> In order to hack into a Solaris box I think that you
> pretty much have to get
> through SSH and then somehow drop a kernel module
> into place or something
> that can not be tracked with ps, prstat, sar activity
> or userland activity
> of any kind.

No, no special Voodoo-hoodoo is required. Breaking SSH and using a few lines in 
DTrace will do.

After that, you'll be virtually invisible in the process table, but your 
processes will still run.

If my memory still serves me correctly, the DTrace approach doesn't even so 
much as require any modification of utilities like ps(1), therefore, not even 
an integrity check with bart(1M) or tripwire will pick anything up. A little 
bit of Googling will get you to the article (PDF, from what I remember), and 
another way is through Slashdot, someone posted a link to the whitepaper 
detailing the DTrace approach step-by-step.

Using a tool like cd00r.c, which opens up one of these invisible processes 
after a sequence of specially crafted packets are sent, and there's your 
backdoor into a Solaris box. The network logs will be empty and the sysadmin 
will have no clue that you're on his system.  The code is available here:

http://www.phenoelit-us.org/fr/tools.html

Just hope that any OpenSSH vulnerabilities (which Sun SSH is based upon) are 
fixed and your systems patched before you get hit.

> Really, I don't know how someone would hack a Solaris
> box.

...
 
 
This message posted from opensolaris.org
_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to