Security Incidents mailing list archives
Re: Trojans that use LDAP
From: Stephen <sa7ori () tasam com>
Date: Fri, 18 Jan 2002 21:36:16 -0500 (EST)
When addressing these issues you have to remember that there is no set WAY of doing things. just because that machine has traffic destined for what is normally designated for LDAP doesnt mean that this is LDAP traffic, it simply means that whomever trojaned your machine chose that port for whatever reasons (maybe your firewall policies let that stuff through) many times people put things on 53, so your not contentmatching firewalls let the data through...dont assume that because the packet has 389 in it destination fields, that it is LDAP content in the datagram.. You can use netstat, and lsof, but how can you trust these tools. assuming your machine has been rooted, there is no real way of being sure these utils arent trojaned or that the attacker hasnt loaded a kernel mod that will do execve redirection or hide files...netstat and lsof WILL NOT see these sockets/files if the kernel doesnt want them to. Keep your mind open. I suggest (if you can) booting the machine from another medium perhaps your OS install cds and using the utilities on that cd. or atleast copy the binaries from a "secure" machine. security is all about TRUST violation, dont over TRUST your utilities especially in an untrustworthy environment. On Fri, 18 Jan 2002 Kevin.Reardon () oracle com wrote:
If you're running unix, you might want to run lsof on that potential infected machine to see what process is trying to get to that port. netstat will show you the port that is trying to connect to the ldap port, and you can go from there. Find the process, find the offender. ---K Gary Porter wrote:Are there any Trojans that communicate using LDAP? A machine on our internal network is trying to connect to "email-ds-3.c3pki.ch" on destination Port 389? That port (blocked by the firewall) is ostensibly used for the Lightweight Directory Access Protocol, but I know nothing about this service and I've been unsuccessful (using Sam Spade) in locating any information about the destination address. Is this the sign of a compromise or something more benign? Gary R. Porter Program Manager, CITS Mobile Training MATCOM Corporation 757-838-0212 (w) 757-897-5830 (m) gary.porter () matcomcorp com ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Trojans that use LDAP Gary Porter (Jan 15)
- Re: Trojans that use LDAP Patrick Patterson (Jan 15)
- Re: Trojans that use LDAP Hugo van der Kooij (Jan 16)
- Re: Trojans that use LDAP Kevin . Reardon (Jan 18)
- Re: Trojans that use LDAP Stephen (Jan 19)
- <Possible follow-ups>
- Re: Trojans that use LDAP GeekSpooky (Jan 17)