Date: Sun, 13 Jun 2004 01:54:08 +0200 From: Remko Lodder <remko@elvandar.org> To: Peter Jeremy <PeterJeremy@optushome.com.au> Cc: Thordur Ivar <thib@mi.is> Subject: Re: [Freebsd-security] Re: Hacked or not appendice Message-ID: <40CB97A0.3040407@elvandar.org> In-Reply-To: <20040612212926.GL1596@cirb503493.alcatel.com.au> References: <019101c45072$a8b9cfe0$3501a8c0@pro.sk> <20040612130307.2c4483cb.thib@mi.is> <20040612212926.GL1596@cirb503493.alcatel.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
Hey Peter Jeremy wrote: > > [Please wrap your mail before 80 characters] > > Why would you trust the toolchain on a potentially hacked machine? > There's an old paper by Ken Thompson that dicusses patching the C > compiler to recognize the login sources and re-introduce a backdoor - > even it was removed from the login sources. > > You would be much better off booting a fixit CD-ROM and using that > rather than trusting anything on the potentially hacked system. Indeed, one should make a backup copy (if possible) of the potentially hacked computer (Drive) and take the machine offline. Then insert the backupdisk in a other pc, (or the same, with the original hd stored safely) and startup your Live-cd kit (which can be a freebsd version from cd, or linux). Make sure that the tools necessary are on the live cd;-) and to forensics (tct might help (The Coroners Toolkit).. After finding out what happened, format the disk, and reinstall from scratch, be hostile to every config file and stuff you backupped, because you might not be able to tell when the potential hack took place..... Cheers :-) > -- Kind regards, Remko Lodder |remko@elvandar.org Reporter DSINet |remko@dsinet.org Projectleader Mostly-Harmless |remko@mostly-harmless.nl
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?40CB97A0.3040407>