LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-17-2014, 02:13 PM   #1
Sasuke92
LQ Newbie
 
Registered: Dec 2013
Posts: 14

Rep: Reputation: Disabled
What a Rootkit has done ?


(I hope this question is in the right section )

This question has been hitting me for a while now and I cannot figure out an answer. So, after removing a Rootkit, HOW would you know WHAT the Rootkit has actually done? I mean, the Rootkit might have been there for months and you don't see any changes to your system (to the naked eye anyway) but how would you know what the attacker has done with that Rootkit?

After removing it, does it leave a trail as to what the Rootkit has replaced/modified etc? Like API calls, system calls etc? How can you check what the Rootkit has done?

I know you can use the KSTAT tool with the -s option to see if any system call memory addresses have been changed, is there anything else?

Appreciate any replies, thanks. I understand what they are, how they hide, the types of Rootkits, their purpose etc but this one I don't get. I am stumped.
 
Old 02-17-2014, 10:45 PM   #2
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,624

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
the truth
you do not
there really is no way to KNOW - 100% know

now if you have a back up from before you installed this rootkit
-- without any info ... the likely way is you installed it

with that backup you can check files

now the good news
photos are not likely effected
music ???? iffy on that
and HOME videos "should" be fine

"digital downloads" from that HD and blue-ray combo pack ???????????
re download them

bad news

your office spread sheet files
PRIME TARGET !!!!!!
they have a big red bulls eye on them .
and if Windows is dual booted and the linux os has access
then the HR-Block "tax-cut" and turbo-tax files are likely a target

but without knowing the details ??????? i am only guessing, it might not really have done much of anything

and only a guess on this
the MBR
reformat it and reinstall the bootloader
but that is a GOOD precaution

BUT to be 100 % SAFE !!!

if possible do a full reinstall
zero out the drive(s) ( google it - using dd and /dev/zero )
and reinstall

Last edited by John VV; 02-17-2014 at 10:46 PM.
 
1 members found this post helpful.
Old 02-18-2014, 12:43 AM   #3
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,830

Rep: Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308
not to speak about your logins, accounts and other personal informations. You will never know exactly what was stolen....
 
1 members found this post helpful.
Old 02-18-2014, 07:47 AM   #4
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Rep: Reputation: 78
you can sandbox it (the root kit), see what it does initially. if it provides C2 functionality then it may be tough to know 100% what had happened during the life of the root. after a root, finding remnants may be a daunting task. its generally accepted (common practice) that after an infection you rebuild the box, adding additional security controls or tweaking the existing to make sure the box is less vulnerable to rooting, etc.

so, my recommendation:
1) if your Q is around learning, then by all means, clone the system and then study it.
2) if your Q is around forensics for a report, then dont take it too far, find the weakness, then rebuild it stronger.
 
1 members found this post helpful.
Old 02-18-2014, 08:21 AM   #5
Sasuke92
LQ Newbie
 
Registered: Dec 2013
Posts: 14

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Linux_Kidd View Post
you can sandbox it (the root kit), see what it does initially. if it provides C2 functionality then it may be tough to know 100% what had happened during the life of the root. after a root, finding remnants may be a daunting task. its generally accepted (common practice) that after an infection you rebuild the box, adding additional security controls or tweaking the existing to make sure the box is less vulnerable to rooting, etc.

so, my recommendation:
1) if your Q is around learning, then by all means, clone the system and then study it.
2) if your Q is around forensics for a report, then dont take it too far, find the weakness, then rebuild it stronger.
Brilliant, just what I was looking for because I was running out of methods. Before these answers I had the KSTAT method for checking memory addresses, checking CPU utilisation, hidden processes using the ps and proc methods, MBR modification etc just needed a bit more. And yes you are right, this was the last question I needed to answer for my mini-Rootkit project, completing a 3500 word report on Rootkits.

And thanks John VV for the backup, didn't think of that. I kinda knew the answer would be that it's impossible to know what it did 100% (I'm sure it applies to any sort of other malware aswell, not just Rootkits?)

Last edited by Sasuke92; 02-18-2014 at 08:23 AM. Reason: Typos
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
possible rootkit- Now what? mcteague Linux - Security 13 10-03-2011 11:25 AM
rootkit hunter false positive for Xzibit Rootkit on CentOS 4.8? abefroman Linux - Security 2 12-20-2009 08:19 AM
rootkit? basilogics Linux - Software 2 08-19-2005 08:16 AM
Possible rootkit? bleunuit Linux - Security 4 05-18-2005 03:21 PM
rootkit? linuxtesting2 Linux - Security 3 12-06-2004 08:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:10 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration