On Sat, 8 Feb 2003, terry white wrote:

> on "2-7-2003" "Craig Holmes" writ:
> 
> : On February 7, 2003 07:41 am, Rivanor P. Soares wrote:
> : > Checking `lkm'... You have    69 process hidden for ps command
> : > Warning: Possible LKM Trojan installed
> : > Could this be *true* ? How can I discover it?
> 
> : If this is true, then your 'ps' binary has been replaced with one that filters
> : certain processes from your viewing.
> 
> : The best, easiest method to determine if this is true,
> 
> ... i created a directory, copied 'ps' et al to it, and used chattr on
> them.  having a known good binary outside $PATH is something of a comfort
> ...

Yes, indeed, but how do you prevent the ps from using a tampered glibc or 
other libs?  I usually statically compile a standard set of utilities (ls, 
ps, netstat, chkrootkit, etc.), tar.Z them up (some systems still don't 
have gzip or bzip2) and dump the tools into a working directory on the 
"suspect" system.  Then I set my path to utilize that directory during my 
inspection.  This limits the toolset such that all I have to worry about 
is a tampered shell.

Just a suggestion, seeing as the source is so readily available and works 
spectacularly on Linux.

Sincerely,

Shawn M. Jones

Reply via email to