This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| mission:log:2015:03:28:digital-exorcism [2015-03-28 12:48] – chrono | mission:log:2015:03:28:digital-exorcism [2015-03-28 17:46] (current) – chrono | ||
|---|---|---|---|
| Line 17: | Line 17: | ||
| After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | After verifying that the traffic really was outgoing, it was time to find out what is causing this amount of traffic. In the old days, exorcism was a bit more of a good show I think, today, it's just a couple of people sharing the same tmux session, listening to their favorite kind of music and hacking away with a couple of tcpdumps, iftops, netstats and some other shell mumbo-jumbo. rkhunter didn't identify any rootkits. The daemon concealment seemed done like a crude quick-hack. If I'd have to hide something in a system, I'd definitely make it much harder for someone to track. | ||
| - | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / | + | At the time two daemons of the kit were running: /.sshd and /http. sshd was located at / |
| < | < | ||
| Line 44: | Line 44: | ||
| - | {{tag> | + | {{tag> |
| - | {{keywords> | + | {{keywords> |
| ~~DISCUSSION~~ | ~~DISCUSSION~~ | ||