- Running
netstat
, see the weird python script with established connection to some remote host:
- Grab the executable:
lsof -p 2082
andps aux grep 2082
.
- Let’s see the
/tmp/
folder forbackdoor
executable - Check
/proc/2082
andls
- Since the executable is a legitimate python, need to explore further. In
/proc/2082
runsudo cat cmdline
shows the comand used to launch,cat task/2082/children
shows children PID.sudo cat status
shows general information.cat environ
shows … .cat arp
shows MAC addresses of the machines connected:
- Get the backdoor file: file recovery or memory forensics. Sometimes
/procfs
can manage.
References
[1] Magnet webinar on Linux Forensics