SlideShare a Scribd company logo
Linux Systems
Compromised
Understanding and dealing with break-ins
Ede, 5 February 2016
Michael Boelen
michael.boelen@cisofy.com
Agenda
Today
1. How do “they” get in
2. Rootkits
3. Malware handling
4. Defenses
2
Michael Boelen
● Security Tools
○ Rootkit Hunter (malware scan)
○ Lynis (security audit)
● 150+ blog posts
● Founder of CISOfy
3
How do “they” get in
Intrusions
● Passwords
● Vulnerabilities
● Weak configurations
5
Why?
6
Keeping Control
● Rootkits
● Backdoors
7
Rootkits 101
Rootkits
● (become | stay) root
● (software) kit
9
Rootkits
● Stealth
● Persistence
● Backdoors
10
How to be the best rootkit?
Hiding ★
In plain sight!
/etc/sysconfig/…
/tmp/mysql.sock
/bin/audiocnf
12
Hiding ★★
Slightly advanced
● Rename processes
● Delete file from disk
● Backdoor binaries
13
Hiding ★★★
Advanced
● Kernel modules
● Change system calls
● Hidden passwords
14
Demo
Demo
16
Demo
17
Continuous Game
18
Detection
Handling of compromised Linux systems
Challenges
● We can’t trust anything
● Even ourselves
● No guarantees
21
Rootkit Hunter
Detect the
undetectable!
22
Dealing with malware
● Owner?
● Risk?
● What if we pull the plug?
Activate your plan!
24
VLAN
Bogus DNS
Looks Real™
Quarantine
25
Consider Research
Memory dump
(Volatility)
Static analysis
26
Restore
Does it include malware?
27
Defense
Best protection
At least
● Perform security scans
● Collect data
● System Hardening
29
Frameworks / Patches
● SELinux
● AppArmor
● Grsecurity
30
Compilers
● Remove
● Limit usage
31
Harden Applications
● Use chroot
● Limit permissions
● Change defaults
32
Kernel Hardening
● sysctl -a
● Don’t allow ptrace
33
Automation
Tip: Lynis
● Linux / UNIX
● Open source
● GPLv3
35
Conclusions
Conclusions
● Good rootkits are hard to detect
● Use cost-effective methods
● Detect
● Restore
● Learn
● Apply hardening
37
You finished this presentation
Success!
More Linux security?
Presentations
michaelboelen.com/presentations/
Follow
● Blog Linux Audit (linux-audit.com)
● Twitter @mboelen
39
40

More Related Content

What's hot (20)

PDF
Oksana Safronova - Will you detect it or not? How to check if security team i...
NoNameCon
 
PPT
Linux Security
nayakslideshare
 
PDF
Implementing ossec
Jeronimo Zucco
 
PDF
Introduction to Exploitation
UTD Computer Security Group
 
ODP
If security is hard, you are doing it wrong - Fabio Locati - Codemotion Amste...
Codemotion
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PPTX
kali linux.pptx
anumeha bhatnagar
 
PPTX
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 
PDF
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
 
PDF
Virtual Networking Security - Perimeter Security
Eng Teong Cheah
 
PDF
Managing Application Config and Secrets
Eng Teong Cheah
 
PDF
$HOME Sweet $HOME SANSFIRE Edition
Xavier Mertens
 
PPTX
Kali linux
afraalfalasii
 
PDF
HAcktive Directory - Microsoft Meetup July 2020
Yossi Sassi
 
PPT
Kevin wharram
Kevin Wharram
 
PPTX
Migrate from windows to linux
MarJose Darang
 
PDF
BASIC OVERVIEW OF KALI LINUX
Deborah Akuoko
 
PDF
Virtual Networking Security - Network Security
Eng Teong Cheah
 
PDF
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
 
PDF
Slides null puliya linux basics
Anant Shrivastava
 
Oksana Safronova - Will you detect it or not? How to check if security team i...
NoNameCon
 
Linux Security
nayakslideshare
 
Implementing ossec
Jeronimo Zucco
 
Introduction to Exploitation
UTD Computer Security Group
 
If security is hard, you are doing it wrong - Fabio Locati - Codemotion Amste...
Codemotion
 
[OWASP Poland Day] Saving private token
OWASP
 
kali linux.pptx
anumeha bhatnagar
 
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
 
Virtual Networking Security - Perimeter Security
Eng Teong Cheah
 
Managing Application Config and Secrets
Eng Teong Cheah
 
$HOME Sweet $HOME SANSFIRE Edition
Xavier Mertens
 
Kali linux
afraalfalasii
 
HAcktive Directory - Microsoft Meetup July 2020
Yossi Sassi
 
Kevin wharram
Kevin Wharram
 
Migrate from windows to linux
MarJose Darang
 
BASIC OVERVIEW OF KALI LINUX
Deborah Akuoko
 
Virtual Networking Security - Network Security
Eng Teong Cheah
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
 
Slides null puliya linux basics
Anant Shrivastava
 

Similar to Handling of compromised Linux systems (20)

PDF
Understanding and implementing website security
Drew Gorton
 
PDF
Hybis: Advanced Introspection for Effective Windows Guest Protection
Federico Franzoni
 
ODP
Wordpress Security 101
Robert Rowley
 
PPTX
Open Source Defense for Edge 2017
Adrian Sanabria
 
PDF
On hacking & security
Ange Albertini
 
PDF
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
DynamicInfraDays
 
PDF
Olivier Cleynen: Overtaking Proprietary Software Without Writing Code [24c3]
OpenSlidesArchive
 
PDF
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Code Engn
 
PPT
Bulletproof IT Security
London School of Cyber Security
 
PDF
Windows logging workshop - BSides Austin 2014
Michael Gough
 
PDF
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
CloudOps2005
 
DOCX
2569 protect yourdatawithbitlocker_gs_windows7_external
Expert Outsource Pvt Ltd
 
PDF
Introduction to Slick
Knoldus Inc.
 
PDF
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
Tom Limoncelli
 
PPTX
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Shota Shinogi
 
PDF
Fileless Malware Infections
Ramon
 
PPTX
Playing with fuzz bunch and danderspritz
Deepanshu Gajbhiye
 
PDF
Deeplook into apt and how to detect and defend v1.0
Michael Gough
 
PDF
Stop pulling the plug
Kamal Rathaur
 
PDF
How to Hack Windows on Linux A Comprehensive Guide.pdf
uzair
 
Understanding and implementing website security
Drew Gorton
 
Hybis: Advanced Introspection for Effective Windows Guest Protection
Federico Franzoni
 
Wordpress Security 101
Robert Rowley
 
Open Source Defense for Edge 2017
Adrian Sanabria
 
On hacking & security
Ange Albertini
 
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
DynamicInfraDays
 
Olivier Cleynen: Overtaking Proprietary Software Without Writing Code [24c3]
OpenSlidesArchive
 
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Code Engn
 
Bulletproof IT Security
London School of Cyber Security
 
Windows logging workshop - BSides Austin 2014
Michael Gough
 
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
CloudOps2005
 
2569 protect yourdatawithbitlocker_gs_windows7_external
Expert Outsource Pvt Ltd
 
Introduction to Slick
Knoldus Inc.
 
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
Tom Limoncelli
 
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Shota Shinogi
 
Fileless Malware Infections
Ramon
 
Playing with fuzz bunch and danderspritz
Deepanshu Gajbhiye
 
Deeplook into apt and how to detect and defend v1.0
Michael Gough
 
Stop pulling the plug
Kamal Rathaur
 
How to Hack Windows on Linux A Comprehensive Guide.pdf
uzair
 
Ad

Recently uploaded (20)

PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Ad

Handling of compromised Linux systems