Presentation

Download Report

Transcript Presentation

UNIX Postmortem
Mark Henman
1
Introduction
For most system administrators,
there is no question that at some
point at least one of their systems
is going to be hijacked by
someone else.
This presentation should provide
enough information to help an
administrator quickly and
successfully recover from an
attack.
2
Discovery
Realize that you’ve been hacked
 Tools
 Observation

3
Realize that you’ve been
hacked

Crackers use to make themselves known
quickly
– Web site defacing
Today’s crackers hide
 Hijacked machine market

4
Tools
seccheck
 chkrootkit
 Tripwire
 Snort


Use more than one form of intrusion
detection.

Watch for intruders inside and out.
5
Trust Nothing!

Files may have been replaced
– Binaries
– Shared Libraries
– Kernel
6
Trust Nothing!
Disconnect the Network
 Shutdown the system
 Boot from a trusted hard drive
 Mount compromised file systems without
execute permissions

7
Examining The System
Log Files
 Changed system executables
 Shared libraries
 Viewed files
 Back doors
 Other network accessible systems

8
System Restoration
Backup user data
 Check for alterations
 Re-install the Operating System
 Restore user data

9
Follow-up
Harden the system against attack
 Check for abnormal behavior
 Bring the system back into service
 Monitor the log files

10
Conclusion
Don’t panic!
 Isolate quickly
 Examine slowly and carefully
 Protect the system from a repeat attack

11
Where to Get More Information
www.snort.org
 www.tripwire.org
 www.chkrootkit.org
 www.sans.org

12