Security Incidents mailing list archives

Re: LJK2 rootkit?


From: hecix () HOTMAIL COM (. Hecix)
Date: Fri, 19 May 2000 12:55:55 GMT


Here is a list of what files are used by the LRK4 and what they do, how they
are used...

chfn -          Local user->root. Run chfn then when it asks you for a new name
                enter your password.

chsh -          Local user->root. Run chsh when it asks you for a new shell
                enter your password.

crontab -       Loads a file defined as TAB_NAME in rootkit.h, by default
/dev/hda02
                This file should have the following syntax:
                username regularcrontabentry
                ie: say to run your botchk for your hidden eggdrop as user hack you'd use:
                hacker 0,10,20,30,40,50 * * * *   /home/hack/eggdrop1.1.5/botchk
/dev/null 2>&1

                NOTE: the user must already have a crontab, do crontab -lu
username
                      to see if they have one

du -            See documentation for ls

find -          See documentation for ls

fix -           Replaces and fixes timestamp/checksum infomation on files.

ifconfig -      Modified to remove PROMISC flag when sniffing.

inetd -         Don't even *think* about asking ;-) It ain't that hard..

killall -       All process of type 2 and 3 in the ROOTKIT_PROCESS_FILE cant be
killed using
                killall.
                say our process file had this in it:
                2 linsniffer
                3 hack
                if you typed killall linsniffer, it wouldn't kill any process with the
fullname
                of linsniffer, but if you typed killall somehackerprogs it wouldn't kill
any
                process with hack in it.  See ps for more information as they run on the
same
                list, along with the pidof trojan.

linsniffer -    A great packet sniffer, very simple to use just run:
./linsniffer > tcp.log &
                Come back in a few hours and read your logs of ftps/imaps/telnets :)
                Some other sniffers if you want more configurability are:
                Sniffit: http://reptile.rug.ac.be/~coder/sniffit/sniffit.html

login -         Allows login to any account with the rootkit password.
                If root login is refused on your terminal login as "rewt".
                Disables history logging when backdoor is used.

ls -            Trojaned to hide specified files and dirs.
                The data file is ROOTKIT_FILES_FILE, defaults to /dev/ptyr.
                All files can be listed with 'ls -/' if SHOWFLAG is enabled.
                (see rootkit.h)
                The format of /dev/ptyr is:
                ptyr
                hack.dir
                w4r3z
                ie. just the filenames. This would hide any files/dirs with the
                names ptyr, hack.dir and w4r3z.

netstat -       Modified to remove tcp/udp/sockets from or to specified
                addresses, uids and ports. The file is ROOTKIT_ADDRESS_FILE.
                default data file: /dev/ptyq
                type 0: hide uid
                type 1: hide local address
                type 2: hide remote address
                type 3: hide local port
                type 4: hide remote port
                type 5: hide UNIX socket path

                example:
                0 500           <- Hides all connections by uid 500
                1 128.31        <- Hides all local connections from 128.31.X.X
                2 128.31.39.20  <- Hides all remote connections to 128.31.39.20
                3 8000          <- Hides all local connections from port 8000
                4 6667          <- Hides all remote connections to port 6667
                5 .term/socket  <- Hides all UNIX sockets including the path
                                   .term/socket

passwd -        Local user->root. Enter your rootkit password instead of your
                old password.

pidof -         Uses ROOTKIT_PROCESS_FILE, just like ps and killall do.
                pidof (some command name) normally returns the pid or pids of that
command.
                Any process of type 2 or 3 in our file will be hidden just like in ps, see
ps
                documentation for more information.
                NOTE: programs that run from scripts like a bash script use the name of
the
                      script to hide it not the item it runs!  IE: eggdrop config files
instead
                      of eggdrop ./config.file

ps -            Modified to remove specified processes.
                The file used is ROOTKIT_PROCESS_FILE, default to /dev/ptyp.
                An example data file is as follows:

                0 0             Strips all processes running under root
                1 p0            Strips tty p0
                2 sniffer       Strips all programs with the name sniffer
                3 hack          Strips all programs with 'hack' in them
                                ie. proghack1, hack.scan, snhack etc.
                Don't put in the comments, obviously. Note: if this doesn't
                seem to work make sure there are no spaces after the names,
                and don't use the full path name.
                NOTE: programs that run from scripts like a bash script use the name of
the
                      script to hide it not the item it runs!  IE: eggdrop config files
instead
                      of eggdrop ./config.file

rshd -          Execute remote commands as root.
                Usage: rsh -l rootkitpassword host command
                ie. rsh -l satori cert.org /bin/sh -i
                    would start a root shell.

sniffchk -      simple bash scrip to check if your linsniffer is running, not
really necessary
                unless you setup your system to mail you the logs and you dont want to
ever log
                in manually to read them, but how long do u really wanna sniff the same
servers?

syslogd -       Modified to remove specified strings from logging.
                The data file is ROOTKIT_LOG_FILE, this defaults to /dev/ptys.
                Example data file:

                evil.com
                123.100.101.202
                rshd
                This would remove all logs containing the strings evil.com,
                123.100.101.202 and rshd.

tcpd -          Modified to allow access from your host without any logging.
                Any type 1 record in the ROOTKIT_ADDRESS_FILE is used for
                tcpd. See netstat for more infoz on this file.
                Example data file:
                1 123.4.5.6
                would set up the tcp wrappers to allow and hide connects from
                123.4.5.6.

top -           Identical to ps.

wted -          This does lots of stuff. U can view ALL the entries in a wtmp
                or utmp type file, erase entries by username or hostname,
                view zapped users (admins use a util similar to this to find
                erased entries), erase zapped users etc.

z2 -            Zapper2! Run this to erase the last utmp/wtmp/lastlog entries
                for a username. This can be detected since it just nulls the
                entry out.

Hecix
________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com


Current thread: