Date: Thu, 23 Jul 1998 23:19:05 -0500 (CDT) From: "Lee Crites (ASC)" <leec@adam.adonai.net> To: Garance A Drosihn <drosih@rpi.edu> Cc: Drew Derbyshire <ahd@kew.com>, security@FreeBSD.ORG Subject: Re: hacked and don't know why Message-ID: <Pine.BSF.3.96.980723231641.9874A-100000@adam.adonai.net> In-Reply-To: <v04011703b1dc263644f1@[128.113.24.47]>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 22 Jul 1998, Garance A Drosihn wrote: =>That executable would see a few things about what privileges it =>was running with before trying to do nasty things. No matter =>what, it would then run the *real* program, so the user always =>got the results that they were expecting to see. All the =>*real* programs were buried in a non-obvious directory. So, =>the nasty program would find out what path it was started up =>as, and then just add /var/.hidden/non-obviousplace on to the =>front of that pathname. So, the exact same executable could be =>used to replace all executables in a given directory. This sounds exactly like what I was seeing. After I regained some presense of mind I thought it would have been nice if I could have checked for something like that. In fact, for all I know, the "executable" I was looking at might have just been a script. Okay, okay, a 180-something-k script might be a little excessive, but the point is I have no idea what was there. I did notice, though, that each command appeared to work properly even though the command itself was exactly the same as all of the other ones. Lee =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Lee Crites Adonai Services Company, Round Rock, Texas leec@adonai.net http://www.adonai.net/~leec =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980723231641.9874A-100000>