Curious

Tags
beginners

 

 
Thread Tools Search this Thread
# 1  
Old 02-28-2003
Question Curious

Dear All
I am curious to know, that in a system compromise, when someone has access to a box, does that individual have access to a shell on the system, i.e. the person is logging into the system using telnet or SSH to remotely access the box?? How does this individual/ hacker access the system. I know it is dumb question, but please someone clarify this to me.

Also could someone direct me to a site that explains backdoors in detail? What are they, how to detect, etc.

Thanks

KS
# 2  
Old 02-28-2003
To your last question of the group...

Quote:
The permenance of these backdoors will depend completely on the technical saavy of the administrator. The experienced and
skilled administrator will be wise to many (if not all) of these backdoors. But, if you have managed to steal root, it is likely the
admin isn't as skilled (or up to date on bug reports) as she should be, and many of these doors may be in place for some time
to come. One major thing to be aware of, is the fact that if you can cover you tracks during the initial break-in, no one will be
looking for back doors.
Taken from hackers playground

To find out more and to understand it all requires a system administrator to know how to hack a system - just as the best investigators know the mind of a criminal, a sysadmin must know the mind of a hacker. Do a search on goggle and read as much as you can.

# 3  
Old 02-28-2003
A Backdoor can be via telnet, ftp, ssh, a netcat listener, a custom process, or just about any other net-aware process out there. Some holes that have been used in the past were actually executed through the Sendmail daemon, or via an insecure web cgi.

My favorite place for up-to date security information (and research on past issues) is Bugtraq. You can subscribe to the list, or browse via www.securityfocus.com .

Also, keep in mind it may be near impossible to find someone once they're in. For example, many of the Linux Rootkits floating around modify the system in a way the ls doesn't really show all files, ps doesn't show all processes, lsmod doesn't show all modules loaded. Can you imagine trying to search for "clues" when ls, ps, lsof, find, lsmod, etc etc have been modified? Ick.
 

|
Thread Tools Search this Thread
Search this Thread:
Advanced Search

Similar Threads More UNIX and Linux Forum Topics You Might Find Helpful
Thread Thread Starter Forum Replies Last Post
Two curious questions jamie_123 Shell Programming and Scripting 7 10-03-2012 01:35 PM
Curious GQiang Shell Programming and Scripting 2 07-28-2011 02:51 AM
Curious about the -9 pflickner UNIX for Dummies Questions & Answers 3 11-17-2010 01:48 AM
Curious MPxIO problem Ranck Solaris 4 09-23-2010 01:23 PM
An curious idea, how to make it by the powerful script? liuzhencc Shell Programming and Scripting 1 02-03-2010 08:24 AM
AWK sub function curious problem under bash Max Rebo UNIX for Advanced & Expert Users 5 11-12-2009 06:24 PM
Curious cron job question Ashberry Shell Programming and Scripting 3 11-11-2009 11:33 AM
Curious & Strange Videos sparcguy What is on Your Mind? 0 12-22-2008 08:33 AM
curious kurosaki Shell Programming and Scripting 6 09-29-2008 10:54 AM
Curious 'ls' Issue vibhor_agarwali UNIX for Advanced & Expert Users 7 07-10-2008 04:19 AM
Curious? River Freight Linux 1 10-07-2007 04:40 PM
Curious Dummy highway39 UNIX for Dummies Questions & Answers 1 08-31-2006 08:22 PM
Just curious, does Unix stand for anything? pudad UNIX for Dummies Questions & Answers 6 10-18-2002 02:06 AM
All times are GMT -4. The time now is 05:55 PM.

Unix & Linux Forums Content Copyright 1993-2018. All Rights Reserved.