ports/132131: New port: security/unhide A forensic tool to find hidden processes and TCP/UDP ports

Nikos Ntarmos ntarmos at cs.uoi.gr
Thu Feb 26 15:50:05 UTC 2009


>Number:         132131
>Category:       ports
>Synopsis:       New port: security/unhide A forensic tool to find hidden processes and TCP/UDP ports
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Feb 26 15:50:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Nikos Ntarmos
>Release:        FreeBSD 7.1-STABLE i386
>Organization:
Computer Science Dept., U. of Ioannina, Greece
>Environment:
System: FreeBSD ace.cs.uoi.gr 7.1-STABLE FreeBSD 7.1-STABLE #0: Mon Feb 9 02:02:57 EET 2009 ntarmos at ace.netcins.ceid.upatras.gr:/opt/obj/opt/src/sys/ACE i386


	
>Description:
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by
rootkits / LKMs or by another hidden technique. It consists of two
programs: unhide and unhide-tcp.

unhide detects hidden processes through:
* Comparison of /proc vs /bin/ps output.
* Comparison of info gathered from /bin/ps with info gathered from.
* Syscalls (syscall scanning).
* Full PIDs space ocupation (PIDs bruteforcing).

unhide-tcp identifies TCP/UDP ports that are listening but not listed in
/bin/netstat by doing brute forcing of all TCP/UDP ports availables.
>How-To-Repeat:
	
>Fix:

	

--- unhide.shar begins here ---
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	unhide
#	unhide/Makefile
#	unhide/files
#	unhide/files/patch-Makefile
#	unhide/distinfo
#	unhide/pkg-descr
#
echo c - unhide
mkdir -p unhide > /dev/null 2>&1
echo x - unhide/Makefile
sed 's/^X//' >unhide/Makefile << '80f8b6017c513539fd5a60feb5294182'
X# New ports collection makefile for:   unhide
X# Date created:        26 February 2009
X# Whom:                ntarmos at cs.uoi.gr
X#
X# $FreeBSD$
X#
X
XPORTNAME=	unhide
XPORTVERSION=	20080519
XCATEGORIES=	security
XMASTER_SITES=	http://www.security-projects.com/
XDISTNAME=	${PORTNAME}${DISTVERSION}
XEXTRACT_SUFX=	.tgz
X
XMAINTAINER=	ntarmos at cs.uoi.gr
XCOMMENT=	A forensic tool to find hidden processes and TCP/UDP ports
X
XWRKSRC=		${WRKDIR}/${PORTNAME}-${DISTVERSION}
XPLIST_FILES=	sbin/unhide sbin/unhide-tcp
XMAN8=		unhide.8 unhide-tcp.8
XMANCOMPRESSED=	yes
X
X.include <bsd.port.pre.mk>
X
Xpre-configure:
X	@${REINPLACE_CMD} -e 's/-eLf/-axH/g' -e 's/$$2/$$1/g' ${WRKSRC}/unhide.c
X	@${REINPLACE_CMD} -e 's/-t/-p tcp -/g' -e 's/-u/-p udp -/g' \
X		${WRKSRC}/unhide-tcp.c
X
X.include <bsd.port.post.mk>
80f8b6017c513539fd5a60feb5294182
echo c - unhide/files
mkdir -p unhide/files > /dev/null 2>&1
echo x - unhide/files/patch-Makefile
sed 's/^X//' >unhide/files/patch-Makefile << 'a9de08e4dbb8db8fa262303ddc558f88'
X--- /dev/null	2009-02-26 16:27:00.000000000 +0200
X+++ Makefile	2009-02-26 16:26:45.000000000 +0200
X@@ -0,0 +1,19 @@
X+DESTDIR		:= /usr/local
X+MANDIR		:= ${DESTDIR}/man
X+INSTALL_PROGRAM	:= /usr/bin/install -s -m 0700
X+INSTALL_MAN	:= /usr/bin/install -m 0444
X+GZIP_CMD	:= /usr/bin/gzip -9
X+MKDIR_CMD	:= /bin/mkdir -p
X+
X+all:
X+	gcc unhide.c -o unhide
X+	gcc unhide-tcp.c -o unhide-tcp
X+
X+install: all
X+	${MKDIR_CMD} ${DESTDIR}/sbin ${MANDIR}/man8
X+	${INSTALL_PROGRAM} unhide ${DESTDIR}/sbin/unhide
X+	${INSTALL_PROGRAM} unhide-tcp ${DESTDIR}/sbin/unhide-tcp
X+	${INSTALL_MAN} man/unhide.8 ${MANDIR}/man8 && \
X+		${GZIP_CMD} ${MANDIR}/man8/unhide.8
X+	${INSTALL_MAN} man/unhide-tcp.8 ${MANDIR}/man8 && \
X+		${GZIP_CMD} ${MANDIR}/man8/unhide-tcp.8
a9de08e4dbb8db8fa262303ddc558f88
echo x - unhide/distinfo
sed 's/^X//' >unhide/distinfo << '291d2a6c3bca23c2290cc1b8828e77b7'
XMD5 (unhide20080519.tgz) = 1194ec0f89c6f28e8eb64fb66836f70f
XSHA256 (unhide20080519.tgz) = 631bc2fb09fa05351273021fd32483e5bf4187dcdc15222335fe2ddc5d146ae3
XSIZE (unhide20080519.tgz) = 17104
291d2a6c3bca23c2290cc1b8828e77b7
echo x - unhide/pkg-descr
sed 's/^X//' >unhide/pkg-descr << 'acce0e3235507f7eefa4a89c50d12e6e'
XUnhide is a forensic tool to find hidden processes and TCP/UDP ports by
Xrootkits / LKMs or by another hidden technique. It consists of two
Xprograms: unhide and unhide-tcp.
X
Xunhide detects hidden processes through:
X   * Comparison of /proc vs /bin/ps output.
X   * Comparison of info gathered from /bin/ps with info gathered from.
X   * Syscalls (syscall scanning).
X   * Full PIDs space ocupation (PIDs bruteforcing).
X
Xunhide-tcp identifies TCP/UDP ports that are listening but not listed in
X/bin/netstat by doing brute forcing of all TCP/UDP ports availables.
X
X
XWWW: http://http://www.security-projects.com/?Unhide/
acce0e3235507f7eefa4a89c50d12e6e
exit
--- unhide.shar ends here ---


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list