On Sun, Jun 02, 2002 at 10:41:36AM +0800, Huter.Liu wrote:
> hi,Hal Burgiss!
>       I know how to fix a damaged system,I'll install rh7.3 and
        use vsftpd to do ftp server,and I'll change ftp port to 2323,
        just open ftp to internal networks(use ipchains)....I'm not
        the manager of this damaged system,my friend manage it,just a
        few days ago he found the ps and netstat command can't use,so
        he found his system is cracked,now we want found out the
        cracker,my friend is good at programming,now he've write a
        programme to record the attempt quest to port 21 and 23,but
        I want  gather more information from system log or other
        relate things......

        You word wrap didn't.

>     Thank you very much,hehe.

        If you want to play with the system and learn, fine.  First,
go get "chkrootkit" <www.chkrootkit.org>, build it and run it.  See
what it says about any rootkits.  Before anyone chimes in about running
these tools on a compromised system, I'll point out that it is quite
effective for the rootkits that are listed and is capable of spotting
numerous others.  There's no guarantee that you are not infested with
one it doesn't spot, but the idea is to look for and eliminate the
ones it does.  You can do this on the running machine, you just still
can't trust it to be clean.  That's why you follow this course if you
want to invest some time in learning.  You can clean it up pretty
good.  I've done this remotely in the past and subsequent scanning and
IDS testing indicated the resulting system was clean.  Still, you
don't want to do this if you can avoid it.  It's time consuming and
educational to try, though.

        As far as tracking the perps go, the safest thing is the have
a second box which can sniff the network.  Trying to monitor their
behavior from a compromised system which you have live hostiles on
it is NOT a good idea at all.  Several in the underground have been
know to turn the tables on their watchers and later post conversations
of the sys admins having conversations about the compromise investigation.
There are tools out there for reassembling sniffed data streams to
recover conversations.  Trying to invest time in programming booby
trapped programs can be an exercise in futility.  If you want to
lay some goodies about for them to find, you might check out the
deception tool kit (sorry, I don't have the URL handy, Goggle is
your friend or you might try some security sites like Security Focus).
Again, you monitor their behavior from another system.

        Going down this road, what you are doing is setting up a honeypot.
The question becomes, what do you intend to do with the data?  If you
just want to do this for a learning experience, enjoy.  You'll find
more information on honeypots up at the HoneyNet Project, www.honeynet.org.
If you are trying to track down the perpetrators, ask yourself why.
It doesn't sound like you have any grounds for legal action.  Was there
any monitary loss, did they "damage" information on the system, did
they steal anything (beyond the computer access) or compromise your
business or reputation?  Depending on your country and the country they
are in, what they did was probably illegal (there are still a couple
of countries where it is not, sigh...) but prosecuting them is next
to impossible, even in big cases.  If you are just going to try and
get them "thrown off the net", I wouldn't count on it.  Most network
providers will just give them a warning.  I spend 6 months trying
to deal with an individual at the ISP I get my service from who
has been cronically (we thing deliberately) infected with CodeRed
and Nimda.  They are now "filtering" that IP address but he is still
on the net.

        I see you are in China.  If it's from another Chinese site,
you might have a shot.  OTOH...  I get a lot of attack attempts from
China and Korea and others in the Pacific basin.  Funny how so many
of them, once they break into a system and crank up their IRC
services, seem to speak Romanian or some other Eastern European
language.  I didn't know those languages were so popular in
the far east (I'm cracking a joke).  I would not be surprised if
you learned that you had been busted into by someone from either
Eastern Europe or some other country outside of the Asia Pacific region.
If you want to play with them and learn something, enjoy.  Just be
forwarned that they are already better at this than you are.  You
might also need an interpretor.  Be extremely careful you don't end
up victimized even further.

> >The reason being someone else seems to have root access on your
> >machine, and may have multiple backdoors that are well concealed, and
> >you many never find them all.

> ????????????????[EMAIL PROTECTED]
> ????????????????????2002-06-02

        Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  [EMAIL PROTECTED]
  /\/\|=mhw=|\/\/       |  (678) 463-0932   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to