On 12/27/2017 08:35 PM, Ms. Eva wrote: > Hello, > Hello, first of all, please don't panic!
> Could anyone help me? I'm new.. just learning ethical hacking for > beginners, and I was afraid to download Kali and Metasploitable environment > because I suspected I had intrusion on my system. I've taken the system in > to Apple and consulted Apple, but they deny they see anything wrong. Yet, I > see suspicious things. Research lead me to RK hunter with a tutorial on how > to download and enable it and the terminal commands to use. > Kali Linux and Metasploit as far as I know don't have a direct connection to rkhunter. You might find rkhunter on kali Linux installations as an installed program but that's all. (Note: correct me if I am wrong here) > I've now DOD-level- erased, repartitioned disks, downloaded and reinstalled > my operating system 7 times on my Mac over the course of 3 days, but I > think rootkit or string injection is rebuilding itself. Here are my > suspicious results. I have summarized below the suspicious findings that > appear exactly the same each time, regardless of how fresh the OSX High > Sierra refresh: Can anyone Kindly tell me what they think, and how to go > about cleaning this up? > I am not familiar with MacOS as I don't trust the operating system. But if you trust apple in general to deliver non-compromised software in factory default you should be fine. The most difficult part of rkhunter is the configuration. If you have a fresh installation it's a good starting point to accept all warnings as trusted changes to rkhunter's defaults. To verify the authority of the installed software binaries is your responsibility. To accept changes to rkhunter defaults and trust the installed version you have to run rkhunter --propupd[0] > Checking if SSH root access is allowed [ *Warning* ] > > Checking if SSH protocol v1 is allowed [ *Warning* ] > As you have a fresh installation I would propose to change the defaults here. SSHD configuration is (at east for Linux) straight forward to change those mentioned options. If you don't know what ssh is it might be worth to disable the service. A service not running is still the most secure option. Regards, Thomas [0] --propupd [{filename | directory | package name},...] One of the checks rkhunter performs is to com‐ pare various current file properties of vari‐ ous commands, against those it has previously stored. This command option causes rkhunter to update its data file of stored values with the current values. If the filename option is used, then it must either be a full pathname, or a plain file name (for example, 'awk'). When used, then only the entry in the file properties database for that file will be updated. If the direc‐ tory option is used, then only those files listed in the database that are in the given directory will be updated. Similarly, if the package name option is used, then only those files in the database which are part of the specified package will be updated. The package name must be the base part of the name, no version numbers should be included - for exam‐ ple, 'coreutils'. Package names will, of course, only be stored in the file properties database if a package manager is being used. If a package name is the same as a file name - for example, 'file' could refer to the 'file' command or to the RPM 'file' package (which contains the 'file' command) - the package name will be used. If no specific option is given, then the entire database is updated. WARNING: It is the users responsibility to ensure that the files on the system are gen‐ uine and from a reliable source. rkhunter can only report if a file has changed, but not on what has caused the change. Hence, if a file has changed, and the --propupd command option is used, then rkhunter will assume that the file is genuine.
signature.asc
Description: OpenPGP digital signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________ Rkhunter-users mailing list Rkhunter-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/rkhunter-users