[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Interpreting output of tiger scripts (WAS:Re: Is my system compromised)



On Saturday 04 February 2006 05:35, Marc Shapiro wrote:
[snip]

A quick Google around "FUCK: Got signal 11 while manipulating kernel!" throws 
up references to the the SucKIT rootkit. The following is from a CERN 
advisory. Maybe worth checking.

"Here is a simple recipe to detect the SucKIT rootkit, as it has been
 found on CERN machines. It may miss some other types of installations
 but it should produce no false positive. 
 
 Just run:
   # ls -li /sbin/init /sbin/telinit
 
 Here is the output on a normal machine:
   304579 -rwxr-xr-x   1 root    root    26920 Mar 14  2002 /sbin/init*
   304587 lrwxrwxrwx   1 root    root        4 Dec  2 13:18 /sbin/telinit
 -> init*
 
 Here is the output on a compromised machine:
    85133 -rwxr-xr-x   1 root    root    25636 Mar 26 20:03 /sbin/init
    85133 -rwxr-xr-x   1 root    root    25636 Mar 26 20:03 /sbin/telinit
 
 In the second case, telinit is a real file (not a symlink) and its time
 is the time of the rootkit installation. Note also the incorrect
 information: both files have the same inode number but a reference count
 of one, this comes from the kernel module hiding the real information."

Apologies if this is a false alarm. However, what you've found so far doesn't 
look good. You could also try going 
sudo netstat -tupl | grep LISTEN | grep -v unix
and seeing whether anything is listening that you don't recognize.

:)

Fish
 



Reply to: