Sean Finney on Mon, 15 Jul 2002 05:30:08 +0200


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] how to tell which process binds to which port?


On Sun, Jul 14, 2002 at 03:35:21PM -0400, Jesse P Schultz wrote:
> Check for strange entrys in xinetd.conf or inetd.conf (depending on your
> flavor).  Thats one place that some worms or hackers set up listeners.
> 
> Also, try telnet to that port and see what you get.  If you get a shell
> without need of a password you have been hacked.
> 

the first thing i'd do depends on what you're using this box for.  if
it's just a workstation, i'd put it behind a packet-logging
firewall, and crank up the logs for incoming connections.  if you
find someone logging in to your box, a little wall message should
scare them off, and you'll know where they came from to boot. 

if you are hacked, you could also a) just re-install from scratch, and/or 
b) report the hacker to their isp.  i think neither of those would be
nearly as gratifying though :)

> | Am I hacked?

that certainly is the question...

> Also, if you are hacked you may have a trojanized netstat and ps (among
> others) so try running those from a floppy.

what i'd be more concerned with is a trojanized libc library, or
trojan lkm.  i've never actully seen the latter done, but fhe former
is trivial to implement, and rather pervasive to discover.  i'd
recommend getting on another machine, and re-compiling your shell-utils,
base-utils, et cetera packages as static binaries, and then use those
to investigate.

i might have missed--what distro/kernel do you use?  are you up
to date on the latest ssh/dns/other server packages?

--sean

Attachment: pgpahrUZrPdJH.pgp
Description: PGP signature