Security Incidents mailing list archives
Re: find_ddos results
From: Christophe Dubois <dubois () RENATER FR>
Date: Thu, 16 Nov 2000 09:27:19 +0100
Hi ! It means your box has been compromised. The Stacheldraht daemon (leaf) appears not to be configured to work (because the Stacheldraht master IP is 3.3.3.3). Well, we have seen a lot of such daemons on compromised boxes which were not configured too. Each time, it appeared to be part of the t0rnkit. The default installation path of the t0rnkit is /usr/src/.puta. Perhaps you should have a look there. However, you can find the t0rnkit path with the 'strings' command. Simply try: strings /bin/netstat | more then read the line below 'Fred Baumgarten'. You will find the config file for the t0rnkit netstat (and should find plenty of other files there). There are certainly also a lot of stuff in the path /proc/23043. I expect at least a trojaned sshd listening on a high port, and may be a 'leeto's socket daemon' listening on port 510/tcp or 511/tcp (it is a file usually named /usr/sbin/in.inetd). Best regards, Christophe DUBOIS. CERT-Renater. Karl Malivuk wrote:
Security Focus; I am new to UNIX/Linux and just brought my first Linux box online. I am using it as a test machine before bringing up as a production host. I just received and installed find_ddos this morning and got the log listed below. I sent a copy to our campus security director who suggested I contact you. Where do I go from here? Thanks Karl ---------- Forwarded Message ---------- Date: Monday, November 13, 2000, 12:31 PM -0700 From: "David Grisham CIRT Security Admin." <dave () unm edu> To: root <kmalivuk () unm edu> Subject: Re: find_ddos I really don't know. The people at incidents@security focus.com can help. Subscribe and ask them or write to dsig () unm edu. Cheers.-grish On Mon, 13 Nov 2000, root wrote:David; I just now installed find_ddos, ran it, and was presented with the following log: Log started for cfatest at Mon Nov 13 11:47:49 2000 Scanning running processes: /proc/23043/exe: identified as: stacheldraht daemon with no symbol table with the following differences: missing string: Error sending syn packet. missing string: nohup ./%s missing string: rcp %s@%s:sol.bin %s missing string: rm -rf %s missing string: sicken missing string: ttymon IP address found: 3.3.3.3 (spoofed address) Grabbing: /proc/23043/exe to: /usr/local/find_ddos/files/23043 Scanning "/tmp": Scanning "/": Log finished Mon Nov 13 11:50:32 2000 Sadly, I'm still too ignorant to know what to do about it. Should I simply delete this or should I be doing an additional corrective measure? Thanks KarlKarl Malivuk Sr LAN Administrator, College of Fine Arts University of New Mexico
Current thread:
- find_ddos results Karl Malivuk (Nov 16)
- Re: find_ddos results Dave Dittrich (Nov 17)
 - Re: find_ddos results Ryan Russell (Nov 17)
- Re: find_ddos results J C Lawrence (Nov 21)
- Re: find_ddos results Ryan Russell (Nov 22)
 - Re: find_ddos results Valdis Kletnieks (Nov 24)
 - Re: find_ddos results Jose Nazario (Nov 24)
 
 
 - Re: find_ddos results J C Lawrence (Nov 21)
 
 - Re: find_ddos results Jose Nazario (Nov 17)
 - Re: find_ddos results Christophe Dubois (Nov 17)
- Re: find_ddos results Dave Dittrich (Nov 18)
 
 
- <Possible follow-ups>
 - Re: find_ddos results Karl Malivuk (Nov 17)
 
