Security Incidents mailing list archives

Re: Solaris hack


From: Christopher Samuel <C.Samuel () eris dera gov uk>
Date: Mon, 4 Mar 2002 10:36:12 +0000

-----BEGIN PGP SIGNED MESSAGE-----

On Thursday 28 Feb 2002 9:29 pm, Steve Huston wrote:

I just got one of these too; upon booting from CD and doing a little poking
around, I found in /usr/lib/vold/nsdap the file 'defines', which contained
the following:

======

# Edit these
# Dir to install rootkit in
RKDIR="/usr/lib/vold/nsdap"
# Your email address
EMAIL="bert.smith () mbox bol bg"
# debug mode on or off
DEBUG=0
[...]

Google is your friend - doing a search for that email address picks up two 
links to the Honeynet project, both for results for the Scan of the Month #16.

The most interesting of the two is:

        http://project.honeynet.org/scans/scan16/som/som34.html

by "Solar Eclipse". The useful text is:

  This looks like our rootkit. According to the README it was written by
  Tragedy/Dor <bert.smith () mbox bol bg>.  I send an email to this address
  and Dor was kind enough to send me the binaries of his rootkit - k.tar.gz.
  I have not analyzed the rootkit in depth, since this is not the objective
  of Scan 16, but I looked at the installation script. It writes out the
  configuration to a temporary file and then obfuscates it with a crypt
  program, included in the rootkit. By disassembling the crypt binary with
  IDA Pro I found out that it simply reads the file, NOTs every byte and
  writes it out. My cryptanalysis appears to be correct.

The link "k.tar.gz" to the rootkit in the above is broken, though.

HTH, HAND,
Chris
- -- 
Christopher Samuel               [dstl]                 +44 1684 771134
L007, DSTL, St Andrews Road, Malvern, UK  -  DSTL is part of the UK MoD
DISCLAIMER:  The views expressed above are just those of the author and
do not represent the views, policy or understanding of any other entity

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPINOIVJ7nmUlvnM9AQHe4wP/XKD7BKv4NN07bCmGsGYS4nKs8q11QCFn
UBXVdiSAB1+UrPB+dg/6rp+N7nndmDKihRXc43SHs7fme/aHLXmEHfbUpgjwbL9N
0HvBsK3zLQ7radjkHMGH/5o/F9DtP04ekW+sNmRzV2Mnma2pbwVexGwjaKDsPqYd
xB93/jwoz/o=
=rN0U
-----END PGP SIGNATURE-----

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: