The discovery of linuxxxx traceability: Invasion of Farinose (version 1) (if this version feels nonsense, the next version will write specific points)

Source: Internet
Author: User

Speaking of Linux Discovery, then it is easy to think of Linux logs, through the log can really find a lot of problems, you can also find out whether Linux is, how to be . So what if Linux doesn't turn on the logs? The log was deleted? The general method is only applicable to regularEvent. Incurable diseases can only be a panacea (odd kinky coincidence).
Just like anti-virus software, the emergence of new viruses will always survive for a period of time, as a loophole, new vulnerabilities in a period of time is very useful. But when the method is published, the secret is no longer a secret, the method can only be used as a method, as a theoretical study written in writing. This article from the method and the way to say that Linux is after the discovery method. Mainly is the unification and the difference of each attribute.
If the normal system is not changed, then the system
is
The change is the discovery system is the fundamental, following changes from the following aspects are said to beThe changes in the system, and where the mistakes are made, please point out.
Linux is in general, the following changes can be taken to determine whether the system is

    • The file has changed.
    • Suspicious process
    • The flow rate is changing
    • Changes in business content

File changes, a system is *, if XXX left the back door, it will inevitably lead to changes in the file, some would say that the statistics file hash can be found to change the file. But there is a problem here, not every system administrator will go to record this hash, and after the hash record with the system updates a certain system of key files will also change, then there will be false positives. And according to the hash, especially MD5 this hash to do the file check itself there is a risk, MD5 this hash has been Xiao Professor in 2006 to crash the way to crack, simply said, can find two different files have the same hash. The change of the hash is said to change the contents of the file, then what other attributes does the file have besides the hash? What if it's a catalogue? Obviously, the hash here is out of the deal. We can list the various attributes and observe them from the following aspects.

    • Unity: Whether it is the same as the normal system, and whether the surrounding documents form a unified. After unification there are two possible: 1, was *, XXX will file a variety of attributes should be consistent, this situation will always be out of the way. 2, the system is normal.
    • Difference: There is a difference between the properties of the surrounding files and the difference is where the problem is.

Suspicious process, if the system is *, if XXX adds a backdoor, then the system process will change, and does not discuss the rootkit this situation, if the rootkit is difficult to say, it can hide a lot of key information. We will always find that Linux looks at the exception process with PS and then observe the exception process, then which is the exception process? How to differentiate? Textbooks may end in the abnormal process, judge the anomaly depends on experience? The exception process is also differentiated by methods:

    • First, the above-mentioned changes in the file, for the selected files to include suspicious files, and to remember the attributes of the exception file, the attribute information loaded into your brain, so that encountered other similar situations can quickly respond, processes and files have similar properties, through the attribute comparison to find abnormal process.
    • The second is the inter-process attribute comparison to find its unity and difference.
    • Third, using anti-virus software

The flow of change, but also from the unity and differences. Traffic specifically reflected in the network connection related to the five-tuple, for the five-tuple attribute analysis of its unity and diversity, you can find the exception you want. Here are two examples:

    • First, the vast part of the connection is from the domestic, then from abroad is very suspicious.
    • Second, whether the connection initiated process is in the exception list.

Business content changes, such as website tampering, hang xxx or illegal advertising.

Finish

The discovery of linuxxxx traceability: Invasion of Farinose (version 1) (if this version feels nonsense, the next version will write specific points)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.