This page tries to merge information from undeleted files and from mactime command output, based on files remaining on filesystems. Files are grouped by time frames, from past to present. Each group finish with an hypothesis on what caused that behaviour.Leyend:
- Marks activity on showed time
- Removed (and recovered) files appear with inode number as name, preceded with filesystem recovered from
- Index of timepoints are available at the bottom
Nov 8 00:08:41 apollo inetd[408]: pid 2077: exit status 1 Nov 8 00:08:41 apollo inetd[408]: pid 2078: exit status 1 Nov 8 00:09:00 apollo rpc.statd[270]: SM_MON request for hostname containing '/ ': ^D÷ÿ¿^D÷ÿ¿^E÷ÿ¿^E÷ÿ¿^F÷ÿ¿^F÷ÿ¿^G÷ÿ¿^G÷ÿ¿08049f10 bffff754 000028f8 4d5f4d53 7 2204e4f 65757165 66207473 6820726f 6e74736f 20656d61 746e6f63 696e6961 2720676e 203a272f 00000000000000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000 000bffff70400000000000000000000000000000000000000000000000bffff7050000bffff70600 00000000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000bffff707~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P ~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~PëK^~Iv¬~Cî ~M^(~CÆ ~I^°~Cî ~M^ .~CÆ ~Cà ~Cë#~I^´1À~Cî ~HF'~HF*~CÆ ~HF«~IF¸°+, ~Ió~MN¬~MV¸Í~@1Û~IØ@Í~@è°ÿÿÿ/bin/ sh -c echo 4545 stream tcp nowait root /bin/sh sh -i >> /etc/inetd.conf;killall -HUP inetd
![]() | Tue Nov 7 11:02:03 2000 | ![]() |
![]() | Hypothesis 1:
Seems to be a temporary file being accessed... Content is something like a list of files?
|
![]() | Tue Nov 7 11:02:06 2000 | ![]() |
![]() | Hypothesis 2:
Three seconds later, the same file is modified (added?).
|
![]() | Wed Nov 8 11:02:00 2000 | ![]() |
![]() | Hypothesis 3:
Automatic action, launched from anacron (see man page) that checks the need for rotation of several log files. Nothing to do with our fellow hacker.
|
![]() | Wed Nov 8 11:02:01 2000 | ![]() |
![]() | Hypothesis 4:
seems to be a man command launched? But nothing is found (no man page retrieved).
|
![]() | Wed Nov 8 11:02:02 2000 | ![]() |
![]() | Hypothesis 5:
man whatis database is being rebuilt (makewhatis), seems that automatically through cron. That access to /home/ftp files, could be an ftp incoming connection? |
![]() | Wed Nov 8 11:02:03 2000 | ![]() |
![]() | Hypothesis 6:
Access to linuxconf and lots of docs files an libraries... What for??? A kind of system administration task? Could be more consecuences from the previous command to rebuild the whole help system. The access to /home/drosen confuses me.
|
![]() | Wed Nov 8 11:02:04 2000 | ![]() |
![]() | Hypothesis 7:
More on that misterious help-building command...
|
![]() | Wed Nov 8 11:02:05 2000 | ![]() |
![]() | Hypothesis 8:
And more, one second later...
|
![]() | Wed Nov 8 11:02:06 2000 | ![]() |
![]() | Hypothesis 9:
And even more, this time a temporary file in /var is deleted (the one with a pseudo list of files).
|
![]() | Wed Nov 8 15:25:53 2000 | ![]() |
![]() | Hypothesis 10:
uptime command is launched. (who?)
|
![]() | Wed Nov 8 15:26:15 2000 | ![]() |
![]() | Hypothesis 11:
/etc/hosts.deny is modified (emptied). Probably someone wants to make sure his IP can access the honeypot...
|
![]() | Wed Nov 8 15:26:51 2000 | ![]() |
![]() | Hypothesis 12:
Listing of /etc/rc.d/init.d directory. What for?
|
![]() | Wed Nov 8 15:29:27 2000 | ![]() |
![]() | Hypothesis 13:
ftp command is started. Connecting to ???... No files seems to be inmediately downloaded. Maybe his connection is slow :-)
|
![]() | Wed Nov 8 15:33:42 2000 | ![]() |
![]() | Hypothesis 14:
Listing of 'at' jobs... ¿some automatic task?
|
![]() | Wed Nov 8 15:45:18 2000 | ![]() |
![]() | Hypothesis 15:
Uh, Oh! Deleted file corresponding to inode 93839 in filesystem USR is the original telnetd binary!! (see strings output, checked comparing the recover file with the default /usr/sbin/in.telnetd). It was accessed at this time and later removed. So current telnetd binary is probably a trojan horse, at least a new one. The access to /etc/hosts* files proves that this is an incoming TELNET connection. |
![]() | Wed Nov 8 15:45:19 2000 | ![]() |
![]() | Hypothesis 16:
This confirms the incoming telnet connection. telnetd shows issue.net file to the user.
|
![]() | Wed Nov 8 15:45:24 2000 | ![]() |
![]() | Hypothesis 17:
5 seconds later, connection checks for current console.perms (who is doing this... telnetd? login? shell?)
|
![]() | Wed Nov 8 15:51:37 2000 | ![]() |
![]() | Hypothesis 18:
A tar package file is created. Probably is the result of the previous ftp command launched at 15:29. More than 22 minutes is a lot of time to get just 2 Mb, but maybe hacker's depot has a slow connection. Resulting speed is 12808 bits per second... maybe a 14.400 modem. Probably rest of downloaded files were removed. Contents of file seems to be eggdrop source code. |
![]() | Wed Nov 8 15:51:53 2000 | ![]() |
![]() | Hypothesis 19:
A script/automatic action has been launched, as lots of files under the "suspicious" directory /usr/man/.Ci are accessed. Inode from USR shows a script to install ssh in the system (real or trojan?). My hypothesis is that a tar file was exploded over /usr/man/.Ci (with files last modification time older than current time). That tar file was also downloaded in the previous ftp command, but now is lost forever (inode being reused). |
![]() | Wed Nov 8 15:51:54 2000 | ![]() |
![]() | Hypothesis 20:
Tar command continues. Just these two files in one second is too few bytes (?)
|
![]() | Wed Nov 8 15:51:55 2000 | ![]() |
![]() | Hypothesis 21:
more files from the tar package...
|
![]() | Wed Nov 8 15:51:56 2000 | ![]() |
![]() | Hypothesis 22:
and more... (just one second intervals).
|
![]() | Wed Nov 8 15:51:56 2000 | ![]() |
![]() | Hypothesis 23:
This is probably the result of a bug in the information gathering script, as this line is already in previous time pack. Will have to check on that... Meanwhile ignore this comment :-)
|
![]() | Wed Nov 8 15:52:09 2000 | ![]() |
![]() | Hypothesis 24:
Hacker links .bash_history to /dev/null. He (or she!) doesn't like to be spied. Not being sure if /.bash_history or /root/.bash_history, he links both.
|
![]() | Wed Nov 8 15:52:10 2000 | ![]() |
![]() | Hypothesis 25:
More .bash_history lost forever... Also, hacker is copying original files (like ifconfig, top, etc...) to his backup directory /usr/man/.Ci/backup. Probably he plans to replace them with trojans. This activity is obviously the results of an automated script, or we are dealing with fastest typist in the world :-) Our guess: a rootkit is being installed. |
![]() | Wed Nov 8 15:52:12 2000 | ![]() |
![]() | Hypothesis 26:
Two seconds later, so this is probably same script. What seems to be rootkit configuration files are created under /usr/man.
|
![]() | Wed Nov 8 15:52:13 2000 | ![]() |
![]() | Hypothesis 27:
Sniffer installed is started. Pid is saved in sniff.pid, results on tcp.log, now empty. Or hacker emptied file later (keeping time info in file) or sniffer failed for some reason and no output was saved. Maybe he was interested just in telnet/login connections and none happened.
|
![]() | Wed Nov 8 15:52:14 2000 | ![]() |
![]() | Hypothesis 28:
Script "clean" is launched. In time, it calls script "snap" to remove certain information from system log files under /var/log and /usr/adm. Our hacker fellow is interested in removing everything related with sshd, log, games, own, owned, Pro, snif, ident, splitrock and echo. Also ip addresses 209.86 and 209.255. Interestingly, he is not very sure about how to use the "snap" script as is throws the information in the standard input and also as parameter. The file deleted under /var is probably one log file now lost forever... |
![]() | Wed Nov 8 15:52:15 2000 | ![]() |
![]() | Hypothesis 29:
THE typical rootkit configuration file /dev/ptyp is created. It contains process names he doesn't want system to show in ps and the like commands.(see file contents) Also shell script a.sh is accessed. launched? Not likely, as removes a lot of files. But maybe those files have been all re-created. Will have to check. |
![]() | Wed Nov 8 15:52:23 2000 | ![]() |
![]() | Hypothesis 30:
A telnet command is launched from the desktop??????
|
![]() | Wed Nov 8 15:52:25 2000 | ![]() |
![]() | Hypothesis 31:
This group and several of the next ones are the result of installing some rpm packages. RPM libraries are accessed (in one of the next groups) and a complete bunch of files is created for each; that should be enough hints. On the other hand, we also know, from a command like rpm --root /honeypot -q -a --queryformat "%{NAME} - %{VERSION}\n" that some rpm packages were installed by the hacker. Here they are: nfs-utils-0.1.9.1-1 Wed 08 Nov 2000 03:53:49 wu-ftpd-2.6.0-14.6x Wed 08 Nov 2000 03:53:41 ypserv-1.3.9-1 Wed 08 Nov 2000 03:52:33 telnet-0.10-29 Wed 08 Nov 2000 03:52:33 screen-3.9.4-3 Wed 08 Nov 2000 03:52:33 make-3.77-6 Wed 08 Nov 2000 03:52:32 lpr-0.48-1 Wed 08 Nov 2000 03:52:32 am-utils-6.0.1s11-1.6.0 Wed 08 Nov 2000 03:52:26 So, hacker (or honeypot administrators, you never know) is basically closing security holes in the system. See: |
![]() | Wed Nov 8 15:52:26 2000 | ![]() |
![]() | Hypothesis 32:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:27 2000 | ![]() |
![]() | Hypothesis 33:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:28 2000 | ![]() |
![]() | Hypothesis 34:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:29 2000 | ![]() |
![]() | Hypothesis 35:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:30 2000 | ![]() |
![]() | Hypothesis 36:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:31 2000 | ![]() |
![]() | Hypothesis 37:
See hypothesis 31
|
![]() | Wed Nov 8 15:52:31 2000 | ![]() |
![]() | Hypothesis 38:
More on that rpm command (See hypothesis 31). But definitively this proves that our info gathering script is broken somewhere... this line should be grouped with the others.
|
![]() | Wed Nov 8 15:52:31 2000 | ![]() |
![]() | Hypothesis 39:
More on the rpm command (See hypothesis 31)
|
![]() | Wed Nov 8 15:52:32 2000 | ![]() |
![]() | Hypothesis 40:
More on the rpm command (See hypothesis 31)
|
![]() | Wed Nov 8 15:52:33 2000 | ![]() |
![]() | Hypothesis 41:
More on the rpm command (See hypothesis 31). But several things to note here: Changed something in the telnetd binary (later removed). The file /bin/bx (what is that file?) is accessed. Seems to be the IRC client BitchX (from the strings command). |
![]() | Wed Nov 8 15:52:34 2000 | ![]() |
![]() | Hypothesis 42:
A second later, the supposed BitchX command has changed somehow... Was it just installed?
|
![]() | Wed Nov 8 15:52:53 2000 | ![]() |