This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| mission:log:2015:03:28:digital-exorcism [2015-03-28 11:07] – chrono | mission:log:2015:03:28:digital-exorcism [2015-03-28 17:46] (current) – chrono | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ~~DRAFT~~ | ||
| - | |||
| ====== Personal Log: Digital Exorcism ====== | ====== Personal Log: Digital Exorcism ====== | ||
| When you leave the commercial/ | When you leave the commercial/ | ||
| - | Yesterday, a couple of friends from the awesome http:// | + | Yesterday, a couple of friends from the awesome http:// |
| Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | ||
| Line 19: | Line 17: | ||
| After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | ||
| - | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / | + | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / |
| < | < | ||
| Line 46: | Line 44: | ||
| - | {{tag> | + | {{tag> |
| - | {{keywords> | + | {{keywords> |
| ~~DISCUSSION~~ | ~~DISCUSSION~~ | ||