⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme.txt

📁 也是一个linux系统下的网络入侵检测程序
💻 TXT
字号:
	AIRT --	Advanced Incident Response Tool

	Developed and maintained by madsys, coolq	v0.3


[1] What is AIRT?
[2] How can I use it?
[3] What platforms it supports now?
[4] Where can I get the lastest version?
[5] How can I report a bug?


[1] What is AIRT?
--------------------

	AIRT(Advanced incident response tool) is a set of incident response assistant tools on linux platform. It's useful when you want to know what evil program is still resident on your broken system and what the hell it is. It consists of 5 useful tool:

mod_hunter: looks for hidden module on the suspect system.

process_hunter: looks for hidden process from kernel on the suspect system.

sock_hunter: looks for hidden port from kernel on the suspect system (only support IPv4 now).

modumper: dumps the hidden module into file.

dismod: trys to analyze the dumped module (you should use dismod.pl instead of dismod)


Note: it only supports 2.6 kernel now, will support 2.4 kernel later.


[2] How can I use it?
----------------------

	Unpack the compressed sources, enter the top directory and just execute:

	make;

mod_hunter:
	if u want to check if there is hidden module in your system:
	insmod mod_hunter.[k]o && cat /proc/showmodules
	and then there will be something like that:

      address                name     size      core_addr     flags

  1  0xc6813400           am_evil     1536     0xc6813000       0    Warning	<---
  2  0xc6845180        mod_hunter     5528     0xc6844000       0
  3  0xc6858580           pcnet32    34824     0xc6850000       0

	if u want to uncover the hidden modules which showed by mod_hunter (marked with Warning), u can try:
	echo "0xaabbccdd" > /proc/showmodules
	Note: 0xaabbccdd is the address of the suspect module and it must be 10 characters

process_hunter:
	if u want to check if there is hidden process in your system:
	insmod process_hunter.[k]o && cat /proc/showprocess

port_hunter:
	if u want to check if there is hidden port in your system:
	insmod port_hunter.[k]o && cat /proc/showsocks

mod_dumper:
	if u want to dump the module:
	enter the mod_dumper directory and
	insmod modumper.[k]o mod_name=MODULE && cat /proc/get_mod
	it will dump the module automatically into dump.dat & dump.info

	if u want to analyze the dumped module:
	./dismod.pl (use the perl scritp instead of the dismod binary!)


[3] What platforms it supports now?

	It currently supports normal kernel 2.6.x and Fedora Core2 and SUSE 9.2, not supports SMP yet and will fix it in the near future.
	


[4] Where can I get the last version?
-----------------------------------------

	http://159.226.5.93/projects/airt.htm


[5] How can I report a bug?
----------------------------

	we are glad to recieve the bug report.
	any comments && bugs && suggestion mail to: 
	madsys@ericst.iscas.ac.cn
	sec_user@ericst.iscas.ac.cn

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -