[815] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Signs of an Intruder

daemon@ATHENA.MIT.EDU (Diane Davidowicz)
Tue Dec 17 05:31:08 1996

Date: Wed, 11 Dec 96 11:10:33 EST
From: Diane Davidowicz <diane_d@sun1.wwb.noaa.gov>
To: ids@uow.edu.au
Reply-To: ids@uow.edu.au

> 
> > Wrong. The intruders with a clue know what to look for and remove themselves
> > promptly. Nothing is sacred on a system once it has intruders. 
> 
> While the intruder may not know it, the attack kit and the root kit he/she
> uses usually will know where to look and what to doctor. Unfortunately, this
> allows a lot of people who otherwise would not have had the technical skill
> to breakin to do just that. Fortunately, like in any eco-system this create
> a lot of low-skilled attackers that are easy to track.
> 


There are a lot more tools available than just what the rootkit has to offer
and they have been around a lot longer. Although I admit to seeing more use 
of the rootkit tools than any other, there are still others that are floating
around and are in use.

Whether the intruder knows what exactly a tool modifies or not is a mute 
point. The technology to change these files has always been there for the 
taking. And all the intruders love to trade their warez, so its just a matter
of time before any such a tool is well distributed.

A good example of this is rootkit. 2 years or so ago it was hard to come by, 
traded only amongst the elite. During the past year, I have lost track of how
many times I have just happened to come across it on anonymous ftp servers.

Diane

home help back first fref pref prev next nref lref last post