|
|
Subscribe / Log in / New account

Interview with Rootkit Hunter author Michael Boelen

September 29, 2004

This article was contributed by Joe Klemmer

One of the greatest joys we Linux users have is to say to our Windows-running friends, family and co-workers that we do not suffer from viruses like they do. However, the reality is that we aren't immune from being attacked. There are plenty of nasty things out there that would be happy to trash our systems. One of these nasty things is something called a rootkit. Rootkits allow a cracker to ensure future access to a compromised system while hiding the evidence from administrators and users; see LWN's look at the Adore rootkit for an example.

So how do you detect them? One way is to use the tool Rootkit Hunter. The following is an interview with the author of this utility, Michael Boelen.

Joe Klemmer: Tell us a bit about yourself. Who is Michael Boelen?

Michael Boelen: I'm a 22 years old guy, working for a small company (small webhosting, maintaining servers/services and application development). My task it to maintain the internal servers and perform administration for our customers. I live in The Netherlands at my parents. Computers are my hobby and my work, so I'm the author of Rootkit Hunter :-)

My main interests are networking, hardware, security and small application development. As many people, I like to read, but especially interested in computer related stuff.

JK: What led you into system security?

MB: It's a special part of computer services, which attracts me because it's never the same. It's a dynamic world inside the big computer world. Although a lot of companies aren't aware of the consequences of (a missing plan for) security, I think it's a very important part. That's why almost everyone in the computer world will use/need some security enhancements sooner or later. In my case, open relays, Trojans and viruses were the first signals to have a better look at security.

JK: What, specifically, are rootkits?

MB: Rootkits are often little packages with some binaries, some sources and an easy-to-use installer. These packages are being created to 'stay root' after a successful comprise of a host. The installer in these packages do check the host and replaces the default binaries with the one in the package. Most times these are binaries like 'ps', 'ls', 'top', 'netstat', where traces of the hacker/cracker/scriptkiddie are being filtered, with one purpose: hide evil processes, network connections etc.

Because rootkits are unwanted and difficult to find without good searching, automated tools are being created. Although an UNIX specialist is often able to find bad things better/quicker than automated tools, it can be a very valuable tool. Of course it is a nice addition to UNIX specialists, but also for average UNIX users which aren't able to find out with things of a UNIX system are good or evil (like hidden files, bad strings, not usual network ports etc).

JK: You've said elsewhere that you built rkhunter because you didn't find the existing tools to your liking. What was it about them that you felt needed changing?

MB: The lack of active development is the most important one. I won't say my tool is better than the others, but I try to maintain it as active as possible. When users come with (nice) new ideas, most times I try to implement it as soon as possible.

JK: Over the course of rkhunter's evolution, have you found anything interesting about root kits? Any similarities or differences? Are there any trends?

MB: Yes, a lot of interesting information. I also have a better idea now (since the development) why hackers/crackers/scriptkiddies use rootkits and what to do to detect them. The most difficult part is to maintain an utility which keeps smart enough to detect suspicious traces on a system.

Most tools use the same approach, so I tried to combine as many as possible ways to detect these suspicious traces. And although it gets better every release, a lot of things have to be done.

Rootkits don't have a 'normal' trend like viruses/worms have, because viruses aren't often used for a single person to achieve his goal (beside breaking up systems, sending spam or planting a trojan). In fact, some individuals create rootkits for their needs at the moment they need them. These custom made rootkits contain often simple things like IRC bots, backdoors and sniffers. Within the next few months, those things will be getting special attention from me and added to Rootkit Hunter. Rootkits won't quickly disappear, so the war isn't yet over.

JK: Do you know if rkhunter has had an impact on the root kit community? Are they now trying to design kits to work around rkhunter?

MB: I have really no idea, because most rootkits and backdoors are still being used by individuals and use private parts (although there are a lot of often used public tools). So I haven't seen any tools yet, which are build to hide for Rootkit Hunter. But I'll guess there will be variants already available.

JK: I would guess that the battle between the root kit "developers" and the security community is similar to the anti-virus wars. Is the bulk of your work spent in catching up to new root kits? Or are you in a position of developing preemptive technologies to head off the kit builders?

MB: On both ways, because maintaining a 'rootkit hunter' is almost similar to maintaining an anti-virus tool, with one exception, viruses aren't made to be hidden for the system (yet?). So anti-virus developers try to discover as quick as possible new (unknown) viruses. The approach on rootkits is a little bit different. It means also adding unknown rootkits, but more important, adding new ways to discover all kinds of hack traces.

JK: What do you see for the future of rkhunter? With the advent of SElinux will there still be a need for rkhunter and it's kind?

MB: I guess tools like this one, won't be quickly useless, because even if you have a secured system (like with SElinux and all other kernel and application improvements), it's always possible someone breaks your system. At that stage, tools like Rootkit Hunter (and the few others) can provide an administrator very useful information.

This interview gives me the opportunity to ask people an easy question: If you find something interesting for me, can you send it to me?

The question above gives an answer to your question, because although I can improve Rootkit Hunter a lot, I really need input from the users and the guys on the field. Rootkits, sniffers, ideas and even books are needed to keep on improving. Till now I have already got a lot of input, but I still need more information. So have a simple thought about the future: it only will be better, but only if I get support from the community!


Index entries for this article
GuestArticlesKlemmer, Joe


to post comments

The Anti-Virus approach to rootkits

Posted Sep 30, 2004 10:20 UTC (Thu) by dps (guest, #5725) [Link]

The AV approach to rootkits is probably the least effective one. Instead you can construct broad-spectrum tools that look for the *effects* of root kits. In the case of adore, it only patches kill() and access via /proc. If netstat and ps output are not falsified one wonders how protective the rootkit is.

Brute force the remainder of the system calls that take a process id generates a real process list. The fact that kill() gives different results is a definite evidence of fun and games. Note that this method also reveals the real infomration inside various forms of sandbox.

Once you have a good process lsit you can then determine a real connection list via /proc/<pid>/fd/*, even if <pid> is something that is hidden. Comaprison with ps output would tell you than your system has been owned.

checkps, my background version of this, can also stop or kill the hidden processes with using ptrace if you ask it to and most of a netstat test is also included. I am open to offers if to maintain this beast.

Generic logic is also included in chkrootkit (albeit less exhaustive logic). A good default deny firewall is also effective against many remote access tools, especially if it implements fascism in both directions.

Interview with Rootkit Hunter author Michael Boelen

Posted Oct 8, 2004 1:05 UTC (Fri) by accensi (guest, #11754) [Link] (1 responses)

Speaking in rootkits, seen today in ROX devel list:

> When I run chkrootkit, I see some problems, here they are :
> Searching for suspicious files and dirs, it may take a while...
> /usr/lib/apps/AbiWord/.DirIcon /usr/lib/apps/Emacs/.DirIcon
> /usr/lib/apps/GMix/.DirIcon /usr/lib/apps/GQView/.DirIcon
...
> /usr/lib/apps/Mandrake/Système/Terminaux/.DirIcon
> /usr/lib/apps/Mandrake/Système/Terminaux/Eterm/.DirIcon
> /usr/lib/apps/Mandrake/Système/Terminaux/X Term/.DirIcon
>
> As you can see, .DirIcon files are considered by chkrootkit as suspicious.
> After a little search I found that these files are frome the Rox RPM
> package, so I am reporting what I believe as a bug. As .DirIcon files are
> PNG pictures, why are they not in "file.png" format ?

Actually they are not necessarily .png files. They can be anything supported by gtk2's image loader (svg, xpm, jpeg, ...) Therefore adding a .png extension would be misleading in many cases.

The question is why does chkrootkit think they are suspicious?

!?!

chkrootkit

Posted Oct 20, 2004 9:28 UTC (Wed) by mmacok (guest, #20088) [Link]

Maybe all "hidden" files (name starting with a dot) in /usr are suspicious? (my guess)


Copyright © 2004, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds