Book 5: Covering Tracks on Unix and Linux Flashcards
following an inital compromise, attackers will take steps to hide thier presence on systems to avoid detection?
true
What steps will attackers take to avoid detection?
- remove artifacts following an exploit
- changing logs to remove evidence
- creating subtle hiding spaces to keep files as they collect data and pillage
What are the 3 goals of attacker
- compromise the target
- achieve post exploitation goal
- evade detection for as long as possible
What is the easist way to hide files on UNIX
name it “.” or “..”
or “…” or “ “
Easist way to hide a file in UNIX is to name the file with a dot?
yes.
wouldnt be neccessary if attacker had a rootkit or kernal mode rootkit technique/ root access but in this case he does not.
Every directory has at least two other directories
.. refers to the parent directory
. refers to the current directory
what are the 3 popular locations to hide files in UNIX?
/dev
/tmp
/etc
or
/usr/local/man
/usr/src
/dev
directory contains information about devices on the system, such as chunks of your hard drive and references to terminals. A good place to hide files.
/tmp
often contains strangely named files created by various apps to temporarily store data
the /tmp file is emptied on reboot?
true.
files stored in /tmp would need to be restored?
yes, it is a location emptied on reboot
/etc
bad place to hide files. holds machine configuration and is carefully monitored by sys admins.
What are the two increasingly popular locations to store/hide data?
/usr/local/man
and
/usr/src
Main log files can be found by viewing the ___?
/etc/syslog.conf
How can attackers find where logs are located on a UNIX system?
check /etc/syslog.conf by just checking this location or running a script that guessses where the logs are
the __ process stores the logs for the machine?
syslog
the configuration for the system logger is found in the ____ file.
/etc/syslog.conf file
if using a log clearing script to guess the location of the logs it can malfunction due to __
running the script on an improper version of linux. or not stored in their default location
Once find out where the logs are located from checking __ file, you know that they are mainly stored in which directory?
/etc/syslong.conf
/var/log
several flavors of linux store their system logs in the ___ directory
/var/log
web server (http) store their logs wihtin their own directories?
true
almost all logs within /var/log are stored in ASCII?
yes. so they can be edited with vi or nano. an attacker will and can delete these entries
What logs are of particular interest to attacker?
/var/log/secure
/var/log/messages
logs written in /var/log are in ASCII?
yes
What logs of particular service are exploited to gain access?
/var/log/httpd/error.log
/var/log/httpd/access.log
Logs written in /var/log are usually edited by?
hand, because they are ASCII and can be edited via script.
The __ where you type a command has the option of recording each command
shell
by default the __ __ included in linux stores the most recent x commands typed in.
bash shell