These classnotes are depreciated. As of 2005, I no longer teach the classes. Notes will remain online for legacy purposes

UNIX03/Handling Running Cracker's Processes

Classnotes | UNIX03 | RecentChanges | Preferences

Showing revision 1
Once you have detected that your system has been broken into, it would be very helpful to try and find any running processes that the cracker has left behind. Remember that any program on your system may be compromised.

It is preferable to operate as a non-privileged user that does not have access to anything important. This is because there may be a trojanned or otherwise compromised program on your machine waiting for an administrator to come along and trigger it.

It is advisable to keep a "stealth" version of ps under an unassuming name. If you run an application, call it by that name. Do a ps of your system and note root programs such as lpd and sendmail as possible names to call your "stealth ps" executable. Some crackers might notice that sendmail should not have an argument of axlww so if you are feeling ambitious, grab the source of ps and tweak it to create a custom version that defaults to these flags. To recall what these flags do:

  • The "a" flag requests all processes
  • The "x" flag also includes daemons
  • The "l" flag requests long format
  • The "w" flag allows longer lines
  • The second "w" allows unlimited lines



Classnotes | UNIX03 | RecentChanges | Preferences
This page is read-only | View other revisions | View current revision
Edited June 28, 2003 4:29 am (diff)
Search:
(C) Copyright 2003 Samuel Hart
Creative Commons License
This work is licensed under a Creative Commons License.