[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Resultado de chkrootkit sospechoso



Pasando ahora rkhunter me aparece esto

Trojan specific characteristics
   shv4
     Checking /etc/rc.d/rc.sysinit                            [ Not found ]
     Checking /etc/inetd.conf                                 [ Clean ]
     Checking /etc/xinetd.conf                                [ Skipped ]
* Allround tests
   Checking hostname... Found. Hostname is debian
   Checking for passwordless user accounts... OK
   Checking for differences in user accounts... OK. No changes.
   Checking for differences in user groups... OK. No changes.
   Checking boot.local/rc.local file...
     - /etc/rc.local                                          [ OK ]
     - /etc/rc.d/rc.local                                     [ Not found ]
     - /usr/local/etc/rc.local                                [ Not found ]
     - /usr/local/etc/rc.d/rc.local                           [ Not found ]
     - /etc/conf.d/local.start                                [ Not found ]
     - /etc/init.d/boot.local                                 [ Not found ]
   Checking rc.d files...                                     [ Not found ]
   Checking history files
     Bourne Shell                                             [ OK ]
 
Filesystem checks
   Checking /dev for suspicious files...                      [ OK ]
   Scanning for hidden files...                               [ Warning! ]
---------------
/etc/.pwd.lock
/etc/.java /dev/.static
/dev/.udev
/dev/.initramfs
/dev/.initramfs-tools
---------------
Please inspect:  /etc/.java (directory)  /dev/.static (directory) 
/dev/.udev (directory)  /dev/.initramfs (directory)

Aunque en la tabla de resultados final me aparece todo correcto

Y con chkrootkit -c aparece:

ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not infected
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not found
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not found
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing
found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/xulrunner/.autoreg
/usr/lib/jvm/java-1.5.0-sun-1.5.0.10/.systemPrefs
/usr/lib/jvm/.java-1.5.0-sun.jinfo
/usr/lib/iceweasel/.autoreg
/usr/lib/eclipse/plugins/org.eclipse.platform.source_3.2.1.r321_v20060921-MGDh_08KUYM-Bvn/src/org.eclipse.ui.intro_3.2.1.R321_v20060810/.options
/usr/lib/eclipse/plugins/org.eclipse.platform.source_3.2.1.r321_v20060921-MGDh_08KUYM-Bvn/src/org.eclipse.ui.intro.universal_3.2.1.R321_v20060905/.options
/usr/lib/eclipse/plugins/org.eclipse.pde.build_3.2.1.r321_v20060823/.options
/usr/lib/eclipse/plugins/org.eclipse.help.webapp_3.2.1.R321_v20060803/.options
/usr/lib/eclipse/plugins/org.eclipse.ui.intro.universal_3.2.1.R321_v20060905/.options
/usr/lib/eclipse/.eclipseproduct
/lib/init/rw/.ramfs

Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for OBSD rk v1... /usr/lib/security
/usr/lib/security/classpath.security
Searching for LOC rootkit... nothing found
Searching for Romanian rootkit... nothing found
Searching for Suckit rootkit... nothing found
Searching for Volc rootkit... nothing found
Searching for Gold2 rootkit... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for AjaKit rootkit default files and dirs... nothing found
Searching for zaRwT rootkit default files and dirs... nothing found
Searching for Madalin rootkit default files... nothing found
Searching for Fu rootkit default files... nothing found
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... chkproc: nothing detected
Checking `rexedcs'... not found
Checking `sniffer'... lo: not promisc and no packet sniffer sockets
eth1: PACKET SNIFFER(/sbin/dhclient3[3063])
Checking `w55808'... not infected
Checking `wted'... chkwtmp: nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... chklastlog: nothing deleted

Ahora parece que no hay rastro del troyano ese

¿Que pasa en mi pc? ¿Tendré efectivamente un rootkit?

Ronald Urbano escribió:
>
> Si pruebas con el rkhunter y lo ejecutas asi  :
> # rkhunter - c --createlogfile  archivo.log
>
> buscas luego en archivo.log la ruta de los posibles infectados;  Lo
> primero seria borrar los mismos, que de seguro no se querran borrar pq
> tienen permisos especiales, si es así, prueba quitandolos con un
> "chattr -ai  file_infectado" de ahi te dejará borrarlos.
>
> Seguramente el "ps" , el "top" "netstat" y algunos otros estan
> reemplazados, asi que no te mostrara todos los procesos reales, mejor
> si los reemplazas por ejecutables confiables de otro sistema.
>
> Sin embargo te recomiendo ir instalando otro sistema ya que si has
> sido vulnerado nunca se sabe si te han dejado algo corriendo y q el
> rkhunter o chkrrotkit no te lo detectan, estos detectres de rootkit
> buscan en rutas especificas y cabe la posibilidad q te hayan dejado
> algo en otras ubicaciones.
>
> Atte.
>
> Ronald -
>
>
>
> Pedro Jose Martin Cano escribió:
>> ¿Cómo los testeo?
>>
>> Gracias
>>
>> Miguel Da Silva - Centro de Matemática escribió:
>>  
>>> Pedro Jose Martin Cano wrote:
>>>    
>>>> Realizando un análisis con chkrootkit ha detectado esto, y estoy
>>>> realmente preocupado:
>>>>
>>>> eth1: PACKET SNIFFER(/sbin/dhclient3[3063])
>>>> Checking `lkm'... You have     2 process hidden for readdir command
>>>> You have     2 process hidden for ps command
>>>> chkproc: Warning: Possible LKM Trojan installed
>>>> Searching for suspicious files and dirs, it may take a while...
>>>> /usr/lib/xulrunner/.autoreg
>>>> /usr/lib/jvm/java-1.5.0-sun-1.5.0.10/.systemPrefs
>>>> /usr/lib/jvm/.java-1.5.0-sun.jinfo
>>>> /usr/lib/iceweasel/.autoreg
>>>> /usr/lib/eclipse/plugins/org.eclipse.platform.source_3.2.1.r321_v20060921-MGDh_08KUYM-Bvn/src/org.eclipse.ui.intro_3.2.1.R321_v20060810/.options
>>>>
>>>>
>>>> /usr/lib/eclipse/plugins/org.eclipse.platform.source_3.2.1.r321_v20060921-MGDh_08KUYM-Bvn/src/org.eclipse.ui.intro.universal_3.2.1.R321_v20060905/.options
>>>>
>>>>
>>>> /usr/lib/eclipse/plugins/org.eclipse.pde.build_3.2.1.r321_v20060823/.options
>>>>
>>>>
>>>> /usr/lib/eclipse/plugins/org.eclipse.help.webapp_3.2.1.R321_v20060803/.options
>>>>
>>>>
>>>> /usr/lib/eclipse/plugins/org.eclipse.ui.intro.universal_3.2.1.R321_v20060905/.options
>>>>
>>>>
>>>> /usr/lib/eclipse/.eclipseproduct
>>>> /lib/init/rw/.ramfs
>>>>
>>>> Tendré un el troyano ese instalado? ¿Como puedo ver los procesos
>>>> ocultos? Aparte de los plugins de eclipse, le veis algo sospechoso a
>>>> esos archivos?
>>>>
>>>>
>>>>       
>>> Chequeaste estos archivos?
>>>
>>> /usr/lib/xulrunner/.autoreg
>>> /lib/init/rw/.ramfs
>>> /usr/lib/iceweasel/.autoreg
>>>
>>> Para los procesos no sé si ps te ayudaría, pero sería buena idea
>>> probar con eso.
>>>
>>> Saludos.
>>>     
>>
>>
>>   
>
>



Reply to: