Difference between revisions of "Chkrootkit"

From OnnoWiki
Jump to navigation Jump to search
Line 33: Line 33:
 
  # ./chkrootkit
 
  # ./chkrootkit
  
  Usage: ./chkrootkit [options] [testname ...]
+
  Usage: ./chkrootkit [options] [test ...]
 
  Options:
 
  Options:
 
         -h                show this help and exit
 
         -h                show this help and exit
 
         -V                show version information and exit
 
         -V                show version information and exit
         -l                show available tests
+
         -l                show available tests and exit
 
         -d                debug
 
         -d                debug
 
         -q                quiet mode
 
         -q                quiet mode
Line 57: Line 57:
 
Contoh
 
Contoh
  
  # ./chkrootkit ps ls sniffer
+
  ./chkrootkit ps ls sniffer
  
The `-q' option can be used to put chkrootkit in quiet mode -- in
+
untuk melihat data lebih banyak
this mode only output messages with `infected' status are shown.
 
  
  With the `-x' option the user can examine suspicious strings in the
+
  ./chkrootkit -x | more
binary programs that may indicate a trojan -- all the analysis is
 
left to the user.
 
  
Lots of data can be seen with:
+
Melihat pathname dalam sistem command
  
  # ./chkrootkit -x | more
+
./chkrootkit -x | egrep '^/'
  
  Pathnames inside system commands:
+
chkrootkit menggunakan command berikut untukl melakukan test: awk, cut, egrep, find, head, id, ls, netstat, ps, strings, sed, uname. Pakai option -p untuk memberikan alternate path untuk chkrootkit agar tidak menggunakan system command yang mungkin sudah terinfeksi. Contoh,
  
  # ./chkrootkit -x | egrep '^/'
+
./chkrootkit -p /cdrom/bin
  
chkrootkit uses the following commands to make its tests: awk, cut,
+
Untuk beberapa path.
egrep, find, head, id, ls, netstat, ps, strings, sed, uname.  It is
 
possible, with the `-p' option, to supply an alternate path to
 
chkrootkit so it won't use the system's (possibly) compromised
 
binaries to make its tests.
 
  
  To use, for example, binaries in /cdrom/bin:
+
  ./chkrootkit -p /cdrom/bin:/floppy/mybin
  
  # ./chkrootkit -p /cdrom/bin
+
Ada baiknya mount disk mesin yang ter-compromise ke mesin yang bisa di percaya, misalnya disk ada di /mnt, gunakan.
 
 
It is possible to add more paths with a `:'
 
 
 
  # ./chkrootkit -p /cdrom/bin:/floppy/mybin
 
 
 
Sometimes is a good idea to mount the disk from a compromised machine
 
on a machine you trust.  Just mount the disk and specify a new
 
rootdir with the `-r' option.
 
 
 
For example, suppose the disk you want to check is mounted under
 
/mnt, then:
 
 
 
  # ./chkrootkit -r /mnt
 
  
 +
./chkrootkit -r /mnt
  
 
==Output Messages==
 
==Output Messages==

Revision as of 08:06, 14 June 2017

What's chkrootkit?

Chkrootkit adalah tool untuk memeriksa tanda-tanda rootkit secara lokal.

Instalasi

Siapkan compiler

sudo su
apt install make gcc

Download source code

cd /usr/local/src
wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
tar zxvf chkrootkit.tar.gz
cd /usr/local/src/chkrootkit-0.52/
make sense

Menjalankan

cd /usr/local/src/chkrootkit-0.52
./chkrootkit

atau

cd /usr/local/src/chkrootkit-0.52
./chkrootkit -q

Penggunaan

# ./chkrootkit
Usage: ./chkrootkit [options] [test ...]
Options:
        -h                show this help and exit
        -V                show version information and exit
        -l                show available tests and exit
        -d                debug
        -q                quiet mode
        -x                expert mode
        -r dir            use dir as the root directory
        -p dir1:dir2:dirN path for the external commands used by chkrootkit
        -n                skip NFS mounted dirs

testname salah satu atau lebih dari daftar berikut,

aliens asp bindshell lkm rexedcs sniffer w55808 wted scalper slapper
z2 chkutmp amd basename biff chfn chsh cron crontab date du dirname
echo egrep env find fingerd gpm grep hdparm su ifconfig inetd
inetdconf identd init killall ldsopreload login ls lsof mail mingetty
netstat named passwd pidof pop2 pop3 ps pstree rpcinfo rlogind rshd
slogin sendmail sshd syslogd tar tcpd tcpdump top telnetd timed
traceroute vdir w write

Contoh

./chkrootkit ps ls sniffer

untuk melihat data lebih banyak

./chkrootkit -x | more

Melihat pathname dalam sistem command

./chkrootkit -x | egrep '^/'

chkrootkit menggunakan command berikut untukl melakukan test: awk, cut, egrep, find, head, id, ls, netstat, ps, strings, sed, uname. Pakai option -p untuk memberikan alternate path untuk chkrootkit agar tidak menggunakan system command yang mungkin sudah terinfeksi. Contoh,

./chkrootkit -p /cdrom/bin

Untuk beberapa path.

./chkrootkit -p /cdrom/bin:/floppy/mybin

Ada baiknya mount disk mesin yang ter-compromise ke mesin yang bisa di percaya, misalnya disk ada di /mnt, gunakan.

./chkrootkit -r /mnt

Output Messages

Keluaran

  • "INFECTED": the test has identified a command probably modified by a known rootkit;
  • "not infected": the test didn't find any known rootkit signature.
  • "not tested": the test was not performed -- this could happen in
  the following situations:
    a) the test is OS specific;
    b) the test depends on an external program that is not available;
    c) some specific command line options are given. (e.g. -r ).
  • not found": the command to be tested is not available;
  • "Vulnerable but disabled": the command is infected but not in use. not running or commented in inetd.conf)


A trojaned command has been found. What should I do now?

Your biggest problem is that your machine has been compromised and this bad guy has root privileges.

Maybe you can solve the problem by just replacing the trojaned command -- the best way is to reinstall the machine from a safe media and to follow your vendor's security recommendations.


Referensi

Pranala Menarik