Cesar writes:

> 
> Hi ! 
> 
>   I'm a disquette with this utilities clean.
>   #mount /dev/fd0 /floppy
>   #cd /floppy
>   #./netstat -antp  
> 

Don't forget to mount "-ro" or write protect the floppy. :-) 

On linux, AFASIK, "netstat" relies on /dev/net and friends not to lie to it. 
This is a poor assumption on a comprimised machine, as it is possible to 
intercept the reading of these devices in the kernel to filter results.  
This can be done with a LKM (which are a common feature of root kits), or 
perhaps by leveraging flaws in existing system calls (e.g. the old BSD 
mmap() bug that let you make kernel physical memory writable could be used 
to effect this, I suppose). 

For a practical example of how this can work in the wild, please check out 
the "knark" or "rial" root kit.  Both use an LKM, BTW.  Even having a safe, 
staticly linked "netstat" on floppy won't save you here. 

Once again, successful detection of a compromise is a multi-layered problem, 
and no one tool is a silver bullet. 

Ken Seefried, CISSP 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to