Solved

No directory! - Root permisions where changed to 0 now it is 755 - No evidence in last command of yesterday

Posted on 2011-02-17
3
510 Views
Last Modified: 2013-12-27
Hi experts.
I receive an alert yesterday night from our Oracle monitoring system of one of the two unreacheable nodes, (one has a more upgraded version of the monitoring agent).  In one of the nodes there is no evidence of the logging via last command - solaris Sparc 64 bit.
Can it be possible that one of this two things be possible?

1- Someone can enter and change root permissions in the Solaris node without a trace in the last command.

2- There is some sort of certification expiration or software expiration that will change the root permissions to 0 yesterday february 16 like some kind of "trial software" or some kind of "virus software".
0
Comment
Question by:LindaC
  • 2
3 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
Comment Utility
Hi,

1 - yes, that's possible if you have ssh installed. ssh remote command execution never uses login(), so there is no trace in wtmp (the file "last" relies on).
Of course one must be able to gain root authority to perform the actions you mentioned.
If the malicious person is in possession of root's password they could do:

ssh root@node 'chmod 755 ....' (if root login via ssh is permitted)
or
ssh user@node -c #su - -c chmod 755 ...'

2 - possible, of course, but I never heard of such phenomena before.

wmp
0
 
LVL 68

Expert Comment

by:woolmilkporc
Comment Utility
Sorry, the second "ssh" example should read:

ssh user@node -c 'su - -c chmod 755 ...'

ssh would log connections via syslog if configured.
You need an entry "auth.info /path/to/log' ("info" or higher) in /etc/syslog.conf or a catch-all entry "*.info /path/to/log".

wmp
0
 
LVL 8

Author Closing Comment

by:LindaC
Comment Utility
Thank you.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

FreeBSD on EC2 FreeBSD (https://www.freebsd.org) is a robust Unix-like operating system that has been around for many years. FreeBSD is available on Amazon EC2 through Amazon Machine Images (AMIs) provided by FreeBSD developer and security office…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now