by Chris Sanders

Introduction

It is 4 PM on a Thursday afternoon...do you know what ports you’re communicating on? One of the biggest fears for any systems administrator is that his/her machine has been compromised. When this type of thing happens it will often be the case that something might tip you off to the intruder’s presence. Whether it’s an obscure antivirus alert or a strange firewall notification, it’s a good idea to know what to do in this situation. In this article I will demonstrate a few of the things you can do to find out if someone else is hanging around your system.

Listing Open Connections

One of the simplest and most effective things you can do is to output a list of the open connections to your system. This is made possible via netstat command line tool which is actually available on both Linux and Windows. You can use netstat on Windows to output a list of TCP and UDP ports by typing “netstat –ano” at a command prompt. The output should show you five columns. The first column in the protocol in use (TCP or UDP), after that is the local address and port, the third column is the foreign address and port, the fourth column is the state of the connection, i.e. listening, established, et cetera. The fifth column displays the process ID associated with the displayed connections. An example of this output is shown in Figure 1.

image001comp
Figure 1: Output of the netstat -nao command

When examining netstat output you can be overwhelmed with information easily. That being the case, make sure you have closed any network-centric applications and processes so that your results aren’t clouded with legitimate connections. Once you’ve done that, the first things to look for here are unrecognized foreign addresses, especially in the ESTABLISHED state. Also, be sure to look for any LISTENING connections on your local system on odd ports. When an attacker compromises your system it’s often the case that he will leave a backdoor listening for easier connections back. It helps to know your system very well when examining this output so you have an idea of what connections are normal.

It’s important to keep in mind here that netstat is not infallible. As a matter of fact, a great deal of the kernel-mode rootkits in use by attackers can purposefully modify netstat so that any backdoors they install will be hidden from the output.

Sniffing the Wire

If someone is controlling your system then they have to come through your network card to do it. With that being an absolute and netstat not always being 100% reliable based upon the skill of an attacker and the potential for kernel-mode rootkits, one alternate method is to simply fire up a packet sniffing application. Doing this you can examine the packets going across the wire or air waves.

In order to sniff packets quickly I recommend Wireshark, the world’s most popular packet sniffing application. It’s easy to install, open source (i.e. free), and graphical. If you prefer using the command line then you can use Wireshark’s command-line alternative Tshark, or the ever popular Windump (the Windows version of tcpdump). Windump is also free and works great. Using either of these you can quickly capture packets traversing your network interface and search for any IP addresses that appear foreign to your system.

image002comp
Figure 2: Using Wireshark to Examine Conversations

Once again, when doing this make sure you turn off any services that may be utilizing the network as to not cloud your results. You can quickly view all of the conversations occurring between your system and the outside world by selecting the Statistics option form the main drop-down menu and clicking Conversations. This window allows you to view actively communicating hosts sorted in a variety of ways, as shown in Figure 2.

Siphoning through Log Files

Log files are the bread and butter of any systems administrator, software developer, or intrusion analyst. Of course, the sophisticated attacker is going to make sure he is covering his tracks, but we want to catch the unsophisticated ones as well. The quickest way to access the event viewer on your Windows system is to type eventvwr.msc from the run dialog or command line. From here you will want to examine all of the log files for activity that looks inconsistent with your daily activities. Some events that I look for include:

·         A large number of failed login attempts. This can indicate someone attempting to guess or brute force an account password.

·         The event log service being stopped. It’s common for attackers to shut this service down immediately once a system is compromised in order to cover their tracks.

·         Unusual services starting. Any service that you don’t recognize is worth investigating as it could be malicious.

Using Process Monitor to Examine the Registry and Running Processes

Two of the most important areas to look at when attempting to determine if a system has been compromised are the system registry and the running processes. Any change to a system is reflected in the registry and every task that occurs on a system is done with some kind of process. In the past, examining these things was a bit of a cumbersome and manual process using the Windows built-in registry and process monitoring tools. Luckily for us, Windows Sysinternals provides the Process Monitor tool. Using Process Monitor you can view changes to the registry as they are actively happening and view active processes and detailed information associated with them. You can download Process Monitor from Microsoft.

image003comp
Figure 3: Viewing Processes in Process Monitors Process Tree View

As for the analysis of the registry and running processes, this is another case where you need to have a knowledge baseline in order to be effective. Run process monitor occasionally and get an idea for what processes are normal for your system so that you can quickly pick out anomalous ones when the time comes.

Looking for New User Accounts

This last one is a no brainer but I couldn’t write this article without mentioning it. It’s incredibly common for an attacker to compromise a system and then create a new user account on it for eased reentry back into the system. You can view the user accounts on your system by going to the start menu, right clicking Computer, clicking Manage, and browsing the Users and Groups heading.

Conclusion

In this article I’ve given a basic run through of some things to look for when you think your system has been compromised. This list is by no means exhaustive, as entire books have been written on this topic. In addition, the SANS institute has a great cheat sheet to accompany this article that can be found here. As always, remember that proactive security is the best security as it prevents you from having to be reactive.