You are completely right. Its only a peace of code
to try to find the open ports (at that moment).
Its only usefull for one specific situation - when
you have a open port hidden (by lkm or trojanned
binaries)...
You need to do a lot of other checks to have a 
complete analyze of the system.

--
Daniel B. Cid


> --- Michael Silk <[EMAIL PROTECTED]> escreveu: >
>Well backdoors don't always have to have a port open
> waiting
> for connections, one such different variation could
> be:
>       - backdoor runs every X o'clock, connecting to a
> website
>               to receive its malicious commands ... hence it
> will
>               just look like a simply http browsing session and
>               will probably be un-noticed.
> 
>       A simple port-search wouldn't pick that up :)
> 
> -- Michael
> 
> -----Original Message-----
> From: Tim Greer [mailto:[EMAIL PROTECTED]
> Sent: Friday, 1 August 2003 8:26 AM
> To: Daniel B. Cid; [EMAIL PROTECTED]
> Subject: Re: Finding hidden backdoors
> 
> 
> The backdoor could easily only accept connections
> from non local sources, or
> a specific source.  It's probably easier to just run
> netstat, lsof, etc.
> from a clean. trusted media... or also boot into
> single user mode from a
> trusted kernel image.  In fact, you should always
> have trusted kernel images
> on the server anyway, for purposes of being able to
> boot if the other image
> is corrupted or modified.  As for LKM, I don't
> compile with lkm support in
> my kernels for many reasons (security being one of
> them), but a lot of
> people do, so...
> --
> Regards,
> Tim Greer  [EMAIL PROTECTED]
> Server administration, security, programming,
> consulting.
> 
> 
> ----- Original Message -----
> From: "Daniel B. Cid" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Thursday, July 31, 2003 1:18 PM
> Subject: Finding hidden backdoors
> 
> 
> > I saw some people talking about rootkits that
> hidden process/ports.
> > One think that i always do to see what ports are
> open is to run this
> > perl script:
> >
> >
> > use IO::Socket;
> > for($i=0;$i<=65555;$i++)
> >         {
> >         $server[$i] = IO::Socket::INET->new(
> >         Proto => 'tcp',
> >         LocalPort => $i,
> >         Listen => SOMAXCONN,
> >         Reuse => 1) or print "Port $i Open \n"
> unless $server[$i];
> >         close ($server[$i]);
> >         }
> >
> > This is good because if "netstat" or "lsof" or
> "fuser" or any other
> > program is trojaned , or if it has any firewall
> and nmap is not finding
> > all the open ports, this script will show ... The
> other benefit is that
> > you cant hidden from it using any LKM code...
> > What do you thing ?
> >
> > thanks
> >
> > Daniel B. Cid
> >
> >
> >
> >
> >
> >
> >
>
--------------------------------------------------------------------------
> -
> >
>
--------------------------------------------------------------------------
> --
> >
> 
> 
>
---------------------------------------------------------------------------
>
----------------------------------------------------------------------------
> 
> 
> 
> CAUTION: This email message and accompanying data
> may contain information that is confidential and/or
> subject to legal privilege. If you are not the
> intended recipient, you are notified that any use,
> dissemination, distribution or copying of this
> message or data is prohibited. If you have received
> this email message in error, please notify us
> immediately and erase all copies of this message and
> attachments. Thank you.
> 
> This email is for your convenience only, you should
> not rely on any information contained herein for
> contractual or legal purposes. You should only rely
> on information and/or instructions in writing and on
> company letterhead signed by authorised persons.
>  

_______________________________________________________________________
Conheça o novo Cadê? - Mais rápido, mais fácil e mais preciso.
Toda a web, 42 milhões de páginas brasileiras e nova busca por imagens!
http://www.cade.com.br

---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to