Cross posted message from comp.s.os2.misc
=========================================================================
From:
jake@jakesplace.dhs.org (Jack Troughton)
Newsgroups: comp.os.os2.networking.misc,comp.os.os2.misc
Subject: Re: OT: Anatomy of a hacker attack
Reply-To:
jake@jakesplace.dhs.org
Date: Sun, 03 Jun 2001 02:03:39 GMT
On 1 Jun 2001 19:29:14 GMT, Christian Hennecke scribbled:
On Fri, 1 Jun 2001 13:34:32, jake@jakesplace.dhs.org (Jack Troughton) >
wrote:
I feel I should note that this capability has inherently been >> present in OS/2 for a long time now... however, nobody's been >> exploiting them.
Could you tell us a bit more about that?
Well, the stack in OS/2 since _at least_ 4.1 has been a full implementation of the BSD stack, as ported to OS/2 from AIX by IBM. I'm sure that some of these clowns would be able to build nasty packets using the warp stack. However, for a DDoS attack, an ability to have it on OS/2 doesn't buy you very much as there
aren't a huge number of OS/2 systems out there. Also, we don't have a fully integrated mail client like Outlook... and you _can't_ depend on people not being able to see the extensions on an OS/2 system: as soon as you send a rexx script by email everyone's going to immediately see that it's a program. This makes distributing them by email to clueless newbies a lot less likely to get you very far.
I bet that OS/2 could be a good development platform for these guys,though. However, I'm sure they'll stick with their Windows
systems... trojans, DDoS attacks, and the like all depend on getting your bots on as many systems as possible. The internet is turning out to be like other monocultures (in biology, I mean); once something gets in that can attack the monoculture, it just spreads like crazy. Usually in orange groves and things like that, the farmers just burn the infected trees....
The risk is certainly present though; while the
OS/2 community is more savvy as a whole, there's certainly nothing >> preventing it from being done. I think I know the kind of app we >> need; a process lister/socket lister, which can show which app is >> using which socket, and permit the user to kill the apps. Of course,>> since the stack comes with nice tools included, you can do this >> pretty easily now... but that's not so easy for people who are >> afraid of the command line. A PM program that would let people do >> that would be a lot better for new/naive users.
I think that would make a really nice topic for a HowTo for the OS/2 > eZine
or the VOICE Newsletter. What about taking us
non-networking-experts by the hand, Jack?
Get go.exe from hobbes:
http://hobbes.nmsu.edu/pub/os2/util/process/go_15.zip
This will list running programs on your computer.
The other command you need to know is already on your system; it's called netstat... and the switch that is key is -s.
Here's some sample output:
First, here's go.exe:
-----------------------begin
GO! v1.5 - (c) 1993-95 by Carsten Wimmer <
cawim@train.oche.de>
List of Processes:
P-ID PPID Session Thr Prio CPU Time Name
---- ---- ------- --- ---- -------------- ---------------------------
1272 0 005 Det 10 0200 0:05:17.34 WEASEL.EXE
1078 0 013 Det 1 0200 0:03:47.68 CMD.EXE
845 0 012 Det 1 0300 1:46:54.25 CMD.EXE
844 0 012 Det 6 0300 1:11:48.31 CHANGI.EXE
843 0 012 Det 6 0300 0:01:00.68 MAJOR.EXE
842 0 012 Det 3 0300 11:10:37.78 WEB.EXE
841 0 012 Det 5 0300 0:00:17.59 FTPD.EXE
37 0 000 Det 1 0200 0:00:00.18 EPWMUX.EXE
29 0 000 Det 1 0200 0:00:00.18 EPWMUX.EXE
28 0 000 Det 1 0200 0:00:00.15 EPWPSI.EXE
27 0 000 Det 3 0200 1:33:10.81 EPWMP.EXE
21 0 000 Det 2 0200 0:00:01.43 EPWROUT.EXE
20 0 000 Det 1 021F 0:00:00.50 LOGDAEM.EXE
19 0 000 Det 1 0200 0:00:00.09 LSDAEMON.EXE
10 0 000 Det 5 0304 12:58:02.81 CNTRL.EXE
9 0 000 Det 1 0200 0:00:00.65 LANMSGEX.EXE
7 0 000 Det 1 031F 0:00:00.03 MIDIDMON.EXE
5 0 000 Det 1 0200 0:00:06.87 LVMALERT.EXE
1 0 000 Sys 6 0100 0:31:52.53 LVMALERT.EXE
22 1 001 Sys 24 0200 8:05:22.56 PMSHELL.EXE
2268 22 004 Sys 5 021F 0:01:09.81 TELNETDC.EXE
2269 2268 004 Sys 1 0200 0:00:02.87 CMD.EXE
2270 2269 004 Sys 2 0200 0:00:29.87 SLRN.EXE
2271 2270 004 Sys 1 0200 0:00:02.06 CMD.EXE
2272 2271 004 Sys 3 0200 0:04:04.75 VIM.EXE
2276 2272 004 Sys 1 0200 0:00:00.28 CMD.EXE
2277 2276 004 Sys 1 0200 0:00:00.03 GO.EXE
835 22 015 VIO 1 0200 0:00:00.06 CMD.EXE
839 835 015 VIO 1 0200 0:01:20.34 SYSLOGD.EXE
833 22 011 VIO 1 0200 0:00:00.09 CMD.EXE
834 833 011 VIO 1 0200 0:00:12.96 TELNETD.EXE
32 22 012 VIO 1 0300 0:01:13.96 CMD.EXE
30 22 010 PM 4 0200 0:00:00.12 PMSPOOL.EXE
24 22 000 Sys 3 0300 0:00:00.03 HARDERR.EXE
23 22 FF0 VDM 1 0300 0:00:00.00 VDM 2 1 000 VDM 1 031F
0:00:00.00 VDM
There are 36 Processes with 108 Threads.
This machine's uptime is 3d 0h 14m 8s 54ms.
-----------------------end
See next message part #2 ..
Mike @ 1:117/3001
--- Maximus/2 3.01
* Origin: Ziplog Public Port (1:117/3001)