Well backdoors don't always have to have a port open waiting
for connections, one such different variation could be:
        - backdoor runs every X o'clock, connecting to a website
                to receive its malicious commands ... hence it will
                just look like a simply http browsing session and
                will probably be un-noticed.

        A simple port-search wouldn't pick that up :)

-- Michael

-----Original Message-----
From: Tim Greer [mailto:[EMAIL PROTECTED]
Sent: Friday, 1 August 2003 8:26 AM
To: Daniel B. Cid; [EMAIL PROTECTED]
Subject: Re: Finding hidden backdoors


The backdoor could easily only accept connections from non local sources, or
a specific source.  It's probably easier to just run netstat, lsof, etc.
from a clean. trusted media... or also boot into single user mode from a
trusted kernel image.  In fact, you should always have trusted kernel images
on the server anyway, for purposes of being able to boot if the other image
is corrupted or modified.  As for LKM, I don't compile with lkm support in
my kernels for many reasons (security being one of them), but a lot of
people do, so...
--
Regards,
Tim Greer  [EMAIL PROTECTED]
Server administration, security, programming, consulting.


----- Original Message -----
From: "Daniel B. Cid" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, July 31, 2003 1:18 PM
Subject: Finding hidden backdoors


> I saw some people talking about rootkits that hidden process/ports.
> One think that i always do to see what ports are open is to run this
> perl script:
>
>
> use IO::Socket;
> for($i=0;$i<=65555;$i++)
>         {
>         $server[$i] = IO::Socket::INET->new(
>         Proto => 'tcp',
>         LocalPort => $i,
>         Listen => SOMAXCONN,
>         Reuse => 1) or print "Port $i Open \n" unless $server[$i];
>         close ($server[$i]);
>         }
>
> This is good because if "netstat" or "lsof" or "fuser" or any other
> program is trojaned , or if it has any firewall and nmap is not finding
> all the open ports, this script will show ... The other benefit is that
> you cant hidden from it using any LKM code...
> What do you thing ?
>
> thanks
>
> Daniel B. Cid
>
>
>
>
>
>
> --------------------------------------------------------------------------
-
> --------------------------------------------------------------------------
--
>


---------------------------------------------------------------------------
----------------------------------------------------------------------------



CAUTION: This email message and accompanying data may contain information that is 
confidential and/or subject to legal privilege. If you are not the intended recipient, 
you are notified that any use, dissemination, distribution or copying of this message 
or data is prohibited. If you have received this email message in error, please notify 
us immediately and erase all copies of this message and attachments. Thank you.

This email is for your convenience only, you should not rely on any information 
contained herein for contractual or legal purposes. You should only rely on 
information and/or instructions in writing and on company letterhead signed by 
authorised persons.


---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to