473,783 Members | 2,546 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Caution SONY Music CDs have trojan Malware

Whether you are a web surfer or a C++ developer, if you use Windows be
cautioned about SONY music CDs. They contain 'viewer' type software that is
actually a trojan horse for a "rootkit". The licence agreement gives no
indication whatsoever that the 'viewer' software contains the implementation
of a nasty near-impossible to remove rootkit software.

http://www.sysinternals.com/blog/200...al-rights.html

http://www.techdirt.com/articles/200...514209_F.shtml

http://www.theregister.co.uk/2005/11/03/secfocus_drm/

--

Beware SONY Music CDs.
They contain "viewers" that are actually
rootkit viruses that are near impossible to
remove.
http://www.sysinternals.com/blog/200...al-rights.html
http://www.techdirt.com/articles/200...514209_F.shtml
Nov 3 '05
87 5356
Roger Wilco wrote:
"kurt wismer" <ku***@sympatic o.ca> wrote in message
Roger Wilco wrote:
This "rootkit" is a misnomer (should just call it stealthing), but
what
you call a rootkit is no closer to the truth it seems to me. The
rootkit
was a kit you could use once you already had sufficient privileges -
to
replace commonly used utilities and such with versions modified to
help
stealth whatever other activities you had in mind.
i'm familiar with that line of reasoning, however it fails to
convince...

there are those who say rootkits are for maintaining root access,
those
who say rootkits are for gaining root access, and those (like the
anti-spyware coalition) who sit on the fence and say it's either
one...
from a functional definition standpoint, the 'maintain' camp are
lost...

hiding unspecified 'other activities' makes the definition context
sensitive (does it stop being a rootkit if the other activities cannot
possibly be hidden?)...
Nobody to the best of my knowledge has said that a "rootkit" is a
specific program or function. It is a thing without a formal definition.
then you weren't reading what you quoted as i just informed you that the
anti-spyware coalition have a *formal* definition for it... see
http://www.antispywarecoalition.org/...s/glossary.htm
It would indeed be difficult to nail it down if it is, as I say, a
collection of programs to be used by someone with newfound root access
to a UNIX machine. Just as "virus" has become synonymous with "malware"
in popular language, so has "rootkit" become synonymous with
"stealthwar e".


and just as i hand out a swift kick in the ass to people who propagate
the absurdity that virus and malware mean the same thing, i shall hand
out a swift kick in the butt to people who propagate the idea that
rootkit == stealthware....
Getting cpu access
and root privileges is not done with a kit, but with exploit code
aimed
at a vulnerability (*possibly by flawed software) either running
with
privilege or possibly leveraged from the lesser privilege via an
escalation vector (possibly more flawed software) to get root.


and that couldn't possibly be with a 'kit'...


Sure it could, I just don't think the kit we're talking about was for
obtaining root permissions. One could install a rootkit no matter how
the privilege level was attained.


or, one could get root to run/install it for one...

--
"they threw a rope around yer neck to watch you dance the jig of death
then left ya for the starvin' crows, hoverin' like hungry whores
one flew down plucked out yer eye, the other he had in his sights
ya snarled at him, said leave me be - i need the bugger so i can see"
Nov 22 '05 #71

"kurt wismer" <ku***@sympatic o.ca> wrote in message
news:Lz******** ***********@new s20.bellglobal. com...
ugg... i hate catching a cold in the middle of a conversation... sorry
for the delay...
No problem, I'm not online every day anyway. Hope you're feeling better.
Roger Wilco wrote:
"kurt wismer" <ku***@sympatic o.ca> wrote in message
Roger Wilco wrote: [snip]is where "kit" comes in imo.

forgive me, but isn't "root" sort of the more important part of the
compound word in question?
Not really, root could mean root directory as easily as root user. A
rootkit could be as simple as issuing the command cd\ in DOS .It really
is a stealth kit used when one has highest (or high enough) privilege to install modified copies of utility programs.


hmmm... now that so much time has passed and things have had a chance

to settle in, do you see just how far astray you've gone here?
Not really, there are already other ways to describe privilege levels -
the word "root" is not really a good substitute for "most privileged"
since it already refers to many other things that can be viewed as a
"tree".
the 'root' in rootkit isn't necessarily about the root user? that's funny...

I'm just saying that "root" is UNIX slang for the "most privileged"
user - but the word "root" is not suitable comp sci terminology as there
are many other uses.
The quoted material from Kurt's blog defining "rootkit"
seems...well ...wrong - but it wouldn't be the first time that
terminolog y changed through common misuse.

it may seem wrong to you but it makes perfect sense to me...

the functional behaviour of what i call rootkits explicitly involves
root/administrative privileges...


Having them - or getting them?


sophistry... getting them of course - having them is not a function,

it is a property...
Well.. I'll agree to disagree then. To me it is a collection to use once
you have sufficient privilege. The idea is to leverage your newly found
"root" privilege into further compromising the machine or network.
the functional behaviour of what you call rootkits doesn't... their
function is to hide objects/activity...
Not only that - but yes ... it would be a good thing to do.
It requires that the installer program runs with sufficient privilege.
and that is a dependency...
You can't install a rootkit without already obtaining this privilege
level by some means.
as has been the case since time immemorial, the person who uses a

thing and the person who installs that thing need not be the same person...
the malware world is rife with examples of nefarious folk getting
unsuspecting victims to install their malware...
Just "getting root" does not imply a rootkit was
used -
never said it was... what i said was that getting root is what a

rootkit helps you do, not if you got root you necessarily used a rootkit to do it...

Having root allows you to install a rootkit, Getting root is outside the
scope of what a rootkit does in the first instance, although having it
(root, and the rootkit) can lead to additional machines being rooted
(and rootkitted).
maintaining root access is an intent, not a function, and we all knowhow good a definition that involves intent is in the field of computerscience...


The UNIX "rootkit" to me is a collection of aptly named trojans

suitable for swapping out when one has sufficient privilege to do so - and with whatever purpose the attacker has in mind (though usually to preserve the attackers ability to maintain the machines compromised state -
stealth being a part of this).


the earliest use of the term rootkit in google's usenet archive can be
found here http://tinyurl.com/a7x62 - it's from 1994 and in it you

will find the context clearly points to rootkit being of the root gaining
variety
I didn't read it that way at all. He was referring disgustedly to the
"kit' aspect as a ready made decidedly not a "do-it-yourself"
combination of exploiter and rootkit - maybe implying the skill level of
his attacker was well beyond "script kiddie". The fact is that a skilled
cracker can make his own collection, to suit his target, and it is still
a rootkit.

What you describe (as rootkit) is more like what that poster describes
as "exploiter" software - specifically exploiter software that ends up
with your gaining root access.
(stealthing objects "the hard way"? sorry, that interpretation
just doesn't seem to work)... bonus points to anyone who noticed the guy also correctly used the term cracker instead of hacker which most people these days would have used...
:))
this phrack article from 1999 (http://www.phrack.org/phrack/55/P55-05)
clearly lays out the 'backdoor' aspect of rootkits...
[snip - thanks for the links]
another cert document from 1997
(http://www.cert.org/research/JHThesis/Chapter8.html) also makes
reference to the toolkit classification but breaks it into 2, tools
designed to exploit root access
Again, to me "exploit root access" in this context means exploiting
(leveraging) the fact of root access. You can't exploit root access in
the sense that you can exploit vulnerabilities in broken software. You
can exploit the broken software to attain root access - but this is an
exploiter not a rootkit. Here they meant (to me at least) that they are
designed to exploit (make use of) root access, not that they are
exploits (injection vector w/payload) to attain root access.
i think what it comes down to is this: in the olden days network
topology looked a lot different than it does now (or people looked at it a lot differently)... now all most people see when they look at nodes
are end-points, not potential pathways to other nodes... the point of
the rootkit was to gain root; in "rootkit"'s (and possibly many others) case it was to gain root on a system other than the one it was installed on by taking advantage of the fact that users of other systems may also use the compromised system, but in general the means by which that could be accomplished were as numerous as the stars in the sky... most attack techniques evolve stealth tactics to help evade detection and so hold
the window of opportunity open longer and increase the chance of
success... eventually those same stealth tactics became a means by which one could systematically detect the presence of a rootkit... at that
point what it was to be a rootkit became blurred in the eyes of the
masses just as at one point many people wrongly believed that all
viruses had to 'insert' themselves into *.exe or *.com files...
To me, a rootkit could also be installed on a system with no attempts at
further compromise of other systems or machines. To me, it doesn't
matter was programs/functions were chosen for inclusion in the kit.
Obviously one would choose stealth in most cases - but it would not be
limited to, nor required to include, stealthing.
Installing a Windows filter driver to mask return information from
certain calls only resembles a rootkit on this one respect. Why do they need to use a new term for stealth anyway? It reminds me of the "Social Engineering" term being used for what used to be called a confidence
game (congame or just con - as "I conned him out of his hard earned
cash).


if they're going to classify something based purely on the fact that

it uses stealth technology then they need a term for that because stealth
alone has never been considered an attack technique before, it's always been a refinement of other techniques...


True here too - the rootkit is not the attack. The rootkit comes after
the attack has resulted in root access.
Nov 22 '05 #72

"kurt wismer" <ku***@sympatic o.ca> wrote in message
news:FC******** ***********@new s20.bellglobal. com...
Nobody to the best of my knowledge has said that a "rootkit" is a
specific program or function. It is a thing without a formal definition.

then you weren't reading what you quoted as i just informed you that the anti-spyware coalition have a *formal* definition for it... see
http://www.antispywarecoalition.org/...s/glossary.htm


I dislike definitions like that. The "gains or maintains administrator
level access" part makes both of us neither right nor wrong - and opens
the door for any exploit or combination of exploits that achieve root
access to be called rootkits. So now a DoS attack against a process
running with root privilege is a rootkit. Even if it has no staying
power. The injection vectors' "payload" code doesn't even have to
properly execute.

I suppose their definition is good enough for them though...did you read
some of their other definitions?
It would indeed be difficult to nail it down if it is, as I say, a
collection of programs to be used by someone with newfound root access to a UNIX machine. Just as "virus" has become synonymous with "malware" in popular language, so has "rootkit" become synonymous with
"stealthwar e".


and just as i hand out a swift kick in the ass to people who propagate
the absurdity that virus and malware mean the same thing, i shall hand
out a swift kick in the butt to people who propagate the idea that
rootkit == stealthware....


This I agree with - stealthware is only a part of what rootkits can
contain and it is not entirely necessary that they even contain this.
Getting cpu access
and root privileges is not done with a kit, but with exploit code
aimed
at a vulnerability (*possibly by flawed software) either running
with
privilege or possibly leveraged from the lesser privilege via an
escalation vector (possibly more flawed software) to get root.

and that couldn't possibly be with a 'kit'...


Sure it could, I just don't think the kit we're talking about was for obtaining root permissions. One could install a rootkit no matter how the privilege level was attained.


or, one could get root to run/install it for one...


Sure, by attaching an exploiter to the front, Or by having the exploit's
injection vector's payload code obtain and install it from elsewhere.
Nov 22 '05 #73
Roger Wilco wrote:
"kurt wismer" <ku***@sympatic o.ca> wrote in message
Roger Wilco wrote:
"kurt wismer" <ku***@sympatic o.ca> wrote in message
Roger Wilco wrote:[snip]
>is where "kit" comes in imo.

forgive me, but isn't "root" sort of the more important part of the
compound word in question?

Not really, root could mean root directory as easily as root user. A
rootkit could be as simple as issuing the command cd\ in DOS .It
really
is a stealth kit used when one has highest (or high enough)
privilege to
install modified copies of utility programs.


hmmm... now that so much time has passed and things have had a chance
to
settle in, do you see just how far astray you've gone here?


Not really, there are already other ways to describe privilege levels -
the word "root" is not really a good substitute for "most privileged"
since it already refers to many other things that can be viewed as a
"tree".


all words can be ambiguous in one context or another, however in the
context we're talking about root is most certainly not related to trees...

further, the "root" in rootkit never applies to the root directory on a
drive... these are all red-herrings...
the 'root' in rootkit isn't necessarily about the root user? that's
funny...


I'm just saying that "root" is UNIX slang for the "most privileged"
user - but the word "root" is not suitable comp sci terminology as there
are many other uses.


technical jargon != slang...

as for suitability, extra-contextual uses do not affect a term's
suitability for use in computer science... you don't see people
complaining about ambiguity of terms like port or packet or pipe, do you?
>The quoted material from Kurt's blog defining "rootkit"
>seems...we ll...wrong - but it wouldn't be the first time that
>terminolog y changed through common misuse.

it may seem wrong to you but it makes perfect sense to me...

the functional behaviour of what i call rootkits explicitly involves
root/administrative privileges...

Having them - or getting them?


sophistry.. . getting them of course - having them is not a function,
it
is a property...


Well.. I'll agree to disagree then. To me it is a collection to use once
you have sufficient privilege. The idea is to leverage your newly found
"root" privilege into further compromising the machine or network.


and here you've slipped up... if you have root on machine A you cannot
further compromise machine A, therefore you can only further compromise
the network - which you do by compromising other machines on the
network, by gaining root (or privileges that can be escalated to root)
on them...

therefore you're actually agreeing with me...
the functional behaviour of what you call rootkits doesn't... their
function is to hide objects/activity...
Not only that - but yes ... it would be a good thing to do.


you have made it quite clear that you think a rootkit in the unix sense
is a set of replacement binaries designed to hide your presence... if
that is so then the function of a rootkit in your terms is to hide things...

[snip]
Just "getting root" does not imply a rootkit was
used -


never said it was... what i said was that getting root is what a
rootkit
helps you do, not if you got root you necessarily used a rootkit to do
it...


Having root allows you to install a rootkit, Getting root is outside the
scope of what a rootkit does in the first instance, although having it
(root, and the rootkit) can lead to additional machines being rooted
(and rootkitted).


i think you have that backwards... a rootkit is always about getting
root, but the first root you get on a network may not have been through
the use of a rootkit...

[snip]
The UNIX "rootkit" to me is a collection of aptly named trojans
suitable
for swapping out when one has sufficient privilege to do so - and
with
whatever purpose the attacker has in mind (though usually to
preserve
the attackers ability to maintain the machines compromised state -
stealth being a part of this).


the earliest use of the term rootkit in google's usenet archive can be
found here http://tinyurl.com/a7x62 - it's from 1994 and in it you
will
find the context clearly points to rootkit being of the root gaining
variety


I didn't read it that way at all. He was referring disgustedly to the
"kit' aspect as a ready made decidedly not a "do-it-yourself"
combination of exploiter and rootkit - maybe implying the skill level of
his attacker was well beyond "script kiddie". The fact is that a skilled
cracker can make his own collection, to suit his target, and it is still
a rootkit.


i'm sorry but your analysis has missed the mark... the context is
clearly about penetration of the machine, not persistence on the
machine... his use of rootkit in that context implies that rootkits are
generally used in the penetration phase (although not in his specific
case)...
What you describe (as rootkit) is more like what that poster describes
as "exploiter" software - specifically exploiter software that ends up
with your gaining root access.
then i suggest you go back and re-read... those exploiters are what *he*
refers to when he says "steenking rootkit toolbox stuff"...

[snip]
another cert document from 1997
(http://www.cert.org/research/JHThesis/Chapter8.html) also makes
reference to the toolkit classification but breaks it into 2, tools
designed to exploit root access

Again, to me "exploit root access" in this context means exploiting
(leveraging) the fact of root access.


that's all well and nice... but what it means to you is irrelevant as
they specify an example of what they meant and the example was the
toolkit known as "rootkit", whose properties and functions are well
documented...
You can't exploit root access in
the sense that you can exploit vulnerabilities in broken software. You
can exploit the broken software to attain root access - but this is an
exploiter not a rootkit. Here they meant (to me at least) that they are
designed to exploit (make use of) root access, not that they are
exploits (injection vector w/payload) to attain root access.
they meant tools like "rootkit".. . it was designed to sniff passwords so
as to allow you to gain root on machines other than the one it was
installed on...
i think what it comes down to is this: in the olden days network
topology looked a lot different than it does now (or people looked at
it
a lot differently)... now all most people see when they look at nodes
are end-points, not potential pathways to other nodes... the point of
the rootkit was to gain root; in "rootkit"'s (and possibly many
others)
case it was to gain root on a system other than the one it was
installed
on by taking advantage of the fact that users of other systems may
also
use the compromised system, but in general the means by which that
could
be accomplished were as numerous as the stars in the sky... most
attack
techniques evolve stealth tactics to help evade detection and so hold
the window of opportunity open longer and increase the chance of
success... eventually those same stealth tactics became a means by
which
one could systematically detect the presence of a rootkit... at that
point what it was to be a rootkit became blurred in the eyes of the
masses just as at one point many people wrongly believed that all
viruses had to 'insert' themselves into *.exe or *.com files...


To me, a rootkit could also be


can i be blunt (or perhaps just curt)?... don't you think we're past the
point in the discussion where you tell me what you *feel* a rootkit is?
installed on a system with no attempts at
further compromise of other systems or machines.
??? i'm sorry, am i reading this right? people compromise machines in
order to 'hang out' on them? that's pretty much what it amounts to if
you make no attempts to further compromise anything else...
To me, it doesn't
matter was programs/functions were chosen for inclusion in the kit.
Obviously one would choose stealth in most cases - but it would not be
limited to, nor required to include, stealthing.


then there is no reason to call them *root*kits... i'm sorry but where i
come from people (especially people who come up with new classifications
for things) do things for a reason...

[snip]
if they're going to classify something based purely on the fact that
it
uses stealth technology then they need a term for that because stealth
alone has never been considered an attack technique before, it's
always
been a refinement of other techniques...


True here too - the rootkit is not the attack. The rootkit comes after
the attack has resulted in root access.


the rootkit is *part* of the attack... you're hiding your presence on a
system for a *reason*... either what you want is there for the taking
and you take it (in which case hiding your presence isn't necessary,
hiding your point of origin is), or you're waiting for something -
something like oh i don't know maybe passwords to other systems...

--
"it's not the right time to be sober
now the idiots have taken over
spreading like a social cancer,
is there an answer?"
Nov 22 '05 #74
Roger Wilco wrote:
"kurt wismer" <ku***@sympatic o.ca> wrote in message
Nobody to the best of my knowledge has said that a "rootkit" is a
specific program or function. It is a thing without a formal
definition.
then you weren't reading what you quoted as i just informed you that
the
anti-spyware coalition have a *formal* definition for it... see
http://www.antispywarecoalition.org/...s/glossary.htm
I dislike definitions like that.


i dislike fence-sitting as well...
The "gains or maintains administrator
level access" part makes both of us neither right nor wrong - and opens
the door for any exploit or combination of exploits that achieve root
access to be called rootkits. So now a DoS attack against a process
running with root privilege is a rootkit. Even if it has no staying
power. The injection vectors' "payload" code doesn't even have to
properly execute.

I suppose their definition is good enough for them though...did you read
some of their other definitions?


yes... most of the definitions aren't *too* bad, however their main idea
of using spyware as an umbrella term is rather idiotic...

[snip]
>Getting cpu access
>and root privileges is not done with a kit, but with exploit code
>aimed
>at a vulnerability (*possibly by flawed software) either running
>with
>privileg e or possibly leveraged from the lesser privilege via an
>escalati on vector (possibly more flawed software) to get root.

and that couldn't possibly be with a 'kit'...

Sure it could, I just don't think the kit we're talking about was
for
obtaining root permissions. One could install a rootkit no matter
how
the privilege level was attained.


or, one could get root to run/install it for one...


Sure, by attaching an exploiter to the front, Or by having the exploit's
injection vector's payload code obtain and install it from elsewhere.


no, no, i mean the person who has root privileges... root is actually a
principal, a 'user' of the system...

--
"it's not the right time to be sober
now the idiots have taken over
spreading like a social cancer,
is there an answer?"
Nov 22 '05 #75

kurt wismer wrote:
i dislike fence-sitting as well...


Do you hear it? It's the sound of a dead horse. :) This is truely a
lost cause Kurt. It's akin to playing with the trolls. If he feels a
rootkit is something that "hides" itself, leave him be. Ignorance
knows no bounds anyway, you should know this.

Regards,
Dustin Cook
http://bughunter.atspace.org

Nov 23 '05 #76
Dustin Cook wrote:
Ignorance
knows no bounds
Retard,
Dustin Cook


New sig? Very apt for you.
Nov 23 '05 #77
Dustin Cook wrote:
kurt wismer wrote:
i dislike fence-sitting as well...
Do you hear it? It's the sound of a dead horse. :) This is truely a
lost cause Kurt. It's akin to playing with the trolls.


....says the guy who plays with the trolls... my killfile is now several
orders of magnitude larger than it was before thanks to you...
If he feels a
rootkit is something that "hides" itself, leave him be. Ignorance
knows no bounds anyway, you should know this.


even when the principals in a discussion make no headway, the gallery
can still be better off for knowing more than it did before...

--
"it's not the right time to be sober
now the idiots have taken over
spreading like a social cancer,
is there an answer?"
Nov 23 '05 #78

"kurt wismer" <ku***@sympatic o.ca> wrote in message
news:9e******** ***********@new s20.bellglobal. com...
Roger Wilco wrote:
[snipped - getting too long]
Not really, there are already other ways to describe privilege levels -
the word "root" is not really a good substitute for "most privileged" since it already refers to many other things that can be viewed as a
"tree".


all words can be ambiguous in one context or another, however in the
context we're talking about root is most certainly not related to

trees...

If you view privilege levels as one with most privilege and others with
different subsets of permissions (like inheritance in forking child
processes - a family tree) then you can see that we are indeed talking
about "most privileged" being the 'root' of a 'tree' structure. Much the
same as directory structures can be viewed as trees.
further, the "root" in rootkit never applies to the root directory on a drive... these are all red-herrings...
Geesh - it applies to UNIX slang for most privileged user in a multiuser
environment. That doesn't mean it is a computer science-wide term any
more than "folder" from Windows slang becomes the replacement for
"directory" in describing a filesystem.
the 'root' in rootkit isn't necessarily about the root user? that's
funny...


I'm just saying that "root" is UNIX slang for the "most privileged"
user - but the word "root" is not suitable comp sci terminology as there
are many other uses.


technical jargon != slang...


In many cases it should, especially when there is already a technical
term to describe a thing and someone 'invents' a new term to describe
it.
as for suitability, extra-contextual uses do not affect a term's
suitability for use in computer science... you don't see people
complaining about ambiguity of terms like port or packet or pipe, do you?

They're pretty much accepted terms no matter what OS you're talking
about aren't they? You talk about traversing directories even though
Microsoft might like to call it 'browsing folders'. Directory traversal
exploits don't suddenly become folder browsing exploits just because
Microsoft prefers other names for things.

[snip]
Well.. I'll agree to disagree then. To me it is a collection to use once you have sufficient privilege. The idea is to leverage your newly found "root" privilege into further compromising the machine or network.


and here you've slipped up... if you have root on machine A you cannot
further compromise machine A,


Not even by making it available for others to get the same privilege? If
I get physical access to a machine with root user logged on that is a
sort of compromise (security is compromised, but the machine itself is
unchanged). If I want back in, I would have to dress up like a courier
again and hope that the opportunity again presents itself. If while
there I make provisions for re-entry from a remote location the machine
is then compromised (changed).
therefore you can only further compromise
the network - which you do by compromising other machines on the
network, by gaining root (or privileges that can be escalated to root)
on them...
Having me logged on as root user (unauthorized) is a breach of security.
The machine is not compromised in the sense that it is still configured
exactly as it was before I got access. In this case the network is
compromised because physical access resrictions weren't properly
enforced.
therefore you're actually agreeing with me...
I agree to disagree.
>the functional behaviour of what you call rootkits doesn't... their>function is to hide objects/activity...


Not only that - but yes ... it would be a good thing to do.


you have made it quite clear that you think a rootkit in the unix

sense is a set of replacement binaries designed to hide your presence...
No, that is only one intent. It could be a set of programs that cause
information to leak out (or trickle in). Hiding whatever programs and
processes you add to the system is so commonly done that "hiding" has
now become synonymous with "rootkit'.
if that is so then the function of a rootkit in your terms is to hide things...

That is not at all what I am saying. Picture a kiddie with a t-shirt
that saya "Got root?". I'm sure you've seen such shirts. The rootkit's
function is to answer the unasked question "what do I do next".

Yes, the meaning of rootkit has evidently changed now to mean hiding
whatever it is you decided to do next.
Having root allows you to install a rootkit, Getting root is outside the
scope of what a rootkit does in the first instance, although having it (root, and the rootkit) can lead to additional machines being rooted
(and rootkitted).


i think you have that backwards... a rootkit is always about getting
root, but the first root you get on a network may not have been

through the use of a rootkit...
From: http://www.sans.org/y2k/TFN_toolkit.htm

"The Attack

The hackers are using buffer overflow exploits on rpc.ttdbserverd ,
rpc.cmsd, sadmind, rpc.statd to gain root access to a machine. In some
cases, they use a variant of the /tmp/bob attack which is associated
with
the ffcore buffer overflow exploit. In any event, if they are successful
in gaining access, they ftp the toolkit into a directory on the machine
...."

Here you see that they mention the root access happening prior to the
FTPing of the "kit" - and also they mention earlier " I'd classify this
attack as a simple rootkit style attack with a DoS payload." so the
payload here isn't furthur rooting of more machines.

[snip]
found here http://tinyurl.com/a7x62 - it's from 1994 and in it you
will
find the context clearly points to rootkit being of the root gaining
variety


I didn't read it that way at all. He was referring disgustedly to the
"kit' aspect as a ready made decidedly not a "do-it-yourself"
combination of exploiter and rootkit - maybe implying the skill level of his attacker was well beyond "script kiddie". The fact is that a skilled cracker can make his own collection, to suit his target, and it is still a rootkit.


i'm sorry but your analysis has missed the mark... the context is
clearly about penetration of the machine, not persistence on the
machine... his use of rootkit in that context implies that rootkits

are generally used in the penetration phase (although not in his specific
case)...
Not really, the context (concerning his use of the word) is a
disparaging remark - putting down users of kits of any kind because they
often are using the kit without nearly the skill level of one who writes
kits. His point is that his attacker is no script kiddy toolkit user but
instead is a skilled intruder. He "did it the hard way" refers to his
beleif that the intruder wrote his own exploits rather than using
available kits written by others.
What you describe (as rootkit) is more like what that poster describes as "exploiter" software - specifically exploiter software that ends up with your gaining root access.


then i suggest you go back and re-read... those exploiters are what

*he* refers to when he says "steenking rootkit toolbox stuff"...
Yes, but again his intention seems to be to belittle the kiddies who use
kits written by others, not to use the term in its most correct form.
[snip]another cert document from 1997
(http://www.cert.org/research/JHThesis/Chapter8.html) also makes
reference to the toolkit classification but breaks it into 2, tools
designed to exploit root access

Again, to me "exploit root access" in this context means exploiting
(leveraging) the fact of root access.


that's all well and nice... but what it means to you is irrelevant as
they specify an example of what they meant and the example was the
toolkit known as "rootkit", whose properties and functions are well
documented...


A "rootkit" and a program calling itself "rootkit" are not the same
thing. The program calling itself rootkit does also happen to be one,
but that program and "all" of its functions are not what defines a
rootkit.

Again in this document
https://tms.symantec.com/members/Ana...HV4Rootkit.pdf
the access (via exploit of a vulnerability) come prior to, and apart
from, the installation of the rootkit. The rootkit itself does not
contain the means to obtain root access.
You can't exploit root access in
the sense that you can exploit vulnerabilities in broken software. You
can exploit the broken software to attain root access - but this is an exploiter not a rootkit. Here they meant (to me at least) that they are designed to exploit (make use of) root access, not that they are
exploits (injection vector w/payload) to attain root access.


they meant tools like "rootkit".. . it was designed to sniff passwords

so as to allow you to gain root on machines other than the one it was
installed on...
But that was not the defining feature.
i think what it comes down to is this: in the olden days network
To me, a rootkit could also be


can i be blunt (or perhaps just curt)?... don't you think we're past

the point in the discussion where you tell me what you *feel* a rootkit

is?

Absolutely, since you won't listen. I'll agree to disagree and will not
discuss it further since no-one else in these groups seem interested.
Nov 24 '05 #79

"kurt wismer" <ku***@sympatic o.ca> wrote in message
news:eC******** ***********@new s20.bellglobal. com...
Dustin Cook wrote:
kurt wismer wrote:
i dislike fence-sitting as well...
Do you hear it? It's the sound of a dead horse. :) This is truely a
lost cause Kurt. It's akin to playing with the trolls.


...says the guy who plays with the trolls... my killfile is now

several orders of magnitude larger than it was before thanks to you...
:))
If he feels a
rootkit is something that "hides" itself, leave him be. Ignorance
knows no bounds anyway, you should know this.


Speaking of ignorance... yet you fail to realize that my view isn't at
all what you suggest it is.

Kurt is of the opinion that the word "root" in rootkit is there because
rootkits are designed to "get root" either on the current machine or on
subsequent machines. On the other hand my opinion is that the word is
there because that privilege level is required prior to attempting to
implement installation of the kit.

We both agree (I think) that the current usage (with regard to this
thread) is somewhat inappropriate because "stealthwar e" is only a part
of what a rootkit is. Kurt is a tenacious debater and very difficult to
persuade, and I will not continue to try.
even when the principals in a discussion make no headway, the gallery
can still be better off for knowing more than it did before...


Agreed!

Thanks for the discussion anyway.
Nov 24 '05 #80

This thread has been closed and replies have been disabled. Please start a new discussion.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.