This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
mission:log:2015:03:28:digital-exorcism [2015-03-28 11:07] – chrono | mission:log:2015:03:28:digital-exorcism [2015-03-28 17:46] (current) – chrono | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ~~DRAFT~~ | ||
- | |||
====== Personal Log: Digital Exorcism ====== | ====== Personal Log: Digital Exorcism ====== | ||
When you leave the commercial/ | When you leave the commercial/ | ||
- | Yesterday, a couple of friends from the awesome http:// | + | Yesterday, a couple of friends from the awesome http:// |
Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | Since it was supposed to be a DDoS, I've had my input filters clamped too early and saw that something was going on and a lot of traffic was moving but it somehow seemed wrong compared to other DDoS investigations I had to do in the past. After some failed attempts to block/ | ||
Line 19: | Line 17: | ||
After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | ||
- | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / | + | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / |
< | < | ||
Line 46: | Line 44: | ||
- | {{tag> | + | {{tag> |
- | {{keywords> | + | {{keywords> |
~~DISCUSSION~~ | ~~DISCUSSION~~ |