免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2261 | 回复: 4
打印 上一主题 下一主题

求助,怎么样清除suckit后门程序? [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2005-12-28 20:37 |只看该作者 |倒序浏览
公司linux as3 web服务器突然出现流量增大,有过多连接,异常进程现象。使用chkrootkit检查发现中了suckit后门。按照网上的办法:
for i in `seq 1 33000`; do test -f $i/cmdline && (cat $i/cmdline; echo "--$i"); done

在/proc察看如下:

init [3]--1
--2
--3
--4
--5
--6
--7
--8
--9
--10
--11
--17
--18
--19
--20
--73
--201
--202
--203
--204
--205
--206
--207
syslogd-m0--468
klogd-x--472
portmap--481
rpc.statd--500
/usr/sbin/sshd--523
rpc.rquotad--540
--544
--545
--546
--547
--548
--549
--550
--551
--552
--553
rpc.mountd--559
crond--568
/usr/local/bin/rsync--daemon--589
/sbin/mingettytty1--621
/sbin/mingettytty2--623
/sbin/mingettytty3--624
/sbin/mingettytty4--625
/sbin/mingettytty5--626
/sbin/mingettytty6--627
/usr/apache/bin/httpd--9681
/usr/apache/bin/httpd--19268
/usr/apache/bin/httpd--19269
/usr/apache/bin/httpd--19270
/usr/apache/bin/httpd--19271
/usr/apache/bin/httpd--19272
/usr/apache/bin/httpd--19273
/usr/apache/bin/httpd--19274
/usr/apache/bin/httpd--19275
/usr/apache/bin/httpd--19276
/usr/apache/bin/httpd--19277
/usr/apache/bin/httpd--19278
/usr/apache/bin/httpd--19279
/usr/apache/bin/httpd--19280
/usr/apache/bin/httpd--19281
/usr/apache/bin/httpd--19282
/usr/apache/bin/httpd--19283
/usr/apache/bin/httpd--19284
/usr/apache/bin/httpd--19285
/usr/apache/bin/httpd--19286
/usr/apache/bin/httpd--19287
/usr/apache/bin/httpd--19288
/usr/apache/bin/httpd--19289
/usr/apache/bin/httpd--19290
/usr/apache/bin/httpd--19291
/usr/apache/bin/httpd--19292
/usr/apache/bin/httpd--19293
/usr/apache/bin/httpd--19294
/usr/apache/bin/httpd--19295
/usr/apache/bin/httpd--19296
/usr/apache/bin/httpd--19297
/usr/apache/bin/httpd--19298
/usr/apache/bin/httpd--19299
/usr/apache/bin/httpd--19300
/usr/apache/bin/httpd--19301
/usr/apache/bin/httpd--19302
/usr/apache/bin/httpd--19303
/usr/apache/bin/httpd--19304
/usr/apache/bin/httpd--19305
/usr/apache/bin/httpd--19306
/usr/apache/bin/httpd--19307
/usr/apache/bin/httpd--19308
/usr/apache/bin/httpd--19309
/usr/apache/bin/httpd--19310
/usr/apache/bin/httpd--19311
/usr/apache/bin/httpd--19312
/usr/apache/bin/httpd--19313
/usr/apache/bin/httpd--19314
/usr/apache/bin/httpd--19315
/usr/apache/bin/httpd--19316
/usr/apache/bin/httpd--19317
/usr/apache/bin/httpd--19318
/usr/apache/bin/httpd--19319
/usr/apache/bin/httpd--19320
/usr/apache/bin/httpd--19321
/usr/apache/bin/httpd--19324
/usr/apache/bin/httpd--19325
/usr/apache/bin/httpd--19326
/usr/apache/bin/httpd--19327
/usr/apache/bin/httpd--19328
/usr/apache/bin/httpd--19329
/usr/apache/bin/httpd--19330
/usr/apache/bin/httpd--19331
/usr/apache/bin/httpd--19332
/usr/apache/bin/httpd--19333
/usr/apache/bin/httpd--19334
/usr/apache/bin/httpd--19335
/usr/apache/bin/httpd--19336
/usr/apache/bin/httpd--19337
/usr/apache/bin/httpd--19338
/usr/apache/bin/httpd--19339
/usr/apache/bin/httpd--19340
/usr/apache/bin/httpd--19341
/usr/apache/bin/httpd--19342
/usr/apache/bin/httpd--19343
/usr/apache/bin/httpd--19344
/usr/apache/bin/httpd--19345
/usr/apache/bin/httpd--19346
/usr/apache/bin/httpd--19347
/usr/apache/bin/httpd--19348
/usr/apache/bin/httpd--19349
/usr/apache/bin/httpd--19350
/usr/apache/bin/httpd--19351
/usr/apache/bin/httpd--19354
/usr/apache/bin/httpd--19355
/usr/apache/bin/httpd--19356
/usr/apache/bin/httpd--19357
/usr/apache/bin/httpd--19358
/usr/apache/bin/httpd--19359
/usr/apache/bin/httpd--19360
/usr/apache/bin/httpd--19361
/usr/apache/bin/httpd--19362
/usr/apache/bin/httpd--19363
/usr/apache/bin/httpd--19364
/usr/apache/bin/httpd--19365
/usr/apache/bin/httpd--19366
/usr/apache/bin/httpd--19367
/usr/apache/bin/httpd--19368
/usr/apache/bin/httpd--19369
/usr/apache/bin/httpd--19370
/usr/apache/bin/httpd--19371
/usr/apache/bin/httpd--19372
/usr/apache/bin/httpd--19373
/usr/apache/bin/httpd--19374
/usr/apache/bin/httpd--19376
/usr/apache/bin/httpd--19378
/usr/apache/bin/httpd--19383
/usr/apache/bin/httpd--19384
/usr/apache/bin/httpd--19385
/usr/apache/bin/httpd--19386
/usr/apache/bin/httpd--19387
/usr/apache/bin/httpd--19388
/usr/apache/bin/httpd--19389
/usr/apache/bin/httpd--19390
/usr/apache/bin/httpd--19391
/usr/apache/bin/httpd--19392
/usr/apache/bin/httpd--19393
/usr/apache/bin/httpd--19394
/usr/apache/bin/httpd--19428
/usr/apache/bin/httpd--19429
/usr/apache/bin/httpd--19430
/usr/apache/bin/httpd--19566
/usr/apache/bin/httpd--19567
/usr/apache/bin/httpd--19568
/usr/apache/bin/httpd--19569
/usr/apache/bin/httpd--19571
/usr/apache/bin/httpd--19573
/usr/apache/bin/httpd--19574
/usr/apache/bin/httpd--19575
/usr/apache/bin/httpd--19578
/usr/apache/bin/httpd--19579
/usr/apache/bin/httpd--19580
/usr/apache/bin/httpd--19581
/usr/apache/bin/httpd--19582
/usr/apache/bin/httpd--19583
/usr/apache/bin/httpd--19586
/usr/apache/bin/httpd--19587
/usr/apache/bin/httpd--19588
/usr/apache/bin/httpd--19589
/usr/apache/bin/httpd--19595
/usr/apache/bin/httpd--21013
/usr/apache/bin/httpd--21165
/usr/apache/bin/httpd--21171
/usr/apache/bin/httpd--21174
/usr/apache/bin/httpd--21175
/usr/apache/bin/httpd--21176
/usr/apache/bin/httpd--21177
/usr/apache/bin/httpd--21182
/usr/apache/bin/httpd--21183
/usr/apache/bin/httpd--21184
/usr/apache/bin/httpd--21185
/usr/apache/bin/httpd--21191
/usr/apache/bin/httpd--21195
/usr/apache/bin/httpd--21200
/usr/apache/bin/httpd--21240
/usr/apache/bin/httpd--21249
/usr/apache/bin/httpd--21265
/usr/apache/bin/httpd--21275
/usr/apache/bin/httpd--21276
/usr/apache/bin/httpd--21277
/usr/apache/bin/httpd--21278
/usr/apache/bin/httpd--21279
/usr/apache/bin/httpd--21280
/usr/apache/bin/httpd--21281
/usr/apache/bin/httpd--21286
/usr/apache/bin/httpd--21287
/usr/apache/bin/httpd--21288
/usr/apache/bin/httpd--21289
/usr/apache/bin/httpd--21290
/usr/apache/bin/httpd--21291
/usr/apache/bin/httpd--21292
/usr/apache/bin/httpd--21293
/usr/apache/bin/httpd--21294
/usr/apache/bin/httpd--21295
/usr/apache/bin/httpd--21296
/usr/apache/bin/httpd--21297
/usr/apache/bin/httpd--21298
/usr/apache/bin/httpd--21299
/usr/apache/bin/httpd--21300
/usr/apache/bin/httpd--21301
/usr/apache/bin/httpd--21302
/usr/apache/bin/httpd--21344
/usr/apache/bin/httpd--21345
/usr/apache/bin/httpd--21347
/usr/apache/bin/httpd--21348
/usr/apache/bin/httpd--21363
/usr/apache/bin/httpd--21369
/usr/apache/bin/httpd--21373
/usr/apache/bin/httpd--21377
/usr/apache/bin/httpd--21831
/usr/apache/bin/httpd--21844
/usr/apache/bin/httpd--21847
/usr/apache/bin/httpd--21848
/usr/apache/bin/httpd--21850
/usr/apache/bin/httpd--21851
/usr/apache/bin/httpd--21852
/usr/apache/bin/httpd--21853
/usr/apache/bin/httpd--21854
/usr/apache/bin/httpd--21857
/usr/apache/bin/httpd--21859
/usr/apache/bin/httpd--21860
/usr/apache/bin/httpd--21861
/usr/apache/bin/httpd--21862
/usr/apache/bin/httpd--21863
/usr/apache/bin/httpd--21864
/usr/apache/bin/httpd--21865
/usr/apache/bin/httpd--21866
/usr/apache/bin/httpd--21867
/usr/apache/bin/httpd--21868
/usr/apache/bin/httpd--21869
/usr/apache/bin/httpd--21870
/usr/apache/bin/httpd--21871
/usr/apache/bin/httpd--21872
/usr/apache/bin/httpd--21873
/usr/apache/bin/httpd--21874
/usr/apache/bin/httpd--21875
/usr/apache/bin/httpd--21876
/usr/apache/bin/httpd--21877
/usr/apache/bin/httpd--21878
/usr/apache/bin/httpd--21879
/usr/apache/bin/httpd--21880
/usr/apache/bin/httpd--21881
/usr/apache/bin/httpd--21882
/usr/apache/bin/httpd--21883
/usr/apache/bin/httpd--21887
/usr/apache/bin/httpd--21888
/usr/apache/bin/httpd--21901
sshd: root@pts/0--21969
-bash--21972
/usr/apache/bin/httpd--22057
/usr/apache/bin/httpd--22058
/usr/apache/bin/httpd--22059
/usr/apache/bin/httpd--22060
/usr/apache/bin/httpd--22061
/usr/apache/bin/httpd--22062
/usr/apache/bin/httpd--22063
/usr/apache/bin/httpd--22064


没有看见suckit进程。
请问大家有没有其他方法清除?
谢谢!

论坛徽章:
0
2 [报告]
发表于 2005-12-29 09:30 |只看该作者
SucKIT v1.3b, (c) 2002 by sd <sd@cdi.cz> & devik <devik@cdi.cz>
  +-------------------------------------------------------------+

  Code:                by sd, with a lot of help from devik <devik@cdi.cz>
  Concepts:        by Silvio Cesare - /dev/kmem, devik - kmalloc & IDT
                  http://phrack.org/p58/phrack-09
  Tested:        by hundreds of script kiddos around the globe
  Targets:        i386-Linux boxen, kernels 2.2.x, 2.4.x without
                security patches/modules.
  Downloads:        http://sd.g-art.nl/sk

    The SucKIT is easy-to-use, Linux-i386 kernel-based rootkit. The code
  stays in memory through /dev/kmem trick, without help of LKM support
  nor System.map or such things. Everything is done on the fly. It can
  hide PIDs, files, tcp/udp/raw sockets, sniff TTYs. Next, it have
  integrated TTY shell access (xor+sha1) which can be invoked through
  any running service on a server. No compiling on target box needed,
  one binary can work on any of 2.2.x & 2.4.x kernels precompiled (libc-free)

  You could find details about technical background in 'src' directory.

  Compiling
  +-------+

    To configure parameters (where is your home, which suffix will hide
  files, and of course, access password) must be given before compiling
  by:
  
  $ make skconfig
  
    Then you could compile the all of stuff by:
  
  $ make
  
  You will get a file, probably called 'inst' in current directory.
  It's a script you upload to target box, exec it and then try to remotely
  login to that host using './login' and password you supplied in skconfig.


  FAQ
  +-+

  Q: When I try to load suckit, it will segfault with kernel oops, wtf ?
  A: Fire up gdb and send me a bug report where is problem

  Q: How I can login to machine running suckit from my Win95 ?
  A: Dunno, btw, I'm interested in how many people ported
     suckit to cygwin

  Q: How I can make suckit to run automatically each reboot of machine ?
  A: The generic way (as the install script does) is to
     rename /sbin/init to /sbin/init<hidesuffix>, and place sk binary
     instead of /sbin/init, so suckit will get resident imediatelly
     after boot. However, when it will get resident, all of such changes
     will be stealthed If you can't fiddle with /sbin/init, you
     still can place binary to somewhere into /etc/rc.d/rc3.d/S##<hidesuffix>
     or such.

  Q: When I make some pid invisible, it still appears in `ps` and `top`
     listing, what's wrong ?
  A: Filtering out /proc records is only for non-suckit, regular, users.
     That means, it doesn't affect you when your shell is invisible.
     *KEEP IN THE MIND* that suckit doesn't twist informations
     in system for you, it does only for rest of the world

  Q: How I can beat rootkits of such kind ?
  A: There is many ways today. You should remove writing ability from
     /dev/kmem (which will might make some lowlevel software angry, Xfree,
     for example) in conjuction with disabling LKM support. Or load some
     anti-lkm LKM (that doesn't work when sk alread installed),
     such as StMichael (yes, this module can beat us
     Also note that best thing to do is simple; don't allow kids
     to enter your servers ;p

  Q: I recompiled sk and it loses contact with kernel instance
     running somewhere, what I could do ?
  A: Please! Use ONE binary at the time! Each iteration of skconfig
     will generate unique version which can not be used with any
     later nor further iterations![btw, that will crash at the time anyway]

  Q: Loggin' to machine takes a lot of time, how to speed up this process ?
  A: Ports on given box were filtered, and client is waiting for TCP
     handshake, so you have to specify explicitly destination port, f.e.
     ./login -h your.loved.box.cz -d 80
     dns (53), www(80) ssh(22) is the probably most good choices.

  Q: I want to execute some init script each boot of a box, what I should do ?
  A: Create shell script called '.rc' in your sk home directory. Take into
     account that it will get executed imediately with sk (=init), so
     putting sleep 300 there would be good idea before doing something.

  Q: Where sniffer puts it's logs ?
  A: ~/.sniffer, note that this file *must* be at least 222, coz sniffed
     pids writes to this file with their [e]uid.


  Distribution, future versions and such bullshit
  +---------------------------------------------+

    As SucKIT took a good success in script-kiddo community,
  I decided to continue in this project. All suckit versions, from
  the oldest to the current one you could find at:

  http://sd.g-art.nl/sk

  Of course, any code, flames, ideas, patches, "bug-reports", loveletters,
  pr0n, passwordz and other feedback will be appreciated at sd@cdi.cz


  Thanks
  +----+

  I would like thank to:

  - alin@mido.ro, lstat() bugfix, interesting discussions on new
    features

  - devik <devik@cdi.cz>
    For the most important contributions to this code,
    moral, mental, material support
  
  - mqe <mqe@bboy.com>
    For catching the bugs, ideas about encryption,
    and other feedback.

  - coolvibe <coolvibe@hackerheaven.org> and rest of the g-art.nl guys
    Shell account, hosting the site ...
  
  - thement, fis, destruct_ ...
    For betatesting all of my rootkit creations

    and to a lot of other IRC people who given
    valuable comments/ideas in field of this code.
    btw, if you will get lucky, you could, reach me in realtime
    with any feedback on IRCNet unless I am not away.

  Last words
  +--------+

    What to say there ? If you still didn't get what the hell is all
  of this about, you're probably reading bad file, maybe, you
  downloaded bad tar archive. By the way, I got some sort of
  funny "feedback" from "security experts"/admins or such getrewted
  people. They claims, that I or devik are those evil h4x0r3rs
  who compromised theyr machines. NO! We're coders and we'll
  take NO RESPONSABILITY what someone else did with our code.

  As always, Have fun!
          -sd

论坛徽章:
0
3 [报告]
发表于 2005-12-29 09:32 |只看该作者
Q: How I can make suckit to run automatically each reboot of machine ?
  A: The generic way (as the install script does) is to
     rename /sbin/init to /sbin/init<hidesuffix>, and place sk binary
     instead of /sbin/init, so suckit will get resident imediatelly
     after boot. However, when it will get resident, all of such changes
     will be stealthed  If you can't fiddle with /sbin/init, you
     still can place binary to somewhere into /etc/rc.d/rc3.d/S##<hidesuffix>
     or such.


suckit 是ring3下通过读写/dev/kmem在ring0做hook的后门

论坛徽章:
0
4 [报告]
发表于 2005-12-29 09:33 |只看该作者
suckit2我这里没有源码,所以不太清楚,不过应该不难找

论坛徽章:
0
5 [报告]
发表于 2005-12-29 10:34 |只看该作者
谢谢老大,我先试试啦!

[ 本帖最后由 zwexin 于 2005-12-29 10:50 编辑 ]
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP