-
UNUSUAL PROCESSES
- ps -aux
- Look at running processes
- lsof -p [pid]
- shows files and port used by [pid]
- chkconfig --list
- If available
- check which services are enabled
- UNUSUAL FILES
- find / -uid 0 -perm -4000 -print
- unusual SUID root files
- find / -size +10000k -print
- Look for unusually large files
- find / -name “ “ -print
- find / -name “. ” -print
- find / -name “.. “ -print
- Look for files with unusual dots and space in the names
- lsof +L1
- look for processes running/accessing unlinked files
- UNUSUAL NETWORK USAGE
- ip link | grep PROMISC
- Look for promiscuous mode network card mode - possible. sniffer
- netstat -nap
- look for unusual port listeners
- lsof -i
- details about processes listening on ports
- arp -a
- unusual arp entries
- UNUSUAL SCHED TASKS
- crontab -u root -l
- cronjobs sched by root and other 0 UID accounts
- cat /etc/crontab
- ls /etc/cron.*
- unusual system-wide cronjobs
- UNUSUAL ACCOUNTS
- sort -nk3 -t: /etc/passwd |less
- look for new acounts sorted by UID
- egrep ‘:0+:’ /etc/passwd
- look for unexpected UID 0 accounts
- getent passwd |egrep ‘:0+:’
- look for unexpected UID 0 accounts if using multiple authnt methods
- find / -nouser -print
- look for orphaned files. may be cache of temp account that was deleted
- UNUSUAL LOG ENTRIES
- “entered promiscuous mode”
- large number of auth fails from local/remote
- RPC programs that include large number of unusual characters
- web logs with unusual number of error
- reboots/app restarts
- UNUSUAL OTHERS
- uptime
- look at load avarage
- df
- sudden increase in disk space utilization