution: Slackware 13 64bit
Posts: 534

Rep: Reputation: 35
Quote:
Originally Posted by onebuck View Post
Hi,
I don't take offense to the reply. My reply was augmented to each quote section, maybe the Costa Rica servers mangled your information.
Well, no, it just wasn't relevant.

You replied as though I were responding to what you had said earlier, when this was not the case.

My reply was quite specific in two parts in response to unspawns questions.

It was how I would determine the cause of an attack, and then why I thought the browser was the cause of attack.

As I said, your reply did not compliment or contradict what I said, it just seemed unrelated.

Quote:
My background is in systems and I feel my understanding is thorough therefore the opinions along with the presented information is valid. As for varied attacks you can be open to whenever not vigilant along with full awareness of the protection(s) schemes and how to compliment with available tools then we should care to present our methods of protection to those unaware.
Sure, but nothing you have said in the thread has really been relevant.

I again bring up my analogy of recommending an oil change for a flat tire.

Of course it is good to encourage good security practices, but general advice is not so useful when someone has a specific problem.

Quote:
As for your implication about lack of knowledge on DOS, Trojans or any form of attack is not valid. If you want to continue with the head in the sand attitude then 'so be it'.
I have no idea what you are saying here.

My attitude is anything but "head in the sand". I'm speaking from the perspective of someone who does this for a living, rather than just giving generic good advice.

I would like you to clarify exactly what you mean when you say "your implication about lack of knowledge on DOS, Trojans or any form of attack is not valid" as I can't make sense of it in context.

Quote:
I will continue to convey to individuals that they should protect themselves either on a GNU/Linux system, OSX or even M$.
That's great. Giving good security advice is always useful, just somewhat out of place when someone has a specific problem that the generic advice does not really relate to.

Quote:
If you think people cannot be phished, tricked into introduction or violation within the system or even at the software package level then you my friend don't know what is happening around you.
Here you are putting words in my mouth.

I never said or implied any such thing.


Quote:
Why do you think people are signing PM, hash coding packages or just plain security methods for personal exchanges? Be it for software, mail or whatever, sign it! Verify it! Protect it! One should be aware of the pitfalls around them. Be it for a browser, application or whatever the user should investigate all options available to protect.
Sure, and I agree.

Once again though, I don't understand how this generic advice, correct as it may be, relates to anything I have said. It doesn't contradict it, and it doesn't compliment it.

Quote:
Just to say 'It can't happen on GNU/Linux system' is just setting someone up for potential problems overall. Sure the typical script kiddie is going after the M$ market. But there are people who want your bandwidth, some want your $$ while others are just down right ornery.
I never said it can't happen on a Linux system, at all.

As I said, you should read up on the difference between a distrubted attack, and a targetted attack.

Quote:
We are not talking about CyberWar here but individual practices and methodology of how person(s) can have problems by not protecting things properly. Yes, GNU/Linux systems can be hacked, cracked or corrupted by someone else other than the rightful owner. And to say that the system will have unknown characteristics or act different is just a untruth.
No, it isnt.

An infected system will, necessarily act differently. Just because the user may not perceive that the system is acting differently, does not mean it is not.

Any unknown code executing is already the machine acting different.

Again, not meaning to offend, but I really don't think you have an idea about security specifically.

You know enough to keep your systems safe and secure, but not to the extent where you can speak authoritivley on the differences between different attack cases.

Quote:
My systems are protected and I do follow good netiquette while on 'MY' systems. I don't access my systems via remote other than via Known protected access. Most typical M$ users still feel secure with having virus protection of some form and don't realize the potential still exists to have future problems. Simple protection schemes along with good netiquette habits will prevent most things from occurring but not all.
Yes.

This is more generic good practices security advices.

As I have said countless times, I agree with it, it just isn't related to the specific problem d1ver posted.

Just as recommending a general car checkup isn't useful for a flat tire. It can't hurt, and may help, but it isn't really useful to solve that specific problem.

Quote:
As for the 'Browser' statements, I'll agree that most usage is via a browse session for typical users therefore the potential problems can arise from those same sessions. But I will add that a lot of people don't take the time to check software for installation to be valid. Be it for M$ or GNU/Linux. Assume? Closed source can be broken and used to cause problems for unsuspecting users. Open Source can be hacked just as easy if the user doesn't check the validity then they to could have a problem. So check or make the assumption that the software is valid thus gambling whether or not something will happen.
This is *really* unrelated to d1vers problem.

As far as I can tell you are talking about ensuring the software you install is valid and verified.

Again, this is good practice, bur isnt related to the matter at hand.

Quote:
So this was a software fix. Potential problem? Yes, to a user that was not aware thus failing to update to the new 3.6.3 a remote code execution may occur on their system. This was blanket across OS not OS specific. So fonts that were to be updated could in effect pass code to cause execution on a system. If that code happened to be for a GNU/Linux system then it could create a security risk. Sure a big 'if' but a potential problem for those unaware.
Sure...once again I agree....it just isnt related to the problem at hand.

I really would suggest you read about the difference between targetted and dsitrubted attacks, or if you like I can go into some detail and explain the differences as they relate to Linux systems.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Is there any simple tips for Linux security? greenwinter02 Linux - Security 3 10-23-2007 06:18 PM
Multi User Security Tips jestah84 Linux - Security 2 05-12-2004 10:08 AM
Tips on Local User Security matthew.collins Linux - Security 4 03-29-2004 01:04 AM
tips for user security spoody_goon Linux - General 3 02-01-2004 09:05 AM
Maintaining RH 9 Security Tips statmobile Red Hat 1 12-06-2003 03:48 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration