Security Incidents mailing list archives
Re: 'rooted' NT/2K boxen?
From: "Cody Hatch" <cody () halosec com>
Date: Thu, 2 May 2002 20:30:16 -0600
Yeah, sorry, I meant Task Manager. I unfortunately I don't have a copy of lb.exe, although it was impressive. It did a great job of hiding all of the processes from all monitoring agents. The only reason the person knew they had it was they had Snort running. It caught and logged the Unicode attack. They were running IIS 5.0 on a Win2000 machine, too. Netstat didn't show the open port connecting to the IRC channel, and neither did fport. There was even a GUI menu that showed which processes were hidden and which one's weren't. You could choose which things to hide, and which ones to let show. All of the normal methods of gathering system info were on the menu. I didn't get to make a complete forensic examination because the user of the box had messed around with things before I got there. Cody Hatch HALO Network Security
Cody, Of all of the responses I've seen so far, yours is by far the most informative. Thanks. I guess the specifics are that using the dir transversal exploit (patch published in Nov '00...ouch!), this autorooter sent echo commands to the system to create and launch the ftp script file. Do you have a copy of "lb.exe", by chance? This is interesting. First off, neither netstat nor Program Manager show process information, so hiding process info from them isn't tough. I'm going to assume you mean Task Manager...but again, that's an API call to hide a process from TM. Netstat on XP will show process info, but not on NT/2K. I'd be interested in getting a copy of lb.exe to look at, or some more specifics on this ability to hide processes you mentioned... __________________________________________________ Do You Yahoo!? Yahoo! Health - your guide to health and wellness http://health.yahoo.com
----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- 'rooted' NT/2K boxen? H C (May 02)
- Re: 'rooted' NT/2K boxen? William N. Zanatta (May 02)
- <Possible follow-ups>
- Re: 'rooted' NT/2K boxen? zeno (May 02)
- Re: 'rooted' NT/2K boxen? H C (May 02)
- Re: 'rooted' NT/2K boxen? Cody Hatch (May 02)
- Re: 'rooted' NT/2K boxen? H C (May 02)
- Re: 'rooted' NT/2K boxen? KJK::Hyperion (May 06)
- Re: 'rooted' NT/2K boxen? H C (May 02)
- Re: 'rooted' NT/2K boxen? Cody Hatch (May 02)
- Re: 'rooted' NT/2K boxen? H C (May 03)