<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: trying to do forensic on a hack server in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173959#M9367</link>
    <description>all,&lt;BR /&gt;just got the server back and ran fsck on it to check for bad block and it seems the disk is corrupted. Thanks all for your help.</description>
    <pubDate>Fri, 06 Feb 2004 16:26:00 GMT</pubDate>
    <dc:creator>K.C. Chan</dc:creator>
    <dc:date>2004-02-06T16:26:00Z</dc:date>
    <item>
      <title>trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173931#M9339</link>
      <description>All,&lt;BR /&gt;I am investigating how this server was compromise, doing an ls under /dev listed this weird output:&lt;BR /&gt;&lt;BR /&gt;"actual blank line here"&lt;BR /&gt;/159&lt;BR /&gt;/26204&lt;BR /&gt;/26258&lt;BR /&gt;adbmouse&lt;BR /&gt;admmidi0&lt;BR /&gt;admmidi1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;an ls -aF:&lt;BR /&gt;ls -aF | more  &lt;BR /&gt;ls: /159: No such file or directory&lt;BR /&gt;|&lt;BR /&gt;./&lt;BR /&gt;../&lt;BR /&gt;/26204|&lt;BR /&gt;/26258|&lt;BR /&gt;adbmouse&lt;BR /&gt;admmidi0&lt;BR /&gt;admmidi1&lt;BR /&gt;admmidi2&lt;BR /&gt;admmidi3&lt;BR /&gt;adsp@&lt;BR /&gt;&lt;BR /&gt;Any other type of ls options pukes on it. I am interested in getting at thise files&lt;BR /&gt;"|", "/26204|", and "/26258|".  Any idea?  Thanks.</description>
      <pubDate>Mon, 26 Jan 2004 11:41:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173931#M9339</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T11:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173932#M9340</link>
      <description>I'm not sure I understood.&lt;BR /&gt;Try ls |grep ...</description>
      <pubDate>Mon, 26 Jan 2004 11:48:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173932#M9340</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2004-01-26T11:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173933#M9341</link>
      <description>ls and grep seems to work: &lt;BR /&gt;ls | grep "/26204"&lt;BR /&gt;/26204&lt;BR /&gt;&lt;BR /&gt;But I want to know if it's a dir or a file, so far I can not cd into it or view with less or more:&lt;BR /&gt; more  "/26204"&lt;BR /&gt;/26204: No such file or directory&lt;BR /&gt;less  "/26204"&lt;BR /&gt;/26204: No such file or directory&lt;BR /&gt; file  "/26204"&lt;BR /&gt;/26204: can't stat `/26204' (No such file or directory).&lt;BR /&gt;Any idea?</description>
      <pubDate>Mon, 26 Jan 2004 11:53:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173933#M9341</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T11:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173934#M9342</link>
      <description>actually you should try less //name of file&lt;BR /&gt;&lt;BR /&gt;i.e. you should have preceding slash before the slash in the name and this how it should work...</description>
      <pubDate>Mon, 26 Jan 2004 11:55:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173934#M9342</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2004-01-26T11:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173935#M9343</link>
      <description>Sorry , it suppose to be a preceding backslash &lt;BR /&gt;touch \\filename &lt;BR /&gt;to create &lt;BR /&gt;\filename</description>
      <pubDate>Mon, 26 Jan 2004 11:59:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173935#M9343</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2004-01-26T11:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173936#M9344</link>
      <description>the backslash escape character is the first I've tried, didn't work; that's why I din't mention it here.</description>
      <pubDate>Mon, 26 Jan 2004 12:06:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173936#M9344</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T12:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173937#M9345</link>
      <description>another thing, the no. of process in proc and ps -ax did not match, it's 88 proceses in proc table and 44 in ps -ax output.</description>
      <pubDate>Mon, 26 Jan 2004 12:09:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173937#M9345</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T12:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173938#M9346</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;do a ls -lb to see any unprintable characters.&lt;BR /&gt;&lt;BR /&gt;Michael&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2004 12:10:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173938#M9346</guid>
      <dc:creator>Michael Schulte zur Sur</dc:creator>
      <dc:date>2004-01-26T12:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173939#M9347</link>
      <description>ls -lQ might help too (quotes the actual name, so you can see e.g. spaces etc.&lt;BR /&gt;&lt;BR /&gt;All the best, Martin&lt;BR /&gt;&lt;BR /&gt;P.S. I suppose you disconnected the system from the network already.</description>
      <pubDate>Mon, 26 Jan 2004 12:35:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173939#M9347</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-01-26T12:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173940#M9348</link>
      <description>Hi again,&lt;BR /&gt;&lt;BR /&gt;another thing, you could try is:&lt;BR /&gt;ls -l | od -x&lt;BR /&gt;gives you a hexdump.&lt;BR /&gt;&lt;BR /&gt;Michael&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2004 12:41:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173940#M9348</guid>
      <dc:creator>Michael Schulte zur Sur</dc:creator>
      <dc:date>2004-01-26T12:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173941#M9349</link>
      <description>Of course you're not using system ls I suppose, but an external, it looks like your command doesn't work properly, as if a rootkit was installed.&lt;BR /&gt;Tried chkrootkit also ?&lt;BR /&gt;&lt;A href="http://www.chkrootkit.org/" target="_blank"&gt;http://www.chkrootkit.org/&lt;/A&gt;&lt;BR /&gt;file /26204 should tell you what kind of stuff it's supposed to be...&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Mon, 26 Jan 2004 12:44:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173941#M9349</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2004-01-26T12:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173942#M9350</link>
      <description>Please let us know what you find.  These days we could all benefit from seeing examples of hacked linux systems--regardless how mundane the exploit.&lt;BR /&gt;&lt;BR /&gt;Bruce</description>
      <pubDate>Mon, 26 Jan 2004 12:46:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173942#M9350</guid>
      <dc:creator>Bruce Copeland</dc:creator>
      <dc:date>2004-01-26T12:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173943#M9351</link>
      <description>Michael,&lt;BR /&gt;ls -lb &amp;gt; /tmp/dev2.txt&lt;BR /&gt;ls: /159: No such file or directory&lt;BR /&gt;ls: : No such file or directory&lt;BR /&gt;ls: /26258: No such file or directory&lt;BR /&gt;ls: /26204: No such file or directory&lt;BR /&gt;&lt;BR /&gt;didn't like it either.</description>
      <pubDate>Mon, 26 Jan 2004 12:56:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173943#M9351</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T12:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173944#M9352</link>
      <description>Michael,&lt;BR /&gt;don't know how the hex dump can help me, but here it is:&lt;BR /&gt;/root/ls /dev | od -x | more&lt;BR /&gt;0000000 2f0a 3531 0a39 322f 3236 3430 2f0a 3632&lt;BR /&gt;0000020 3532 0a38 6461 6d62 756f 6573 610a 6d64&lt;BR /&gt;0000040 696d 6964 0a30 6461 6d6d 6469 3169 610a&lt;BR /&gt;0000060 6d64 696d 6964 0a32 6461 6d6d 6469 3369&lt;BR /&gt;0000100 610a 7364 0a70 6461 7073 0a30 6461 7073&lt;BR /&gt;0000120 0a31 6461 7073 0a32 6461 7073 0a33 6761&lt;BR /&gt;0000140 6770 7261 0a74 6c61 616f 4364 0a30 6c61&lt;BR /&gt;0000160 616f 4364 0a31 6c61 616f 4364 0a32 6c61&lt;BR /&gt;0000200 616f 4364 0a33 6c61 616f 5364 5145 610a&lt;BR /&gt;0000220 696d 6964 610a 696d 6964 0a30 6d61 6469&lt;BR /&gt;0000240 3169 610a 696d 6964 0a32 6d61 6469 3369&lt;BR /&gt;0000260 610a 696d 6167 6f6d 7375 0a65 6d61 6769&lt;BR /&gt;0000300 6d61 756f 6573 0a31 6d61 7869 7265 0a30&lt;BR /&gt;0000320 6d61 7869 7265 0a31 6d61 7869 7265 0a32&lt;BR /&gt;0000340 6d61 7869 7265 0a33 7061 5f6d 6962 736f&lt;BR /&gt;0000360 610a 6174 6172 6469 610a 6174 6972 6f6d&lt;BR /&gt;0000400 7375 0a65 7461 6269 0a6d 7461 6d69 756f&lt;BR /&gt;0000420 6573 610a 6475 6f69 610a 6475 6f69 0a30&lt;BR /&gt;0000440 7561 6964 316f 610a 6475 6f69 0a32 7561&lt;BR /&gt;0000460 6964 336f 610a 6475 6f69 7463 0a6c 7a61&lt;BR /&gt;0000500 6374 0a64 6562 7065 620a 6370 0a64 6163&lt;BR /&gt;0000520 6970 3032 630a 7061 3269 2e30 3030 630a&lt;BR /&gt;0000540 7061 3269 2e30 3130 630a 7061 3269 2e30&lt;BR /&gt;0000560 3230 630a 7061 3269 2e30 3330 630a 7061&lt;BR /&gt;0000600 3269 2e30 3430 630a 7061 3269 2e30 3530&lt;BR /&gt;0000620 630a 7061 3269 2e30 3630 630a 7061 3269&lt;BR /&gt;0000640 2e30 3730 630a 7061 3269 2e30 3830 630a&lt;BR /&gt;0000660 7061 3269 2e30 3930 630a 7061 3269 2e30&lt;BR /&gt;0000700 3031 630a 7061 3269 2e30 3131 630a 7061&lt;BR /&gt;0000720 3269 2e30 3231 630a 7061 3269 2e30 3331&lt;BR /&gt;0000740 630a 7061 3269 2e30 3431 630a 7061 3269&lt;BR /&gt;0000760 2e30 3531 630a 7061 3269 2e30 3631 630a&lt;BR /&gt;0001000 7061 3269 2e30 3731 630a 7061 3269 2e30&lt;BR /&gt;0001020 3831 630a 7061 3269 2e30 3931 630a 6963&lt;BR /&gt;0001040 7373 630a 7264 6d6f 630a 7564 3133 0a61&lt;BR /&gt;&lt;BR /&gt;The first 4 line should be the file of interest.</description>
      <pubDate>Mon, 26 Jan 2004 13:15:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173944#M9352</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T13:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173945#M9353</link>
      <description>All,&lt;BR /&gt;I believe the evidence is in the these files/dir in /dev directory. I can't even recreate create such file/dir with "/" as a character.  As you noticed, the only options of ls which could see the file is ls without an options or options which does not require accessing attribute of the files.  I've even tried "ls -lQ /dev/\/159" but it turns out as "ls: "/dev//159": No such file or directory".  I am begining to think, this was created by some other utilities. Any idea?</description>
      <pubDate>Mon, 26 Jan 2004 14:14:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173945#M9353</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T14:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173946#M9354</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;not sure it helps, but maybe file * works? Just letting it figure out the right quoting by itself.&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin</description>
      <pubDate>Mon, 26 Jan 2004 14:41:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173946#M9354</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-01-26T14:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173947#M9355</link>
      <description>you can try to see the hidden char by:&lt;BR /&gt;&lt;BR /&gt;# cd ..&lt;BR /&gt;# ls dev/ [tab] [tab]&lt;BR /&gt; &lt;BR /&gt;bash autocompletion will list the files in /dev, you may be able to see the characters inserted before the "/".</description>
      <pubDate>Mon, 26 Jan 2004 14:42:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173947#M9355</guid>
      <dc:creator>Olivier Drouin</dc:creator>
      <dc:date>2004-01-26T14:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173948#M9356</link>
      <description>What architecture do you use ?&lt;BR /&gt;Assuming you're on an x86, the dump does provide a few things (Michael had a good idea) :&lt;BR /&gt;0x30 comes several times (317), which is the CMOS reg that hold the low byte of the mem count, this is wether a subfunction or an interrupt call.&lt;BR /&gt;0x33 comes 181 times, usually designing or getting mouse move (0x33 is mouse interrupt), so for some others 0x36 ioctl, 0x31 geteuid, 0x20 getchar.&lt;BR /&gt;This seems to be a stuff waiting for instruction from sopme media and deduce some read from it.. 've seen this kind of scheme in stuff like adore, but not exactly with the same nomenclature.&lt;BR /&gt;Getting the others would be great (but time consuming !)&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Mon, 26 Jan 2004 14:54:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173948#M9356</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2004-01-26T14:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173949#M9357</link>
      <description>Jerome,&lt;BR /&gt;How did you decode those hex characters? Any pointers on how it was done?&lt;BR /&gt;&lt;BR /&gt;To answ. Your question, it's running redhat 7.2 on an IBM X intellistation.  &lt;BR /&gt;&lt;BR /&gt;According to ls -lF, the file type is of "|" and doing an ls -l on another system with similar category has this perm: "prw-r--r--", which is similar to gpmdata and initctl. I am assuming "p" means pipe? Thanks.</description>
      <pubDate>Mon, 26 Jan 2004 15:08:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173949#M9357</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T15:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: trying to do forensic on a hack server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173950#M9358</link>
      <description>Olivier, here is what I got from your suggestion:&lt;BR /&gt; ls -l /dev/&lt;BR /&gt;Display all 5117 possibilities? (y or n)&lt;BR /&gt;             irlpt3       sdab1        sdca14       sdg5         ttyP13&lt;BR /&gt;159          irlpt4       sdab10       sdca15       sdg6         ttyP14&lt;BR /&gt;26204        irlpt5       sdab11       sdca2        sdg7         ttyP15&lt;BR /&gt;26258        irlpt6       sdab12       sdca3        sdg8         ttyP2&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2004 15:11:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trying-to-do-forensic-on-a-hack-server/m-p/3173950#M9358</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2004-01-26T15:11:42Z</dc:date>
    </item>
  </channel>
</rss>

