Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 13 Jun 2004 01:54:08 +0200
From:      Remko Lodder <remko@elvandar.org>
To:        Peter Jeremy <PeterJeremy@optushome.com.au>
Cc:        Thordur Ivar <thib@mi.is>
Subject:   Re: [Freebsd-security] Re: Hacked or not appendice
Message-ID:  <40CB97A0.3040407@elvandar.org>
In-Reply-To: <20040612212926.GL1596@cirb503493.alcatel.com.au>
References:  <019101c45072$a8b9cfe0$3501a8c0@pro.sk> <20040612130307.2c4483cb.thib@mi.is> <20040612212926.GL1596@cirb503493.alcatel.com.au>

next in thread | previous in thread | raw e-mail | index | archive | help
Hey

Peter Jeremy wrote:

> 
> [Please wrap your mail before 80 characters]
> 
> Why would you trust the toolchain on a potentially hacked machine?
> There's an old paper by Ken Thompson that dicusses patching the C
> compiler to recognize the login sources and re-introduce a backdoor -
> even it was removed from the login sources.
> 
> You would be much better off booting a fixit CD-ROM and using that
> rather than trusting anything on the potentially hacked system.

Indeed, one should make a backup copy (if possible) of the potentially 
hacked computer (Drive) and take the machine offline.

Then insert the backupdisk in a other pc, (or the same, with the 
original hd stored safely)  and startup your Live-cd kit (which can be a 
freebsd version from cd, or linux). Make sure that the tools necessary 
are on the live cd;-) and to forensics (tct might help (The Coroners 
Toolkit)..


After finding out what happened, format the disk, and reinstall from 
scratch, be hostile to every config file and stuff you backupped, 
because you might not be able to tell when the potential hack took 
place.....


Cheers :-)

> 

-- 
Kind regards,

Remko Lodder                   |remko@elvandar.org
Reporter DSINet                |remko@dsinet.org
Projectleader Mostly-Harmless  |remko@mostly-harmless.nl


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?40CB97A0.3040407>