Re: how to fix rootkit?

2012-02-08 Thread Laurentiu Pancescu
Hello Alexander, On 2/8/12 09:53 , v...@lab127.karelia.ru wrote: Today I found next things at squeeze. Please help to fix, I've no experience in such tasks. Checking `ifconfig'... INFECTED I was wondering if we're not losing perspective of what is realistic in a certain situation, especially

Re: how to fix rootkit?

2012-02-08 Thread Russell Coker
On Thu, 9 Feb 2012, Jason Fergus wrote: > Out of curiosity, couldn't one technically boot up a liveCD, mount the > drive(s) and then download the .debs individually, then extract them > over the mounted partitions, effectively copying over all of the > binaries. There is the possibility of SUID b

Re: how to fix rootkit?

2012-02-08 Thread Jason Fergus
On Wed, 2012-02-08 at 18:16 -0600, Mike Mestnik wrote: > On 02/08/12 18:07, Russell Coker wrote: > > On Thu, 9 Feb 2012, Stephen Hemminger wrote: > >> The advice I heard is trust nothing (even reflash the BIOS). > > Do you know of any real-world exploits that involve replacing the BIOS? > > It's

bios infection (was: how to fix rootkit?)

2012-02-08 Thread Aníbal Monsalve Salazar
On Thu, Feb 09, 2012 at 11:07:20AM +1100, Russell Coker wrote: >On Thu, 9 Feb 2012, Stephen Hemminger wrote: >>The advice I heard is trust nothing (even reflash the BIOS). > >Do you know of any real-world exploits that involve replacing the BIOS? It's >been theoretically possible for a long time

Re: how to fix rootkit?

2012-02-08 Thread Mike Mestnik
On 02/08/12 18:07, Russell Coker wrote: > On Thu, 9 Feb 2012, Stephen Hemminger wrote: >> The advice I heard is trust nothing (even reflash the BIOS). > Do you know of any real-world exploits that involve replacing the BIOS? It's > been theoretically possible for a long time but I haven't seen a

Re: how to fix rootkit?

2012-02-08 Thread Russell Coker
On Thu, 9 Feb 2012, Stephen Hemminger wrote: > The advice I heard is trust nothing (even reflash the BIOS). Do you know of any real-world exploits that involve replacing the BIOS? It's been theoretically possible for a long time but I haven't seen any references to it being done. Also one thi

Re: how to fix rootkit?

2012-02-08 Thread Mike Mestnik
On 02/08/12 02:41, Laurentiu Pancescu wrote: > On 2/8/12 09:53 , v...@lab127.karelia.ru wrote: >> Today I found next things at squeeze. Please help to fix, I've no >> experience in such tasks. > > As Fabian already mentioned, you cannot know what an attacker changed > in the system (especially now

Re: how to fix rootkit?

2012-02-08 Thread Stephen Hemminger
On Wed, 08 Feb 2012 22:56:16 + Chris Davies wrote: > Milan P. Stanic wrote: > > What about statically linked binaries on the external media (CD, DVD, > > USB ...) which is write protected with 'execute in place' mode? > > You can no longer trust the kernel. Therefore you cannot trust > ANY

Re: how to fix rootkit?

2012-02-08 Thread Chris Davies
Milan P. Stanic wrote: > What about statically linked binaries on the external media (CD, DVD, > USB ...) which is write protected with 'execute in place' mode? You can no longer trust the kernel. Therefore you cannot trust ANY application that runs under that kernel, either directly or indirectl

Re: how to fix rootkit?

2012-02-08 Thread Milan P. Stanic
On Wed, 2012-02-08 at 19:39, Michael Stummvoll wrote: > Am 08.02.12 18:46, schrieb Fernando Mercês: > > Reading memory after turning off? There are a easy way to it? > > > > When I said "your own binaries", I mean "get fresh copies of > > binaries and use in system with a USB stick or something li

Re: how to fix rootkit?

2012-02-08 Thread Fernando Mercês
Michael, I think you're talking about syscall interceptions and related stuff. You're right, we can't trust, but it in this case we're talking about a very specialized malware and I don't see any fast action to bypass it. Maybe the conclusion is that we can't trust anything, so we can't do anythin

Re: how to fix rootkit?

2012-02-08 Thread Michael Stummvoll
Am 08.02.12 19:51, schrieb Jutta Zalud: > Michael Stummvoll wrote: > >> And who says, that the new binarys don't work in "compromized >> mode", e.g. with a LD_PRELOAD? ;) > >> you can't trust a compromized system, not even when you running >> (or think you are running) own binaries. Who knows, wh

Re: how to fix rootkit?

2012-02-08 Thread Jutta Zalud
Michael Stummvoll wrote: > And who says, that the new binarys don't work in "compromized mode", > e.g. with a LD_PRELOAD? ;) > you can't trust a compromized system, not even when you running (or > think you are running) own binaries. Who knows, what the kernel does. What exactly do you mean by "

Re: how to fix rootkit?

2012-02-08 Thread Michael Stummvoll
Am 08.02.12 18:46, schrieb Fernando Mercês: > Reading memory after turning off? There are a easy way to it? > > When I said "your own binaries", I mean "get fresh copies of > binaries and use in system with a USB stick or something like that. > Do not use the compromised system binaries". That's i

Re: how to fix rootkit?

2012-02-08 Thread Fernando Mercês
Reading memory after turning off? There are a easy way to it? When I said "your own binaries", I mean "get fresh copies of binaries and use in system with a USB stick or something like that. Do not use the compromised system binaries". That's it. ;-) BR, Fernando Mercês Linux Registered User #43

Re: how to fix rootkit?

2012-02-08 Thread Michael Stummvoll
On 08.02.2012 17:03, Fernando Mercês wrote: > Humm... you're all right, dumping before reboot is much better. > > Another tip: dump with your own dd/rsync binary copies. Remember: you > cannot trust this system. > > You can also capture some network traffic and general volatile data > (memory) befo

Re: how to fix rootkit?

2012-02-08 Thread Fernando Mercês
Humm... you're all right, dumping before reboot is much better. Another tip: dump with your own dd/rsync binary copies. Remember: you cannot trust this system. You can also capture some network traffic and general volatile data (memory) before reboot. BR, Fernando Mercês Linux Registered User #

Re: how to fix rootkit?

2012-02-08 Thread Repasi Tibor
But, the most important: think before you act. If you wipe and reinstall the system, it could be as vulnerable as it was, so it may be rooted before you have it fully up again. Consider the following: - Cut network connection. Having the system off-line you can investigate the situation undist

Re: how to fix rootkit?

2012-02-08 Thread Leonor Palmeira
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I would rather (if it's ok for the server do be down for a while) unplug the internet cable and dd (and/or rsync) all the partitions before rebooting. A lot of information (including swap) is lost during reboot... Best, Leonor Palmeira. On 08/02/12 1

Re: how to fix rootkit?

2012-02-08 Thread Fernando Mercês
I recommend you boot with some live CD system and make a dump of each partition, including swap, with dd. So you can analyze it after wipe your system. This analysis will help you to discover how attacker have gained root access, protect your actual system and feed community with real case informa

Re: how to fix rootkit?

2012-02-08 Thread Alexander Schreiber
On Wed, Feb 08, 2012 at 11:53:14AM +0300, v...@lab127.karelia.ru wrote: > Today I found next things at squeeze. Please help to fix, I've no > experience in such tasks. > > # chkrootkit > ROOTDIR is `/' > Checking `ifconfig'... INFECTED > Checking `netstat'...

Re: how to fix rootkit?

2012-02-08 Thread Laurentiu Pancescu
On 2/8/12 09:53 , v...@lab127.karelia.ru wrote: Today I found next things at squeeze. Please help to fix, I've no experience in such tasks. As Fabian already mentioned, you cannot know what an attacker changed in the system (especially now that chkrootkit found a rootkit), therefore you canno

Re: how to fix rootkit?

2012-02-08 Thread Fabian Nöldgen
"v...@lab127.karelia.ru" wrote: > Today I found next things at squeeze. Please help to fix, I've no > experience in such tasks. Reinstall. You cannot trust a machine that had been rooted. -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Tro