Intrusion Tracking for UNIX

Source: Internet
Author: User
Tags ftp ftp upload file log

After the *nix system has been invaded, it is very important to determine the loss and the source address of the intruder's attack. While most intruders know how to attack your servers by using machines they've captured as a springboard, the target information collection (exploratory scans) that they do before they launch a formal attack is often started from their work machines, this article describes how to analyze the IP of an intruder and determine it from the logs of an intrusion-stricken system.

1.messages

/var/adm is the log directory for UNIX (/var/log is under Linux). There are quite a few ASCII text-formatted logs saved, of course, let's focus first on the messages file, which is a file that intruders care about, and it records information from the system level. Here, a lot of logging is useless for us.

Like what:

APR 21:49:30 Unix:copyright (c) 1983-1997, Sun Microsystems, Inc.

APR 21:49:30 unix:mem = 262144K (0x10000000)

This shows the record of the copyright or hardware information and:

APR 19:06:47 www login[28845]: FAILED login 1 from xxx.xxx.xxx.xxx,

User not known to the underlying authentication module

Such a logon failure record:

APR 22:05:45 Game pam_pwdb[29509]: (login) session opened to user Ncx by (uid=0) so the first step should be Kill-hup cat '/var/run/syslo Gd.pid ' (of course, it's possible that the intruders have done that for us,;-) so we don't get any useful information.

In this URL you can find a large number of log audit analysis tools or feet:

Http://www.securityfocus.com/tem ... platform=&path=[%20auditing%20][%2-0log%20analysis%20]

2.wtmp,utmp logs,ftp Log

You can find a file named Wtmp,utmp in the/var/adm,/var/log,/etc directory, which records when and where the user is telnet to the host, the oldest and most popular zap2 in the hacker (the compiled filename is generally called Z2, or is called wipe). It is also used to erase the user login information in these two files, but because lazy or bad network speed (>3 seconds of ECHO is a crash, and I often meet the echo time 10 times times), many intruders did not upload or compile this file, What the administrator needs is to use the Lastlog command to get the source address of the intruder's last connection (which, of course, could be a springboard for them). FTP log is generally/var/log/xferlog, the text form of the file detailed record of FTP upload file time, source , filename, and so on. However, because the log is too obvious, a slightly more sophisticated intruder will rarely use the method to pass files. And it's more common to use RCP. Of course you can # Cat/var/log/xferlog | Grep-v 202.106.147. To see which addresses are not supposed to appear.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.