Hiding from netstat
The netstat
tool
lists currently running network services on
a host:
[notroot]$ netstat -na
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
udp 0 0 0.0.0.0:68 0.0.0.0:*
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ACC ] STREAM LISTENING 2085 /dev/gpmctl
unix 6 [ ] DGRAM 1886 /dev/log
unix 2 [ ] DGRAM 2153
unix 2 [ ] DGRAM 2088
unix 2 [ ] DGRAM 2046
unix 2 [ ] DGRAM 1894
The Adore rootkit allows you to hide a given
set of listening services from a netstat
query. It
does this by using the exported proc_net
structure
to change the tcp4_seq_show( )
handler, which is
invoked by the kernel when netstat
queries for
listening connections. Within the hacked_tcp4_seq_show()
function in
hide_sshd.c, strnstr( )
is
used to look in seq->buf
for a substring that
contains the hex representation of the port it is trying to hide, and
if this is found, the string is deleted.
Get Network Security Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.