Home Man
Search
Today's Posts
Register

This forum is closed for new posts. Please post beginner questions to learn unix and learn linux in the UNIX for Beginners Questions & Answers forum.

Curious

Tags
beginners

 

 
Thread Tools Search this Thread
# 1  
Old 02-28-2003
Question Curious

Dear All
I am curious to know, that in a system compromise, when someone has access to a box, does that individual have access to a shell on the system, i.e. the person is logging into the system using telnet or SSH to remotely access the box?? How does this individual/ hacker access the system. I know it is dumb question, but please someone clarify this to me.

Also could someone direct me to a site that explains backdoors in detail? What are they, how to detect, etc.

Thanks

KS
# 2  
Old 02-28-2003
To your last question of the group...

Quote:
The permenance of these backdoors will depend completely on the technical saavy of the administrator. The experienced and
skilled administrator will be wise to many (if not all) of these backdoors. But, if you have managed to steal root, it is likely the
admin isn't as skilled (or up to date on bug reports) as she should be, and many of these doors may be in place for some time
to come. One major thing to be aware of, is the fact that if you can cover you tracks during the initial break-in, no one will be
looking for back doors.
Taken from hackers playground

To find out more and to understand it all requires a system administrator to know how to hack a system - just as the best investigators know the mind of a criminal, a sysadmin must know the mind of a hacker. Do a search on goggle and read as much as you can.

# 3  
Old 02-28-2003
A Backdoor can be via telnet, ftp, ssh, a netcat listener, a custom process, or just about any other net-aware process out there. Some holes that have been used in the past were actually executed through the Sendmail daemon, or via an insecure web cgi.

My favorite place for up-to date security information (and research on past issues) is Bugtraq. You can subscribe to the list, or browse via www.securityfocus.com .

Also, keep in mind it may be near impossible to find someone once they're in. For example, many of the Linux Rootkits floating around modify the system in a way the ls doesn't really show all files, ps doesn't show all processes, lsmod doesn't show all modules loaded. Can you imagine trying to search for "clues" when ls, ps, lsof, find, lsmod, etc etc have been modified? Ick.
 

« Previous Thread | Next Thread »
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

More UNIX and Linux Forum Topics You Might Find Helpful
Thread Thread Starter Forum Replies Last Post
Two curious questions jamie_123 Shell Programming and Scripting 7 10-03-2012 12:35 PM
Curious GQiang Shell Programming and Scripting 2 07-28-2011 01:51 AM
Curious about the -9 pflickner UNIX for Dummies Questions & Answers 3 11-17-2010 12:48 AM
curious kurosaki Shell Programming and Scripting 6 09-29-2008 09:54 AM
Curious 'ls' Issue vibhor_agarwali UNIX for Advanced & Expert Users 7 07-10-2008 03:19 AM
Curious? River Freight Linux 1 10-07-2007 03:40 PM
Curious Dummy highway39 UNIX for Dummies Questions & Answers 1 08-31-2006 07:22 PM
Just curious, does Unix stand for anything? pudad UNIX for Dummies Questions & Answers 6 10-18-2002 01:06 AM


All times are GMT -4. The time now is 03:33 AM.

Unix & Linux Forums Content Copyrightę1993-2018. All Rights Reserved.
UNIX.COM Login
Username:
Password:  
Show Password