This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
mission:log:2015:03:28:digital-exorcism [2015-03-28 10:37] – created chrono | mission:log:2015:03:28:digital-exorcism [2015-03-28 17:46] (current) – chrono | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ~~DRAFT~~ | ||
- | |||
====== Personal Log: Digital Exorcism ====== | ====== Personal Log: Digital Exorcism ====== | ||
When you leave the commercial/ | When you leave the commercial/ | ||
- | Yesterday, a couple of friends from the awesome http:// | + | Yesterday, a couple of friends from the awesome http:// |
Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | ||
+ | |||
+ | {{ : | ||
Here's where Dashboards like [[https:// | Here's where Dashboards like [[https:// | ||
- | {{ : | + | It then quickly became apparent, that one of the VMs was the top talker so we moved onto that box and what started out as DDoS mitigation turned into digital exorcism. You know, when there are daemons that are possessed |
- | + | ||
- | It then quickly became apparent, that one of the VMs was the top talker so we moved onto that box and what started out as DDoS mitigation turned into digital exorcism. You know, when there are daemons that are possessed by some evil spirit to create some form havoc, mostly | + | |
===== ===== | ===== ===== | ||
Line 19: | Line 17: | ||
After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | ||
- | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / | + | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / |
< | < | ||
Line 46: | Line 44: | ||
- | {{tag> | + | {{tag> |
- | {{keywords> | + | {{keywords> |
~~DISCUSSION~~ | ~~DISCUSSION~~ |