📄 readme.txt
字号:
AIRT -- Advanced Incident Response Tool
Developed and maintained by madsys, coolq v0.3
[1] What is AIRT?
[2] How can I use it?
[3] What platforms it supports now?
[4] Where can I get the lastest version?
[5] How can I report a bug?
[1] What is AIRT?
--------------------
AIRT(Advanced incident response tool) is a set of incident response assistant tools on linux platform. It's useful when you want to know what evil program is still resident on your broken system and what the hell it is. It consists of 5 useful tool:
mod_hunter: looks for hidden module on the suspect system.
process_hunter: looks for hidden process from kernel on the suspect system.
sock_hunter: looks for hidden port from kernel on the suspect system (only support IPv4 now).
modumper: dumps the hidden module into file.
dismod: trys to analyze the dumped module (you should use dismod.pl instead of dismod)
Note: it only supports 2.6 kernel now, will support 2.4 kernel later.
[2] How can I use it?
----------------------
Unpack the compressed sources, enter the top directory and just execute:
make;
mod_hunter:
if u want to check if there is hidden module in your system:
insmod mod_hunter.[k]o && cat /proc/showmodules
and then there will be something like that:
address name size core_addr flags
1 0xc6813400 am_evil 1536 0xc6813000 0 Warning <---
2 0xc6845180 mod_hunter 5528 0xc6844000 0
3 0xc6858580 pcnet32 34824 0xc6850000 0
if u want to uncover the hidden modules which showed by mod_hunter (marked with Warning), u can try:
echo "0xaabbccdd" > /proc/showmodules
Note: 0xaabbccdd is the address of the suspect module and it must be 10 characters
process_hunter:
if u want to check if there is hidden process in your system:
insmod process_hunter.[k]o && cat /proc/showprocess
port_hunter:
if u want to check if there is hidden port in your system:
insmod port_hunter.[k]o && cat /proc/showsocks
mod_dumper:
if u want to dump the module:
enter the mod_dumper directory and
insmod modumper.[k]o mod_name=MODULE && cat /proc/get_mod
it will dump the module automatically into dump.dat & dump.info
if u want to analyze the dumped module:
./dismod.pl (use the perl scritp instead of the dismod binary!)
[3] What platforms it supports now?
It currently supports normal kernel 2.6.x and Fedora Core2 and SUSE 9.2, not supports SMP yet and will fix it in the near future.
[4] Where can I get the last version?
-----------------------------------------
http://159.226.5.93/projects/airt.htm
[5] How can I report a bug?
----------------------------
we are glad to recieve the bug report.
any comments && bugs && suggestion mail to:
madsys@ericst.iscas.ac.cn
sec_user@ericst.iscas.ac.cn
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -